Archive

Category Archives for "Networking"

Big Switch Networks CTO Rob Sherwood on SDN in 2015: The Time is now

I recently had the chance to sit down with Rob Sherwood, CTO of Big Switch Networks to get his insight on whats hot with SDN for 2015. The interview can be seen on my youtube channel, OpenNetworking.TV here, and you can also view the transcript below: [Art Fewell] Welcome to OpenNetworking TV, this is the CatchUp. I'm your host, Art Fewell. Today we are going to be catching up with another one of the founding fathers of the SDN movement, I hope that's a fitting description, Rob Sherwood of Big Switch Networks. Rob would you mind sharing a little of your background?To read this article in full or to leave a comment, please click here

31.4 references to Pi that you have to see

Pi Day of the CenturyImage by TwitterPi Day is a big day for nerds each year. On March 14 (get it? Pi is 3.14… and March 14 is 3/14?) geeks around the world unite to celebrate. But this year is bigger. Why? Because it’s not just 3/14, it is 3/14/15, meaning five numbers of pi will be represented on this year’s Pi Day. Some are calling it the Pi Day of the century. Here are 31.4 references to pi you’ve got to check out:To read this article in full or to leave a comment, please click here

New products of the week 03.09.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Aruba 7000 Series Cloud Services ControllersKey features: Aruba’s new Cloud Services Controllers integrate WAN acceleration, firewall, web content filtering, policy-based routing and zero-touch provisioning into a single cohesive system, allowing branch offices to rightsize their networks. More info.To read this article in full or to leave a comment, please click here

New products of the week 03.09.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Aruba 7000 Series Cloud Services ControllersKey features: Aruba’s new Cloud Services Controllers integrate WAN acceleration, firewall, web content filtering, policy-based routing and zero-touch provisioning into a single cohesive system, allowing branch offices to rightsize their networks. More info.To read this article in full or to leave a comment, please click here

CCIE vs CCDE

Probably one of the mostly asked questions by the networking experts. CCIE vs CCDE. How many times you asked yourself or discussed with someone else about this ? I think many times. right ? I have CCIE Routing Switching and/or Service Provider, should I continue to Design certificates such as CCDE or should I study… Read More »

The post CCIE vs CCDE appeared first on Network Design and Architecture.

HTIRW: Reality at the Mic (1)

We’ve talked a little about the structure of the IETF, and the process a draft follows when moving from submission to draft to RFC… The perennial question is, though — why does it take so long? Or, perhaps — why is the IETF so broken? Let me begin here: the IETF is a human organization. […]

Author information

Russ White

Principal Engineer at Ericsson

Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, and his author page on Amazon.

The post HTIRW: Reality at the Mic (1) appeared first on Packet Pushers Podcast and was written by Russ White.

Estimating BGP Convergence Time

One of my readers sent me this question:

I have an Internet edge setup with two routers connected to two upstream ISPs and receiving full BGP routing table from them. I’m running iBGP between my Internet routers. Is there a formula to estimate convergence time if one of my uplinks fail? How many updates will I need to get the entire 512K routes in BGP table and also how much time it would take?

As always, the answer is it depends.

Read more ...

Install Mininet on an Amazon EC2 server

To install the Mininet SDN network simulator on a remote server running on Amazon’s EC2 cloud1, follow the procedure shown below. After installing it, I did some basic tests and it seems that Mininet works well on the Amazon EC2 server.

From my laptop PC, I connect to the Amazon EC2 instance via SSH. In the example below, the server’s private key file AWS-PrivateKey.pem is stored in the folder ~/AWS and the server’s public IP address is 55.155.1.55. I had previously created a new user brian on the server.

brian@Laptop:~$ ssh -X -i ~/AWS/AWS-PrivateKey.pem [email protected]

To install the latest stable version of Mininet, plus all supporting software, execute the following commands on the Amazon EC2 server running Ubuntu Server 14.04.

brian@AWS:~$ sudo apt-get install git
brian@AWS:~$ git clone git://github.com/mininet/mininet
brian@AWS:~$ mininet/util/install.sh -a

To test the installation, run the following command:

brian@AWS:~$ sudo mn --test pingall

The benefit of installing Mininet on a remote server such as an Amazon EC2 instance is that I can now experiment with Mininet from any computer, including a tablet or smartphone, at any time as long as I have a connection Continue reading

CCIE R&S — By the Numbers

When I started studying in earnest for my CCIE, I started a log of how I was spending my time studying, which books and papers I'd read, videos I'd watched, and so on. I thought it would be a neat exercise to look back afterwards at what it took to achieve this goal. I'm also somewhat self-deprecating and tend to minimize my accomplishments, so having this data is a way for me to remember that this wasn't a small accomplishment at all.

