Archive

Category Archives for "Networking"

Syslog to Telegram

Introduction

From time to time, I wish I could be made aware of failures earlier. There are two events, in particular, that I am interested to know about very quickly, as they may impact service at AS8298:

  1. Open Shortest Path First (OSPF) adjacency removals. OSPF is a link-state protocol and it knows when a physical link goes down, that the peer (neighbor) is no longer reachable. It can then recompute paths to other routers fairly quickly. But if the link stays up but connectivity is interrupted, for example because there is a switch in the path, it can take a relatively long time to detect.
  2. Bidirectional Forwarding Detection (BFD) session timeouts. BFD sets up a rapid (for example every 50ms or 20Hz) of a unidirectional UDP stream between two hosts. If a number of packets (for example 40 packets or 2 seconds) are not received, a link can be assumed to be dead.

Notably, BIRD, as many other vendors do, can combine the two. At IPng, each OSPF adjacency is protected by BFD. What happens is that once an OSPF enabled link comes up, OSPF Hello packets will be periodically transmitted (with a period called called a Hello Timer Continue reading

Hedge 120: Information Centric Networking with Dirk Kutscher

In today’s Internet, packets are at the core of information flows. Routers only know (very minimally) about what is in the packets they’re carrying around. Caching and content distribution networks (CDNs) are used to place information at various locations throughout the ‘net for users to access, making the distribution of this information more efficient. Information Centric Networking “flips the script,” making named information, rather than packets, the core construct of networks.

Join Dirk Kutscher, Alvaro Retana, and Russ White, as they discuss this interesting research area at the future edge of networking. You can find out more about ICN here.

download

What is MU-MIMO, and why is it essential for Wi-Fi 6 and 6E?

The only thing techies love more than creating acronyms is the chance to create even longer ones. Such is the case with wireless acronym MIMO (multiple input, multiple output), which got some additional letters with the release of MU-MIMO a few years ago.As wireless standards evolved from 802.11ac (Wi-Fi 5) to 802.11ax (Wi-Fi 6), new features were added to MU-MIMO as well to improve speeds and efficiency, specifically in the number of streams it can support, as well as bidirectional functionality (uplink and downlink).How to buy Wi-Fi 6 access points What is MU-MIMO?  MU-MIMO stands for multi-user, multiple input, multiple output, and represents a significant advance over single-user MIMO (SU-MIMO), which is generally referred to as MIMO. MIMO technology was created to help increase the number of simultaneous users a single access point can support. This was initially achieved by increasing the number of antennas on a wireless router.To read this article in full, please click here

What is MU-MIMO and Why is it essential for Wi-Fi6 and 6E?

The only thing techies love more than creating acronyms is the chance to create even longer ones. Such is the case with wireless acronym MIMO (multiple input, multiple output), which got some additional letters with the release of MU-MIMO a few years ago.As wireless standards evolved from 802.11ac (Wi-Fi 5) to 802.11ax (Wi-Fi 6), new features were added to MU-MIMO as well to improve speeds and efficiency, specifically in the number of streams it can support, as well as bidirectional functionality (uplink and downlink).What is MU-MIMO? MU-MIMO stands for multi-user, multiple input, multiple output, and represents a significant advance over single-user MIMO (SU-MIMO), which is generally referred to as MIMO. MIMO technology was created to help increase the number of simultaneous users a single access point can support. This was initially achieved by increasing the number of antennas on a wireless router.To read this article in full, please click here

Dell upgrades entry-level block storage array

Dell's newest entry-level block storage array is the PowerVault ME5 series, aimed at price-sensitive customers with a focus on ease of deployment and affordability.The array's predecessor, the PowerVault ME4, was released in 2018. So it was overdue for an upgrade – and Dell delivered.The ME5 features significant performance and capacity improvements compared to the ME4. Between the hardware and software upgrades, Dell says the PowerVault ME5 offers twice the performance, throughput, capacity and memory of the ME4. The ME5 has newer Xeon processors with twice as many cores as the ME4, and controller memory has been increased to 16GB per controller.To read this article in full, please click here

Dell upgrades entry-level block-storage array

Dell’s newest entry-level block-storage array is the PowerVault ME5 series, aimed at price-sensitive customers with a focus on ease of deployment and affordability.The array’s predecessor, the PowerVault ME4, was released in 2018. So it was overdue for an upgrade—and Dell delivered.The ME5 features significant performance and capacity improvements compared to the ME4. Between the hardware and software upgrades, Dell says the PowerVault ME5 offers twice the performance, throughput, capacity and memory of the ME4. The ME5 has newer Xeon processors with twice as many cores as the ME4, and controller memory has been increased to 16GB per controller.To read this article in full, please click here

Data Plane Quirks in Virtual Network Devices

Have you noticed an interesting twist in the ICMP Redirects saga: operating systems of some network devices might install redirect entries and use them for control plane traffic – an interesting implementation side effect of the architecture of most modern network devices.

