Archive

Category Archives for "Networking"

DARPA $2M contest looks to bring AI to wireless spectrum provisioning

Getting mobile devices to more intelligently access and use the ever-tightening wireless spectrum will be the goal of a new public competition from the Defense Advanced Research Projects Agency.The defense research agency recently announced a $2 million Grand Challenge called the Spectrum Collaboration Challenge (SC2) and said the primary goal of the contest was to infuse radios with “advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today’s intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies.”To read this article in full or to leave a comment, please click here

A very cool twist on optical communications

University of Ottawa researchers say their discovery that a twisted optical beam in a vacuum travels more slowly than the speed of light could be a boon for quantum computing and communications, and could benefit enterprise IT shops down the line.Their research, which began in late 2013, is outlined in the paper "Observation of subluminal twisted light in vacuum," published in The Optical Society's Optica journal.MORE: 10 of today's really cool network & IT research projectsTo read this article in full or to leave a comment, please click here

A very cool twist on optical communications

University of Ottawa researchers say their discovery that a twisted optical beam in a vacuum travels more slowly than the speed of light could be a boon for quantum computing and communications, and could benefit enterprise IT shops down the line.Their research, which began in late 2013, is outlined in the paper "Observation of subluminal twisted light in vacuum," published in The Optical Society's Optica journal.MORE: 10 of today's really cool network & IT research projectsTo read this article in full or to leave a comment, please click here

Ping on You! – small weekend web/CGI project

For best article visual quality, open Ping on You! – small weekend web/CGI project directly at NetworkGeekStuff.

After a few previous web programming endeavors (both here on networkgeekstuff.com with SDN programming and in real life job) I had a taste to develop “something” and since I am a network geek, I wondered what I have needed in the past as network tools that would ideally be placed on the internet. So I came to the very basic list of things like ping, nslookup or putty as tool accessible only via a browser.

So without more delay, I give you first beta release of Ping on You! – pingonyou.com the list of current features is:

  • ping
  • nslookup
  • wget (for http response checks)
  • whois / ripe database

Here is a quick view how it looks when you try to ping google’s public DNS service on 8.8.8.8, since in the background a linux like ping tool is used, you have the same output:

web_view_beta

Additionally, here are some features that I plan to do when I get more time, however no release date right now because there are much more complex than the above ones:

[minipost] Windows partition editing with diskpart

For best article visual quality, open [minipost] Windows partition editing with diskpart directly at NetworkGeekStuff.

This will really be a micro-post as I only want to document this for my benefit. This is a way how to change partition table for disks, or USB sticks. In my example, I had a linux live boot USB stick that I needed to quickly convert into a usable storage USB stick with NTFS under windows and of course the visual GUI tools under My Computer -> Manage -> Disk Management was not having full visibility on all partitions that the linux created on this USB stick, so this is how to actually do partitioning on windows.

So without more delay, this is an example how to clean the USB stick partition table and reformat it for windows use:

  1. start command prompt as Administrator and type “diskpart”
  2. enter “list disk”
  3. enter “select disk X”, where X is the and number of your USB stick ( ergo “select disk 1″ )
  4. enter “clean”
  5. enter “create partition primary”
  6. enter “select partition 1″
  7. enter “active”
  8. enter “format quick fs=ntfs”
  9. enter “assign”
  10. enter “exit”  to leave diskpart

In summary, short, but hopefully useful minipost for someone.

For IT, climate change means preparing for disaster

IT managers understand the hazards of heat inside data centers. But what about outside it?Cordell Schachter, the CTO of the New York City Department of Transportation (DOT), who went through Hurricane Sandy in 2012, says climate trends will increasingly impact IT operations."At one time, you could go through a whole career without facing one of those situations" -- something like a Sandy -- said Cordell. But he now believes if "you have a career spanning more than a decade" you may see one or two major weather events.Scientists are increasingly connecting extreme weather events to man-made climate change. Insurance claims are rising.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Small cell deployment to rapidly grow, says report

Small cells, the low-powered radio access nodes, are being deployed at ever increasing rates, says a study. Sixty-percent of enterprises will have deployed the signal-enhancing devices by the end of 2017, the Small Cell Forum says. It commissioned the study from Nemertes Research. The study, published in February, discovered that 14% of businesses have already introduced the technology. The reason for the growth is to fulfill a need for better mobile coverage in hard to reach spots not covered by regular mobile service. + ALSO: 10 top reasons for integrating Wi-Fi radios in small cellular cells +To read this article in full or to leave a comment, please click here

