Archive

Category Archives for "Networking"

IDG Contributor Network: Stretchable screens will follow upcoming flexible ones

The smartphone in its current guise has been around for 10 years, and in that time it hasn’t changed form-factor much—a somewhat boring rectangular slab of plastic. Big deal.Ten years, however, are eons in tech life. Therefore one could ask just why haven’t smartphones morphed their shape in this decade of otherwise spectacular technological advancement? Have we really reached the pinnacle of communications tool design? More likely, a technical limitation.Samsung, though, is reportedly aiming to launch flexible devices soon, according to the Korea Herald. One of them is a “bendable Virtual Reality device with a flexible OLED display that can be bent to cover a user’s eyes completely,” for example, it says.To read this article in full or to leave a comment, please click here

New products of the week 2.20.17

New products of the weekImage by RiverbedOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ambra for DevelopersImage by ambraTo read this article in full or to leave a comment, please click here

New products of the week 2.20.17

New products of the weekImage by RiverbedOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ambra for DevelopersImage by ambraTo read this article in full or to leave a comment, please click here

Microsoft eyes Indian startups for cloud services

Microsoft is targeting Indian startups with its cloud services, and has signed up more than 2,000 such customers in the country in the last 12 months, the company’s CEO Satya Nadella said Monday at an event for startups in Bangalore.A large opportunity ahead for the company is the large number of developers who are building their services around a biometric database, consisting of fingerprints and iris scans, which the country has created of over 1 billion of its people.Under a new program for the digital exchange of information, called India Stack, the government is offering the biometric system, called Aadhaar, as an authentication mechanism for a variety of services offered by the private sector.To read this article in full or to leave a comment, please click here

Q&A: Migrating to Modern Data Center Infrastructure

One of my readers sent me a list of questions after watching some of my videos, starting with a generic one:

While working self within large corporations for a long time, I am asking myself how it will be possible to move from messy infrastructure we grew over the years to a modern architecture.

Usually by building a parallel infrastructure and eventually retiring the old one, otherwise you’ll end up with layers of kludges. Obviously, the old infrastructure will lurk around for years (I know people who use this approach and currently run three generations of infrastructure).

Read more ...

February 2017 CCDE Training is over ! Waiting the attendees success now !

My February 2017 CCDE class is now over. The duration of the course was for 11 days and as usual it started with lots of advanced technology lessons. All the critical CCDE exam topics (IGP, BGP , MPLS and the other technologies) were covered in detail from the design point of view. A minimum of […]

The post February 2017 CCDE Training is over ! Waiting the attendees success now ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

New Zealand High Court clears Kim Dotcom extradition to the US

Megaupload website founder Kim Dotcom and three associates were on Monday cleared by a court in New Zealand to be extradited to the U.S. where he faces a variety of charges including copyright infringement and racketeering.Holding that copyright infringement by digital online communication of copyright protected works to members of the public is not a criminal offense under New Zealand’s Copyright Act, the High Court found that a conspiracy to commit copyright infringement amounts to a bid to defraud, which is an extradition offense listed in the treaty between the U.S. and New Zealand.An earlier District Court judgment permitting the extradition was upheld by the High Court.To read this article in full or to leave a comment, please click here

Uber orders investigation into employee’s charge of sexual harassment

Uber Technologies said Sunday it had ordered an urgent investigation after a former engineer triggered an uproar on social media, alleging sexual harassment, politics and discrimination at the ride-hailing company.In a blog post, Susan J. Fowler, who joined Uber in November 2015 and quit in December last year to join Stripe, alleged that her former manager in the company had said in messages over company chat that he was looking for women to have sex with.“It was clear that he was trying to get me to have sex with him, and it was so clearly out of line that I immediately took screenshots of these chat messages and reported him to HR,” Fowler wrote in a blog post that created a storm online.To read this article in full or to leave a comment, please click here

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

Watch Air Gordon dunk with an assist from Intel drone

Give Orlando Magic forward Aaron Gordon and Intel credit for creativity: The NBA player employed an AscTec Neo drone as part of his NBA Slam Dunk Contest repertoire. Intel Orlando Magic forward Aaron Gordon practices with Intel’s AscTec Neo drone ahead of the Slam Dunk Contest, as part of NBA All-Star 2017 festivities. Unfortunately, it took the athletic player 4 attempts to grab a pass from the roughly 11-pound hexicopter and complete the dunk, and he wound up getting knocked out of the competition early.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 2

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

Exercise two of week three we already completed in a previous post where we used a For loop to loop through the BGP output.

