Archive

Category Archives for "Networking"

IDG Contributor Network: Not all information is created equal: Unlocking the huge potential of smart data

The amount of data being created today is expected to increase ten-fold in less than a decade, it’s also anticipated that enterprises will produce around 60% of global data by 2025[1]. However, while the amount of data may be growing exponentially, the intelligence gleaned from it is not. Instead, companies can be subject to a barrage of unstructured data delivered at high velocity from a variety of different sources with limited ability to convert it into actionable insight. As a result, enterprises risk useful information getting lost amidst the sheer volume of noise.This is set to be further compounded by the widespread adoption of IoT technologies in both consumer and enterprise markets. The proliferation of IoT sensors, mobile devices and digital services, combined with advent in big data technologies and broadband networks increase the volume, velocity and variety of data traversing the connected world. This means that businesses that collect relevant data that flows through their corporate networks and the connected world are sitting on an abundance of data, which will only increase. Mission contextual analysis of this data can provide invaluable insight to corporations in a variety of areas and improve business outcomes. For example, gleaning insight Continue reading

Task List Tracker for the Mac (DIY Version)

As a Mac user, how do you keep track of the tasks you need to complete? I find myself swamped in things that need doing and every day more things get added to my list. The problem is, in the past I’ve relied too much on my memory to keep track of what I need to do, and I’m sadly aware that there are more things on my task list than I can keep track of, and all too frequently I get into work and think “What was I going to do this morning? I’m sure there was something high priority, but…”

It should be easy, you’d think, to maintain a list of tasks, assign some kind of priority, and have that list readily accessible while using my computer. I suspect there’s an app (indeed, that there are many apps) for that, but while I have tried a few, somehow I’ve not managed to integrate them into my daily workflow. I spoke to a colleague about this, and he said that he keeps a text file on his Desktop listing all his open tasks, and he updates it as needed. If it works for him, maybe it would work for Continue reading

How to avoid ‘the biggest rip-off in networking’

Old habits die hard, especially when it comes to buying network gear and accessories based on long-standing procurement practices. While it may seem easier to sustain the status quo, doing so can expose you to undue costs created by manufacturer price-gouging practices.Case in point: Optical transceivers, which Gartner says accounts for 10 to 15 percent of enterprise network capital spending. This may not seem like a big budget buster, but huge markups on optics is the subject of a new Gartner report, entitled “How to Avoid the Biggest Rip-Off in Networking.”To read this article in full or to leave a comment, please click here

How to avoid ‘the biggest rip-off in networking’

Old habits die hard, especially when it comes to buying network gear and accessories based on long-standing procurement practices. While it may seem easier to sustain the status quo, doing so can expose you to undue costs created by manufacturer price-gouging practices.Case in point: Optical transceivers, which Gartner says accounts for 10 to 15 percent of enterprise network capital spending. This may not seem like a big budget buster, but huge markups on optics is the subject of a new Gartner report, entitled “How to Avoid the Biggest Rip-Off in Networking.”To read this article in full or to leave a comment, please click here

How to avoid ‘the biggest rip-off in networking’

Old habits die hard, especially when it comes to buying network gear and accessories based on long-standing procurement practices. While it may seem easier to sustain the status quo, doing so can expose you to undue costs created by manufacturer price-gouging practices.Case in point: Optical transceivers, which Gartner says accounts for 10 to 15 percent of enterprise network capital spending. This may not seem like a big budget buster, but huge markups on optics is the subject of a new Gartner report, entitled “How to Avoid the Biggest Rip-Off in Networking.”To read this article in full or to leave a comment, please click here

Solving the Problem in the Right Place

Sometimes I have this weird feeling that I’m the only loony in town desperately preaching against the stupidities heaped upon infrastructure, so it’s really nice when I find a fellow lost soul. This is what another senior networking engineer sent me:

I'm belonging to a small group of people who are thinking that the source of the problem are the apps and the associated business/security rules: their nature, their complexity, their lifecycle...

Sounds familiar (I probably wrote a few blog posts on this topic in the past), and it only got better.

Read more ...

Deploy360 @ ENOG 14

Our colleague Jan Žorž from the Deploy360 team will be presenting at the 14th Eurasia Network Operators Groups (ENOG 14) on 9-10 October 2017 in Minsk, Belarus. This is being preceded by workshops on Best Practices in IPv6 BGP and DNSSEC Operations.

Jan will be talking about his real life experiences with NAT64/DNS64 and will be demonstrating the NAT64check tool on Monday evening (17.00-18.15). Following after his talk is a BoF on the Internet-of-Things (18.30-19.30), which is also sure to include discussions about the importance of IPv6 to scale the expected many billions of devices in future.

We’d also like to highlight the Cloudflare update on IPv6, DNS, DNSSEC, CA certs from Martin Levy (Cloudflare) on the Tuesday (10.00-11.30), who seems to be managing to cover just about all the Deploy360 topics in one talk. And for routing security, Kirill Malevanov, (Selectel) will be discussing his experiences of IPv4 prefix hijacking.

More Information

The post Deploy360 @ ENOG 14 appeared first on Internet Society.

Support New Ways of Working To Connect The World

The World Telecommunications Conference (WTDC) begins today. This is a key moment to remind the world that together we can shape a digital future that puts humanity at the heart of the Internet.  But to do this we need your help.

Help send the message that to close the digital divide we’ll need new ways of working, new ways of thinking, and new policies support it all.

Much of what we are speaking on at WTDC serve as real-world examples of the kinds of things we need policy and decision makers to support – community networking being a key focus.

We will keep you up-to-date on what is happening and what we need to do next the conference.

