Archive

Category Archives for "Networking"

Arista joins Cisco, Dell at 25G

Arista Networks this week became the latest major vendor to roll data center switches that support 25G, 50G and 100Gbps Ethernet.Arista also upgraded its operating system software to support the new switches and give them a number of new features to enhance uptime, and avoid resets and reloads.The new Arista 7060X, 7260X and 7320X fixed-leaf and modular spineswitches are based on Broadcom’s Tomahawk chipset. Tomahawk silicon delivers 3.2Tbps switching capacity – 32 100G ports -- and SDN-optimized engines in a single chip, and features all-25G per-lane interconnect, enabling transformation to 25G and 50G Ethernet networks and eventually up to 100G.To read this article in full or to leave a comment, please click here

Mainstream Cloud Networking with Flexible Ethernet

Networking vendors have long touted distinct routers and switches with different LAN and WAN interfaces. Remember IBM Token Ring versus Ethernet? Or ATM or Sonet versus Ethernet or more recently Fibre Channel SANs versus Ethernet? Ethernet truly addresses the present state and next generation of networking, usually obsoleting the alternatives. Ethernet has proven its evolution...
Continue reading »

Networking Heresy?

Software Defined Networking, and it’s latest incarnation SD-WAN seem to be all the rage at the moment.  Having seen presentations from vendors large and small on the subject recently at Networking Field Day 10 I am still given to thinking there are a few things that get glossed-over by the vendors quite often.  Foremost in my mind, is this (potentially heretical thought):

It is all very well creating virtual or ‘overlay’ networks which run over other networks to suit your purposes, but as someone famous once said, you can’t change the laws of physics.   Packets must ultimately flow across a medium – wires, fibres or waves.  The media doesn’t give a flying fart whether the packet is naked, or clothed in layers MPLS or GRE headers – if that medium is congested and doesn’t support any form of packet prioritisation, your data is down the dunny.

There’s a trade-off here that perhaps not many people understand when they are shown smooth presentations by manufacturers.  It seems to me that:

  1. Efficient use of network connectivity requires deep understanding from end to end.
  2. Efficient deployment of network connectivity requires abstraction and overlays (which equals loss of understanding of lower layer protocols).
  3. Efficient operation of network connectivity…  well… let’s hope it’ll be fine so long Continue reading

Networking Heresy?

Software Defined Networking, and it’s latest incarnation SD-WAN seem to be all the rage at the moment.  Having seen presentations from vendors large and small on the subject recently at Networking Field Day 10 I am still given to thinking there are a few things that get glossed-over by the vendors quite often.  Foremost in my mind, is this (potentially heretical thought):

It is all very well creating virtual or ‘overlay’ networks which run over other networks to suit your purposes, but as someone famous once said, you can’t change the laws of physics.   Packets must ultimately flow across a medium – wires, fibres or waves.  The media doesn’t give a flying fart whether the packet is naked, or clothed in layers of MPLS or GRE headers – if that medium is congested and doesn’t support any form of packet prioritisation, your data is down the dunny.

There’s a trade-off here that perhaps not many people understand when they are shown smooth presentations by manufacturers.  It seems to me that:

  1. Efficient use of network connectivity requires deep understanding from end to end. That’s why you employ network engineers.
  2. Efficient deployment of network connectivity requires abstraction and overlays to increase ease of deployment (which equals loss of understanding of lower layer protocols).
  3. Continue reading

White House won’t say if it’s hoping for a cybersecurity deal with China

With the visit of Chinese premier Xi Jinping just a week away, the White House won't say whether one of its goals is to reach an agreement with China over cybersecurity.Hacking has been one of the issues at the forefront of U.S.-China relations over the last couple of years, particularly after the U.S. accused China of hacking into sensitive federal government systems, something that China denies."We've been pretty blunt in describing the concerns that we have with China's behavior in cyberspace," White House press secretary Josh Earnest told reporters on board Air Force One on Monday, according to a pool report.But Earnest wouldn't comment on any measures that might be taken ahead of the visit.To read this article in full or to leave a comment, please click here

Just some quick points about DHCP

Okay, so everybody knows DHCP pretty well.

I just want to point out a few little details as background for a future post:

DHCP Relays Can Change Things
The first point is about those times when the DHCP client and server aren't on the same segment.

In these cases, a DHCP relay (usually running on a router) scoops up the helpless client's broadcast packets and fires them at the far away DHCP server. The server's replies are sent back to the relay, and the relay transmits them onto the client subnet.

The DHCP relay can change several things when relaying these packets:
  • It increments the bootp hop counter.
  • It populates the relay agent field in the bootp header (The DHCP server uses this to identify the subnet where the client is looking for a lease).
  • It can introduce additional DHCP options to the request.
The last one is particularly interesting. When a DHCP relay adds information to a client message, it can be used by the DHCP server for decision-making or logging purposes. Alternatively, the added information can be used by the DHCP relay itself: Because the relay's addition will be echoed back by the server, the relay can parse Continue reading

Study names the five most hackable vehicles

A study released by a forensic consultancy has singled out the top five vehicles most susceptible to hacking.The results of the study, by PT&C|LWG Forensic Consulting Services, were based on published research by hackers, vehicle recall information and media reports.The most hackable list includes the 2014 Jeep Cherokee, the 2014 Infiniti Q50, the 2015 Cadillac Escalade, the 2010 and 2014 Toyota Prius and the 2014 Ford Fusion.To read this article in full or to leave a comment, please click here

Intel sets up talking shop to improve automotive security

The dramatic hack of a Jeep Cherokee, which resulted in Fiat Chrysler Automobile recalling over one million vehicles, has also prompted Intel to take action.Security researchers Charlie Miller and Chris Valasek remotely hacked their way into the Jeep's Uconnect navigation and entertainment system via its connection to Sprint's wireless network, taking control of it while a reporter for Wired magazine was at the wheel.The hack prompted Fiat Chrysler to issue a recall notice for 1.4 million vehicles in order to patch the software bug exploited by the researchers.To read this article in full or to leave a comment, please click here

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living "off the land" -- using whatever tools are already available in the compromised systems, according to a new report from Dell SecureWorks.In fact, this has been the case for nearly all the intrusions analyzed by the Dell SecureWorks’ Incident Response Team last year.The cyber criminals typically start out with compromised credentials, said Phil Burdette, senior security researcher at Atlanta-based Dell SecureWorks, Inc."For example, they might use phishing attacks," he said. "They'll send an email purporting to be from the IT staff, asking users to log in and test their credentials because the IT staff has just created a new email server. Once a user logs in, those same credentials would then be used to access the company's virtual private network solutions."To read this article in full or to leave a comment, please click here

FDA accepts application for micro-chipped pill that tells doc if you took meds

Some people with schizophrenia might be inclined to believe “they” are watching them, that “they” are tracking them, and ironically now “they” really might be via a “digital” pill that contains an ingestible sensor which gives doctors and caregivers the ability to track if and when a patient takes his medicine.According to an announcement by Otsuka Pharmaceutical and Proteus Digital Health: This is the first time an FDA-approved medication (ABILIFY) has been combined and submitted for approval with a sensor within the medication tablet (the Proteus ingestible sensor) to measure actual medication-taking patterns and physiologic response. This objective information is communicated to the patient – and with the consent of the patient – to the patient’s physician and/or caregiver.To read this article in full or to leave a comment, please click here