Apple Watch event: What to expect

Ahead of Apple's upcoming special media event this coming Monday, we've seen a flurry of new reports detailing a number previously unknown tidbits about the highly anticipated Apple Watch. When Apple first unveiled the Apple Watch this past September, it remained unusually coy about many of the device's more significant features. With the benefit of hindsight, it's become apparent that Apple was reluctant to disclose certain details because various aspects of the device – from pricing to battery life – remained in flux. With a release date set for April (early April, according to the rumor mill), the Apple Watch rumors have been coming in at a rapid clip lately. That being the case, below is a collection of some of the more recent Apple Watch rumors that shed new light on Apple's brazen jump into the world of wearable technology.To read this article in full or to leave a comment, please click here

Apple Watch Event: What to expect

Ahead of Apple's upcoming special media event this coming Monday, we've seen a flurry of new reports detailing a number previously unknown tidbits about the highly anticipated Apple Watch.When Apple first unveiled the Apple Watch this past September, it remained unusually coy about many of the device's more significant features. With the benefit of hindsight, it's become apparent that Apple was reluctant to disclose certain details because various aspects of the device -- from pricing to battery life -- remained in flux.With a release date set for April (early April according to the rumor mill), the Apple Watch rumors have been coming in at a rapid clip lately. That being the case, below is a collection of some of the more recent Apple Watch rumors that shed new light on Apple's brazen jump into the world of wearable technology.To read this article in full or to leave a comment, please click here

The Year of IPv6?

IPv6 adoption has been slow. But I think it’s reaching a tipping point. I’m very close to calling 2015 “The year of IPv6.” There’s plenty of people who won’t believe me, but the statistics are very interesting. You need to keep a close on eye on what the data is saying.

Recently I asked the question “What percentage of Internet traffic needs to be IPv6 for you to consider IPv6 to be mainstream/arrived/the year of IPv6?”

@bobbobob had the best answer for when IPv6 can be considered ‘mainstream’:

But @icemarkom was probably technically correct with this answer:

So how far away is that? It’s tough trying to measure IPv6 adoption. Traffic patterns are region- & user-specific. The services that Chinese users access are different to those that a New Zealand business users. Traffic is often concentrated with a few ISPs and/or a few big services (Google, Facebook, Twitter, etc).

I like to use the Google IPv6 statistics Continue reading

What is the difference between throughput & goodput?

Throughput Throughput is the rate at which data is traversing a link. For example, take a look at the virtual router output below. The throughput rate is 643Kbps in each direction. [crayon-54facc3328376599378258/] Goodput Goodput is the rate at which useful data traverses a link. Assuming an uncongested path between endpoints, goodput and throughput will […]

Google is developing a virtual reality version of Android, report says

Google is reportedly developing a virtual reality version of Android that will compete with software being built by Facebook, Samsung, Microsoft and others.Virtual reality is being eyed as the next big thing, and not just for gaming. Facebook has talked about how VR headsets will let friends communicate as if they’re together in the same room.A team of engineers at Google is building a version of Android for virtual reality applications, the Wall Street Journal reported Friday, citing two people familiar with the project. “Tens of engineers” and other staff are said to be working on the project.To read this article in full or to leave a comment, please click here

Smartphone dead? Fuel cells offer instant power anywhere

If there’s one thing almost every smartphone user wants, it’s longer battery life.While processors, memory and other components have advanced in leaps and bounds, progress in battery technology has been much slower over the last couple of decades.All those people you see charging their phones at airports, coffee shops and other public places are a testament to how often batteries die out during the day. So while engineers are fighting against basic chemistry and physics to improve current Lithium Ion cells, is there a better way to recharge?One answer might be fuel cells, which generate electricity through a chemical reaction and provide instant power anywhere. Unlike portable battery packs, they don’t need to be charged in advance. You just need a fuel cell cartridge.To read this article in full or to leave a comment, please click here

Cryptocurrency software bundled with BitTorrent triggers complaints

Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.The mining software, made by the company Epic Scale, started appearing for some people earlier this week after they updated to the latest version of uTorrent, a program made by BitTorrent for downloading files. In forums online, users have likened the software to bloatware, as it taxes their computer processor without their consent. Cryptocurrency mining software is used to release bitcoins and other digital currencies by having computers persistently perform complex mathematical calculations.To read this article in full or to leave a comment, please click here

Cryptocurrency software bundled with BitTorrent triggers complaints

Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.The mining software, made by the company Epic Scale, started appearing for some people earlier this week after they updated to the latest version of uTorrent, a program made by BitTorrent for downloading files. In forums online, users have likened the software to bloatware, as it taxes their computer processor without their consent. Cryptocurrency mining software is used to release bitcoins and other digital currencies by having computers persistently perform complex mathematical calculations.To read this article in full or to leave a comment, please click here

Two indicted for stealing 1 billion email addresses in historic breach

Two Vietnamese men have been indicted, with one pleading guilty, for hacking into eight U.S. email service providers and stealing 1 billion email addresses and other confidential information, resulting in what’s believed to be the largest data breach in U.S. history, the U.S. Department of Justice announced.The attacks, running from February 2009 to June 2012, resulted in the largest data breach of names and email addresses “in the history of the Internet,” Assistant Attorney General Leslie Caldwell said in a statement. After stealing the email addresses, the defendants sent spam emails to tens of millions of users, generating US$2 million in sales, according to the DOJ.To read this article in full or to leave a comment, please click here