During last year’s Birthday Week we announced early support for QUIC, the next generation encrypted-by-default network transport protocol designed to secure and accelerate web traffic on the Internet.
We are not quite ready to make this feature available to every Cloudflare customer yet, but while you wait we thought you might enjoy a slice of quiche, our own open-source implementation of the QUIC protocol written in Rust.
Quiche will allow us to keep on top of changes to the QUIC protocol as the standardization process progresses and experiment with new features more easily. Let’s have a quick look at it together.
The main design principle that guided quiche’s initial development was exposing most of the QUIC complexity to applications through a minimal and intuitive API, but without making too many assumptions about the application itself, in order to allow us to reuse the same library in different contexts.
For example, while we think Rust is great, most of the stack that deals with HTTP requests on Cloudflare’s edge network is still written in good ol’ C, which means that our QUIC implementation would need to be integrated into that.
The quiche API can process Continue reading
The German carrier signed an agreement with the Berlin Senate Department for Economics, Energy and Public Enterprises to drive 5G deployment in the capital.
Community established networks, also referred to as “community networks” (CNs), have existed for many years and provide a sustainable solution to address the connectivity gaps that exist in urban, remote, and rural areas around the world. While the global statistics estimate that about half of the world population has access to the Internet, the connectivity gap is wide between the developed and developing countries.
In Tanzania, there are 41.8 million voice telephone subscriptions and only 23 million Internet users. A study by Research ICT Africa reported that when Internet access is compared between rural and urban areas, 86% of rural dwellers remain unconnected to the Internet compared to 44.6% in urban areas. Similarly, in Tanzania, fewer women have access to and use of the Internet than men.
In order to address the connectivity challenges in Tanzania, the Internet Society Tanzania Chapter in partnership with the University of Dodoma, supported by Beyond the Net Funding Programme, has built a pilot project using TV white space as a community network solution. The deployed network has connected four educational institutions in rural Tanzania and at the same time provided Internet access to community members around the schools.
In order Continue reading
Today there is a need for a new breed of IT professional−the hybrid engineer. This is an engineer who understands DevOps and has the technical skills and ability to communicate in business terms.
In summer 2018 Juniper started talking about another forward-looking concept: Network Reliability Engineering. We wanted to find out whether that’s another unicorn driving DeLorean with flux capacitors or something more tangible, so we invited Matt Oswalt, the author of Network Reliability Engineer’s Manifesto to talk about it in Episode 97 of Software Gone Wild.
Read more ...They are mobile 5G, fixed wireless, and edge computing, and AT&T says it is building its networks to allow “LTE to work efficiently in parallel with 5G.” “
Accenture has been working on a commercial version of ONAP to support providers’ transition from hardware-based to software-based networks.
But “this rate of investment is not sustainable,” Strategic Cyber Ventures warns. There are likely many security “zombies” that initially raised big rounds but now growth has slowed.
We often use metaphors to describe a particular part of a thing or the thing itself. For instance, we might say “I’m as hungry as a horse,” to describe how much we think we could eat (although a more appropriate saying might be “as hungry as a bird,” as it turns out!). Network operators and engineers are no exception to this making of metaphors, of course.
Metaphors have a reductionistic tendency. For instance, when saying I am as hungry as a horse, I am relating the amount of food a horse might eat to the amount of food I feel like eating. The metaphor reduces the entire person and the entire horse so the turn on a single point—a quantity of food. In using this kind of comparison, I am not claiming to have the same number of legs as a horse, or perhaps a swishing tail like a horse.
The danger in using a metaphor is that you can take the part to be the whole. When this happens, the metaphor says things it should not say, and can cause us to misunderstand the scope, complexity, or solution to a problem. For some reason, we tend to do Continue reading
In one of our last posts on MPLS – we showed how LDP can be used to dynamically exchange labels between MPLS enabled routers. This was a huge improvement from statically configured LSPs. We saw that LDP was tightly coupled to the underlying IGP but we didn’t spend a lot of time showing examples of that. In this post, I want to extend our lab a little bit to show you exactly how tightly this coupling is. To do so, we’ll use part of the extended lab that we created at the end of our last post on the JunOS routing table. For the sake of being thorough, we’ll provide the entire configuration of each device. The lab will look like what’s shown below…
For a base configuration – we’re going to start with mostly everything there with the exception of MPLS and LDP. We’ll then add that in stages so we can see how things look before and after we have multiple IGP paths to the same destination…
vMX1 Configuration…
system { host-name vmx1.lab; } interfaces { ge-0/0/0 { unit 0 { family inet { address 10.2.2.0/31; } } } ge-0/0/1 { unit 0 { Continue reading
According to EdgeMicro, these proof-of-concept edge computing tests are the last step before deployment.
Today's Network Break analyzes a new AWS backup service, Rubrik's latest infusion of VC cash, whether the tech sector has reached its natural growth limit and what that means for how tech companies are valued, a Juniper/IBM deal, and more.
The post Network Break 218: AWS Launches New Backup Service; Rubrik Rakes In VC Bucks appeared first on Packet Pushers.
On today's Tech Bytes, sponsored by Comstor, we're going to dive into Cisco's Smart Net Total Care. We discuss different service options and examine the Collector software that can help organizations get a handle on Cisco software licenses, updates, and bug fixes.
The post Tech Bytes: Understanding Cisco’s Smart Net Total Care (Sponsored) appeared first on Packet Pushers.
Research group sees reasons to be cheerful as mobile infrastructure market set to see turnaround after three consecutive years of declining revenues thanks to 5G New Radio.
IoT survey: Nearly half of all companies using IoT devices don’t have mechanisms in place to detect if any of their devices have been hacked, according to a survey featured in a Fast Company story. Just 14 percent of the respondents to the Gemalto survey believe providing security is an ethical consideration.
Huge leak: More than 22 million unique passwords and 772 million email addresses were leaked and distributed by hackers in a folder named “Collection #1,” Mashable reports. The cache of emails and passwords were collected from several data, dating back to 2008.
Pushing back: WhatsApp is planning to fight India’s recent crackdown on encryption, FT.com reports. Indian policymakers have proposed rules that would allow authorities to trace the origin of encrypted messages, but WhatsApp says it will protest the proposals.
Fighting fake news: Japan’s government plans to come up with a plan to fight fake news by June, Japan Times says. The plan could include requiring social media companies to create codes of conduct. Several other attempts by governments to fight fake news have led to concerns about censorship, however.
AI as a weapon: Forbes.com has a story raising concerns about the weaponization of Artificial Intelligence. Continue reading
Cloudflare is proud to partner with Mesosphere on their new Argo Tunnel offering available within their DC/OS (Data Center / Operating System) catalogue! Before diving deeper into the offering itself, we’ll first do a quick overview of the Mesophere platform, DC/OS.
Mesosphere DC/OS provides application developers and operators an easy way to consistently deploy and run applications and data services on cloud providers and on-premise infrastructure. The unified developer and operator experience across clouds makes it easy to realize use cases like global reach, resource expansion, and business continuity.
In this multi cloud world Cloudflare and Mesosphere DC/OS are great complements. Mesosphere DC/OS provides the same common services experience for developers and operators, and Cloudflare provides the same common service access experience across cloud providers. DC/OS helps tremendously for avoiding vendor lock-in to a single provider, while Cloudflare can load balance traffic intelligently (in addition to many other services) at the edge between providers. This new offering will allow you to load balance through the use of Argo Tunnel.
Cloudflare Argo Tunnel is a private connection between your services and Cloudflare. Tunnel makes it such that only traffic that routes through the Continue reading