Archive

Category Archives for "Networking"

Weekly internet health check, US and worldwide

The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here. Get regularly scheduled insights by signing up for Network World newsletters To read this article in full, please click here

Talk of a national 5G network leaves a lot of questions unanswered

A Pentagon request for information that led to speculation about a nationwide 5G network created by a partnership between the mobile carriers and the government has provoked the wrath of Congressional leaders. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises The controversy started with an official request for information from the Pentagon, which asks for guidance about the Department of Defense owning and operating 5G networks for domestic operations. Per Forrester vice president and research director Glenn O’Donnell, the plan as discussed would amount to a public-private partnership funded through government stimulus money and overseen by the DoD, but it would be implemented and operated by one of the country’s major wireless carriers.To read this article in full, please click here

IBM, Red Hat, and AT&T team up for private edge deployments

IBM’s new Cloud Satellite offering will move the company’s open hybrid-cloud framework into new and different environments, thanks to partnerships with AT&T for 5G connectivity and IBM's Red Hat  unit for containerization. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Cloud Satellite, currently in beta, is a software product, sold through IBM, that provides a link to IBM and AT&T’s hardware. It offers a one-dashboard method of managing services across multiple computing environments, networks and locations. It leverages Red Hat’s OpenShift containerization platform—built on Kubernetes for the flexibility to deploy applications and services across multiple environments—IBM’s cloud framework for management, and AT&T’s public or private 5G for connectivity between customersites and the cloud. Thus, an application could be deployed at the edge, but managed from IBM’s cloud framework, with connectivity furnished by AT&T, and OpenShift making it simpler to keep workloads virtualized and flexible.To read this article in full, please click here

My collection of vintage PC cards

Recently, I have been gathering some old hardware at my parents’ house, notably PC extension cards, as they don’t take much room and can be converted to a nice display item. Unfortunately, I was not very concerned about keeping stuff around. Compared to all the hardware I have acquired over the years, only a few pieces remain.

Tseng Labs ET4000AX (1989)

This SVGA graphics card was installed into a PC powered by a 386SX CPU running at 16 MHz. This was a good card at the time as it was pretty fast. It didn’t feature 2D acceleration, unlike the later ET4000/W32. This version only features 512 KB of RAM. It can display 1024×768 images with 16 colors or 800×600 with 256 colors. It was also compatible with CGA, EGA, VGA, MDA, and Hercules modes. No contemporary games were using the SVGA modes but the higher resolutions were useful with Windows 3.

This card was manufactured directly by Tseng Labs.

Carte Tseng Labs ET4000AX ISA au-dessus de la boîte "Planète Aventure"
Tseng Labs ET4000 AX ISA card

AdLib clone (1992)

My first sound card was an AdLib. My parents bought it in Canada during the summer holidays in 1992. It uses a Yamaha OPL2 chip to produce sound via FM synthesis. Continue reading

Strong Reactions and Complexity

In the realm of network design—especially in the realm of security—we often react so strongly against a perceived threat, or so quickly to solve a perceived problem, that we fail to look for the tradeoffs. If you haven’t found the tradeoffs, you haven’t looked hard enough—or, as Dr. Little says, you have to ask what is gained and what is lost, rather than just what is gained. This failure to look at both sides often results in untold amounts of technical debt and complexity being dumped into network designs (and application implementations), causing outages and failures long after these decisions are made.

A 2018 paper on DDoS attacks, A First Joint Look at DoS Attacks and BGP Blackholing in the Wild provides a good example of causing more damage to an attack than the attack itself. Most networks are configured to allow the operator to quickly configure a remote triggered black hole (RTBH) using BGP. Most often, a community is attached to a BGP route that points the next-hop to a local discard route on each eBGP speaker. If used on the route advertising the destination of the attack—the service under attack—the result is the DDoS attack traffic no longer Continue reading

Nominations Now Open for 2021 Internet Society Board of Trustees Elections

The Internet Society Nominations Committee is now inviting nominations for candidates to serve on the Board of Trustees, effective at the start of the Annual General Meeting which is currently scheduled to be held 31 July-1 August 2021.
 
In 2020-2021, Organization Members and the IETF will each select two Trustees, and Chapters will select one Trustee. Following an orientation program, all new Trustees chosen by the IETF and Chapters will begin three-year terms commencing with the board’s Annual General Meeting. With respect to the two Organizational Members to be chosen, the candidate with the highest weighted vote count will be seated for a three-year term, while the candidate with the second highest weighted vote count will serve the final year of a three-year term initially served by a Trustee who resigned from the board in mid-term.
 
The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Internet Society’s mission of preserving the open, globally-connected, trustworthy and secure Internet for everyone. Trustees also currently serve as members of the Internet Society Foundation’s board.
 
I encourage you and all of your community members to identify appropriate candidates for these positions. Further information regarding the positions, as Continue reading

The Week in Internet News: Tech Giants Face Hostile Lawmakers

Getting hit from both sides: Executives from Google, Twitter, and Facebook faced criticism from all sides when testifying in the U.S. Senate recently, the Washington Post reports. Democratic senators told the companies they should do a better job with moderating their sites for fake news and conspiracy theories, while Republicans called on the companies to take a more hands-off role with political speech.

