Archive

Category Archives for "Networking"

RIPE 75

RIPE held its 75th meeting in Dubai in mid-October. As usual there was a diverse set of presentations covering a broad range of activities that are taking place on today’s Internet. The topics include issues relating to network operations, regulatory policies, peering and interconnection, communications practices within data centres, IPv6, the DNS, routing and network measurement. If that's not enough, the topic of the Internet of Things has been added as a Working Group in the RIPE pantheon. If you add address policy, database and RIPE services to the mix you get a pretty packed five days with topics that would appeal to most Internet folk

RIPE 75

RIPE held its 75th meeting in Dubai in mid-October. As usual there was a diverse set of presentations covering a broad range of activities that are taking place on today’s Internet. The topics include issues relating to network operations, regulatory policies, peering and interconnection, communications practices within data centres, IPv6, the DNS, routing and network measurement. If that's not enough, the topic of the Internet of Things has been added as a Working Group in the RIPE pantheon. If you add address policy, database and RIPE services to the mix you get a pretty packed five days with topics that would appeal to most Internet folk

Extreme Transition At Last

It is now almost 12 months since the first announcement that Broadcom was to acquire Brocade, and sell off the IP parts of the business. It took another 6 months to get confirmation that Extreme Networks would be buying my business unit (SRA).

For regulatory reasons, the Broadcom/Brocade transaction has still not closed. The original plan was to close that deal first, then close the Extreme transaction. But due to the delays, they re-arranged things, and now the Extreme deal has finally closed. Desks have been cleared, moving crews are working all weekend, and come Monday, I will have a new “Extreme Networks” badge.

What does this mean for me? My group is moving to become part of Extreme Networks. In the short term, I keep working with the same core group of people. But now we will be part of a new wider group, with a different strategic focus.

We will have new systems and applications to integrate StackStorm with, new use-cases, and maybe further opportunities beyond StackStorm. So far all signs are pointing to this being a positive move, and I am looking forward to getting this transition behind us.

Cisco PIX Security Appliances Firewall modes

Today I am going to talk about the different modes of Cisco PIX firewall. By default if you talk about the mode of the firewall, a firewall is a routed hop and acts as a default gateway for hosts that connect to one of its screened subnets. 

In recent years, a growing best practice has been to deploy firewalls not only at the traditional network perimeter-where the private corporate network meets the public Internet-but also throughout the enterprise network in key internal locations, as well as at the WAN edge of branch office networks. This distributed-firewall strategy helps protect against internal threats, which have historically accounted for a large percentage of cyber losses, according to annual studies conducted by the Computer Security Institute (CSI).

Now let's talk about the different firewall modes. There are two modes of firewalls and they are as routed mode and transparent mode.

Cisco PIX Security Appliances Routed mode
Default mode of an ASA. The ASA acts as a single firewall and all interfaces are provisioned to be managed through a single firewall configuration.

Fig 1.1- Firewall Routed mode
Configuration Example for Cisco PIX security appliances in routed mode

Below is the basic way Continue reading

Alcatel-Lucent (Nokia) 7750 Service routers

Today I am going to talk about the Alcatel-Lucent 7750 Service routers as they are very much robust in nature and in demand with many of the enterprise networks. Now the Alcatel-Lucent 7750 Service routers are now rebranded and renamed as Nokia 7750 Service routers. The Nokia 7750 service routers are delivers the performance, service richness, and intelligence to drive the converged IP network edge.

The Alcatel-Lucent 7750 service Router (SR) portfolio is a collection of multi-provider edge routing structures that supply high performance, carrier richness, and creates first-rate value for networking in the cloud generation. it's far designed for the concurrent delivery of advanced residential, business and Wi-Fi broadband IP offerings, and gives cloud, records middle and department office connectivity for corporation networking on a commonplace IP part routing platform.

Fig 1.1- Alcatel-Lucent/Nokia 7750 service Routers

Leveraging Alcatel-Lucent 400 Gb/s FP3 silicon technology and a comprehensive suite of IP/MPLS routing capabilities, the 7750 SR has the flexibility to be deployed in a wide range of applications:
  • Broadband network gateway for residential service delivery with advanced subscriber management
  • Multiservice edge router for business VPN/Internet access, cloud and data center interconnect services
  • Enterprise router providing intelligent connectivity to the Continue reading

MPLS 101 – The Basics

In this series of posts, I want to spend some time reviewing MPLS fundamentals.  This has been covered in many places many times before – but I’ve noticed lately that often times the basics are missed or skipped when looking at MPLS.  How many “Introduction to MPLS” articles have you read where the first step is “Enable LDP and MPLS on the interface” and they dont actually explain whats happening?  I disagree with that being a valid starting point so in this post I’d like to start with the basics.  Subsequent posts will build from here as we get more and more advanced with the configuration.

Warning: In order to get up and running with even a basic configuration we’ll need to introduce ourselves to some MPLS terminology and concepts in a very brief fashion.  The descriptions of these terms and concepts is being kept brief intentionally in this post and will be covered in much great depth in a future post.

Enough rambling from me, let’s get right into it…

So what is MPLS?  MPLS stands for Multi-Protocol Label Switching and it provides a means to forward multiple different protocols across a network.  To see what it’s capable Continue reading

Nominations Now Open for 2018 ISOC Board of Trustees Election

The ISOC Nominations Committee is now inviting nominations for candidates to serve on the ISOC Board of Trustees.

