Archive

Category Archives for "Networking"

Intentional Infrastructure

I gave a presentation at the recent Network Field Day 17 (on my 3rd day working for Juniper). My main goal for this presentation was just to get people excited about building stuff. We tend to focus on vendor-provided solutions in this industry, and there’s a lot of good reasons for that, but it’s also good to stay sharp and be able to build your own solution to fill gaps where necessary.

77 Facts About Cyber Crimes One Should Know In 2018

I am pleased to publish an infographic called "77 Facts About Cyber Crimes One Should Know In 2018." The infographic includes the top 10 biggest data breaches of the 21st century, top cyber crimes, stats of cyber attacks, fun facts and a ton more interesting info.

 I am glad to thank BestVPNs for kind permission to republish the original article on my blog.

Note: Click image to enlarge.

77 Facts About Cyber Crimes One Should Know In 2018

I am pleased to publish an infographic called "77 Facts About Cyber Crimes One Should Know In 2018." The infographic includes the top 10 biggest data breaches of the 21st century, top cyber crimes, stats of cyber attacks, fun facts and a ton more interesting info.

 I am glad to thank BestVPNs for kind permission to republish the original article on my blog.

Note: Click image to enlarge.

Top 5 moments from Networking Field Day 2017

Did you miss Cumulus Networks’ session at Networking Field Day 2017 on February 26th? Or maybe you tuned in, and you want to reminisce on the best moments? Don’t worry, we’ve got you covered! Check out our top five favorite highlights from Technical Marketing Engineer Pete Lumbis’ presentation about managing EVPN/VXLAN. (You can also watch the whole session here, if you’d prefer to hear it from the man himself. Prepare for an intelligent demonstration peppered with some good laughs!)

5) The Legos of Linux

It makes sense to start with the basics, and that’s exactly how we begin the presentation. In a daring move, Pete decides to illustrate Cumulus Linux’s capabilities sans-Powerpoint, and whiteboards the architecture of a Mellanox switch running our OS.

managing EVPN/VXLAN

One of the great things about Cumulus technology is that it’s all based in Linux. So, any configurations you would make on a Linux device are exactly the same on Cumulus Linux. Simple, right? That’s exactly our goal — allowing customers to easily customize their network as they see fit with basic building blocks. As Pete describes it, building the network is like “taking those Lego pieces and turning them into Saturn V.” Continue reading

A Behind the Scenes Look at Mobile Ad Fraud

How did I use over a gigabyte of mobile data in a single day? Why is my phone as warm as a hot plate? If you have ever asked yourself either of these questions, you might be the victim of a malicious application that is using your device and consuming your mobile bandwidth to facilitate ad fraud. We have recently identified a large population of apps being distributed from the Google Play Store that support this behavior.  These apps are installed on devices on a majority of the major cell phone carriers around the world.  These carriers operate in the US (AT&T, Verizon, Sprint, and T-Mobile), Europe (KPN, Vodafone, Ziggo, Sky, Virgin, Talk Talk, BT, O2, and T-Mobile), and the Asia Pacific region (Optus, Telstra, iinet, and others) [Note: Mobile providers and Google have been notified]. Just this morning, before this article was published, Buzzfeed broke another ad fraud story.

The Mechanics of the Grift

Online advertising consists of a complex ecosystem of ad buyers, sellers, exchanges, and data providers. Operators of websites and application authors have available space in their content layout and interaction in the user experience that can be integrated to include various forms of Continue reading

AMD plans silicon fix for Spectre vulnerability

Comeback kid AMD announced on its quarterly earnings call that it intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019 with its new Zen 2 core.The company also said it will ramp up GPU card production to meet the insane demand these days thanks to cryptominers, although it said the biggest challenge will be to find enough memory to make the cards.Also read: Meltdown and Spectre: How much are ARM and AMD exposed? It's hard to believe that in 2018 we are seeing such shortages in computing hardware, but there you have it.To read this article in full, please click here

AMD plans silicon fix for Spectre vulnerability

Comeback kid AMD announced on its quarterly earnings call that it intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019 with its new Zen 2 core.The company also said it will ramp up GPU card production to meet the insane demand these days thanks to cryptominers, although it said the biggest challenge will be to find enough memory to make the cards.Also read: Meltdown and Spectre: How much are ARM and AMD exposed? It's hard to believe that in 2018 we are seeing such shortages in computing hardware, but there you have it.To read this article in full, please click here

IDG Contributor Network: Multicloud mania: what to know

When enterprises started moving workloads and applications to the public cloud, it made sense to adapt existing networking technologies to the new domain. But while compute and storage have successfully become ‘cloud-like,’ networking hasn't.Cloud networking solutions being offered by companies including Aviatrix, Cisco, and Juniper Network are all vying to help organizations solve networking challenges when transforming their infrastructure to public cloud. But as cloud implementations become more complex, it’s becoming clear that cloud connectivity solutions based on virtualized datacenter networking technologies lack the agility and elasticity required to   build and scale in the public cloud.To read this article in full, please click here

