Archive

Category Archives for "Networking"

Deep Dive: Scoring ISPs and Hosts on Privacy and Security

In April 2019 the Internet Society’s Online Trust Alliance (OTA) released its 10th Annual Online Trust Audit & Honor Roll. The Audit looks at the security and privacy practices of over 1,000 of the top sites on the Internet from retailers to governments. In this post we will take a deeper dive into the ISP/Hosts sector of the Audit. This sector is comprised of the top ISPs and other hosting organizations in the U.S. It includes everything from organizations that provide network access to organizations that host email services.

In the Audit, privacy statements are scored across 30 variables. ISP/Hosts were a decidedly mixed bag compared to other sectors, which tended to do either relatively well or poorly across the board in their statements. (Though to clear, the vast majority of organizations in the Audit had poor privacy statements, it was the most common reason for failure across privacy and security scoring.)

ISP/Hosts fell somewhat short in the presentation of their statements. OTA advocates several best practices that deal with how the privacy statement is displayed to make it as easy as possible for users to understand.

The simplest practice OTA advocates is a link to the privacy Continue reading

SK Telecom Boasts Standalone 5G ‘First,’ Readies Launch

The carrier added New Radio software to its existing non-standalone 5G base stations and achieved...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Citrix Swats ADC, Gateway Bugs, SD-WAN Fix in the Wings

“We urge customers to immediately install these fixes,” noted Citrix Chief Information Security...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Why Your SD-WAN Deployment is Failing

I’m going to say something you may not want to hear, or you may already know: implementing SD-WAN is hard. Among the promise and hype of automation, dynamic path selection, zero-touch provisioning and a cloud-ready WAN, lies a trail of failed SD-WAN projects, with many others struggling on life support. For many, the WAN of the future has failed to manifest into anything more than another hard-to-manage, costly IT project that has failed to deliver on its promises (or, has failed to live up to your expectations), but why?The problems SD-WAN solutions address are not incremental change or gradual evolution, they are the result of industry megatrends that have upended the way we consume applications and connect our users, all in a very short period of time. These megatrends, such as Digital Transformation and the move to SaaS, IaaS and Cloud have placed new demands on network infrastructure, IT staff and application owners; requiring a complete rethink of how they are connecting locations, delivering applications and services and securing their networks. The sheer gravity of these changes, and scope of what needs to be done to support them, cannot be undertaken in an additive approach. Rather, they must be Continue reading

It’s a fact: choosing your own hardware means lower TCO

An essential part of open networking is the ability to choose your own hardware. This allows for customization of your network to suit business needs, and it can also dramatically reduce your Total Cost of Ownership (TCO). On average, open networking with Cumulus helps customers reduce their capital expenditures (CapEx) by about 45% and operational expenditures (OpEx) in the range of approximately 50% to 75%.

Choosing the right hardware is a big part of these savings. If you compare bare-metal networking equipment with a similar product from a proprietary networking vendor, you’ll quickly find that bare-metal hardware is much less expensive. One reason for this is competition between hardware vendors in the open networking space.

Open networking is a multi-vendor ecosystem. More than 100 switches are certified to work with Cumulus Linux; they’re manufactured by vendors such as Dell, HPE, Mellanox, Supermicro, and others. Unlike with proprietary switches, there’s no vendor lock-in creating a monopoly situation. In the open networking space, vendors compete for sales, and this keeps costs down.

Another factor in lowering costs is the degree of customization available when you have many products to choose from. Choosing your own hardware means buying what you need—and only Continue reading

Exclusive: Cisco Adds Network Insights to IBN

Cisco VP Thomas Scheibe spoke exclusively to SDxCentral about the new Day 2 network operations...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: The Zettabyte Era is Coming – Are you Ready?

It’s no secret that data growth is at an all-time high. IDC expects 103 zettabytes of data to be generated worldwide by 20231. Yes, zettabytes. With the proliferation of IoT devices, 5G-enabled technologies, and the massive growth of video, we’re just scratching the surface of how companies will store and extract value from data.Machine data will play a leading role, as it is expected to outpace commercial/consumer data. By 2023, more than 90% of data will be generated by machines2 (i.e. smart cities, IoT, endpoints, autonomous cars, etc.). In addition, video, surveillance footage, and large AI/ML data sets – this “natural streaming” or sequential data – will be everywhere. To read this article in full, please click here

Beyond Moore’s Law: Neuromorphic computing?

