Archive

Category Archives for "Networking"

Arm launches new IoT processors

Arm Holdings launched its latest micro controller design to provide high-performance computing at the edge as well as two new platforms to help reduce development time of internet of things (IoT) devices.Normally, the Cortex-M line of controllers is used in small low-power devices, like smart watches, but the Cortex-M85 performs better than the rest of the line. It is designed to improve artificial-intelligence operations such as voice recognition on edge devices including smart-home products and drones.To read this article in full, please click here

5G, automotive to drive semiconductor revenue through 2022

Worldwide semiconductor revenue is set to increase by 13.6% this year as demand continues to exceed supply, according to a Gartner Research report.That growth will likely level off in 2023, however, with just a 3.6% increase predicted for that year, noted the report, which was released Tuesday. It's a function of overall supply and demand coming into near-balance in the future, according to Gartner.The chip shortage that has created widespread supply constraints in the recent past is beginning to ease, although some sectors — most notably the automotive industry – will still see demand outstripping supply for the foreseeable future.Alan Priestley, the report's author and a research vice president at Gartner, said that automotive semiconductor demand will grow despite flaccid overall vehicle production.To read this article in full, please click here

Two voting days, a debate and a polling rule in France impacts the Internet

Two voting days, a debate and a polling rule in France impacts the Internet
Two voting days, a debate and a polling rule in France impacts the Internet

We blogged previously about some trends concerning the first round of the 2022 French presidential election, held on April 10. Here we take a look at the run-off election this Sunday, April 24, that ended up re-electing Emmanuel Macron as President of France.

First, the two main trends: French-language news sites outside France were clearly impacted by the local rule that states that exit polls can only be published after 20:00.

And Internet traffic was similar on both the election days (April 10 and 24) and that includes the increase in use of mobile devices and interest in news websites — there we also saw a clear interest in the Macron-Le Pen debate on April 20.

We have discussed before that election days usually don’t have a major impact on overall Internet traffic. Let’s compare April 10 with 24, the two Sundays when the elections were held. The trends throughout the day are incredibly similar (with a slight increase in traffic on April 24), even with a two-week gap between them.

Two voting days, a debate and a polling rule in France impacts the Internet

Another election-day trend is the use of mobile devices to access the Internet, mainly at night. The largest spikes in number of requests made using mobile devices in Continue reading

Deux jours de vote, un débat et une réglementation concernant les élections en France impactent l’Internet

Deux jours de vote, un débat et une réglementation concernant les élections en France impactent l'Internet
Deux jours de vote, un débat et une réglementation concernant les élections en France impactent l'Internet

Nous avons publié un article de blog consacré à certaines tendances concernant le premier tour de l'élection présidentielle française de 2022, qui s'est déroulé le 10 avril. Nous nous intéressons ici au second tour de l'élection, qui a eu lieu le dimanche 24 avril et a abouti à la réélection d'Emmanuel Macron à la présidence de la France.

Tout d'abord, les deux principales tendances : les sites d'information francophones situés hors de France ont été clairement impactés par la réglementation locale, qui stipule que les estimations ne peuvent être publiées qu'après 20 heures.

Le trafic Internet a été similaire les deux jours de l'élection (les 10 et 24 avril), et cela inclut l'augmentation de l'utilisation des appareils mobiles et l'intérêt pour les sites d'actualités – - là aussi, nous avons constaté un net intérêt pour le débat Macron-Le Pen du 20 avril.

Nous avons déjà évoqué le fait que les jours d'élections n'ont généralement pas un impact majeur sur le trafic Internet global. Comparons les journées des 10 et 24 avril, les deux dimanches où ont eu lieu les élections. Les tendances tout au long de la journée sont incroyablement similaires (avec une légère augmentation du trafic le 24 Continue reading

How To Work With A Sponsor For Your IT Blog

For many years, I’ve been working with B2B IT vendors who sponsor content with my company to market their offerings. My co-founder and I have learned many lessons–some the hard way–about dealing with these vendors and the content they create with us.

In this article, I’ll focus on handling a specific scenario. You’ve got a niche blog where you write as a deeply technical expert in a IT field such as cloud, networking, storage, development, or security. Your audience is made up of fellow nerds in similar orbits. You’ve been writing for years, and have developed a faithful audience who reads most of your stuff. After all this time, a real-deal vendor appears, wanting to place a sponsored blog post on your hallowed site. Now what?

