Archive

Category Archives for "Networking"

SignalFx

SignalFx is an example of a cloud based analytics service. SignalFx provides a REST API for uploading metrics and a web portal that it simple to combine and trend data and build and share dashboards.

This article describes a proof of concept demonstrating how SignalFx's cloud service can be used to cost effectively monitor large scale cloud infrastructure by leveraging standard sFlow instrumentation. SignalFx offers a free 14 day trial, making it easy to evaluate solutions based on this demonstration.

The diagram shows the measurement pipeline. Standard sFlow measurements from hosts, hypervisors, virtual machines, containers, load balancers, web servers and network switches stream to the sFlow-RT real-time analytics engine. Metrics are pushed from sFlow-RT to SignalFx using the REST API.

Over 40 vendors implement the sFlow standard and compatible products are listed on sFlow.org. The open source Host sFlow agent exports standard sFlow metrics from hosts, virtual machines and containers and local services. For additional background, the Velocity conference talk provides an introduction to sFlow and case study from a large social networking site.

SignalFx's service is priced based on the number of data points that they need to store and they estimate a cost of $15 per host Continue reading

Securing BGP: A Case Study (2)

In part 1 of this series, I pointed out that there are three interesting questions we can ask about BGP security. The third question I outlined there was this: What is it we can actually prove in a packet switched network? This is the first question I want dive in too—this is a deep dive, so be prepared for a long series. :-) This question feels like it is actually asking three different things, what we might call “subquestions,” or perhaps “supporting points.” These three questions are:

  • If I send a packet to the peer I received this update from, will it actually reach the advertised destination?
  • If I send this information to this destination, will it actually reach the intended recipient?
  • If I send a packet to the peer I received this update from, will it pass through an adversary who is redirecting the traffic so they can observe it?

These are the things I can try to prove, or would like to know, in a packet switched network. Note that I want to intentionally focus on the data plane and then transfer these questions to the control plane (BGP). This is the crucial point to remember: If I Continue reading

Forget about LTE hurting Wi-Fi and think about using it in your business

Controversial technology that lets LTE networks use unlicensed spectrum could become a trusted part of the enterprise IT toolkit in a few years.So-called unlicensed LTE has come under fire ever since the news about it first broke more than a year ago. The charge: If mobile operators adapt their LTE networks to use frequencies that Wi-Fi depends on, Wi-Fi users will get squeezed out.ALSO ON NETWORK WORLD U.S. carriers stay tight-lipped on LTE-U deployments The two sides are now working together on standard tests to tell if a given unlicensed LTE radio unfairly interferes with Wi-Fi. Meanwhile, Qualcomm, the biggest cheerleader for the new technology, just got permission to try it out at Verizon Wireless facilities in Oklahoma City and Raleigh, North Carolina, the Federal Communications Commission said Friday. The industry group Wi-Fi Forward promptly declared the FCC should closely monitor the experiments.To read this article in full or to leave a comment, please click here

Why your network admins are nervous

This past summer, the White Rose Academies Trust in Leeds, England, kicked off a project that represented the first step on a journey to a software-defined networking platform -- and the move precipitated some career changes, both positive and negative, for the IT staff.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 2.1.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Appcito Application Delivery System (ADS) Key features: New self-service provider-tenant portal for Enterprise Infrastructure and Application teams delivering application performance, security, visibility and analytics. Service adapters for F5 Big-IP LTM and HAProxy devices – per-application visibility and analytics. More info.To read this article in full or to leave a comment, please click here

10 of today’s really cool network & IT research projects

New enterprise and consumer network technologies are coming fast and furious these days via well-heeled startups, and yes, even more established tech players. But further back in the pipeline, in the research labs of universities and colleges around the world, that's where the really cool stuff is happening. Take a peek at some of the more intriguing projects in areas ranging from wireless to security to open source to robotics and cloud computing.UNDERWATER WIRELESS University at Buffalo and Northeastern University researchers are developing hardware and software to enable underwater telecommunications to catch up with over-the-air networks. This advancement could be a boon for search-and-rescue operations, tsunami detection, environmental monitoring and more.To read this article in full or to leave a comment, please click here

Getting Back to Basics with SDN

Typically when things start to get complicated, we talk about getting ‘back to basics’. The premise, of course, is to better compartmentalize, keep things in simple, digestible chunks, and not lose sight of the fundamentals.

For instance, if you’re not hitting the golf ball straight, it’s because you’ve incorporated too much variance into your swing. A good golf instructor will break the swing down into its components, and help you work on the basics.