With the conceivable exhaustion of Moore’s Law – that the number of transistors on a microchip doubles every two years – the search is on for new paths that lead to reliable incremental processing gains over time.One possibility is that machines inspired by how the brain works could take over, fundamentally shifting computing to a revolutionary new tier, according to an explainer study released this month by Applied Physics Reviews.[Get regularly scheduled insights by signing up for Network World newsletters.] “Today’s state-of-the-art computers process roughly as many instructions per second as an insect brain,” say the paper’s authors Jack Kendall, of Rain Neuromorphics, and Suhas Kumar, of Hewlett Packard Labs. The two write that processor architecture must now be completely re-thought if Moore’s law is to be perpetuated, and that replicating the “natural processing system of a [human] brain” is the way forward.To read this article in full, please click here

Beyond Moore’s Law: Neuromorphic computing?

With the conceivable exhaustion of Moore’s Law – that the number of transistors on a microchip doubles every two years – the search is on for new paths that lead to reliable incremental processing gains over time.One possibility is that machines inspired by how the brain works could take over, fundamentally shifting computing to a revolutionary new tier, according to an explainer study released this month by Applied Physics Reviews.[Get regularly scheduled insights by signing up for Network World newsletters.] “Today’s state-of-the-art computers process roughly as many instructions per second as an insect brain,” say the paper’s authors Jack Kendall, of Rain Neuromorphics, and Suhas Kumar, of Hewlett Packard Labs. The two write that processor architecture must now be completely re-thought if Moore’s law is to be perpetuated, and that replicating the “natural processing system of a [human] brain” is the way forward.To read this article in full, please click here

Public Cloud Cannot Change the Laws of Physics

Listening to public cloud evangelists and marketing departments of vendors selling over-the-cloud networking solutions or multi-cloud orchestration systems, you could start to believe that migrating your workload to a public cloud would solve all your problems… and if you’re gullible enough to listen to them, you’ll get the results you deserve.

Unfortunately, nothing can change the fundamental laws of physics, networking, or application architectures:

Read more ...

EVENTS. My experience attending and speaking at UKNOF 45 in London.

Hello my friend,

This year, besides Cisco championship started for me with an opportunity to speak at UKNOF event in London. UKNOF stands for United Kingdom’s Network Operators’ Forum, and per their webpage acts as an open forum for operational, technical and engineering information exchange related to networking technologies and practices. And here is my experience.

How do I get there?

Some time ago I was presenting at NetLdn event in a nice pub in London, and apparently there were some people from the UKNOF board (hey, Chris Russel).

I have an interesting discussion with NetLdn organizers some time ago, you can watch it on our YouTube channel.

They advised me to submit my talk to UKNOF, and if the committee voted for it, I’d have an opportunity to speak in front of quite a big audience at UKNOF 45 in London. I was positively surprised and took that opportunity to apply for a talk. After a month of waiting I finally got an invitation to talk at the 45th UKNOF meeting, which took place in London. 

Despite I have an almost ready slide deck, I need to rework it a bit to comply with the event’s Continue reading

Tech Bytes: Reviewing 2019’s Most Impactful Internet Outages With ThousandEyes (Sponsored)

Today’s Tech Bytes podcast looks back at some of 2019's impactful Internet outages, including Google Cloud, with sponsor ThousandEyes. We’ll discuss what happened in these outages, who was affected, and lessons learned. Our guest is Angelique Medina, Director of Product Marketing at ThousandEyes.

The post Tech Bytes: Reviewing 2019’s Most Impactful Internet Outages With ThousandEyes (Sponsored) appeared first on Packet Pushers.