Here’s how you can help:

Take part in a Pre-Event Roundtable

On Sunday, October 8, 17:20 UTC (4:20 PM Argentina Local Time) Internet Society’s Vice President, Global Engagement Raúl Echeberría will speak on the importance of community networks at a Pre-Event-Private Sector Roundtable on Partnering for the SDGs. Watch it here.

 Share Raul’s Blog

Raul’s wrote a critical blog to launch our WTDC message.  Please share it across your channels.

“Every Connection Matters – Shape Tomorrow and Help Close Digital Continue reading

BGP ADD-PATH – Summary

Hi,

First things first, I have been getting a lot of requests to upload the lab’s which i illustrate as is, so i shall be uploading them to a Github page with initial and final-configs and Instead of vagrant i shall be using EVE-NG as a tool so that you guys can import them easily.

https://github.com/r2079/JDC

Going through Fabric-Path and CLOS concepts, got myself started with 3 Stage Clos and as a part of understanding it, discovered something.

Why –  To make sure Servers at one end have equal cost path to the servers-at other end, at scale the spine accordingly optimizing the CAPEX.

Simple words, in the below topology, we need to make sure that R6 has equal cost to R7 and vice-versa.

 

Protocols and setup

-> OSPF for the entire domain and Ibgp to peer between RR (R2) and all other loopbacks, we use OSPF so that Ibgp peering will be over Loopback and also for load-balancing protocol Next-hops

-> Default routes on R6 and R7, load-balance (per-packet) on all-routers (where technically required)

-> R3 AND R4,R5 has static back to loopbacks of R6 and R7 respectively, advertising them into OSPF will defeat the purpose obviously Continue reading

Introduction to DHCP (Dynamic host configuration protocol)

 Today I am going to talk about the most interesting topic named as DHCP. I knew lot of you guys already knew about the DHCP and how it works in the real network environment but some of you are the beginners in the field of networking and this is why it is one of the most important topic for them.

Why we use the DHCP server and what is the purpose of the DHCP ?

Well Routers, servers, other key nodes require specific or static IP address and Clients can use an IP from a pool of available addresses. Minimum host configuration for Internet:
  • IP address
  • Subnet mask
  • Default gateway
  • DNS server IP

DHCP allows network administrator to assign a pool of available IP addresses for clients with additional configuration information such as default gateway, DNS IP, WINS IP, domain names
Addresses are leased, Cisco default is 24 hours

Fig 1.1- DHCP Server


DHCP process
·      Client boots up, sends a DHCPDISCOVER broadcast
·      All available DHCP servers respond with DHCPOFFER containing proposed IP address, lease time, DNS IP; server checks that IP offered is not in use before making the offer by issuing a default 2 pings

“Keep those eyebrows up!” – Cybersecurity at the Global Women’s Forum

News of cyberattacks is slowly becoming a new normal. We are still at a stage where high-profile cases, like the recent attack against the American credit reporting company Equifax, in which 145.5 million users had their personal information compromised, raise eyebrows. But we need those eyebrows to stay up because we should never accept cyber threats as the new normal.

This week in Paris, hundreds of leaders met at the Women’s Forum to discuss some of the key issues that will shape the future of a world in transition, including cybersecurity. But this topic is not just a concern for the experts – it’s a concern to all men and women leading any business today.

New risks on the horizon

A recent report by the Internet Society, “Paths to Our Digital Future”, points out that now is a big moment for the Internet. The revolution we already see could accelerate in the coming years, not only due to the increasing digitalization of services and businesses, but also through the expansion of objects being connected to the Internet – the Internet of Things (IoT). By 2020 more than 20 billion “things” could be connected.

Suddenly it’s not only Continue reading

IDG Contributor Network: Data or metadata? For the IoT they’re both important

Think about the most successful, widely scaled networks that let us function in today's world. No I’m not talking about internet service providers, I mean the Really, Really Big Networks. The ones that without which modern civilization would be very different. The telephone system. Intermodal containerized shipping. Air traffic control. And they all have one vitally important enabling element that made them all scalable: a Control Layer that is not intrinsic to the electronic or physical streams that make up the network traffic. For phones, it’s Signalling System 7, which has managed to run the world of voice calls for decades. For intermodal shipping, it’s container manifests. For aviation, it’s ATC. And they truly do, run the globe.To read this article in full or to leave a comment, please click here

Traceroute Lies! A Typical Misinterpretation Of Output

Sometimes a user with performance issues will proudly present me with a traceroute and point to a particular hop in the network and accuse it of being the problem because of high latency on the link. About 1 time in 1000 they are correct and the link is totally saturated. The other 999 times, well, let me explain.

Traceroute

Traceroute Output

Here’s a typical traceroute I might be sent by a user (IPs and hostnames are altered to protect the innocent):

$ traceroute www-europe
traceroute to www-europe (18.9.4.17), 64 hops max, 52 byte packets
 1  gateway (57.239.196.133)          11.447 ms   18.371ms    25.057 ms
 2  us-atl-edge (137.16.151.202)      13.338 ms   20.070 ms   19.119 ms
 3  us-ga-core (57.239.129.37)       103.789 ms  105.998 ms  103.696 ms
 4  us-nyc-core (57.239.128.189)     107.601 ms  103.116 ms  103.934 ms
 5  us-east-core (57.239.13.42)     103.099 ms  104.215 ms  109.042 ms
 6  us-east-bb1 (57.239.111.58)      107.824 ms  104.463 ms  103.482 ms
 7  uk-south-bb1 (57.240.117.81)     106.439 ms  111.156 ms  104.761 ms
  Continue reading