You might think the sponsored content itself would be the most complicated part, and that once you hit publish, you’re mostly done. Not really. Back end logistics will likely take up more of your time. There are other considerations, too. Consider them carefully before trying to monetize your blogging hobby.

Mark Sponsored Content As Sponsored

If this is your first sponsored post, you might feel weird about it. The temptation can be to hide Continue reading

BGP Remotely Triggered Blackhole (RTBH)

DDoS attacks and BGP Flowspec responses describes how to simulate and mitigate common DDoS attacks. This article builds on the previous examples to show how BGP Remotely Triggered Blackhole (RTBH) controls can be applied in situations where BGP Flowpsec is not available, or is unsuitable as a mitigation response.
docker run --rm -it --privileged --network host --pid="host" \
-v /var/run/docker.sock:/var/run/docker.sock -v /run/netns:/run/netns \
-v ~/clab:/home/clab -w /home/clab \
ghcr.io/srl-labs/clab bash
Start Containerlab.
curl -O https://raw.githubusercontent.com/sflow-rt/containerlab/master/ddos.yml
Download the Containerlab topology file.
sed -i "s/\\.ip_flood\\.action=filter/\\.ip_flood\\.action=drop/g" ddos.yml
Change mitigation policy for IP Flood attacks from Flowspec filter to RTBH.
containerlab deploy -t ddos.yml
Deploy the topology.
Access the DDoS Protect screen at http://localhost:8008/app/ddos-protect/html/
docker exec -it clab-ddos-attacker hping3 \
--flood --rawip -H 47 192.0.2.129
Launch an IP Flood attack. The DDoS Protect dashboard shows that as soon as the ip_flood attack traffic reaches the threshold a control is implemented and the attack traffic is immediately dropped. The entire process between the attack being launched, detected, and mitigated happens within a second, ensuring minimal impact on network capacity and services.
docker exec -it clab-ddos-sp-router vtysh -c "show running-config"
See Continue reading

What is a SAN and how does it differ from NAS?

A storage area network (SAN) is a dedicated, high-speed network that provides access to block-level storage. SANs were adopted to improve application availability and performance by segregating storage traffic from the rest of the LAN. SANs enable enterprises to more easily allocate and manage storage resources, achieving better efficiency. “Instead of having isolated storage capacities across different servers, you can share a pool of capacity across a bunch of different workloads and carve it up as you need. It’s easier to protect, it’s easier to manage,” says Scott Sinclair, senior analyst with Enterprise Strategy Group.To read this article in full, please click here

Full Stack Journey 065: Developer Tools And Practices Other IT Disciplines Can Adopt

Today's Full Stack Journey asks: Are there tools, techniques, or practices common to software development that other IT disciplines should consider adopting? Can these tools and practices help other IT disciplines improve automation, operations, and daily tasks? Guests Adeel Ahmad and Kurt Seifried join host Scott Lowe to discuss.

The post Full Stack Journey 065: Developer Tools And Practices Other IT Disciplines Can Adopt appeared first on Packet Pushers.

Practical Python For Networking: 6.1 Python Packages – Introduction To Packages – Video

This lesson introduces packages, which let you bundle together different Python modules to re-use and share. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Additional Resources: Packages Tutorial: https://docs.python.org/3/tutorial/modules.html#packages Python Modules And Packages: An Introduction: https://realpython.com/python-modules-packages/ Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft […]

The post Practical Python For Networking: 6.1 Python Packages – Introduction To Packages – Video appeared first on Packet Pushers.

Building many private virtual networks through Cloudflare Zero Trust

Building many private virtual networks through Cloudflare Zero Trust

We built Cloudflare’s Zero Trust platform to help companies rely on our network to connect their private networks securely, while improving performance and reducing operational burden. With it, you could build a single virtual private network, where all your connected private networks had to be uniquely identifiable.

Starting today, we are thrilled to announce that you can start building many segregated virtual private networks over Cloudflare Zero Trust, beginning with virtualized connectivity for the connectors Cloudflare WARP and Cloudflare Tunnel.

Connecting your private networks through Cloudflare

Consider your team, with various services hosted across distinct private networks, and employees accessing those resources. More than ever, those employees may be roaming, remote, or actually in a company office. Regardless, you need to ensure only they can access your private services. Even then, you want to have granular control over what each user can access within your network.

