The post Worth Reading: QoS Marking is an Application Problem appeared first on 'net work.
Sitting in the conference room, I looked up at the whiteboard covered in a clever design. I hadn’t understood the design immediately, but then as my mentor explained it to me, I comprehended the brilliance of it.
“That was…that was clever. Really. Elegant even. I never would have come up with that on my own. I learned something from you today, and I appreciate it. Thanks for taking the time.”
“Oh, I can’t take credit for the design. I got most of it from this book here. If anything, the credit goes to the author.”
And so I took a look at the book, and searched online for the author’s name. Her information popped up in my browser, and I sent her an e-mail.
“Thanks for the design you recommended in your book. It’s very clever, and we’re going to be testing it for use in our company. I think you’ve solved some problems for us. We really appreciate it.”
After a few days, her reply came back.
“Naturally, I’m happy that the book is a benefit to you, but honestly, that design is a reflection of an interview I had with a research team. They did all the heavy lifting and Continue reading
CORD remains a radical notion but is gaining traction with service providers.
[Editor’s Note: A limited number of student grants are available to help pay for travel, accommodations, and NDSS Symposium registration fees for full-time students attending the 24th annual Network and Distributed System Security (NDSS) Symposium. Watch the NDSS website at https://www.internetsociety.org/events/ndss-symposium for information and deadlines as the process opens for NDSS 2018 in February of next year. The following post is a guest contribution from one 2017 grantee.]
Verizon is taking networking tips from Facebook and Google.
When the inevitable 2AM call happens—”our network is under attack”—what do you do? After running through the OODA loop (1, 2, 3, 4), used communities to distribute the attack as much as possible, mitigated the attack where possible, and now you realist there little you can do locally. What now? You need to wander out on the ‘net and try to figure out how to stop this thing. You could try to use flowspec, but many providers do not like to support flowspec, because it directly impacts the forwarding performance of their edge boxes. Further, flowspec, used in this situation, doesn’t really work to walk the attack back to its source; the provider’s network is still impact by the DDoS attack.
This is where DOTS comes in. There are four components of DOTS, as shown below (taken directly from the relevant draft)—
The best place to start is with the attack target—that’s you, at 6AM, after trying to chase this thing down for a few hours, panicked because the office is about to open, and your network is still down. Within your network there would also be a DOTS client; this would be a small piece of software running Continue reading
The managed SD-WAN service will be available at the end of the second quarter.
Pica8 now supports five 100G white box switches.