New products of the week 3.28.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Harmony Breach AnalyticsKey features: The Harmony Breach Analytics platform reads customer log data to provide contextually-aware threat intelligence and retrospective analysis. This reduces SOC and SIEM workloads by providing threat intelligence customer specific. More info.To read this article in full or to leave a comment, please click here

Petya ransomware overwrites MBRs, locking users out of their computers

It's hard enough for non-technical users to deal with ransomware infections: understanding public-key cryptography, connecting to the Tor anonymity network and paying with Bitcoin cryptocurrency. A new malicious program now makes it even more difficult by completely locking victims out of their computers.The new Petya ransomware overwrites the master boot record (MBR) of the affected PCs, leaving their operating systems in an unbootable state, researchers from antivirus firm Trend Micro said in a blog post.The MBR is the code stored in the first sectors of a hard disk drive. It contains information about the disk's partitions and launches the operating system's boot loader. Without a proper MBR, the computer doesn't know which partitions contain an OS and how to start it.To read this article in full or to leave a comment, please click here

California Nurds by Katy Sperry

Katy Perry

California Nurds

I know a place
Where the tech is truly awesome
Smart network folks; all clustered
inside CA’s borders

Cablin’ guys and gals
Running fibers to the servers.
We’re all hard core geeks, we are
certified nerf herders.

You may think you are sad,
But nothing comes close
To the silicon coast
Santa Clara’s just mad, you can’t
help your nerd lust
Oooooh Oh Oooooh

California nurds;
we are incredible!
Armed with Flukes,
we’re testing non stop.
Wi Fi smarts
so hot
we’ll melt your antenna
Oooooh Oh Oooooh

California nurds,
we like telemetry;
But we don’t
like SNMP.
West Coast time is lame
so we use UTC
Oooooh Oh Oooooh

We love unicorns, shooting
rainbows from their rear ends.
We’re Software Defined, running
everything in Python.

–John Herbert, with sincere apologies to Katy Perry

If you liked this post, please do click through to the source at California Nurds by Katy Sperry and give me a share/like. Thank you!

Test-Driving OSPF on RouterOS – Interoperability

So I wrote about OSPF on RouterOS in my previous post. It was a nice experiment to learn about routing protocols. I wanted to take it a little further and test Interoperability of RouterOS with other open source solutions. This post is an update from the previous one and I will add OSPF neighbor nodes … Continue reading Test-Driving OSPF on RouterOS – Interoperability

Test-driving OSPF on RouterOS

I came across RouterOS by MikroTik© which provides advances routing protocol support. What is more amazing is they provide a RouterOS in a virtual form-factor called Cloud Hosted Router (CHR) that can be installed on hypervisors like KVM/VirtualBox/VMware. Please look at licensing model at http://wiki.mikrotik.com/wiki/Manual:CHR#CHR_Licensing This is perfect for learning purposes and experimenting at home. … Continue reading Test-driving OSPF on RouterOS

VRF – Virtual Routing and Forwarding

How does Internet work - We know what is networking

Ever needed one extra router? It’s possible to split the router into more logical routers by using VRF. How? Here’s how! Virtual Routing and Forwarding or VRF allows a router to run more that one routing table simultaneously. When running more routing tables in the same time, they are completely independent. For example, you could use same or overlapping IP addresses in both VRFs and it can be used without conflict. It is possible to use same VRF instance on more routers and connect every instance separately using VRF dedicated router port or only a sub-interface. You can find VRFs to be used

VRF – Virtual Routing and Forwarding

DNS Zombies

It seems that some things just never die, and this includes DNS queries. In a five month experiment encompassing the detailed analysis of some 44 billion DNS queries we find that one quarter of these DNS queries are zombies - queries that have no current user awaiting the response, and instead are echoes of previous queries. What is causing these zombies? Are we seeing deranged DNS resolvers that maniacally re-query the same questions and never accept the answer. Or is this something slightly more sinister and are we seeing evidence of widespread DNS stalking and shadowing? Let's find out.

General – How to Build a Network Pt.2

In the previous post I talked about why you should build a network of people to both help you in your career and to improve your own skillset. How does one build this network of people?

There are endless ways of building a network and the ways I describe here are based on my personal experience. That said, I do believe that there are some common factors regardless of what approach you take.

Interacting in Forums – There are a lot of forums available, forums for Cisco Learning Network, Cisco Support Community, training vendor forums, product forums, vendor forums. These are often the best resources for getting help on a product and finding those golden nuggets of information that are not always available from the official documentation. There are often very skilled and experienced people in these forums answering posts and writing posts. Try to contribute to the forums and to learn from them and start interacting with these people. Many forums have some form of ranking which makes it easier to spot the people that are the most active on the forums.

I started writing a lot on CLN several years ago and that has been very benificial for Continue reading