Archive

Category Archives for "Networking"

The Internet is at a crossroads: we have a choice to make

As we look around at a rapidly changing world that is shaped more and more by the digital domain, we see an Internet that faces many challenges. We see an Internet at a crossroads, where we have critical choices to make about its evolution in the years to come.

Those choices will determine whether we continue to benefit from an Internet that opens up a world of opportunity for everyone online, or whether we grow more fearful of it as a negative influence on our lives.  People’s hopes and fears about the Internet today are dividing us and its future.

The notion of hope and progress has defined our view of the Internet since its inception. Its own growth has taken it from obscure computer-to-computer connections to a social and economic powerhouse. It is the platform on which young people and an ever-growing number of women can invent their own futures. Small enterprises and communities all over the world are using digital tools to mobilize and empower themselves to access new markets, grow their economies and provide vital services to their citizens.

Of course, we must see the adoption of the Internet for what it is: a reflection of everything in society itself.

In light of growing sentiment that the Internet is fueling Continue reading

Vapor IO announces new architecture for edge data centers

Vapor IO, the data center technology startup previously featured for its plans to put mini data centers at cell towers, announced a new architecture for deploying and managing distributed computing power throughout cities.As previously announced, the company launched what it calls Project Volutus, a co-location and “data center as a platform” service, powered by Vapor Edge Computing containers. What’s coming out now is details on the modules.What is Vapor Kinetic Edge? The actual data center module design is called Vapor Kinetic Edge. The idea is to install multiple interconnected edge computing locations around a city or a region and connect them to form a single virtual data center using centralized management and orchestration software.To read this article in full, please click here

Vapor IO announces new architecture for edge data centers

Vapor IO, the data center technology startup previously featured for its plans to put mini data centers at cell towers, announced a new architecture for deploying and managing distributed computing power throughout cities.As previously announced, the company launched what it calls Project Volutus, a co-location and “data center as a platform” service, powered by Vapor Edge Computing containers. What’s coming out now is details on the modules.What is Vapor Kinetic Edge? The actual data center module design is called Vapor Kinetic Edge. The idea is to install multiple interconnected edge computing locations around a city or a region and connect them to form a single virtual data center using centralized management and orchestration software.To read this article in full, please click here

Data ‘tsunami’ to absorb 20% of world electricity

It’s the "Dirty Cloud," says journalist John Vidal in a recent tweet. Vidal is referring to energy use by data centers, which he wrote about in an article for Climate Home News.In the story, published this week, the Guardian environment writer reveals a bleak picture of future global climate change emissions. Bleak, in part, because the discouraging projections he writes of are caused not by, as one might expect, fossil fuel power plants and internal combustion engine users, but by communications and data center power use.To read this article in full, please click here

Data ‘tsunami’ to absorb 20% of world electricity

It’s the "Dirty Cloud," says journalist John Vidal in a recent tweet. Vidal is referring to energy use by data centers, which he wrote about in an article for Climate Home News.In the story, published this week, the Guardian environment writer reveals a bleak picture of future global climate change emissions. Bleak, in part, because the discouraging projections he writes of are caused not by, as one might expect, fossil fuel power plants and internal combustion engine users, but by communications and data center power use.To read this article in full, please click here

JAUT Course – Review Midweek

Hi,

Its been 3/5 Days in JAUT training and I should say Juniper has done a great job in introducing various training concept and methodologies towards Network scripting / automation.

Here are some-thing that helped

– No high stress on learning programming , they kept it to minimal and interestingly they made it more on how automation works and done instead of programming concepts – this is done in many courses

– Stress on PYEZ and Good Introduction to Ansible, simple labs  and then making the lab cover all the concepts is another great way Juniper helped to Learn us the course

– Main take-away till now is Ansible / intro to Jinja2 & YAML and templating configuration which i felt very refreshing and all my fears about templating has atleast vanished  till now.

I cant wait to blog on things that i have learnt during the training and implement it in my own lab, i will keep this topic alive for a while.

 

Cheers

Rakesh M

Another BGP Routing Incident Highlights an Internet Without Checkpoints

Yesterday, there were two BGP routing incidents in which several high-profile sites (Google, Apple, Facebook, Microsoft, Twitch, NTT Communications and Riot Games) were rerouted to a previously unused Russian AS. The incidents only lasted about three minutes each, but demonstrated once again the lack of routing controls like those called for in MANRS that could have prevented this from happening.

As reported in BGPmon’s blog post on 12 December 12,

“…our systems detected a suspicious event where many prefixes for high profile destinations were being announced by an unused Russian Autonomous System.

Starting at 04:43 (UTC) 80 prefixes normally announced by organizations such Google, Apple, Facebook, Microsoft, Twitch, NTT Communications and Riot Games were now detected in the global BGP routing tables with an Origin AS of 39523 (DV-LINK-AS), out of Russia.”

Either a configuration mistake or a malicious attack, it propagated quickly through the Internet without visible obstacles. This was one of almost 5000 route leaks and hijacks in 11 months of 2017. For comparison, network outages during the same period caused almost 8000 incidents (source: https://bgpstream.com/):

In practice, the efficacy of corrective actions strongly depends on the reliability and completeness of information related to Continue reading

Internet Giants Should Be Broken Up

This is a 30 minute presentation that highlights the lack of societal value that Google, Apple, Facebook and Amazon deliver. Galloway examines their market dominance and how the market is failing to regulate or control the tech companies. I recommend watching this and considering the ideas proposed here. Galloway is well known and worth listening […]

Episode 17 – BGP: Peering and Reachability

In this Community Roundtable episode, returning guests Russ White and Nick Russo start our three part deep dive into the Border Gateway Protocol, or BGP, with a look at terminology, how peer relationships form, the differences between internal and external BGP, and scaling techniques.

 

Show Links

https://tools.ietf.org/html/rfc4271

https://www.ietf.org/rfc/rfc1771.txt

http://bgp.us/

 

Show Notes

Overview

  • BGP is an external gateway protocol used widely in both the public internet and with enterprise organizations
  • BGP is the only external gateway protocol and is traditionally used primarily to connect networks to other networks
  • BGP was built primarily for policy propagation to provide reliability, scalability, and control
  • BGP v4 is created which is the base version we still use today though updated over the year

 

Terminology

  • Devices running BGP are called speakers
    • A connection between two speakers is called a peering session
    • The two speakers are often called peers or neighbors
  • Network Layer Reachability Information is a key term to remember — NLRI
    • Address Families (AFs) carry NLRIs for different topologies and different kinds of reachability information (v4, v6, ethernet, mpls, etc.
  • Autonomous System–a set of bgp speakers contained within a single administrative domain (with some rather loose Continue reading