Archive

Category Archives for "Networking"

Packet analysis using Docker

Why use sFlow for packet analysis? To rephrase the Heineken slogan, sFlow reaches the parts of the network that other technologies cannot reach. Industry standard sFlow is widely supported by switch vendors, embedding wire-speed packet monitoring throughout the network. With sFlow, any link or group of links can be remotely monitored. The alternative approach of physically attaching a probe to a SPAN/Mirror port is becoming much less feasible with increasing network sizes (10's of thousands of switch ports) and link speeds (10, 100, and 400 Gigabits). Using sFlow for packet capture doesn't replace traditional packet analysis, instead sFlow extends the capabilities of existing packet capture tools into the high speed switched network.

This article describes the sflow/tcpdump  and sflow/tshark Docker images, which provide a convenient way to analyze packets captured using sFlow.

Run the following command to analyze packets using tcpdump:
$ docker run -p 6343:6343/udp -p 8008:8008 sflow/tcpdump

19:06:42.000000 ARP, Reply 10.0.0.254 is-at c0:ea:e4:89:b0:98 (oui Unknown), length 64
19:06:42.000000 IP 10.0.0.236.548 > 10.0.0.70.61719: Flags [P.], seq 3380015689:3380015713, ack 515038158, win 41992, options [nop,nop,TS val 1720029042 ecr 904769627], length 24
19:06:42.000000 Continue reading

Microsoft Launches Azure Into Orbit With ExpressRoute

The cloud giant announced partnerships with SES, Viasat, and Intelsat to bring Azure to remote...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Veteran AT&T Exec Gets Candid About Operator Challenges

Mobile network operators need to make money now and have “massive strengths” that remain...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Fortifies Kubernetes Nodes Against Boot Attacks

The Google angle hardens the underlying Google Kubernetes Engine node against rootkits and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to use Terminator on Linux to run multiple terminals in one window

If you’ve ever wished that you could line up multiple terminal windows and organize them in a single window frame, we may have some good news for you. The Linux Terminator can do this for you. No problemo!Splitting windows Terminator will initially open like a terminal window with a single window. Once you mouse click within that window, however, it will bring up an options menu that gives you the flexibility to make changes. You can choose “split horizontally” or “split vertically” to split the window you are currently position in into two smaller windows. In fact, with these menu choices, complete with tiny illustrations of the resultant split (resembling = and ||), you can split windows repeatedly if you like. Of course, if you split the overall window into more than six or nine sections, you might just find that they're too small to be used effectively.To read this article in full, please click here

Network Break 251: AWS Outage Is A Backup Reminder; What’s New At FutureNET?

Today's Network Break podcast delves into an AWS outage, tracks a slump in server sales, examines acquisitions by Commvault and Microsoft, and shares highlights from VMworld's FutureNET program. Guest Ed Horley stops by to share commentary and insights.

The post Network Break 251: AWS Outage Is A Backup Reminder; What’s New At FutureNET? appeared first on Packet Pushers.

BrandPost: Moving to SD-WAN? Consider Security Carefully, Say Experts and IT Managers

For those of you migrating from MPLS to SD-WAN, here’s a truism that all too often is forgotten: don’t overlook your security architecture.Failure to consider security as part of SD-WAN deployments is a major cause of security breaches.  Last year, enterprises with completed SD-WAN implementations were 1.3 times more likely to experience a branch office security breach than those without one, says Shamus McGillicuddy, Research Director at analyst firm Enterprise Management Associates.To read this article in full, please click here

The Week in Internet News: Covert Social Media Campaign Champions Military Rulers

The Internet as warfighting tool: Military rulers in Sudan and other countries are paying “Internet warfare” firms to develop social media campaigns to praise their leadership, the New York Times reports. The story highlights a social media company called New Waves, run by a former member of the Egyptian military and a self-described “researcher on Internet wars.”

Internet warfare, part 2: Meanwhile, a “virtual army” from mainland China has focused on recent protests in Hong Kong, with social media posts boosting government interests, the South China Morning Post writes. New recruits to the nationalist Diba group are taught how to use VPNs and circumvent the government firewall to reach the “battlefield” – social media pages and websites normally banned.

Protestors strike back: The Hong Kong protestors had their own Internet-related tactics, QZ.com reports. In response to threats of Internet shutdown, protestors began to use Bluetooth-based mesh networking technologies, allowing them to communicate through a network of devices that are linked locally, rather than over an Internet connection.

Encryption loves blockchain: The Tide Foundation, a nonprofit building an open-source framework for protecting data, has developed a blockchain-based encryption approach, Silicon Angle says.  This type of encryption is much more difficult Continue reading

Samsung Taps Amdocs to Combine 5G and Virtualization in ONAP

The companies are collaborating to support operators as they combine VNFs, SDN, and 5G in ONAP.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Replacing a Network Element Config System with Git

In this post I’ll explore replacing the heart of a network operating system’s configuration mechanism with the software developers take on version control. It can be argued that network operating systems, or at least good ones, already have a version control system. It’s that very system that allows you to roll back and carry out operations like commit-confirmed. More specifically, this is a version control system like Git but not specifically git.

As my day job rotates around Junos, I’ll concentrate on that. So why would anyone want to rip out the heart of Junos and replace it with a git backed directory full of configuration snippets? Software developers and now automation skilled engineers want the advantages of being able to treat the network like any other service delivering node. Imagine committing human readable configuration snippets to a network configuration directory and having the network check it out and do something with it.

Junos already has a configuration engine capable of rollbacks and provides sanity through semantic and syntax commit time checks. Mgd (the service you interact with) provides mechanisms to render interfaces through YANG models and generates the very configuration tree you interact with. You could say mgd takes Continue reading

Why we cannot live without a Telco Cloud, and how does one build one?

There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.

Let me explain.

Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.

While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.

So, what’s the big deal with mobile connections growing?

Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.

Not Continue reading

Why we cannot live without a Telco Cloud, and how does one build one?

There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.

Let me explain.

Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.

While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.

What’s the big deal with mobile connections growing?

Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.

Not anymore.

Continue reading

Money Moves: August 2019

Here are some of the most prominent venture capital and merger and acquisition news items from...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

vlog. Episode 5. NetLdn: Networking for Networkers

Hello my friends,

It is always cool to talk about various network technologies with the engineers from industry, and to meet some awesome chaps. I had a pleasure to attend such an event in London in the last months. Learn my findings on that.

CY2019 Episode 5 // NetLdn with James Bensley and Richard Patterson

In this episode, together with James Bensley and Richard Patterson from Sky we discuss the the NetLdn event series. The event, where you can discuss network technoligies with the peers and, perhaps, make some friends.

Don’t forget to subscribe for the channel, put likes and repost the video if you like that! ?

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,
Anton Karneliuk

Composable 5G Networks? It’s a Thing, Liqid CEO Says

The next phase of composable infrastructure involves 5G networks as a fabric type.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.