Your money, or else: A wave of ransomware attacks have hit nearly two dozen hospitals and healthcare organizations in recent weeks, Wired.com reports. Even after those attacks, the U.S. Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, and Department of Health and Human Services warned that more may be coming, with an “increased and imminent cybercrime threat” to hospitals and healthcare providers.

Safer Zooming: Videoconferencing provider Zoom has added encryption to free accounts, although the new protections come with a catch, TechCrunch says. With end-to-end encryption enabled for every user joining the call, some other features won’t be available. Users on encrypted calls won’t be able to use features like cloud recording and live transcription, and they won’t be able to chat one on one. Also, the encryption feature will only work with the Continue reading

What are the Elements of Effective Communication?

On a good day, there are different people around. The way we converse with them and communicate is completely different. There are ways we talk to those we are older than us, those younger than we are, those we respect, those who lose our respect with time, and it goes on and on. This article aims to talk about the elements of effective communication.

Elements of Effective Communication

Elements of Effective Communication includes the following:

1. Listen

Whenever we converse with people and we say something, we are simply speaking knowledge we already possess. But whenever we listen to others, most times we get the chance to absorb and learn something new.

Speaking and listening work together. As you communicate with other people, these roles are completely fluid. The speaker might not be talking the entire time. One of these important elements of communication is for each of us as speakers to listen with attention.

2. Try to Be Clear

These elements of Simplicity and Clarity are also two beans in a pod. But these aspects cannot be used synonymously. What one means by clarity is that you shouldn’t have any doubt about what you’re talking about. Speaking with confidence Continue reading

Running Isso on NixOS in a Docker container

This short article documents how I run Isso, the commenting system used by this blog, inside a Docker container on NixOS, a Linux distribution built on top of Nix. Nix is a declarative package manager for Linux and other Unix systems.


While NixOS 20.09 includes a derivation for Isso, it is unfortunately broken and relies on Python 2. As I am also using a fork of Isso, I have built my own derivation, heavily inspired by the one in master:1

issoPackage = with pkgs.python3Packages; buildPythonPackage rec {
  pname = "isso";
  version = "custom";

  src = pkgs.fetchFromGitHub {
    # Use my fork
    owner = "vincentbernat";
    repo = pname;
    rev = "vbe/master";
    sha256 = "0vkkvjcvcjcdzdj73qig32hqgjly8n3ln2djzmhshc04i6g9z07j";
  };

  propagatedBuildInputs = [
    itsdangerous
    jinja2
    misaka
    html5lib
    werkzeug
    bleach
    flask-caching
  ];

  buildInputs = [
    cffi
  ];

  checkInputs = [ nose ];

  checkPhase = ''
    ${python.interpreter} setup.py nosetests
  '';
};

I want to run Isso through Gunicorn. To this effect, I build an environment combining Isso and Gunicorn. Then, I can invoke the latter with "${issoEnv}/bin/gunicorn".

issoEnv = pkgs.python3.buildEnv.override {
    extraLibs = [
      issoPackage
      pkgs.python3Packages. Continue reading

Python Pieces: Decorators

As some of you know – Im a big believer that we all learn differently. You may read something the first time and immediately grasp the topic whereas I may read it and miss the point entirely. For me, decorators have been one of those things that I felt like I was always close to understanding but still not quite getting it. Sure – some of the examples I read made sense but then I’d find another one that didn’t. In my quest to understand them, I spent a lot of time reviewing a lot of examples and asking a lot of very patient friends for help. At this point, I feel like I know enough to try and explain the topic in a manner that might hopefully help someone else who was having a hard time with the concept. With my learning philosophy out of the way, let’s jump right in….

I want to jump right into a real (albeit not super useful) example of decorators using the full decorator (or shorthand) syntax. Let’s start with this…

def a_decorator(a_function):
    print("You've been decorated!")
    return a_function

@a_decorator
def print_name_string(your_name):
    name_string = "Your name is: " + your_name
    return name_string

print(print_your_name("Jon"))

Continue reading

Vint Cerf’s Mission to Bring the Internet to Outer Space

77-year-old Vint Cerf is credited as the father of the internet — but he’s now tackling an even bigger challenge. He’s joined with the scientists who envision a network that can scale across hundreds of millions of miles, in an airless vacuum, where data transmissions can be blocked by, for example, the planet Jupiter. Cerf’s working with a team whose lofty new dream is an internet which can connect our spacecraft in outer space — to the other spacecraft, and to listeners waiting here on earth. It’s instructive to see how engineers approach a task that stretches endless on an interplanetary scale — and what it took to lead scientists to this galaxy-sized dream. Guide to the Galaxy Back in the 1970s, Cerf co-developed the TCP/IP protocol with Bob Kahn, which became the foundation for all internet communication today. (Though in a recent article in Quanta, Cerf stresses that “A lot of people contributed to the creation of the internet.”) But what’s less known is that Cerf has also held a lifelong interest in outer space. One

DNS XL

This is a technical report on a detailed exploration of the way the Internet’s Domain Name System (DNS) interacts with the network when the size of the application transactions exceeds the underlying packet size limitations of hosts and networks.