Archive

Category Archives for "Networking"

3 types of edge-gateway vendors

As the enterprise edge expands to encompass everything from the factory floor and oil rigs to solar arrays and retail stores, overcoming the challenges of processing, managing, and securing data traffic close to the source has become a top priority for many organizations.Enter edge gateways. These devices process data from sensors, monitors, industrial controllers, and other devices at the edge, passing only actionable information over the WAN to cloud and enterprise data centers while weeding out bandwidth-hogging noise—for example, pressure sensors on an oil rig showing everything is fine. Read more: How to choose an edge gatewayTo read this article in full, please click here

Fractured edge-gateway market starts to heat up

As the enterprise edge expands to encompass everything from the factory floor and oil rigs to solar arrays and retail stores, overcoming the challenges of processing, managing, and securing data traffic close to the source has become a top priority for many organizations.Enter edge gateways. These devices process data from sensors, monitors, industrial controllers, and other devices at the edge, passing only actionable information over the WAN to cloud and enterprise data centers while weeding out bandwidth-hogging noise—for example, pressure sensors on an oil rig showing everything is fine. Read more: How to choose an edge gatewayTo read this article in full, please click here

3 types of edge-gateway vendors

As the enterprise edge expands to encompass everything from the factory floor and oil rigs to solar arrays and retail stores, overcoming the challenges of processing, managing, and securing data traffic close to the source has become a top priority for many organizations.Enter edge gateways. These devices process data from sensors, monitors, industrial controllers, and other devices at the edge, passing only actionable information over the WAN to cloud and enterprise data centers while weeding out bandwidth-hogging noise—for example, pressure sensors on an oil rig showing everything is fine. Read more: How to choose an edge gatewayTo read this article in full, please click here

Extending Panorama’s firewall address groups into your Kubernetes cluster using Calico NetworkSets

When deploying cloud-native applications to a hybrid and multi-cloud environment that is protected by traditional perimeter-based firewalls, such as Palo Alto Networks (PAN) Panorama, you need to work within the confines of your existing IT security architecture. For applications that communicate with external resources outside the Kubernetes cluster, a traditional firewall is typically going to be part of that communication.

A good practice is to enable enterprise security teams to leverage existing firewall platforms, processes, and architectures to protect access to Kubernetes workloads.

Calico Enterprise already extends Panorama’s firewall manager to Kubernetes. The firewall manager creates a zone-based architecture for your Kubernetes cluster, and Calico reads those firewall rules and translates them into Kubernetes security policies that control traffic between your applications.

With its 3.11 release, Calico Enterprise extends its integration with PAN firewalls to include Panorama address groups in sync with Calico NetworkSets. The new release provides granular application security for your cloud-native application and eliminates workflow complexity.

This integration helps users to:

  • Eliminate complex workflows when using existing PAN firewalls with Kubernetes workloads
  • Extend their Panorama firewall investment to cloud-native applications
  • Provide granular application security for their cloud-native applications

Why Calico’s integration is important

Cloud-native workloads require Continue reading

Internet shut down in Kazakhstan amid unrest

Internet shut down in Kazakhstan amid unrest

In Kazakhstan, the year had barely got going when yesterday disruptions of Internet access ended up in a nationwide Internet shutdown from today, January 5, 2022 (below you’ll find an update). The disruptions and subsequent shutdown happened amid mass protests against sudden energy price rises.

Cloudflare Radar shows that the full shutdown happened after 10:30 UTC (16:30 local time). But it was preceded by restrictions to mobile Internet access yesterday.

Internet shut down in Kazakhstan amid unrest

Our data confirm that Kazakhstan’s ASNs were affected after that time (around 18:30 local time). That’s particularly evident with the largest telecommunication company in the country, Kaz Telecom, as the next chart shows.

Internet shut down in Kazakhstan amid unrest

The first disruptions reported affected mobile services, and we can see that at around 14:30 UTC yesterday, January 4, 2022, there was significantly less mobile devices traffic than the day before around the same time. Kazakhstan is a country where mobile represents something like 75% of Internet traffic (shown on Radar), a usual trend in the region. So mobile disruption has a big impact on the country’s Internet, even before the shutdown that affected almost all connectivity.