Let’s move on to exercise three instead:

III. You have the following 'show ip int brief' output.
show_ip_int_brief = '''
Interface            IP-Address      OK?     Method      Status     Protocol
FastEthernet0   unassigned      YES     unset          up          up
FastEthernet1   unassigned      YES     unset          up          up
FastEthernet2   unassigned      YES     unset          down      down
FastEthernet3   unassigned      YES     unset          up          up
FastEthernet4    6.9.4.10          YES     NVRAM       up          up
NVI0                  6.9.4.10          YES     unset           up          up
Tunnel1            16.25.253.2     YES     NVRAM       up          down
Tunnel2            16.25.253.6     YES     NVRAM       up          down
Vlan1                unassigned      YES    NVRAM       down      down
Vlan10              10.220.88.1     YES     NVRAM       up          up
Vlan20              192.168.0.1     YES     NVRAM       down      down
Vlan100            10.220.84.1     YES     NVRAM       up          up
'''
From this output, create a list where each element in the list is a tuple consisting of (interface_name, ip_address, status, protocol).  Only include interfaces that are in the up/up state.
Print this list to standard output.

In this Continue reading

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 1

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

The first exercise of the week is the following:

I. Create an IP address converter (dotted decimal to binary).  This will be similar to what we did in class2 except:

    A. Make the IP address a command-line argument instead of prompting the user for it.
        ./binary_converter.py 10.88.17.23

    B. Simplify the script logic by using the flow-control statements that we learned in this class.

    C. Zero-pad the digits such that the binary output is always 8-binary digits long.  Strip off the leading '0b' characters.  For example,

        OLD:     0b1010
        NEW:    00001010

    D. Print to standard output using a dotted binary format.  For example,

        IP address          Binary
      10.88.17.23        00001010.01011000.00010001.00010111


    Note, you might need to use a 'while' loop and a 'break' statement for part C.
        while True:
            ...
            break       # on some condition (exit the while loop)

    Python will execute this loop again and again until the 'break' is encountered.

The first thing we want to do is to import the module sys because we are going to be working with command line arguments.

import sys

Continue reading

OpenSwitch Network Operating System

The Open Network Install Environment (ONIE) is an open source install environment that gives a switch user a choice to download ONIE compliant Network Operation System (NOS) to bare metal network switches. The OpenSwitch is community based, open source NOS that runs on hardware based on ONIE.

The goal of this article is to show how to build OpenSwitch Virtual Machine appliance, describe its capabilities and to introduce three methods for managing OpenSwitch. The OpenSwitch VM appliance was created by OpenSwitch project for training and testing purpose. It uses software data plane to forward the packets but it is not intended to be used as a virtual switch for connecting virtual machines. OpenSwitch supports many L2, L3 protocols such as STP, LACP, LLDP, OSPF, BGP, DHCP, TFTP, NTP, SSH, SNMP and others. These protocols run as separate daemons and they were integrated from another open-source projects.

For instance Quagga project provides L3 functionality to Openswitch. Quagga modules ops-ospf and ops-bgp update active routes in OpenvSwitch database (OVSDB). The module ops-zebra reads routes from OVSDB and install them to the kernel. Static routes are also stored in OVSDB, read by ops-zebra module and installed to the kernel. In order to use Continue reading

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies.Verizon’s RISK Team was called in because the multinational company had heard rumblings among the disgruntled employees and found some negative comments online. While there was no evidence of a data breach, Cheese Movers' upper management was concerned something was coming.This is just one case found in Verizon’s recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon’s report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here