Archive

Category Archives for "Networking"

Flooding Domains versus Areas

At a fundamental level, SPF and IS-IS are similar in operation. They both build neighbor adjacencies. They both use Dijkstra’s shortest path first (SPF) to find the shortest path to every destination in the network. They both advertise the state of each link connected to a network device. There are some differences, of course, such as the naming (OSI addresses versus IP addresses, intermediate systems versus routers). Many of the similarities and differences don’t play too much in the design of a network, though.

One difference that does play into network design, however, is the way in which the two protocols break up a single failure domain into multiple failure domains. In OSPF we have areas, while in IS-IS we have flooding domains. What’s the difference between these two, and how does it effect network design? Let’s use the illustration below as a helpful reference point for the two different solutions.

flooding-domains-02

In the upper network, we have an illustration of how OSPF areas work. Each router at the border of a flooding domain (an Area Border Router, or ABR), has a certain number of interfaces in each area. Another way of saying this is that an OSPF ABR is Continue reading

Flooding Domains versus Areas

At a fundamental level, OSPF and IS-IS are similar in operation. They both build neighbor adjacencies. They both use Dijkstra’s shortest path first (SPF) to find the shortest path to every destination in the network. They both advertise the state of each link connected to a network device. There are some differences, of course, such as the naming (OSI addresses versus IP addresses, intermediate systems versus routers). Many of the similarities and differences don’t play too much in the design of a network, though.

One difference that does play into network design, however, is the way in which the two protocols break up a single failure domain into multiple failure domains. In OSPF we have areas, while in IS-IS we have flooding domains. What’s the difference between these two, and how does it effect network design? Let’s use the illustration below as a helpful reference point for the two different solutions.

flooding-domains-02

In the upper network, we have an illustration of how OSPF areas work. Each router at the border of a flooding domain (an Area Border Router, or ABR), has a certain number of interfaces in each area. Another way of saying this is that an OSPF ABR is Continue reading

Kiev, Ukraine: CloudFlare’s 78th Data Center

alt

Здоровенькі були! CloudFlare just turned up our newest datacenter in Kiev, the capital and largest city of Ukraine.

Kiev is an old city with more than 1,000 years of history. It was the capital of Kievan Rus’, an ancient country which is considered to be the ancestor of modern Ukraine, Belarus and Russia. If you visit the city by plane, you may be almost blinded by the shining golden domes of numerous old churches and cathedrals - and once there, be sure to try the famous Ukrainian beet soup, “Borscht”. CloudFlare decided to contribute to the long history of Kiev with our 22nd data center in Europe, and our 78th data center globally.

Localizing content

alt
Frankfurt is arguably the biggest point of interconnection in the world, and is home to Deutscher Commercial Internet Exchange (DE-CIX) which plays an absolutely critical role and sees close to 5Tbps in traffic. While this is great if you live near Frankfurt, it is also where most traffic is exchanged for other parts of Germany, large parts of Europe (think Austria, Bulgaria, Czech Republic, Denmark, Estonia, Finland, Greece, Hungary, Italy, Kazakhstan, Lithuania, Montenegro, Norway, Poland, Romania, Serbia, Turkey, Ukraine, etc.), and even countries such Continue reading

Juniper, Google, Microsoft & other IT vendors urge Congress to up CompSci education spending

Nearly 50 business leaders, including many enterprise IT company executives, have joined dozens of governors and educational system representatives in urging Congress to support the teaching of computer science in every K-12 school across the United States. An open letter/petition, titled "Offer Computer Science in our public schools," had accumulated more than 1,000 signatures on Change.org as of Tuesday morning. The petition was launched by the CS Education Coalition in partnership with Code.org. MORE: Top 25 computer science colleges, ranked by alumni earningsTo read this article in full or to leave a comment, please click here

The bot backlash begins

Bots are hot, hot, hot.Until they’re not, not, not.Unless you’ve been cut off from all media in a vain attempt to avoid the 2016 presidential campaign, you’re probably aware that bots are bright, new shiny things in the tech world.The idea behind “bot-mania” is that a conversation is often the best, most natural way for a program or service to communicate with a human. Instead of websites or apps, you can type or talk to the bot and get the answers or services you’re looking for.Sounds great right? And it is. Or at least it’s a great idea. Most of the time, anyway.Great bot expectations? It turns out, as so often happens in the world of technology, the hype may be getting ahead of the reality, creating expectations that cannot currently, or perhaps ever, be fully met.To read this article in full or to leave a comment, please click here