A large majority of network devices run on some variant of Linux or *BSD operating system, the only true exception being ancient operating systems like Cisco IOS1. The network daemons populate various routing protocol tables and compute the best routes that somehow get merged into a single routing table that might still be just a data structure in some user-mode process.

5G connections to hit 1 billion this year, and will double by 2025

5G connections will represent one-fifth of all worldwide mobile connections as of this year, putting those connections above the 1 billion mark for the first time, and that number will double by 2025, according to the GSMA (GSM Association).The GSMA’s Mobile Economy Report, published Wednesday, also said that 5G penetration is moving faster than either of the two previous major generations of mobile networking technology — while neither 3G nor 4G topped 2.2% of mobile connections until more than a year and a half after their introduction, 5G has already accounted for 5.5% in that time frame.There are currently almost 200 live 5G networks in 70 different countries, according to the GSMA report, which credits high demand for the rapid pace of the rollout.To read this article in full, please click here

Day Two Cloud 136: The Role And Responsibilities Of A Kubernetes Operator (Sponsored)

Today on the Day Two Cloud podcast we examine the role and responsibilities of Kubernetes operators; that is, the humans in charge of running Kubernetes. Kubernetes operators have to support application and security teams, handle capacity planning, keep an eye on versioning, and more. This episode is sponsored by F5's NGINX team. Our guests are Jenn Gile, Sr Manager of Product Marketing; and Brian Ehlert, Sr Product Manager.

iCloud Private Relay: information for Cloudflare customers

iCloud Private Relay: information for Cloudflare customers
iCloud Private Relay: information for Cloudflare customers

iCloud Private Relay is a new Internet privacy service from Apple that allows users with iOS 15, iPadOS 15, or macOS Monterey on their devices and an iCloud+ subscription, to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure.

In this post, we’ll explain how website operators can ensure the best possible experience for end users using iCloud Private Relay. Additional material is available from Apple, including “Set up iCloud Private Relay on all your devices”, and “Prepare Your Network or Web Server for iCloud Private Relay” which covers network operator scenarios in detail.

How browsing works using iCloud Private Relay

The design of the iCloud Private Relay system ensures that no single party handling user data has complete information on both who the user is and what they are trying to access.

To do this, Private Relay uses modern encryption and transport mechanisms to relay traffic from user devices through Apple and partner infrastructure before sending traffic to the destination website.

Here’s a diagram depicting what connection metadata is available to who when not using Private Relay Continue reading

Multifactor Authentication Is Being Targeted by Hackers

It was only a matter of time. While multifactor authentication (MFA) makes logging into systems safer, it doesn’t make it “safe.” As well-known hacker KnownBe4, showed in 2018 it’s easy to Proofpoint has found transparent reverse proxy. Typically transparent reverse proxies, such as the open source man-in-the-middle (MitM) attacks to steal credentials and session cookies. Why go to this trouble? Because, as an MFA company 78% of users now use MFA, compared to just 28% in 2017. That’s good news, but it’s also given cybercrooks the incentive they needed to target MFA. A Range of Kits To make it easy for wannabe hackers. Proofpoint found today’s phishing kits range from “simple open-source kits with human-readable code and no-frills functionality Continue reading

How to inventory server software with PowerShell

Being able to quickly identify what software is installed on your servers has value for a host of reasons. Managing software licensing costs and entitlements, planning upgrade budgets, identifying candidates for server consolidation, or even responding to security incidents are all common reasons for performing a software inventory.There are of course enterprise tools for tracking software inventory. But these tools can be expensive and complex, or could have access limited to specific groups or individuals in your organization. Fortunately PowerShell can help with some of the leg work in analyzing the software on your systems in order to help drive your planning and incident response.To read this article in full, please click here

Gartner: 5 ways to deal with network equipment shortages

How bad is the chip supply shortage? Gartner reports that clients are complaining about lead times as long as 400 days to get networking equipment, plus pricing increases and missed ship dates.“We expect lead times to remain high through early 2023, at which point we expect slow incremental improvement over the course of months,” Gartner wrote in a report titled, "What Are My Options for Dealing With Long Lead Times on Network Equipment?" Read more: Chip shortage has networking vendors scramblingTo read this article in full, please click here