Archive

Category Archives for "Networking"

We need to talk… about the state of internet governance

Pre IGF Speed Dating

In about a month, some of the key stakeholders in internet governance will come together in Paris and talk about the public policy challenges facing the internet in 2018 and beyond. They will do so at the Internet Governance Forum, a UN-supported platform that will meet for the thirteenth time this year.

The IGF traditionally brings different groups of stakeholders into a large conference centre, and provides for the opportunity for these different stakeholders to discuss: the idea being that understanding, consensus and collaboration will emerge between these different communities.

Join us for a pre-IGF stakeholder networking event on Tuesday, 16 October in Brussels.  Learn more and register!

Multistakeholderism: a vivid term with many meanings

The IGF model of multistakeholderism is one of a plethora of different approaches to engaging with actors beyond states in questions of global governance. Some rely more on governments, other processes rely on technical expertise, others have come and gone. Others, like the Internet Society, tend to refer to multistakeholder approaches, rather than one model.

Many observers tend to think this concept was invented by the internet community, but shaping (global) policy through direct engagement with stakeholders has been an integral Continue reading

Indigenous Connectivity Summit 2018: Training Day

True to its location in Festival City – also known as Edmonton, Alberta – the 2018 Indigenous Connectivity Summit’s training day crackled with the energy of community networking advocates from around the world.

Held at the Faculty of Extension at the University of Alberta, the event began with a smudging ceremony led by Dr. Lana Whiskeyjack from Saddle Lake Cree Nation. Lana spoke about the role of smudging to ground ourselves through ceremony. Herman Many Guns from Piikani First Nation then said a prayer and thanked our Treaty 6 hosts for allowing us to host the event on their territories.

Returning to the main venue, Jane Coffin from the Internet Society stressed that community networks are not “pirate” initiatives but rather efforts by communities to support community development through locally-owned and operated broadband. They aim at long-term sustainability and are driven by cooperation and innovation: “They inspire us to think differently and to solve problems together.” Jane also pointed to the barriers these initiatives face, including inappropriate licensing and permits, high taxes and fees on equipment, limited access to financing and funding, and restricted spectrum. Governments and regulatory agencies play an important part in addressing these issues.

Next, I Continue reading

Infrastructure life cycle costs: How ITAD and TPM can save you money

I was recently reading some responses to a question posted on the Spiceworks community forum that asked, “How do you dispose of old hard drives?" While there were some typically humorous responses, such as use them as target practice, smash them with a hammer, or drill a hole through them, I assume those comments were in jest. If not, those respondents are missing out on a great opportunity to get money back for their used equipment.It also reminds me of the need for safe, secure IT asset disposition (ITAD) services. It’s imperative to find an ITAD provider that offers data sanitization and destruction services that protect your company’s data integrity and privacy, handles your gear in an environmentally responsible way, and can also save your company money.To read this article in full, please click here

ICANN’s internet DNS security upgrade apparently goes off without a glitch

So far, so good. That’s the report from Internet Corporation for Assigned Names and Numbers (ICANN) as it rolled out the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS) on Oct. 11.The change is central to ICANN’s project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the internet's foundational servers. This so-called root KSK rollover from the 2010 KSK to the 2017 KSK was supposed to take place almost a year ago but was delayed until Oct. 11 of this year because of concerns it might disrupt internet connectivity to significant numbers of web users.To read this article in full, please click here

ICANN’s internet DNS security upgrade apparently goes off without a glitch

So far, so good. That’s the report from Internet Corporation for Assigned Names and Numbers (ICANN) as it rolled out the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS) on Oct. 11.The change is central to ICANN’s project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the internet's foundational servers. This so-called root KSK rollover from the 2010 KSK to the 2017 KSK was supposed to take place almost a year ago but was delayed until Oct. 11 of this year because of concerns it might disrupt internet connectivity to significant numbers of web users.To read this article in full, please click here

Hello There! :) Update from the FishBowl

June 28th… wow…. lol… my last blog out here was June 28th!  Too funny!  So where have I been and what have I been doing?

Well June was CiscoLive in the beginning and then SharkFest at the end.  I think i hit some “being social” limit and became a hermit for most of July and August.  Then 2 weeks of vacation for the first 2 weeks of September.  Two full weeks.  It was AWESOME!  Then Florence came to visit… ?  She hung around for a little while.  Like one of those visitors who come stay with you at your house and just won’t leave.    Oh.. and then breaking a finger September 15th and struggling to type for the rest of the month.

Hello!  I’m BACK! 

And I have REALLY missed being here!  At the same time… that break was REALLY needed!  ?   Awesome summer with the wife and family!  Woot woot!  Work hard… play hard!