IDG Contributor Network: Multicloud mania: what to know

When enterprises started moving workloads and applications to the public cloud, it made sense to adapt existing networking technologies to the new domain. But while compute and storage have successfully become ‘cloud-like,’ networking hasn't.Cloud networking solutions being offered by companies including Aviatrix, Cisco, and Juniper Network are all vying to help organizations solve networking challenges when transforming their infrastructure to public cloud. But as cloud implementations become more complex, it’s becoming clear that cloud connectivity solutions based on virtualized datacenter networking technologies lack the agility and elasticity required to   build and scale in the public cloud.To read this article in full, please click here

OpenSwitch

OpenSwitch is a Linux Foundation project providing an open source white box control plane running on a standard Linux distribution. The diagram above shows the OpenSwitch architecture.

This article describes how to enable industry standard sFlow telemetry using the open source Host sFlow agent. The Host sFlow agent uses Control Plane Services (CPS) to configure sFlow instrumentation in the hardware and gather metrics. CPS in turn uses the Open Compute Project (OCP) Switch Abstraction Interface (SAI) as a vendor independent method of configuring the hardware. Hardware support for sFlow is a standard feature supported by Network Processing Unit (NPU) vendors (Barefoot, Broadcom, Cavium, Innovium, Intel, Marvell, Mellanox, etc.) and vendor neutral sFlow configuration is part of the SAI.

Installing and configuring Host sFlow agent

Installing the software is simple. Log into the switch and type the following commands:
wget --no-check-certificate https://github.com/sflow/host-sflow/releases/download/v2.0.17-1/hsflowd-opx_2.0.17-1_amd64.deb
sudo dpkg -i hsflowd-opx_2.0.17-1_amd64.deb
The sFlow agent requires very little configuration, automatically monitoring all switch ports using the following default settings:

Link SpeedSampling RatePolling Continue reading

What is the Industrial IoT? And why the stakes are so high

Everyone’s heard of the IoT – smart thermostats, Internet-connected refrigerators, connected lightbulbs – but there’s a subset called industrial IoT that has a much more significant day-to-day impact on businesses, safety and even lives.The term IIoT refers to the Industrial Internet of Things. In broad strokes, it’s the application of instrumentation and connected sensors and other devices to machinery and vehicles in the transport, energy and industrial sectors.What that means in practice varies widely. One IIoT system could be as simple as a connected rat trap that texts home to say that it’s been activated, while another might be as complicated as a fully automated mass production line that tracks maintenance, productivity and even ordering and shipping information across a huge, multi-layered network.To read this article in full, please click here

Live Training at Safari Books: How the Internet Really Works

I will be teaching my first live training course at Safari Books Online on the 9th of March, starting at noon ET: How the Internet Really Works. It’s hard to describe the level and background for this training, as it will be all over the place; this is a bit of an experiment in this realm. The course description is—

This live training will provide an overview of the systems, providers, and standards bodies important to the operation of the global Internet, including the Domain Name System (DNS), the routing and transport systems, standards bodies, and registrars. For DNS, the process of a query will be considered in some detail, who pays for each server used in the resolution process, and tools engineers can use to interact DNS. For routing and transport, the role of each kind of provider will be considered, along with how they make money to cover their costs, and how engineers can interact with the global routing table (the Default Free Zone, of DFZ). Finally, registrars and standards bodies will be considered, including their organizational structure, how they generate revenue, and how to find their standards.

You can find more information here.

Is ACI Coming For The CLI?

I’m soon to depart from Cisco Live Barcelona. It’s been a long week of fun presentations. While I’m going to avoid using the words intent and context in this post, there is one thing I saw repeatedly that grabbed my attention. ACI is eating Cisco’s world. And it’s coming for something else very soon.

Devourer Of Interfaces

Application-Centric Infrastructure has been out for a while and it’s meeting with relative success in the data center. It’s going up against VMware NSX and winning in a fair number of deals. For every person that I talk to that can’t stand it I hear from someone gushing about it. ACI is making headway as the tip of the spear when it comes to Cisco’s software-based networking architecture.

Don’t believe me? Check out some of the sessions from Cisco Live this year. Especially the Software-Defined Access and DNA Assurance ones. You’re going to hear context and intent a lot, as those are the key words for this new strategy. You know what else you’re going to hear a lot?

Contract. Endpoint Group (EPG). Policy.

If you’re familiar with ACI, you know what those words mean. You see the parallels between the data center Continue reading