Archive

Category Archives for "Networking"

Show 394: Technology Problems Are Mostly People Problems

You are a problem…maybe the biggest problem of all. No? The crashing router code is the biggest problem? The leaking memory in the switch?

The app needs layer 2 stretched between data centers–what problem could be worse than that?

Today on the show, we re here to argue that, no…it s you. And me. And everyone else you work with.

With us today to defend the idea that technology problems are really people problems is Eyvonne Sharp, network architect and co-founder of The Network Collective.

We talk about how people and processes can contribute more to a problem than a technology. We also talk about three different organizational culture types (Pathological, Bureaucratic, and Generative), how to evaluate your own organization, and Eyvonne recommends a few books on team building and culture development.

Show Links:

Eyvonne Sharp on Twitter

The Network Collective

Using the Westrum typology to measure culture Andy Kelk

Forget about broad-based pay hikes, executives say – Axios

The Undoing Project – Michael Lewis

The Five Dysfunctions of a Team: A Leadership Fable Patrick M. Lencioni

Team of Teams: New Rules of Engagement for a Complex World – General Stanley McChrystal

The post Show 394: Technology Continue reading

EuroDIG 2018 Gathers the Internet Community: What’s New

The 12th edition of the European Dialogue on Internet Governance or the EuroDIG, as it is commonly known, took place in Tbilisi, Georgia, on 5-6 June. The Internet Society (ISOC) is an institutional partner to EuroDIG and the ISOC European Regional Bureau helped shape the agenda and were involved in several sessions.

This year, a few specific aspects caught my attention and created a lot of debate during the sessions and in the corridors.

Reinforcing the multistakeholder model

While European governments have traditionally been strong supporters of the Internet Governance Fora (IGF) and the multistakeholder model, this support has been to some extent compromised by concerns over national security and other priorities in the recent times. Several core members of the European Internet community have talked about a “fatigue” with the regional and national IGFs.

This year’s EuroDIG offered some fresh food for thought. Larry Strickling, who leads the Internet Society’s Collaborative Governance project, made several interventions during the EuroDIG. Strickling’s extensive experience of driving multistakeholder processes and his practical approach were received with great interest and curiosity. In parallel, high participation from young people injected heaps of new energy and optimism to the event.

Embracing the Internet opportunity Continue reading

Hackathon@AIS: Summary report

The annual Hackathon@AIS, in its second year, is aimed at exposing engineers from the Africa region to open Internet Standards Development. This year, the event was held 9-10 May 2018 in Dakar Senegal at the Radisson Blu Hotel during the Africa Internet Summit (AIS-2018).

The event was attended by more than 75 engineers from 15 countries including 11 fellows who were supported to attend the event. The event featured participants with English and or French-speaking backgrounds encouraging collaboration to work. Organized into 3 tracks, the event allowed participants to choose which track they were interested in participating in. The tracks were as follows:

1. Network Time Protocol Track

Objectives:

  • Make NTP more secure (Privacy)
  • Using WireShark NTP Plugin to read/analyze NTP traffic
  • Code changes to NTP implementations to make them compliant with the draft
  • Read and understand Draft RFC

Facilitators:

  • Loganaden Velvindron (Mauritius)
  • Nitin Mutkawoa (Mauritius)
  • Serge-Parfait Goma (Congo)

Participants were introduced to NTP and asked to test out an IETF draft and implement it in open source NTP clients.

Outcome:

Participants were able to successfully implement draft and made presentations demonstrating their work and accomplishments.

2. Network Programmability

Objectives:

  • Introduce participants to Software Defined Networking (SDN)
  • Introduce network Continue reading

Worth Reading: Discovering Issues with HTTP/2

A while ago I found an interesting analysis of HTTP/2 behavior under adverse network conditions. Not surprisingly:

When there is packet loss on the network, congestion controls at the TCP layer will throttle the HTTP/2 streams that are multiplexed within fewer TCP connections. Additionally, because of TCP retry logic, packet loss affecting a single TCP connection will simultaneously impact several HTTP/2 streams while retries occur. In other words, head-of-line blocking has effectively moved from layer 7 of the network stack down to layer 4.

What exactly did anyone expect? We discovered the same problems running TCP/IP over SSH a long while ago, but then too many people insist on ignoring history and learning from their own experience.

Facebook releases its load balancer as open-source code

Google is known to fiercely guard its data center secrets, but not Facebook. The social media giant has released two significant tools it uses internally to operate its massive social network as open-source code.The company has released Katran, the load balancer that keeps the company data centers from overloading, as open source under the GNU General Public License v2.0 and available from GitHub. In addition to Katran, the company is offering details on its Zero Touch Provisioning tool, which it uses to help engineers automate much of the work required to build its backbone networks.To read this article in full, please click here

Facebook releases its load balancer as open-source code

Google is known to fiercely guard its data center secrets, but not Facebook. The social media giant has released two significant tools it uses internally to operate its massive social network as open-source code.The company has released Katran, the load balancer that keeps the company data centers from overloading, as open source under the GNU General Public License v2.0 and available from GitHub. In addition to Katran, the company is offering details on its Zero Touch Provisioning tool, which it uses to help engineers automate much of the work required to build its backbone networks.To read this article in full, please click here

VRF route leaking: time to get a little more social!

Virtual Routing and Forwarding (VRF) is a ubiquitous concept in networking, first introduced in the late 1990s as the control and data plane mechanism to provide traffic isolation at layer 3 over a shared network infrastructure. VRF for Linux is an excellent blog that describes the technology behind VRFs, especially as it pertains to the Linux kernel. With the introduction of support for leaking of routes, VRFs get to enjoy their isolation while also having the nous to mix and mingle.

Wait, aren’t VRFs meant to be completely isolated?

You have a valid question there. That was certainly the initial use case for VRFs. Each VRF was intended to represent a customer of a service provider and isolation was a fundamental tenet. Each VRF had its own routing protocol sessions and IPv4 and IPv6 routing tables and route computation as well as packet forwarding was independent from other VRFs. All communication stayed within the VRF other than specific scenarios such as reaching the Internet. Hershey’s wouldn’t want to get too chatty with Lindt, right? No, VRFs weren’t meant to be gregarious.

As VRFs moved outside the realm of the service provider and started finding application elsewhere, such as in the Continue reading

Check Out Our New Software Testing Course – Software Testing QA: A Comprehensive Overview





Instructor: Justin Spears

Course Duration: 1hr 45min



About the Course

The modern accessibility of public, private and hybrid cloud environments has led rise to a bastion of cloud-centric practices. One of the most notable is the idea of QA and Testing in the cloud. This course will describe the concepts, methodologies and implementations of testing in a cloud environment. We will go through the full software QA lifecycle and describe where and how each component of that lifecycle can be offloaded into the cloud and further describe methods and mechanisms on how to do so effectively.