In this years election cycle one Trustee will be elected by ISOC Organizational Members, one trustee by ISOC Chapters, and two will be selected by the Internet Engineering Task Force.

The Trustee positions are 3-year terms that will begin mid-year 2018 and expire mid-year 2021.

The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Internet Society’s mission of preserving the open, global Internet.

If you or someone you know is interested in serving on the Board, please see the official Call for Nominations, additional information, and links to online nomination forms at www.internetsociety.org/trustees

Nominations close at 15:00 UTC on 15 December 2017.

The post Nominations Now Open for 2018 ISOC Board of Trustees Election appeared first on Internet Society.

5 Strategies to Promote Your App

5 Strategies to Promote Your App

5 Strategies to Promote Your App

Brady Gentile from Cloudflare's product team wrote an App Developer Playbook, embedded within the developer documentation page. He decided to write it after he and his team conducted several app developer interviews, finding that many developers wanted to learn how to better promote their apps.

They wanted to help app authors out in the areas outside of developer core expertise. Social media posting, community outreach, email deployment, SEO, blog posting and syndication, etc. can be daunting.

I wanted to take a moment to highlight some of the tips from the App Developer Playbook because I think Brady did a great job of providing clear ways to approach promotional strategies.

5 Promotional Strategies


1. Share with online communities

Your app’s potential audience likely reads community-aggregated news sites such as HackerNews, Product Hunt, or reddit. Sharing your app across these websites is a great way for users to find your app.

5 Strategies to Promote Your App

For apps that are interesting to developers, designers, scientists, entrepreneurs, etc., be sure to share your work with the Hacker News community. Be sure to follow the official guidelines when posting and when engaging with the community. It may be tempting to ask your friends to upvote Continue reading

IDG Contributor Network: How IoT is shaping the smart office of the future

The Internet of Things (IoT) has already firmly embedded itself into America’s homes, industries, and infrastructure, and now it’s tackling that final frontier of the market, the office. Increasingly, America’s savviest businesses are adopting IoT tech into their office environments to ease their employees’ workloads, save serious money on overhead and by reducing fraud, and to gather valuable data which can be used to optimize their operations.So how exactly are IoT solutions being applied to office dilemmas, and is the increasingly trendy “smart office” anything more than a temporary fad? A quick look at the union between smart tech and America’s workspaces shows that this phenomenon is anything but temporary, and will fundamentally reshape how we work and run our businesses well into the future.To read this article in full or to leave a comment, please click here

Cisco adds telemetry to storage networks

Fiber Channel (FC) storage networks have always been somewhat of a black box. Servers and storage devices are plugged in, and things magically seem to work.For the most part, storage-area networks (SANs) are reliable and perform well – and they better because the applications that rely of FC-SANs are typically the most important ones in the company. But what happens when things aren’t working? A poorly performing SAN might mean that the database with critical customer information isn’t available or financial records can’t be pulled up. Also on Network World: 10 Most important open source networking projects Historically, troubleshooting SANs has been difficult because the FC switches give off little data that can be used to identify the source of a problem. Typically, engineers would need to deploy a physical test access port (TAP) or packet broker in front of the product to capture the data. This may seem like a reasonable strategy until one prices out TAPs and learns the price per port is about 5-10x a FC port. Companies that go down this route often buy a few and deploy them only when there is a problem. This causes the engineering team to always be in Continue reading

Can We Expand the Multistakeholder Model for Internet Governance? A Feasibility Report

What can be done to expand the usage of the multistakeholder model for Internet governance?

Collaborative decision making has been at the heart of how the Internet has grown and developed since its earliest days. Multistakeholder approaches are used across the Internet ecosystem and have helped create the opportunities made possible by the Internet today. But as we outlined in our Global Internet Report 2017, more work is needed to expand the use of multistakeholder processes in order to tackle some of the most pressing challenges facing the future of the Internet.

As I wrote last summer, the Internet Society commissioned a feasibility study on expanding the use of the multistakeholder model for Internet governance , including three focus areas:

  • Demonstrating the efficacy of the model
  • Capacity building
  • Research

I would like to thank Larry Strickling and Grace Abuhamad, who have led this work. Their report is based on interviews with a wide range ICT experts from academia, industry, the technical community, civil society and governments.  It details a possible framework for such an initiative, as well as the resources required. It also makes clear that any new initiative should support and complement existing initiatives such as the Internet Governance Forum Continue reading

Scary Linux commands for Halloween

With Halloween so fast approaching, it’s time for a little focus on the spookier side of Linux. What commands might bring up images of ghosts, witches and zombies? Which might encourage the spirit of trick or treat?crypt Well, we’ve always got crypt. Despite its name, crypt is not an underground vault or a burial pit for trashed files, but a command that encrypts file content. These days “crypt” is generally implemented as a script that emulates the older crypt command by calling a binary called mcrypt to do its work. Using the mycrypt command directly is an even better option. $ mcrypt x Enter the passphrase (maximum of 512 characters) Please use a combination of upper and lower case letters and numbers. Enter passphrase: Enter passphrase: File x was encrypted. Note that the mcrypt command creates a second file with an added ".nc" extension. It doesn't overwrite the file you are encrypting.To read this article in full or to leave a comment, please click here