This is where Cloudflare can help you. We make our global, performant network available to you, acting as a virtual bridge between your employees and private services. With your employees’ devices running Cloudflare WARP, their traffic egresses through Cloudflare’s network. On the other side, your private services are behind Cloudflare Tunnel, accessible Continue reading

Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare

Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare
Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare

Marcelo Affonso (VP of Infrastructure Operations) and Rebecca Weekly (VP of Hardware Systems) recently joined our team. Here they share their journey to Cloudflare, what motivated them to join us, and what they are most excited about.

Marcelo Affonso - VP of Infrastructure Operations

I am thrilled to join Cloudflare and lead our global infrastructure operations. My focus will be building, expanding, optimizing, and accelerating Cloudflare’s fast-growing infrastructure presence around the world.

Recently, I have found myself reflecting on how central the Internet has become to the lives of people all over the world. We use the Internet to work, to connect with families and friends, and to get essential services. Communities, governments, businesses, and cultural institutions now use the Internet as a primary communication and collaboration layer.

But on its own, the Internet wasn’t architected to support that level of use. It needs better security protections, faster and more reliable connectivity, and more support for various privacy preferences. What’s more, those benefits can’t just be available to large businesses. They need to be accessible to a full range of communities, governments, and individuals who now rely on the Internet. And they need to be accessible in various ways to Continue reading

Netlify CEO on Why Netlify Edge Functions Was Built on Deno

The web development platform Matt Biilmann. In an interview with The New Stack, he described how looking to the future inspired the vision for the company’s latest product. “As we’re building out our edge network and as we start seeing this category mature, with people building more complex projects in a variety of industries, I believed we’d see a new layer emerge where developers could easily write code that would run on the edge. In the beginning, we weren’t sure what that layer would look like or what it would do. We spent a lot of time investigating WebAssembly as the runtime mechanism but ultimately decided against it. In 2020, we moved our efforts from WASM to our own JavaScript-based edge runtime.” “The standard JS runtimes like Node.js aren’t really built to be run in a totally multitenant environment or unique process isolation, so we had to start building our own.” Matt Biilmann, Netlify CEO A year ago, Netlify’s first version of Edge Functions (named Edge Handlers at the Continue reading

Google Cloud launches Media CDN based on YouTube’s network

Google Cloud has launched a new media and content delivery network (CDN) platform called Media CDN that allows large media and streaming customers to tap into Google’s global YouTube network.The new platform blends the same infrastructure as the Google-owned video streaming service, with Google Cloud’s existing Cloud CDN portfolio. Customers will have access to a range of APIs and automation tools, while pre-aggregated metrics and playback tracing will allow users to monitor performance across the entire infrastructure stack. The platform also offers integrations with Google Cloud’s operations suite and other observability tools such as Grafana and ElasticSearch.To read this article in full, please click here

Detecting Byzantine Link Failures with SNMP

One of my readers has to deal with a crappy Network Termination Equipment (NTE)1 that does not drop local link carrier2 when the remote link fails. Here’s the original ASCII art describing the topology:

PE---------------NTE--FW---NMS 
  <--------IP-------->

He’d like to use interface SNMP counters on the firewall to detect the PE-NTE link failure. He’s using static default route toward PE on FW, and tried to detect the link failure with ifOutDiscards counter.

Detecting Byzantine Link Failures with SNMP

One of my readers has to deal with a crappy Network Termination Equipment (NTE)1 that does not drop local link carrier2 when the remote link fails. Here’s the original ASCII art describing the topology:

PE---------------NTE--FW---NMS 
  <--------IP-------->

He’d like to use interface SNMP counters on the firewall to detect the PE-NTE link failure. He’s using static default route toward PE on FW, and tried to detect the link failure with ifOutDiscards counter.

Tools 10. Developing Our Own Cross-platform (AMD64/ARM32) Traceroute Prometheus Exporter for Network Monitoring using Python

Hello my friend,

This is the third and the last (at least for the time being ) blogpost about monitoring of the infrastructure with Prometheus, one of the most powerful and popular open source time series database and metrics collection framework. In today’s talk we’ll cover the build of our own Prometheus exporter, which performs trace route checks.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Why to Automate Monitoring?

Many tools nowadays give you possibility not only to collect metrics, but also to act perform a simple )(or complex) analysis and act based on the result of such an analysis. So can Prometheus. With a help of the Alertmanager, it is possible to send a REST API request upon certain condition, which would trigger an automation activity or a workflow to act upon the business logic needed for the condition, such as remediation and/or configuration. This is why you need to know how the network automation works at a good level.

And we Continue reading