Archive

Category Archives for "Networking"

How we selected 10 hot data-center virtualization startups to watch

The selection process for our roundup of 10 data-center virtualization startups to watch began with 33 recommendations and nominations that were sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.Several of those startups had to be eliminated right off the bat not because they wouldn’t be a good fit for this roundup – they would be – but because they had already been covered in previous roundups, including those focused on storage, hybrid cloud and business continuity.To read this article in full, please click here

The Case of the Missing LDP Neighbor

R1 and R2 are cabled up twice to each other via their gig0/0/1 interfaces and their gig0/0/7 interfaces. Each connection is in its own subnet, and each interface configured for OSPF and MPLS.  But while we have 2 OSPF neighbors between them… we only have 1 LDP neighbor.

R1#show mpls int
Interface IP Tunnel BGP Static Operational
Gi0/0/1 Yes (ldp) No No No Yes
Gi0/0/7 Yes (ldp) No No No Yes
R1#

So as you can see from the output of show mpls interface, gig0/0/1 and gig0/0/7 are both configured for MPLS LDP.  Why then if we look below do we see only 1 MPLS LDP neighbor between them?  

What is the problem?  Actually… in this situation there isn’t a problem.  This is actually expected behavior.

R1#sh mpls ldp neighbor
Peer LDP Ident: 10.100.100.2:0; Local LDP Ident 10.100.100.1:0
TCP connection: 10.100.100.2.22592 - 10.100.100.1.646
State: Oper; Msgs sent/rcvd: 184/184; Downstream
Up time: 02:32:11
LDP discovery sources:
GigabitEthernet0/0/1, Src IP addr: 10.1.1.2
GigabitEthernet0/0/7, Src IP addr: 10.1.7.2
Addresses bound to peer LDP Ident:
Continue reading

OAuth Auth Server through Workers

OAuth Auth Server through Workers

Let’s pretend I own a service and I want to grant other services access to my service on behalf of my users. The familiar OAuth 2.0 is the industry standard used by the likes of Google sign in, Facebook, etc. to communicate safely without inconveniencing users.

Implementing an OAuth Authentication server is conceptually simple but a pain in practice. We can leverage the power of Cloudflare Worker to simplify the implementation, reduce latency, and segregate our service logic from the authentication layer.

For those unfamiliar with OAuth, I highly recommend reading a more in depth article.

The steps of the OAuth 2.0 workflow are as follows:

  1. The consumer service redirects the user to a callback URL that was setup by the auth server. At this callback URL, the auth server asks the user to sign in and accept the consumer permissions requests.
  2. The auth server redirects the user to the consumer service with a code.
  3. The consumer service asks to exchange this code for an access token. The consumer service validates their identity by including their client secret in the callback URL.
  4. The auth server gives the consumer the access token.
  5. The consumer service can now use Continue reading

How Java has stood the test of time

Java has survived for more than two decades and continues to be one of the top programming languages in use today. What accounts for the language's success and how has it changed to accommodate more modern technology?Java's rise to power Java initially appeared in 1995, evolving from a 1991 innovation called "Oak". It was apparently the right time for engineers looking to grow distributed systems. Some of the more popular languages back then -- C, C++, and even Cobol for some efforts -- involved steep learning curves. Java's multi-threading, allowing the concurrent execution of two or more parts of a program, ended the struggle to get multi-tasking working. Java quickly became the de facto language for mission-critical systems. Since that time, new languages have come and gone, but java has remained entrenched and hard to replace. In fact, Java has stood as one of the top two computing languages practically since its initial appearance as this Top Programming Languages article suggests.To read this article in full, please click here

Tusheti Community Network One Year Later: Creating Impact, Sustainability, and Scalability

Connecting the most remote and challenging territories of any country to the Internet can be tough. Typically, Internet access spreads gradually from urban conglomerations towards smaller hubs, and finally, to the most remote and sparsely populated areas. This is just common business sense.

Many of these remote areas are unique in terms of their people, culture, and livelihood, and Internet access can make a world of difference. This was the case when the Internet Society, together with its local partners, launched the first community network in Georgia, in the mountainous region of Tusheti, in September 2017.

Creating Impact

One year on, the Internet has made a significant difference to the lives of the Tushetians. This week, the Internet Society published an impact assessment on the Tusheti community network highlighting the transformation in tourism, e-commerce, and people’s livelihoods.

The Internet has had a positive impact on tourism through more effective online advertising and sales, and through efficiencies in businesses operations. With these encouraging developments, local residents are investing in the construction and opening of new guesthouses. The Internet has also increased the levels of safety and mobility in this remote part of the world by providing a communications channel to Continue reading

Tech Bytes: HPE’s Composable Fabric For Data Center Automation (Sponsored)

On today's Tech Bytes, sponsored by HPE and Intel, we explore HPE's Composable Fabric. It combines top-of-rack switches and automation software to pool networking resources and help your data center scale. We also discuss how Composable Fabric integrates with Simplivity, HPE's hyperconverged platform.

The post Tech Bytes: HPE’s Composable Fabric For Data Center Automation (Sponsored) appeared first on Packet Pushers.

BrandPost: 802.11ax means more IoT. Now, how do I secure it?

Like the teenager with no driving experience who takes the family SUV on the open highway, even the simplest devices that are connecting to corporate networks have the power to participate in an attack and cause serious damage.Courtesy of Moore’s Law, anything with an IP address must be now considered a potential threat. Ironically, 802.11ax introduces terrific new security features such as WPA3 and OWE. But, it also makes the WLAN even more IoT-friendly, given the support for dense concentrations of clients in environments such as smart buildings, where devices like lighting controls are as likely to be connected wirelessly as wired.To read this article in full, please click here