Why I Bought A Meraki Camera

I recently purchased a Meraki MV 72 and wanted to share some of the logic behind why I did this. Having 4 other camera ecosystems in “production” at my home, this decision to add number 5 may defy logic for many. My thoughts around this particular investment were more about my personal learning than about function.

To provide a little background, I have a combination of various consumer and prosumer type cameras that vary in form and functionality. Every single brand (and ecosystem), while covering some functions very well, seem to leave a little to be desired. Hence the reason to buy a Meraki MV.

No–I do not expect the Meraki solution to be a perfect solution. Actually, since it is built around business use cases, it might not be as good at somethings that I find very useful. However, there is an API that I wanted to experiment with and solidify my knowledge of how I might build and extend my own ecosystem.

The deeper function of the Meraki MV API is included with MV Sense which is an add-on. Fortunately, every MV Sense organization with capable cameras comes with 10 free licenses. This requires the new generation of Continue reading

The Week in Internet News: Kentucky Broadband Program Stalls

Broadband delays: KentuckyWired, an ambitious plan to bring broadband services to underserved, rural parts of the state, is about two years behind schedule, the Courier Journal reports. As a result, the promise of new high-tech jobs has not materialized. About 405,000 residents of Kentucky have no access to wired broadband.

Cities take the lead: Meanwhile, a handful of cities in Oregon are considering municipal broadband projects, KPTV reports. Hillsboro is about to join the ranks of cities offering city-funded connectivity.

Tweets against encryption: U.S. President Donald Trump has tweeted a demand for Apple to defeat encryption on iPhones owned by criminal suspects, CNet says. Administration officials have criticized Apple for not unlocking a phone used by a dead mass shooter.

Election hacking: A security researcher has found that an election server in the U.S. state of Georgia may have been hacked in 2014, before a tight 2018 race for governor, Politico reports. If hackers did manage to breach the server, they would have “almost total control” of it, including the abilities to modify files, delete data, and install malware,” election security expert Logan Lamb said.

The cost of pulling the plug: Internet and social media shutdowns cost economies Continue reading

GPON vs. Traditional Ethernet Architecture

GPON (Gigabit Passive Optical Network) is used to reduce the number of active switching nodes in the network design. Network Design Best practice in Campus networks and many Datacenter networks (Not Massively Scale Datacenters), is to use Three-Tier; Access, Distribution and Core network design. Although the design decision depends on the scalability requirements in the Campus and DC, two layer; Access and Collapsed Distribution/Core design can be used. Below figure depicts common three tier Access, Distribution and Core design.

 

This post was first published on “Service Provider Networks Design and Architecture by Orhan Ergun” book. 

 

GPON vs Active Ethernet

Figure – GPON vs. Traditional Ethernet Architecture, Source: cisco.com

 

In Three-tier Traditional campus networks, there are active Ethernet devices used in each tier. Active means, nodes require electricity. Active Ethernet switches forward traffic based on forwarding rules. If it’s a Layer 2 network, traffic is forwarded based on Layer 2 information, if it is a Layer 3 design, traffic is forwarded based on routing protocol information.

GPON in the campus network replaces traditional three-tier design with two-tier optical network, by removing the Active access and distribution layer Ethernet switches with the ONT, Splitter and OLT devices. Although ONT Continue reading

Edge Computing Providers

Edge computing is a networking philosophy focused on bringing computing as close to the source of data as possible, in order to reduce latency and bandwidth usage. In a simpler term, edge computing means running fewer processes in the cloud and moving those processes to local places, such as on a user’s computer, an IoT device, or an edge server.

 

This post was first published in ‘ Service Provider Networks Design and Architecture by Orhan Ergun ‘ book.

Bringing computation to the network’s edge minimizes the amount of long-distance communication that has to happen between a client and server.

For Internet devices, the network edge is where the device, or the local network containing the device, communicates with the Internet. The edge may not be a clear term; for example, a user’s computer or the processor inside of an IoT camera can be considered the network edge, while the user’s router, ISP, or local edge servers are also considered the edge.

 

It is important to understand that the edge of the network is geographically close to the device, unlike origin servers and cloud servers, which can be very far from the devices they communicate with.

 

Cloud computing Continue reading