When we focus on other ASNs besides Kaz Telecom such as the leading mobile Internet services Tele2 or Continue reading

Hedge 113: The PLM with Jeff Jakab

Over the last few episodes of the Hedge, we’ve been talking to folks involved in bringing network products to market. In this episode, Tom Ammon and Russ White talk to Jeff Jakab about the role of the Product Line Manager in helping bring new networking products to life. Join us to understand the roles various people play in the vendor side of the world—both so you can understand the range of roles network engineers can play at a vendor, and so you can better understand how products are designed, developed, and deployed.

download

How The Gambia lost access to the Internet for more than 8 hours

How The Gambia lost access to the Internet for more than 8 hours
How The Gambia lost access to the Internet for more than 8 hours

Internet outages are more common than most people think, and may be caused by misconfigurations, power outages, extreme weather, or infrastructure damage. Note that such outages are distinct from state-imposed shutdowns that also happen all too frequently, generally used to deal with situations of unrest, elections or even exams.

On the morning of January 4, 2022, citizens of The Gambia woke up to a country-wide Internet outage. Gamtel (the main state-owned telecommunications company of the West Africa country), announced that it happened due to "technical issues on the backup links" — we elaborate more on this below.

Cloudflare Radar shows that the outage had a significant impact on Internet traffic in the country and started after 01:00 UTC (which is the same local time), lasting until ~09:45 — a disruption of over 8 hours.

How The Gambia lost access to the Internet for more than 8 hours

Looking at  BGP (Border Gateway Protocol) updates from Gambian ASNs around the time of the outage, we see a clear spike at 01:10 UTC. These update messages are BGP signaling that the Gambian ASNs are no longer routable.

How The Gambia lost access to the Internet for more than 8 hours

It is important to know that BGP is a mechanism to exchange routing information between autonomous systems (networks) on the Internet. The routers that make the Continue reading

An Application-Layer Approach To Multi-Cloud Network Fabrics

This post was originally published on the Packet Pushers’ Ignition site on September 21, 2021. It sounds trite to say that enterprise IT environments are multi-cloud, but the extent of cloud heterogeneity might shock those not paying attention. A recent survey found that 44 percent of organizations had more than half of their workloads deployed […]

The post An Application-Layer Approach To Multi-Cloud Network Fabrics appeared first on Packet Pushers.

Recursive BGP Next Hops: an RFC 4271 Quirk

All BGP implementations I’ve seen so far use recursive next hop lookup:

  • The next hop in the IP routing table is the BGP next hop advertised in the incoming update
  • That next hop is resolved into the actual next hop using one or more recursive lookups into the IP routing table.

Furthermore, all BGP implementations I’ve seen used multiple recursive next hops (if available) to implement load balancing toward the BGP next hop – that’s how we made EBGP load balancing work in Stone Age of networking.

New Year, New Us?

It’s been a while, hope all are well. This is a behind the scenes update to share with you what has been going on with us at NC and where we are headed. Short story, we’ve taken a break but are getting back to it with new content, new ideas, and quite a few changes. If you want a heads up on what is coming, give this episode a listen. If you like surprises, well just ride it out and you’ll see soon enough. It’s good to be back.

The post New Year, New Us? appeared first on Network Collective.

BGP in 2021 – The BGP Table

At the start of each year, I have been reporting on the behaviour of the inter-domain routing system over the past 12 months, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet.

When quantum computers forget: Overcoming decoherence

There’s no point in having a quantum computer if it’s not smokin’ fast; otherwise it’s way too much trouble, what with all the subzero temperatures and instability and such. So it’s always newsworthy when somebody sets a new standard for quantum computing processing speeds, even if quantum computers are far from common commercial use.In this case that somebody is IBM, which recently announced its newly developed quantum computing processor, called Eagle, has broken the 100-qubit barrier. IBM[Get regularly scheduled insights by signing up for Network World newsletters.] Fusion boldly (if clumsily) says it views Eagle “as a step in a technological revolution in the history of computation.” (It sounds like an algorithm wrote that sentence! Is this where you’re leading us, Big Blue? A quantum future of incoherent techspeak?)To read this article in full, please click here