7 million accounts compromised via Lifeboat hack, a Minecraft Pocket Edition community

You’d think you’d hear about a hack that affects over seven million people … unless the company chooses to “cover it up.” Thankfully that is changing thanks to security researcher Troy Hunt, via Have I Been Pwned. Have I Been Pwned? Scale-wise, it's a big breach. Lifeboat is listed in Have I Been Pwned’s top 10 breaches; it currently is ranked eighth with 7,089,395 compromised accounts.To read this article in full or to leave a comment, please click here

7 million accounts compromised via Lifeboat hack, a Minecraft Pocket Edition community

You’d think you’d hear about a hack that affects over seven million people … unless the company chooses to “cover it up.” Thankfully that is changing thanks to security researcher Troy Hunt, via Have I Been Pwned. Have I Been Pwned? Scale-wise, it's a big breach. Lifeboat is listed in Have I Been Pwned’s top 10 breaches; it currently is ranked eighth with 7,089,395 compromised accounts.To read this article in full or to leave a comment, please click here

Riverbed looks to redefine networking in a cloud-first world

The technology industry has gone through several waves of innovation since the birth of computing. The industry kicked off with mainframes, which eventually gave way to client/server, which eventually evolved into branch office computing. Today, we are in the midst of the transition to a cloud-first world.Each of these waves brought with it new networking tools and technologies. The devices that we used to build local LANs were not the same ones we used to build WANs.This trend of requiring new tools is also true for the transition to the cloud. Organizations are rapidly shifting to Wi-Fi to enable mobile devices to connect to cloud services and embracing software-defined WANs (SD-WAN) to give the network the necessary levels of agility required to meet the demands of a cloud-first world. Unfortunately, most of these technologies have been built independent of one another, making management of the end-to-end network in a cloud-centric business very difficult.To read this article in full or to leave a comment, please click here

Riverbed looks to redefine networking in a cloud-first world

The technology industry has gone through several waves of innovation since the birth of computing. The industry kicked off with mainframes, which eventually gave way to client/server, which eventually evolved into branch office computing. Today, we are in the midst of the transition to a cloud-first world.Each of these waves brought with it new networking tools and technologies. The devices that we used to build local LANs were not the same ones we used to build WANs.This trend of requiring new tools is also true for the transition to the cloud. Organizations are rapidly shifting to Wi-Fi to enable mobile devices to connect to cloud services and embracing software-defined WANs (SD-WAN) to give the network the necessary levels of agility required to meet the demands of a cloud-first world. Unfortunately, most of these technologies have been built independent of one another, making management of the end-to-end network in a cloud-centric business very difficult.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Networked clothing getting closer

Clothes with embroidered electronics that can act as internet-connecting antennas or as health monitors are just around the corner.High-precision embroidered circuits have been woven into fabrics with 0.1mm accuracy in experiments. That kind of precision could allow in-clothing antennas to be matched perfectly to radio waves and for sensors to be incorporated into fabrics in such a way as to feel the same on skin as the base material, scientists from Ohio State University say.The revolutionary “functional textile” medium will be known as “e-textiles,” John Volakis, director of the ElectroScience Laboratory at Ohio State University, said in a news release. His team has developed the precise technique.To read this article in full or to leave a comment, please click here

Empty DDoS threats earn extortion group over $100,000

Extorting money from companies under the threat of launching distributed denial-of-service attacks (DDoS) against their online properties has proven lucrative for cybercriminals. So much so that one group has managed to earn over $100,000 without any evidence that it's even capable of mounting attacks.Since early March, hundreds of businesses have received threatening emails from a group calling itself the Armada Collective, asking to be paid between 10 and 50 bitcoins -- US$4,600 to $23,000 -- as a "protection fee" or face DDoS attacks exceeding 1Tbps.While many of them did not comply, some did; the group's bitcoin wallet address shows incoming payments of over $100,000 in total. Yet none of the companies who declined to pay the protection fee were attacked, website protection firm CloudFlare found.To read this article in full or to leave a comment, please click here

