Archive

Category Archives for "Networking"

ONOS traffic analytics

Open Network Operating System (ONOS) is "a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance, and abstractions to make it easy to create applications and services." The open source project is hosted by the Linux Foundation.

Mininet and onos.py workflow describes how to run ONOS using the Mininet network emulator. Mininet allows virtual networks to be quickly constructed and is a simple way to experiment with ONOS. In addition, Mininet flow analytics describes how to enable industry standard sFlow streaming telemetry in Mininet, proving a simple way monitor traffic in the ONOS controlled network.

For example, the following command creates a Mininet network, controlled by ONOS, and monitored using sFlow:
sudo mn --custom ~/onos/tools/dev/mininet/onos.py,sflow-rt/extras/sflow.py \
--link tc,bw=10 --controller onos,1 --topo tree,2,2
The screen capture above shows the network topology in the ONOS web user interface.
Install Mininet dashboard to visualize the network traffic. The screen capture above shows a large flow over the same topology being displayed by ONOS, see Mininet weathermap for more examples.

In this case, the traffic was created by the following Mininet command:
mininet-onos> iperf h1 h3
The screen capture above shows top flows, busiest Continue reading

Reaction: The NRE as the new architect

Over at the Packet Pushers, Anthony Miloslavsky suggests that network architects have outlived their usefulness, so it is time to think of a new role. He describes a role called the “NRE” to replace the architect; the NRE would—

…spend no less than 50% of their time focusing on automation, while spending the other 50% deeply embedded in the operations/engineering/architecture realms of networking. They participate in an on-call rotation to stay in touch with the ops side of the house, with a focus on “treating operations as if it’s a software problem” in response. NREs would provide a expert big picture view of BOTH the development/automation and network operation/design sides of the house.

The author goes on to argue that we need someone who will do operations, engineering, architecture, and development because “pure architecture” folks tend to “lose touch” with the operations side of things. It is too easy to “throw a solution over the cubicle wall” without considering the implementation and operational problems. But, as a friend used to ask of everything when I was still in electronics, will it work? I suspect the answer is no for several reasons.

First, there is no such person as described, and Continue reading

Lasers could power computers wirelessly

A thin beam of invisible laser light has been used to safely charge a smartphone across a room. The experiment by researchers at the Univeristy of Washington lends credence to the futuristic idea that one day all computers could operate without any plugs or wires — that’s both for data and power.The revolutionary smartphone-charging laser system, which functions from up to 40 feet away, detects devices through inaudible acoustic chirps, according to its desginers at the university. It then zaps a couple watts of power at them using laser beams. Importantly, it does it safely and is potentially scalable to computers.To read this article in full, please click here

Aruba CTO says IoT is great fun to work on

Not everybody in business IT seems like they’re having a great time at their job, but Aruba CTO Partha Narasimhan is an exception. He sat down with Network World at the company’s 2018 Atmosphere conference in Las Vegas to talk IoT, onboarding and more.Like company president Keerti Melkote, Narasimhan noted that Aruba’s experience in onboarding devices during the era of BYOD being an issue has stood it in good stead for IoT, but he said that the technical challenge is far greater.+ALSO ON NETWORK WORLD: Getting grounded in intent-based networking + Aruba co-founder: We want to live on the edgeTo read this article in full, please click here

Malicious IoT hackers have a new enemy

IoT security is about the farthest thing from a laughing matter in the world of technology today, threatening global trade, privacy and the basic infrastructure of modern society. So you could be forgiven for being taken aback that the newest defender of vulnerable systems against bad actors looks a little like Johnny 5 from the movie Short Circuit.Researchers at Georgia Tech’s School of Electrical and Computer Engineering rolled out the HoneyBot robot late last week. In essence, it’s a canary in the digital coal mine, offering an early warning that someone is trying to compromise an organization’s systems.To read this article in full, please click here

Malicious IoT hackers have a new enemy

IoT security is about the farthest thing from a laughing matter in the world of technology today, threatening global trade, privacy and the basic infrastructure of modern society. So you could be forgiven for being taken aback that the newest defender of vulnerable systems against bad actors looks a little like Johnny 5 from the movie Short Circuit.Researchers at Georgia Tech’s School of Electrical and Computer Engineering rolled out the HoneyBot robot late last week. In essence, it’s a canary in the digital coal mine, offering an early warning that someone is trying to compromise an organization’s systems.To read this article in full, please click here

IDG Contributor Network: Addressing IoT security with DNS and DNSSEC

We are witnessing a huge explosion in the number of Internet of Things (IoT) devices as a growing number of new “smart” consumer items, appliances, and vehicles are brought to market. While these devices introduce conveniences and enable new exciting applications and experiences, they introduce a high level of security risk to business and consumer networks. This is because manufacturers are frequently lax when it comes to the security implications of deploying smart connected devices in the wild.So why does IoT pose a potential risk to consumers? These devices fall under the “set it and forget it” bucket. They are typically easy to set up – you connect them to whatever network or networks you use regularly and then you don’t have to think about the devices again. Consumers are focused on functionality instead of the way the devices are communicating with the outside world, about updates to the devices, or about the network security characteristics of the devices.  To read this article in full, please click here

Episode 25 – MPLS Part 1

In a new protocol deep-dive series, Nick Russo and Russ White return to discuss MPLS. In part one, we discuss the primary use cases for MPLS, label allocation, and what SD-WAN means for the future of MPLS.


Show Notes:

  1. MPLS solves 3 fundamental problems, individually or in concert
    1. Multi-tenancy/VPNs
    2. Traffic engineering
    3. Fast reroute
  2. 4 bytes in a shim header, technically not a label, but we call it that
    1. 20 bits for label value, 2^20 ~= 1 million values (this is important)
    2. 3 bits for EXP, QoS really
    3. 1 S-bit to signal bottom of stack
    4. 8 bits TTL
  3. Label depth is theoretically infinite, but some HW platforms have a tolerance
  4. Many ways to allocate labels
    1. LDP transport
    2. LDP pseudowire
    3. BGP labeled unicast
    4. BGP based IP VPNs (VPNv4/v6)
    5. BGP pseudowire
    6. SR (really built into OSPF and ISIS for distribution)
    7. RSVP-TE
  5. Some forward rules are worth mentioning (basic LDP/BGP-LU environment)
    1. If route learned via IGP/static, LDP label must be used
    2. If route learned via BGP, BGP label must be used
    3. No exceptions
  6. Penultimate Hop Popping: second to last hop removes topmost label when signaled with imp-null from last hop along a given LSP, saves a lookup
  7. Is MPLS is a tunnel or not:
    1. Continue reading