Archive

Category Archives for "Networking"

BrandPost: Private 5G and Wi-Fi: New Paradigm on the Horizon

By: Stuart Strickland, Wireless CTO and Fellow, Aruba, a Hewlett Packard Enterprise company.Although Wi-Fi will undoubtedly remain the dominant wireless technology for enterprise networks, over the coming years we can expect private cellular to gain a significant foothold. It will be deployed to serve an increasing number of use cases, particularly where wide coverage areas, deterministic behavior, or securely segregated traffic are required.The success of enterprise private cellular will depend on both the availability of private shared spectrum and the integration of enterprise-grade management capabilities to make it significantly easier for organizations to deploy and manage private cellular networks on their own.To read this article in full, please click here

DDoS threat report for 2023 Q1

DDoS threat report for 2023 Q1
DDoS threat report for 2023 Q1

Welcome to the first DDoS threat report of 2023. DDoS attacks, or distributed denial-of-service attacks, are a type of cyber attack that aim to overwhelm Internet services such as websites with more traffic than they can handle, in order to disrupt them and make them unavailable to legitimate users. In this report, we cover the latest insights and trends about the DDoS attack landscape as we observed across our global network.

Kicking off 2023 with a bang

Threat actors kicked off 2023 with a bang. The start of the year was characterized by a series of hacktivist campaigns against Western targets including banking, airports, healthcare and universities — mainly by the pro-Russian Telegram-organized groups Killnet and more recently by AnonymousSudan.

While Killnet-led and AnonymousSudan-led cyberattacks stole the spotlight, we haven’t witnessed any novel or exceedingly large attacks by them.

Hyper-volumetric attacks

We did see, however, an increase of hyper-volumetric DDoS attacks launched by other threat actors — with the largest one peaking above 71 million requests per second (rps) — exceeding Google’s previous world record of 46M rps by 55%.

Back to Killnet and AnonymousSudan, while no noteworthy attacks were reported, we shouldn't underestimate the potential risks. Unprotected Internet Continue reading

DHCP Relaying with Redundant DHCP Servers

Previous posts in this series (DHCP relaying principles, inter-VRFs relaying, relaying in VXLAN segments and relaying from EVPN VRF) used a single DHCP server. It’s time to add another layer of complexity: redundant DHCP servers.

Lab Topology

We’ll use a lab topology similar to the VXLAN DHCP relaying lab, add a second DHCP server, and a third switch connecting the two DHCP servers to the rest of the network.

DHCP Relaying with Redundant DHCP Servers

Previous posts in this series (DHCP relaying principles, inter-VRFs relaying, relaying in VXLAN segments and relaying from EVPN VRF) used a single DHCP server. It’s time to add another layer of complexity: redundant DHCP servers.

Lab Topology

We’ll use a lab topology similar to the VXLAN DHCP relaying lab, add a second DHCP server, and a third switch connecting the two DHCP servers to the rest of the network.

AI and Networking

Bill Gates recently called the development of AI as fundamental of a creation as the microprocessor, the personal computer, the Internet, and the mobile phone. He is most likely right. OpenAI found that around 80% of the U.S. workforce could have at least 10% of their work tasks affected by the introduction of large language models (LLMs). If you are ...

The post AI and Networking appeared first on NetworkStatic | Brent Salisbury's Blog.

Network Observability: Don’t Buy Into the Hype, Follow the Data

The following post is by Jeremy Rossbach, Chief Technical Evangelist at Broadcom. We thank Broadcom for being a sponsor. For today’s teams, it is exceedingly complex and costly to support multiple generations of infrastructure and applications. What’s worse, according to an IDC report on network observability, this is the number one challenge to achieving digital […]

The post Network Observability: Don’t Buy Into the Hype, Follow the Data appeared first on Packet Pushers.

Tech Bytes: Configure Devices, Stream Telemetry With Nokia’s Free, Open-Source gNMIc (Sponsored)

Today on the Tech Bytes podcast we dive into gNMIc with sponsor Nokia. gNMIc is open-source software you can use to configure devices and collect device telemetry. It can output telemetry to InfluxDB, Prometheus, and SNMP traps. Nokia has contributed gNMIc to the OpenConfig project. We talk with gNMIc creator Karim Radhouani, Technology and Architecture Consulting Engineer at Nokia, about why he developed the tool and how customers are using it.

The post Tech Bytes: Configure Devices, Stream Telemetry With Nokia’s Free, Open-Source gNMIc (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Configure Devices, Stream Telemetry With Nokia’s Free, Open-Source gNMIc (Sponsored)

Today on the Tech Bytes podcast we dive into gNMIc with sponsor Nokia. gNMIc is open-source software you can use to configure devices and collect device telemetry. It can output telemetry to InfluxDB, Prometheus, and SNMP traps. Nokia has contributed gNMIc to the OpenConfig project. We talk with gNMIc creator Karim Radhouani, Technology and Architecture Consulting Engineer at Nokia, about why he developed the tool and how customers are using it.

6 industries where private 5G makes sense

OK, I’ve come around on the notion of private 5G.Last year, I blogged about private 5G and explained how you’d know you were a prospect for the technology as an alternative to WiFi or public cellular services. My focus was on the same community of workers that most tech empowerment has focused on, meaning the white-collar or “carpet” types. Since the first of the year, I’ve had a chance to chat with 31 companies who are using or deploying private wireless technology, and I’ve also chatted with some of their integrators and suppliers. None of the enterprises were using private 5G in the hallowed (carpeted) halls of an office. Instead, their targeted jobs were outside in the dirt—sometimes literally—or on some factory or warehouse floor.To read this article in full, please click here

Global hosting providers help keep key Ukraine web sites available

If there’s one big lesson about internet availability, it might be coming from Ukraine, where more than a year of Russian attacks have failed to bring down the network.According to a study by ThousandEyes, which is part of Cisco, the repeated attempts to disrupt access to key Ukrainian web sites have occasionally succeeded, but only for short periods.The most effective defensive strategy proved to be hosting content on global providers’ infrastructure, which demonstrated the most resilience overall, according to ThousandEyes’ “Ukraine Internet Analysis – March 2023”.To read this article in full, please click here

Network Break 425: Microsoft Adds Security Copilot To AI Squadron; Samsung Stung By ChatGPT Leaks

This week's Network Break examines Security Copilot, the latest AI-infused assistant in Microsoft's growing arsenal; discusses optical advancements from Arelion and Infinera that sent 400Gb wavelengths over 1,800 kilometers; examine a news report that claims Tesla workers shared "highly invasive" images recorded by vehicle cameras; plus even more tech news.

The post Network Break 425: Microsoft Adds Security Copilot To AI Squadron; Samsung Stung By ChatGPT Leaks appeared first on Packet Pushers.

Network Break 425: Microsoft Adds Security Copilot To AI Squadron; Samsung Stung By ChatGPT Leaks

This week's Network Break examines Security Copilot, the latest AI-infused assistant in Microsoft's growing arsenal; discusses optical advancements from Arelion and Infinera that sent 400Gb wavelengths over 1,800 kilometers; examine a news report that claims Tesla workers shared "highly invasive" images recorded by vehicle cameras; plus even more tech news.

Kubernetes Security And Networking 6: Kubernetes CVEs – Video

This video looks at various Kubernetes vulnerabilities and their severity scores to help you understand how to evaluate CVEs so you can prioritize remediation. It also shows different options and sources of CVEs. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a diverse a mix of […]

The post Kubernetes Security And Networking 6: Kubernetes CVEs – Video appeared first on Packet Pushers.