Empty DDoS threats earn extortion group over $100,000

Extorting money from companies under the threat of launching distributed denial-of-service attacks (DDoS) against their online properties has proven lucrative for cybercriminals. So much so that one group has managed to earn over $100,000 without any evidence that it's even capable of mounting attacks.Since early March, hundreds of businesses have received threatening emails from a group calling itself the Armada Collective, asking to be paid between 10 and 50 bitcoins -- US$4,600 to $23,000 -- as a "protection fee" or face DDoS attacks exceeding 1Tbps.While many of them did not comply, some did; the group's bitcoin wallet address shows incoming payments of over $100,000 in total. Yet none of the companies who declined to pay the protection fee were attacked, website protection firm CloudFlare found.To read this article in full or to leave a comment, please click here

Empty DDoS threats earn extortion group over $100,000

Extorting money from companies under the threat of launching distributed denial-of-service attacks (DDoS) against their online properties has proven lucrative for cybercriminals. So much so that one group has managed to earn over $100,000 without any evidence that it's even capable of mounting attacks.Since early March, hundreds of businesses have received threatening emails from a group calling itself the Armada Collective, asking to be paid between 10 and 50 bitcoins -- US$4,600 to $23,000 -- as a "protection fee" or face DDoS attacks exceeding 1Tbps.While many of them did not comply, some did; the group's bitcoin wallet address shows incoming payments of over $100,000 in total. Yet none of the companies who declined to pay the protection fee were attacked, website protection firm CloudFlare found.To read this article in full or to leave a comment, please click here

SWIFT banking network warns customers of cyberfraud cases

SWIFT, the international banking transactions network, has warned customers of "a number" of recent incidents in which criminals sent fraudulent messages through its system.The warning from SWIFT (Society for Worldwide Interbank Financial Telecommunication) suggests that a February attack on the Bangladesh Bank, in which thieves got away with US $81 million, was not an isolated incident.SWIFT is aware of malware that "aims to reduce financial institutions’ abilities" to find evidence of fraudulent transactions on their local systems, the organization said Tuesday. The malware has "no impact on SWIFT’s network or core messaging services," it added.To read this article in full or to leave a comment, please click here

SWIFT banking network warns customers of cyberfraud cases

SWIFT, the international banking transactions network, has warned customers of "a number" of recent incidents in which criminals sent fraudulent messages through its system.The warning from SWIFT (Society for Worldwide Interbank Financial Telecommunication) suggests that a February attack on the Bangladesh Bank, in which thieves got away with US $81 million, was not an isolated incident.SWIFT is aware of malware that "aims to reduce financial institutions’ abilities" to find evidence of fraudulent transactions on their local systems, the organization said Tuesday. The malware has "no impact on SWIFT’s network or core messaging services," it added.To read this article in full or to leave a comment, please click here

Companies must stop designing proprietary locked-down services

On May 15, 2016, the company that runs Revolv (a smart-home hub) will be intentionally bricking (for all intents and purposes) every single Revolv hub device ever sold—by killing the server the device depends upon and not providing any ability to self-host that service.The company that’s shutting off this service and bricking these (not cheap) devices? Google. Essentially. Revolve was acquired by Nest. Nest was acquired by Google. Google then changed to Alphabet and made Nest one of the companies owned by Alphabet. So, in a nutshell, Google.To read this article in full or to leave a comment, please click here

Linux and the Quest for Underlays

TuxUnderlay

I’m at the OpenStack Summit this week and there’s a lot of talk around about building stacks and offering everything needed to get your organization ready for a shift toward service provider models and such. It’s a far cry from the battles over software networking and hardware dominance that I’m so used to seeing in my space. But one thing came to mind that made me think a little harder about architecture and how foundations are important.

Brick By Brick

The foundation for the modern cloud doesn’t live in fancy orchestration software or data modeling. It’s not because a retailer built a self-service system or a search engine giant decided to build a cloud lab. The real reason we have a growing market for cloud providers today is because of Linux. Linux is the underpinning of so much technology today that it’s become nothing short of ubiquitous. Servers are built on it. Mobile operating systems use it. But no one knows that’s what they are using. It’s all just something running under the surface to enable applications to be processed on top.

Linux is the vodka of operating systems. It can run in a stripped down manner on a variety Continue reading