When quantum computers forget: Overcoming decoherence

There’s no point in having a quantum computer if it’s not smokin’ fast; otherwise it’s way too much trouble, what with all the subzero temperatures and instability and such. So it’s always newsworthy when somebody sets a new standard for quantum computing processing speeds, even if quantum computers are far from common commercial use.In this case that somebody is IBM, which recently announced its newly developed quantum computing processor, called Eagle, has broken the 100-qubit barrier. IBM[Get regularly scheduled insights by signing up for Network World newsletters.] Fusion boldly (if clumsily) says it views Eagle “as a step in a technological revolution in the history of computation.” (It sounds like an algorithm wrote that sentence! Is this where you’re leading us, Big Blue? A quantum future of incoherent techspeak?)To read this article in full, please click here

Splitting files on Linux by context

The csplit command is unusual in that allows you to split text files into pieces based on their content. The command allows you to specify a contextual string and use it as a delimiter for identifying the chunks to be saved as separate files.As an example, if you wanted to separate diary entries into a series of files each with a single entry, you might do something like this.$ csplit -z diary '/^Dear/' '{*}' 153 123 136 In this example, "diary" is the name of the file to be split. The command is looking for lines that begin with the word "Dear" as in "Dear Diary" to determine where each chunk begins. The -z option tells csplit to not bother saving files that would be empty.To read this article in full, please click here

Splitting files on Linux by context

The csplit command is unusual in that allows you to split text files into pieces based on their content. The command allows you to specify a contextual string and use it as a delimiter for identifying the chunks to be saved as separate files.As an example, if you wanted to separate diary entries into a series of files each with a single entry, you might do something like this.$ csplit -z diary '/^Dear/' '{*}' 153 123 136 In this example, "diary" is the name of the file to be split. The command is looking for lines that begin with the word "Dear" as in "Dear Diary" to determine where each chunk begins. The -z option tells csplit to not bother saving files that would be empty.To read this article in full, please click here

Tello Drone — Initial Review and Python Programming

What is this about ?

A small starter programmable drone that is meant for mostly indoor and has 80 grams of weight with a flight time of 13 minutes.

Some Highlights

https://www.ryzerobotics.com/tello

– Small Drone with under 100 grams weight
– Suitable for kids and anyone who is starting out to get into drones and programmable ones
– Two sites (Tello and tello.edu) offers various addons to support learning and make it more customised for learning
– 13 minutes of Flight time
– 100m Flight distance
– 720p HD Transmission
– 2 Antennas
– you can also have VR headset compatibility
– In collab with DJI and Intel
– Operation via various Apps (Paid and Free ones), Programming Languages ( we are interested in this)

Fancy Features

– Throw and Go — you can just toss Tello into the air
– 8d Flips (needs battery more than 50%)
– Bounce mode (flies up and down from your hand)

Things that I didn’t like :

-First and foremost, there is no way this connects to your home Wifi, Drone goes into an AP Broadcast mode (meaning this starts broadcasting its own AP and we have to connect to it)

This Continue reading

Quality is (too often) the missing ingredient

Software Eats the World?

I’m told software is going to eat the world very soon now. Everything already is, or will be, software based. To some folks, this sounds completely wonderful, but—leaving aside the privacy issues—I still see an elephant in the room with this vision of the future.

Quality.

Let me give you some recent examples.

First, ceiling fans. Modern ceiling fans, in case you didn’t know, don’t rely on the wall switch and pull chains. Instead, they rely on remote controls. This is brilliant—you can dim the light, change the speed of the fan, etc., from a remote control. No unsightly chains hanging from the ceiling.

Well, it’s brilliant so long as it works. I’ve replaced three of the four ceiling fans in my house. Two of the remote controls have somehow attached themselves to two of the three fans. It’s impossible to control one of the fans without also controlling the other. They sometimes get into this entertaining mode where turning one fan off turns the other one on.

For the third one—the one hanging from a 13-foot ceiling—the remote control sometimes operates one of the other fans, and sometimes the fan its supposed to operate. Continue reading