Archive

Category Archives for "Networking"

Will Huawei become a pawn in a high-stakes U.S.-China technology war?

The Justice Department investigation into Huawei recalls a similar probe into whether Shenzhen rival ZTE broke U.S. sanctions by exporting devices containing American components to Iran. ZTE was found guilty last year not only of breaking the sanctions, which resulted in an $892 million fine, but of breaking the settlement deal’s terms by failing to punish those involved.To read this article in full, please click here(Insider Story)

Is OSPF or IS-IS Good Enough for My Data Center?

Our good friend mr. Anonymous has too many buzzwords and opinions in his repertoire, at least based on this comment he left on my Using 4-byte AS Numbers with EVPN blog post:

But IGPs don't scale well (as you might have heard) except for RIFT and Openfabric. The others are trying to do ECMP based on BGP.

Should you be worried about OSPF or IS-IS scalability when building your data center fabric? Short answer: most probably not. Before diving into a lengthy explanation let's give our dear friend some homework.

Read more ...

Don’t Reply To Everything

I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.

For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.

Too cuddly?

Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.

However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.

You’re So Rude

On the surface, ignoring inbox messages seems rude. However, Continue reading

Don’t Reply To Everything

I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.

For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.

Too cuddly?

Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.

However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.

You’re So Rude

On the surface, ignoring inbox messages seems rude. However, Continue reading

The Enterprise of Thing’s troubling lack of security

When it comes to security and manageability, Enterprise of Things (EoT) devices must have far more stringent requirements than consumer IoT devices, which often have virtually no built-in security. Indeed, enterprise use of consumer-grade IoT is highly risky.Making the matter even more urgent is the growing number of deployed EoT devices, which is expected to increase significantly over the next two to three years. (I estimate there will be more “things” in an enterprise than PC and mobile phone clients combined within three to four years.)To read this article in full, please click here

The Enterprise of Thing’s troubling lack of security

When it comes to security and manageability, Enterprise of Things (EoT) devices must have far more stringent requirements than consumer IoT devices, which often have virtually no built-in security. Indeed, enterprise use of consumer-grade IoT is highly risky.Making the matter even more urgent is the growing number of deployed EoT devices, which is expected to increase significantly over the next two to three years. (I estimate there will be more “things” in an enterprise than PC and mobile phone clients combined within three to four years.)To read this article in full, please click here

Innovative Licensing Approaches: Enabling Access in Hard-to-Reach Places Through Collaborative Partnerships

In the Republic of Georgia, high in the mountains of the Tusheti region, a community network has been built to bring faster Internet connectivity to those that did not have it. The story is compelling, not only for the determination of people to make sure that the Internet is available in one of the remotest places in the world, but also for their strong belief of what connecting to the Internet could bring to the people of Tusheti. “Tourism is a beacon of hope for us,” said Ia Buchaidze, who owns a local bakery, “and the Internet is very important for that.”

The project was a true collaborative partnership involving many parties: the Georgian Government, the Internet Society and its Georgia Chapter, the Small and Medium Telecom Operators Association of Georgia, LTD Freenet, and the Tusheti Development Fund (TDF). This network did not need a license, but it did need an authorization from the Georgian Government for it to be built and for the spectrum to be used. The objective was to provide access to a remote region through a locally-built and developed community network.

Similarly, in Mexico, a community network has been built in a remote and Continue reading

Research: Bridging the Air Gap

Way back in the old days, the unit I worked at in the US Air Force had a room with a lot of equipment used for processing classified information. Among this equipment was a Zenith Z-250 with an odd sort of keyboard and a very low resolution screen. A fine metal mesh embedded in a semi-clear substrate was glued to the surface of the monitor. This was our TEMPEST rated computer, on which we could type up classified memos, read classified email, and the like. We normally connected it to the STU-3 through a modem (remember those) to send and receive various kinds of classified information.

Elovici, Mordechai Guri, Yuval. “Bridgeware: The Air-Gap Malware.” Accessed May 13, 2018. https://cacm.acm.org/magazines/2018/4/226377-bridgeware/abstract.

The idea of TEMPEST begins way back in 1985, when a Dutch researcher demonstrated “reading” the screen of a computer using some relatively cheap, and easy to assemble, equipment, from several feet away. The paper I’m looking at today provides a good overview of the many ways which have been discovered since this initial demonstration to transfer data from one computer to another across what should be an “air gap.” For instance, the TEMPEST rated computer described Continue reading

Don’t get left behind: SDN, programmable networks change how network engineers work

The rise of programmable networks has changed the role of the network engineer, and accepting those changes is key to career advancement. Network engineers need to become software fluent and embrace automation, according to a panel of network professionals brought together by Cisco to discuss the future of networking careers.[ For more on SDN see where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ] “The whole concept of engineer re-skilling has become a pretty hot topic over the last four or five years. What’s notable to me is that the engineers themselves are now embracing it,” says Zeus Kerravala, founder of ZK Research, who moderated the panel. To read this article in full, please click here

Network Break 184: Arista’s Core Switch Challenges Cisco; Qualcomm Reconsiders Servers

Take a Network Break! Arista challenges Cisco in the campus with a new a new core switch, Qualcomm is reportedly considering backing away from data center server processors, and a security survey shows woeful patching habits.

Another security survey reveals that three quarters of respondents have been breached at least once in 2017, Apple abandons a planned data center site in Ireland, and ZTE halts major operations because of a US export ban on parts and software from American companies.

Finally, Google acquires cloud onboarding startup VeloStrata, while Google’s Duplex voice assistant raises hackles.

Get links to all these stories after our sponsor messages.

Sponsor: InterOptic

InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.

Sponsor: Cisco Systems

Find out how Cisco and its trusted partners Equilibrium Security and ePlus/IGX can help your organization tackle the General Data Protection Regulation, or GDPR. Tune into Packet Pushers Priority Queue episode 147 to get practical insights on how to get your arms around these wide-ranging rules.

Coffee Continue reading

Tracking CDN Usage Through Historical DNS Data

With Mother’s Day having just passed, some e-commerce sites likely saw an associated boost in traffic. While not as significant as the increased traffic levels seen around Black Friday and Cyber Monday, these additional visitors can potentially impact the site’s performance if it has not planned appropriately.  Some sites have extra infrastructure headroom and can absorb increased traffic without issue, but others turn to CDN providers to ensure that their sites remain fast and available, especially during holiday shopping periods.

To that end, I thought that it would be interesting to use historical Internet Intelligence data (going back to 2010) collected from Oracle Dyn’s Internet Guide recursive DNS service, to examine CDN usage. As a sample set, I chose the top 50 “shopping” sites listed on Alexa, and looked at which sites are being delivered through CDNs, which CDN providers are most popular, and whether sites change or add providers over time. Although not all of the listed sites would commonly be considered “shopping” sites, as a free and publicly available list from a well-known source, it was acceptable for the purposes of this post.

The historical research was done on the www hostname of the listed Continue reading