Archive

Category Archives for "Networking"

Raspberry Pi and AWS IOT – First steps

Hi All,

I have slightly changed this to networking, but the intention and my current use is to measure the water level of a sump, since that deviates from the network blog writing, i have extended the same to a Router.

Purpose – Have a Router and also a Syslog Server which monitors my internal network (This can easily be extended to a Car / Moisture Sensor or a Temperature/Humidity Sensor), what we want to do is to make sure if any anomaly is seen in Log Messages, it logs to IOT service. We can then take this up as a Part-2 writing to perform a specific action / automated on what action can be taken to mitigate

Discussion about configuring a Linux device is out of scope, so lets think that we all have that setup. What happens next ?

Lets quickly see our python script, which parses for a anomaly, in this lets say when someone runs a ping command, well its not a anomaly but will do for our use-case.

 

 

logparse.py is our program, so i have imported it into the readily available sample program provided by AWSIOT Kit, so you dont have to know Continue reading

Recover a RAID5 Array on Linux with healthy disks

Intel Atom failures I know the title sounds a bit weird and you may ask why would you need to recover a RAID5 array when all your disks are healthy, right? To understand what is going on, my DS1515+ has an Intel Atom C2538. (source: Synology CPU / NAS Type). It recently caused a lot of issues in the IT industry. (remember the Cisco clock issue? ? ) The Errata AVR54 of the C2000 Specifications update clearly states the following: “system may experience inability to boot or may cease operation”. My NAS was starting to have regular reboots and it completely crashed before I could back up the last delta of data.  In the first instance, Synology denied any abnormal failure rate on this specific [Read More...]

The post Recover a RAID5 Array on Linux with healthy disks appeared first on VPackets.net.

NetDevOpEd: Disaggregation is key to software vulnerability management

One critical decision that executives need to make when assessing their data center architecture is their approach to software vulnerability management across all network components. Vulnerability management primarily revolves around selecting an efficient and modern software management strategy. There are several ways to execute on a software management strategy, and I believe disaggregation is a critical first step in doing it right.

In this post, I want to take a minute to first share my thoughts on the vulnerability management trends I’ve noticed. I will argue that a) you need to prioritize the network in how you manage vulnerabilities and b) disaggregation is the only way to do it properly. We’ll also take a look at the reasons why I think we never had the right framework to manage software delivery, making vulnerability management a challenge on platforms that are closed in nature.

Operations at the core of vulnerability management

Three weeks ago, I joined 40,000 security professionals in San Francisco to attend the biggest gathering of security conscious professionals — RSA Conference. While there were several presentations and moments from the event that stood out, one that caught my eye was a presentation that discussed challenges in the industry Continue reading

Show 391: IXP Peering Security With Cisco (Sponsored)

The Internet is a network of networks. Where do each of these networks meet to form the global Internet? At Internet Exchange Points or IXPs. In North America, these IXPs are also known as network access points, or NAPs.

Over the years, connecting to a NAP has become increasingly crucial for service providers to get right because of the sheer volume of traffic the Internet carries these days (Hello, Netflix!), the complexity of service provider peering agreements, and endless troubles with security threats.

Joining us today to discuss how to better plan, design, operate, and secure peering is our sponsor Cisco. Our guests from Cisco are Phil Bedard, Service Provider TME; and Bruce McDougall, Consulting Systems Engineer.

We discuss the evolution of Internet traffic flow and interconnection, how peering designs among service providers have changed, the role of telemetry and data, and peering security issues.

Show Links:

BGP Monitoring Protocol (BMP) – IETF

Internet Edge Peering – Current Practice – GitHub

BGP Operations and Security – IETF

Observing BGP activity with BGP Monitoring Protocol – Cisco

Streaming Network Analytics System (SNAS) – snas.io

The Death of Transit And Beyond – Geoff Huston (PDF)

Eyeball network – Wikipedia

The Continue reading

Nonprofit ISP in Mexico Wins Court Battle Against Huge Federal Fee

A nonprofit telecommunications provider offering voice and data services to remote areas in southern Mexico has avoided a crippling federal fee after challenging it in court.

A Mexican court recently ordered the Federal Institute of Telecommunications to reconsider the spectrum fee for Indigenous Community Telecommunications (ICT), which serves about 3,500 customers. The fee, about 1 million pesos or US$50,000, is equal to about half of ITC’s annual operating budget, said Peter Bloom, founder and a board member of ITC.

But the ruling, by the Collegiate Circuit Court on Administrative Matters, Specialized in Economic Competition, Broadcasting and Telecommunications, doesn’t end the legal battle between the nonprofit ISP and the federal regulator.

ITC doesn’t feel like the regulator honored the ruling, Bloom said, even though it exempted the ISP from fees in 2017 and beyond as long as it maintains its nonprofit status.

The court instructed the regulator to “take into account fundamental human and constitutional rights when deciding how or if to charge for spectrum use,” he added. “In our case, our mission is social, but we were being taxed as a commercial cellular provider in an amount that would make it impossible for us to continue operating.”

The Continue reading

The Voice of SD-WAN

SD-WAN is about migrating your legacy hardware away from silos like MPLS and policy-based routing and instead integrating everything under one dashboard and one central location to make changes and see the impacts that those changes have. But there’s one thing that SD-WAN can’t really do yet. And that’s prepare us the for the end of TDM voice.

Can You Hear Me Now?

Voice is a way of life for some people. Cisco spent years upon years selling CallManager into every office they could. From small two-line shops to global organizations with multiple PRIs and TEHO configured everywhere. It was a Cisco staple for years. Which also had Avaya following along quickly to get into the act too.

Today’s voice world is a little less clear. Millenials hate talking on the phone. Video is an oddity when it comes to communications. Asynchronous chat programs like WhatsApp or Slack rule the day today. People would rather communicate via text than voice. We all have mobile devices and the phone may be one of the least used apps on it.

Where does that leave traditional voice services? Not in a good place for sure. We still need phone lines for service-focused businesses Continue reading

Q&A: Cisco’s Theresa Bui on the company’s Kinetic IoT platform

It's been almost a year since Cisco announced Kinetic, a cloud-managed IoT platform aimed at capturing a large and profitable share of the rapidly growing business and industrial IoT market. The executive in charge of Kinetic, Theresa Bui, spoke to us about the platform and how it's architected, in the wake of a flagship customer announcement - the Port of Rotterdam - and a limited partnership with IBM.What’s a customer getting for their money when they buy Cisco Kinetic?As a whole, the platform enables three core, functional capabilities. It allows you to easily and automatically extract data, and how we do that is we ship a library of automated connectors that help you extract data from various data pipes, put it into a model – whether it’s CoAP or MQTT or whatever the flavor that works for you.To read this article in full, please click here