The words Back to Basics written on a chalkboard

We’re pretty far into the software-defined networking (SDN) hype cycle now. Every networking company (or even network service company) has an SDN story. In a lot of cases, SDN is still vapor-ware or marketecture. And for customers, there’s plenty of ‘SDN fatigue’ – which story should you believe?

In short, things have gotten a little complicated.

So what does getting back to basics mean in an SDN context? It’s means understanding the fundamentals components of an SDN solution. Fortunately, we can draw from real data and learn what’s working from customers that have already deployed.

Recently, EMA published research on the impact of SDN on network management. The report featured survey data from over 226 early adopters of SDN – both in the service roviders and Continue reading

What Are SAI And Switchdev And Why Do We Need Them To Succeed?

Howdy. In my last post I discussed the need for an open source framework to drive merchant switching silicon. Towards the end of that long post, I mentioned a future post talking about the Switch Abstraction Interface (SAI) and switchdev in depth. Welcome to that post. There’s been a lot of synergy between both projects, […]

The post What Are SAI And Switchdev And Why Do We Need Them To Succeed? appeared first on Packet Pushers.

What Are SAI And Switchdev And Why Do We Need Them To Succeed?

Howdy. In my last post I discussed the need for an open source framework to drive merchant switching silicon. Towards the end of that long post, I mentioned a future post talking about the Switch Abstraction Interface (SAI) and switchdev in depth. Welcome to that post. There’s been a lot of synergy between both projects, […]

The post What Are SAI And Switchdev And Why Do We Need Them To Succeed? appeared first on Packet Pushers.

Microsoft tests underwater data center

Companies are finding some of the oddest locations for data centers these days.Facebook, for example, built a data center in Lulea in Sweden because the icy cold temperatures there would help cut the energy required for cooling. A proposed Facebook data center in Clonee, Ireland, will rely heavily on wind energy locally available. Google's data center in Hamina in Finland uses sea water from the Bay of Finland for cooling.Now, Microsoft is looking at locating data centers under the sea.To read this article in full or to leave a comment, please click here

Microsoft tests underwater data center

Companies are finding some of the oddest locations for data centers these days.Facebook, for example, built a data center in Lulea in Sweden because the icy cold temperatures there would help cut the energy required for cooling. A proposed Facebook data center in Clonee, Ireland, will rely heavily on wind energy locally available. Google's data center in Hamina in Finland uses sea water from the Bay of Finland for cooling.MORE ON NETWORK WORLD: 10 (FREE!) Microsoft tools to make admins happier Now, Microsoft is looking at locating data centers under the sea.To read this article in full or to leave a comment, please click here

Harvard study refutes ‘going dark’ argument against encryption

A study from Harvard released Monday largely refutes claims that wider use of encryption in software products will hamper investigations into terrorism and crime.It predicts that the continued expansion of Internet-connected devices -- such as smart TVs and vehicles, IP video cameras and more -- will offer fresh opportunities for tracking targets. "Law enforcement or intelligence agencies may start to seek orders compelling Samsung, Google, Mattel, Nest or vendors of other networked devices to push an update or flip a digital switch to intercept the ambient communications of a target," it said. "These are real products now."To read this article in full or to leave a comment, please click here

Harvard study refutes ‘going dark’ argument against encryption

A study from Harvard released Monday largely refutes claims that wider use of encryption in software products will hamper investigations into terrorism and crime.It predicts that the continued expansion of Internet-connected devices -- such as smart TVs and vehicles, IP video cameras and more -- will offer fresh opportunities for tracking targets. "Law enforcement or intelligence agencies may start to seek orders compelling Samsung, Google, Mattel, Nest or vendors of other networked devices to push an update or flip a digital switch to intercept the ambient communications of a target," it said. "These are real products now."To read this article in full or to leave a comment, please click here

Clearing Up Some Misinformation RE: eBGP Multihop and TTL

Myth: You have to set ttl to 2 because it is decremented on the way to the loopback.

**This blog is a formatting cleanup and update to a previous blog I posted in 2013 on NetworkWorld.

 

Years and years ago I was trying to learn more about BGP and I was reading some book with a chapter on the topic.  Back then I pretty much believed that if it made it into a book it must be true and my knowledge had to be in error.  :)  So to say I was confused back then would be an understatement.

Why? Well ya see… they basically said that the reason one must set the TTL to 2 for eBGP peers that are directly connected, but peering with their loopbacks, was cause “the TTL gets decremented on the way to the loopback”

When I try to help someone deprogram this brain washing, I find pictures help.  So for those who’d like to get deprogrammed and learn the truth… Let’s go play in the lab!!!

bgp_ttl_0-100274774-orig

In the picture above we have 3 Routers in 3 different BGP ASes.  We all probably know that if we peer R1 and R2 Continue reading