Author Archives: Russ
Author Archives: Russ
The post Worth Reading: ONIE in the Data Center appeared first on 'net work.
The post Worth Reading: Ten Buzzwords to Avoid in your Profile appeared first on 'net work.
The post Worth Reading: Intel Defends Chip Innovation appeared first on 'net work.
The most current version of the draft can be found here. There is one more comment from Uma that still needs to be addressed, and one more section that needs to be added. There will probably be more changes, as well, over time. These sorts of drafts do not happen through one person; a number of folks have worked on various bits of the draft, including Shawn, Nikos, Ivan, Les, Naiming, Uma, and others—the folks who have added ideas, etc., are included in the contributors section, which is always worth paying attention to!
The post Openfabric: A Short Video of the IETF Presentation appeared first on 'net work.
The post Worth Reading: Microservices to the Edge appeared first on 'net work.
The post Worth Reading: IPAM and RIRs appeared first on 'net work.
The post On the ‘net: CAP and SDN appeared first on 'net work.
The post Worth Reading: Botnets in the Cloud appeared first on 'net work.
The post Worth Reading: QoS Marking is an Application Problem appeared first on 'net work.
When the inevitable 2AM call happens—”our network is under attack”—what do you do? After running through the OODA loop (1, 2, 3, 4), used communities to distribute the attack as much as possible, mitigated the attack where possible, and now you realist there little you can do locally. What now? You need to wander out on the ‘net and try to figure out how to stop this thing. You could try to use flowspec, but many providers do not like to support flowspec, because it directly impacts the forwarding performance of their edge boxes. Further, flowspec, used in this situation, doesn’t really work to walk the attack back to its source; the provider’s network is still impact by the DDoS attack.
This is where DOTS comes in. There are four components of DOTS, as shown below (taken directly from the relevant draft)—
The best place to start is with the attack target—that’s you, at 6AM, after trying to chase this thing down for a few hours, panicked because the office is about to open, and your network is still down. Within your network there would also be a DOTS client; this would be a small piece of software running Continue reading
The post Worth Reading: A Guide to Private VPN Services appeared first on 'net work.
The post Worth Reading: It’s Personal appeared first on 'net work.