Archive

Category Archives for "Networking"

IETF 102, Day 3: DNSSEC, DPRIVE & IoT

This week is IETF 102 in Montreal, Canada, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. And today’s topics include DNS Security & Privacy, along with more IPv6 and IoT.

The first DNSOP session will start at 09.30 EDT/UTC-4, and will continue on Thursday evening. Topics of interest include a draft on Algorithm Implementation Requirements and Usage Guidance for DNSSEC, which updates current algorithm implementation requirements and usage guidance for DNSSEC (obsoleting RFC 6944). Another draft on Multi Provider DNSSEC models describes how to deploy DNSSEC in environments where multiple DNS providers are in use, whilst Delegation_Only DNSKEY flag introduces a new flag for DNSSEC keys that can address a potential attack.


NOTE: If you are unable to attend IETF 102 in person, there are multiple ways to participate remotely.


Alternatively, the relatively new working group SUIT will also be meeting at the same time. Vulnerabilities in Internet of Things (IoT) devices have raised the need for secure firmware updates that are also suitable for a constrained environments, and this group aims to develop an interoperable update mechanism. There are three drafts up for discussion, including the description of the firmware Continue reading

Web-scale: a healthy choice for healthcare networks

Major cloud providers are able to achieve impressive uptime by distributing the load across a large number of commodity servers. There’s no single master server that can fail and bring down the entire infrastructure. It’s not surprising then that so many healthcare networks are already relying on major cloud providers to run electronic medical records (EMR) and imaging applications and store patient data. So doesn’t it make sense to adopt the same approach for the network?

Healthcare networks face a unique challenge that many other networks don’t: how do you grow your network quickly and reliably while remaining compliant? As patient data grows, this tension between growth and compliance is increasing. Healthcare networks are feeling the pressure to move data faster, and this often requires adding more connections and switches, which entails routing and other configuration changes. These continual and rapid changes come at the cost of long, sometimes unplanned, outages. Planned outages are to be expected, but unexpected outages are a nightmare. Consequently, many healthcare networks have understandably opted for slower network growth to maintain a stable, reliable network.

But thanks to the advent of web-scale networking, the tension between growth and compliance is quickly becoming a thing Continue reading

The Philippines Embraces the Multistakeholder Model in the Development of Its National ICT Ecosystem Framework 2022

Earlier this month in Manila, the Philippines Government Department of ICT (DICT) signed a Memorandum of Understanding (MoU) with the Internet Society (ISOC) to facilitate the development of its National ICT Ecosystem Framework (NIEF) 2022.

The NIEF 2022 – a successor to the Philippine Digital Strategy initiative from 2011-2016 – will serve as a roadmap for the management and development of national Information and Communication Technology (ICT) in the country’s plans, programmes, and projects. NIEF will also serve to promote innovation and development of the ICT sector, encourage collaborative use of ICTs, and promote accessibility, security and sustainability.

Some 67 million people are connected to the Internet in the Philippines today – and a large number are prolific users. The country is a significant market for a number of multinational social media and content providers and has a strong Business Process Outsourcing (BPO) industry. These facts make ICTs a key area of development and critical for the future of the economy.

The multistakeholder model will help facilitate perspectives from a range of stakeholders, which in turn will help NIEF 2022 to be in tune with what would work best for the people of the Philippines. This collaborative approach encourages inclusivity Continue reading

New to the INE Course Library – Building Modern Clouds: Docker, DevOps & Kubernetes

This course covers the basics of Docker and Kubernetes by showing how to build modern clouds with these technologies. By the end of this course students will be able to launch a Kubernetes cluster and deploy self-healing and scalable applications, as well as create their own continuous integration, and continuous delivery pipeline.



Why You Should Watch:

Kubernetes has quickly become the standard platform for running containerized workloads. All the major public clouds now have a Kubernetes-as-a-Service offering and popular container management tools, like Rancher, have migrated their underlying platform from in-house software, like Cattle, to Kubernetes. Even Docker themselves are now natively supporting Kubernetes.

This course is meant to teach you how to get started building modern clouds with Kubernetes and Docker, while covering the basic concepts of DevOps.


Who Should Watch:

This course is intended for anyone wanting to learn about Kubernetes and Docker. A basic familiarity with the Linux command line and the basic high-level concepts of the public cloud are recommended. The recommended public cloud platform for this course is Google Cloud Platform.


About The Instructor

David Coronel has been in the IT field since 2002. David started as a call center agent and quickly made his way to systems administration. David is a Certified Kubernetes Administrator, a Docker Certified Associate, a Certified OpenStack Administrator as well as an AWS Certified Solutions Architect Associate. David is currently employed as a Technical Account Manager at Canonical, the company behind Ubuntu.