So what am I up to?  Stealthwatch Baby!  Woot woot!  Been with Cisco for 22 years and I have NEVER loved a product and a GUI so Continue reading

Weekly Show 411: Understanding Global DNS Architecture with ThousandEyes (Sponsored)

Today's Weekly Show delves into DNS performance and endpoint testing with sponsor ThousandEyes. We'll review key findings from a new report on the state of global DNS authored by ThousandEyes, and discuss how to analyze performance and improve troubleshooting with end point testing.

The post Weekly Show 411: Understanding Global DNS Architecture with ThousandEyes (Sponsored) appeared first on Packet Pushers.

Security Is Bananas

I think we’ve reached peak bombshell report discussion at this point. It all started this time around with the big news from Bloomberg that China implanted spy chips into SuperMicro boards in the assembly phase. Then came the denials from Amazon and Apple and event SuperMicro. Then started the armchair quarterbacking from everyone, including TechCrunch. From bad sources to lack of technical details all the way up to the crazy conspiracy theories that someone at Bloomberg was trying to goose their quarterly bonus with a short sale or that the Chinese planted the story to cover up future hacking incidents, I think we’ve covered the entire gamut of everything that the SuperMicro story could and couldn’t be.

So what more could there be to say about this? Well, nothing about SuperMicro specifically. But there’s a lot to say about the fact that we were both oblivious and completely unsurprised about an attack on the supply chain of a manufacturer. While the story moved the stock markets pretty effectively for a few days, none of the security people I’ve talked to were shocked by the idea of someone with the power of a nation state inserting themselves into the supply chain Continue reading

Optimizing HTTP/2 prioritization with BBR and tcp_notsent_lowat

Optimizing HTTP/2 prioritization with BBR and tcp_notsent_lowat

Getting the best end-user performance from HTTP/2 requires good support for resource prioritization. While most web servers support HTTP/2 prioritization, getting it to work well all the way to the browser requires a fair bit of coordination across the networking stack. This article will expose some of the interactions between the web server, Operating System and network and how to tune a server to optimize performance for end users.

tl;dr

On Linux 4.9 kernels and later, enable BBR congestion control and set tcp_notsent_lowat to 16KB for HTTP/2 prioritization to work reliably. This can be done in /etc/sysctl.conf:

    net.core.default_qdisc = fq
    net.ipv4.tcp_congestion_control = bbr
    net.ipv4.tcp_notsent_lowat = 16384

Browsers and Request Prioritization

A single web page is made up of dozens to hundreds of separate pieces of content that a web browser pulls together to create and present to the user. The main content (HTML) for the page you are visiting is a list of instructions on how to construct the page and the browser goes through the instructions from beginning to end to figure out everything it needs to load and how to put it all together. Each piece of content requires a Continue reading

Internet Society submits comments for the revision of the Ethiopian Cybercrime law

Imagine how much the Internet has changed our lives in the last few decades. Today, thanks to the Internet, we can communicate with anyone around the world, instantaneously, reliably and cheaply. This enables us not only to be close to our friends and family that may be far away but also to bridge the knowledge gap that we have with the developed world. It also opens many work opportunities that we wouldn’t even imagine just a few years back and democratize media, allowing anyone to reach instantaneously millions of people at almost no cost, forcing transparency in governance more than ever before.

At national level, our economies are benefiting from the economic opportunities, directly and indirectly related to the Internet. Experts say that this is just the tip of the iceberg and that there are many more opportunities that are yet to be discovered.

However, we cannot deny that the Internet also comes with increasing challenges. Cybercrime is endangering Internet users, organizations and even countries. Our privacies are threatened every day. And more …  It is therefore appropriate that governments act to protect its citizens from the negatives impacts of the Internet by enacting laws and regulations. It was therefore Continue reading

4 Tips for Safeguarding Your SD-WAN

Be mindful of these four areas of security when considering an SD-WAN solution. By incorporating security measures like these into an SD-WAN solution, businesses gain assurance that their data, network, IT assets, and customers are protected.

GIT – Version Control for Network Engineers

Is GIT any way related to Network Guys ?  What is GIT and how a network engineers can benefit from It. Most of the network engineer might have not came across GIT and even not used in their work environment,But as mentioned in  earlier posts that inclusion of DevOps in Networking has made network engineer to learn about automation and related technologies.

GIT is a distributed version control software that keeps track of every modification to the code. If any change or mistake is made , we can look back and compare with  earlier version of code and find for any mistake.

So how GIT can be useful for Network Engineers ? Network Engineer can use GIT to see the config,how and when it got changed and who made the change ,all the changes in a file  can be  tracked easily.

Git can be easily installed by following the steps provided in link https://git-scm.com/book/en/v2/Getting-Started-Installing-Git

What is Git Version Control , Lets understand it in more simple way .. As per https://stackoverflow.com/questions/1408450/why-should-i-use-version-control/1408464#1408464

Have you ever:

  • Made a change to code, realized it was a mistake and wanted to revert back?
  • Lost code or had a backup that was too old?
  • Had Continue reading