ISP Design – Building production MPLS networks with IP Infusion’s OcNOS.

Moving away from incumbent network vendors

 

1466540435IpInfusion interivew questions

 

One of the challenges service providers have faced in the last decade is lowering the cost per port or per MB while maintaining the same level of availability and service level.

And then add to that the constant pressure from subscribers to increase capacity and meet the rising demand for realtime content.

This can be an especially daunting task when routers with the feature sets ISPs need cost an absolute fortune – especially as new port speeds are released.
whitebox-switch_500px-wide

Whitebox, also called disaggregated networking, has started changing the rules of the game. ISPs are working to figure out how to integrate and move to production on disaggregated models to lower the cost of investing in higher speeds and feeds.

Whitebox often faces the perception problem of being more difficult to implement than traditional vendors – which is exactly why I wanted to highlight some of the work we’ve been doing at iparchitechs.com integrating whitebox into production ISP networks using IP Infusion’s OcNOS.

Things are really starting to heat up in the disaggregagted network space after the announcement by Amazon a few days ago that it intends to build and sell whitebox Continue reading

ISP Design – Building production MPLS networks with IP Infusion’s OcNOS.

Moving away from incumbent network vendors

 

1466540435IpInfusion interivew questions

 

One of the challenges service providers have faced in the last decade is lowering the cost per port or per MB while maintaining the same level of availability and service level.

And then add to that the constant pressure from subscribers to increase capacity and meet the rising demand for realtime content.

This can be an especially daunting task when routers with the feature sets ISPs need cost an absolute fortune – especially as new port speeds are released.
whitebox-switch_500px-wide

Whitebox, also called disaggregated networking, has started changing the rules of the game. ISPs are working to figure out how to integrate and move to production on disaggregated models to lower the cost of investing in higher speeds and feeds.

Whitebox often faces the perception problem of being more difficult to implement than traditional vendors – which is exactly why I wanted to highlight some of the work we’ve been doing at iparchitechs.com integrating whitebox into production ISP networks using IP Infusion’s OcNOS.

Things are really starting to heat up in the disaggregagted network space after the announcement by Amazon a few days ago that it intends to build and sell whitebox Continue reading

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

Thoughts on Impostor Syndrome

How many times, on reading my blog, a book, or watching some video of mine over these many years (the first article I remember writing that was publicly available, many years ago, was the EIGRP white paper on Cisco Online, somewhere in 1997), have you thought—here is an engineer who has it all together, who knows technology in depth and breadth, and who symbolizes everything I think an engineer should be? And yet, how many times have you faced that feeling of self-doubt we call impostor synddome?

I am going to let you in on a little secret. I’m an impostor, too. After all these years, I still feel like I am going to be speaking in front of a crowd, explaining something at a meeting, I am going to hit publish on something, and the entire world is going to “see through the charade,” and realize I’m not all that good of an engineer. That I am an ordinary person, just doing ordinary things.

While I often think about these things, what has led me down the path of thinking about them this week is some reading I’ve been doing for a PhD seminar about human nature, work Continue reading

IDG Contributor Network: 6 sneaky ways cloud infrastructure providers lock you in

With more enterprises adopting multi-cloud and hybrid cloud computing strategies, it's more important than ever to avoid getting locked into just one cloud provider's tools and technologies. Multi-cloud and hybrid cloud deployments offer many benefits. They include the ability to pick and choose which cloud vendor's add-on services are right for your business, as well as the ability to implement best-of-breed solutions when the time is right. Multi-cloud also adds redundancy and security because all of your proverbial eggs are not in one basket.Despite the trend toward multi-cloud, however, there are still plenty of ways to find yourself locked in. Here's a quick look at six common ways enterprises get locked into using one provider, along with some advice on how businesses can keep cloud implementations open and interoperable. To read this article in full, please click here

Happy Amazon Crash Day

On one of the biggest shopping days of the year for Amazon.com the company’s web site crapped out intermittently for hours yesterday.Instead of Prime Day purchases, many customers just got error messages and pictures of the dogs of Amazon, along with a message from Amazon that read: "Sorry, we're experiencing unusually heavy traffic. Please try again in a few seconds. Your items are still waiting in your cart," or “"Uh-Oh. Something went wrong on our end." [ Related: How to plan a software-defined data-center network.] Prime Day started at 3PM ET and the problems emerged almost immediately after.  Around 5 p.m., Amazon tweeted acknowledgement of the problem stating: “Some customers are having difficulty shopping and we are working to resolve this issue quickly.  Many are shopping successfully – in the first hour of Prime day in the US, customers have ordered more items compared to the first hour last year.”To read this article in full, please click here