Antidote is the network emulator that runs the labs on the Network Reliability Labs web site. You may install a standalone version of Antidote on your personal computer using the Vagrant virtual environment provisioning tool.
In this post, I show you how to run Antidote on a Linux system with KVM, instead of VirtualBox, on your local PC to achieve better performance — especially on older hardware.
Antidote runs emulated network nodes inside a host virtual machine. If these emulated nodes must also run on a hypervisor, as most commercial router images require, then they are running as nested virtual machines inside the host virtual machine. Unless you can pass through your computer’s hardware support for virtualization to the nested virtual machines, they will run slowly.
VirtualBox offers only limited support for nested virtualization. If you are using a Linux system, you can get better performance if you use Libvirt and KVM, which provide native support for nested virtualization.
If you plan to run Antidote on a Mac or a PC, you should use Antidote’s standard installation with VirtualBox1. Vagrant and VirtualBox are both cross-platform, open-source tools.
Finally, informational EIGRP RFC 7868 has been published.It is not anymore Cisco’s EIGRP, it is an open standard. Without a most critical feature of EIGRP,can we really say that? Why Cisco doesn’t share the most important feature which can help in large scale EIGRP design although industry has been asking from them for a long time ?
EIGRP RFC 7868 specifies EIGRP Dual Algorithm, EIGRP Packets such as Update, Query and Reply, EIGRP Operation, and EIGRP Metrics (K1,K2,….K6).
And since EIGP is RFC anymore, other vendors can legally implement EIGRP. There was couple of open source EIGRP implementations already,but with the RFC status, seeing new implementations among the big vendors would not be a big deal.
In addition to EIGRP packet types and metric values, there are a couple of important things to understand about EIGRP.
Among them is how EIGRP, as a distance vector protocol, calculates a best path and advertise it to the neighbors.
Understanding what is EIGRP successor, EIGRP feasible successor, EIGRP feasibility condition, metric values and usage in real life deployments is among the most important parameters in EIGRP that should be properly understood.
EIGRP RFC is an 80-page document, which provides detailed Continue reading
BGP Best External is used in Active Standby BGP Topologies generally but not limited with that.BGP Best External feature helps BGP to converge much faster by sending external BGP prefixes which wouldn’t normally be sent if they are not overall BGP best path.
I am explaining this topic in great detail in my Live/Webex “BGP Zero to Hero” course.
There are BGP best internal, BGP best external and BGP Overall best path.
BGP Best external in an active-standby scenarios can be used in MPLS VPN, Internet Business Customers, EBGP Peering Scenarios, Hierarchical large scale Service Provider backbone and many others.
But,How active-standby scenario connection with BGP is created ? In which situation people use active-standby instead of active-active connection ?
Let’s start with the below scenario.
Figure -1 BGP Active-Standby Path Selection Example
First thing you should know that common reason for active-standby or primary-backup link is one link is more expensive than the other.Cost doesn’t have to be a $$ cost only but also be based on latency, performance and bandwidth.
In Figure-1 : IBGP is running in the Service Provider network. Between R1 , R2 and R3 there is an IBGP Continue reading
Russ White wrote a great blog post explaining why you have to understand the problem you’re solving instead of blindly believing the $vendor slide deck… or as I said a long time ago, think about how you’ll troubleshoot your network in because you won’t be able to reformat it once it crashes.
Read more ...Taiji: managing global user traffic for large-scale internet services at the edge Xu et al., SOSP’19
It’s another networking paper to close out the week (and our coverage of SOSP’19), but whereas [Snap][Snap] looked at traffic routing within the datacenter, Taiji is concerned with routing traffic from the edge to a datacenter. It’s been in production deployment at Facebook for the past four years.
When a user makes a request to http://www.facebook.com
, DNS will route the request to one of dozens of globally deployed edge nodes. Within the edge node, a load balancer (the Edge LB) is responsible for routing requests through to frontend machines in datacenters. The question Taiji addresses is a simple one on the surface: what datacenter should a given request be routed to?
There’s one thing that Taiji doesn’t have to worry about: backbone capacity between the edge nodes and datacenters— this is provisioned in abundance such that it is not a consideration in balancing decisions. However, there are plenty of other things going on that make the decision challenging:
Despite its overall financial difficulties, NetApp's Cloud Data Services business posted a 167%...
I have upgraded my TPM firmware on my Librem13v2. Its keys are now safe. \o/
Back in 2017 we had the Infineon disaster (aka ROCA). I’ve written about it before about how bad it is and how to check if you’re affected with a simple tool.
I TAKE NO RESPONSIBILITY IF YOU BRICK YOUR DEVICE OR FOR ANYTHING ELSE BAD HAPPENING FROM YOU FOLLOWING MY NOTES.
$ tpm_version | grep Chip
Chip Version: 1.2.4.40 <--- Example vulnerable version
$ cbmem -c | grep Purism # I upgraded coreboot/SeaBIOS just before doing this.
coreboot-4.9-10-g123a4c6101-4.9-Purism-2 Wed Nov 13 19:54:43 UTC 2019 […]
[…]
Found mainboard Purism Librem 13 v2
$ wget https://repo.pureos.net/pureos/pool/main/t/tpmfactoryupd/tpmfactoryupd_1.1.2459.0-0pureos9_amd64.deb
[…]
$ alien -t tpmfactoryupd_1.1.2459.0-0pureos9_amd64.deb
[…]
$ tar xfz tpmfactoryupd-1.1.2459.0.tgz
$ mv usr/bin/TPMFactoryUpd .
$ sudo systemctl stop trousers.service # Need to turn off tcsd for TPMFactoryUpd to work in its default mode.
[…]
$ ./TPMFactorUpd -info
**********************************************************************
* Infineon Technologies AG TPMFactoryUpd Ver 01.01.2459.00 *
**********************************************************************
TPM information:
----------------
Firmware valid : Yes
TPM family : 1.2
TPM firmware version Continue reading
Ericsson, Nokia, and Samsung have much to lose if the RAN space flattens to a point where their...
The variance in performance hasn't shaken Amazon's grip on the market. AWS remains the largest...
The increased interoperability testing will include Nokia’s virtual network functions and...
Service provider revenue dropped 13% year over year in Q1, while Cisco’s enterprise business...
The cloud giant is pitching the platform as a way to help customers find, subscribe to, and use...
A 5G SA core will allow operators to offer 5G-specific services, including network slicing, mobile...
By next year, five Internet of Things (IoT) devices are projected to be in use for every person on the planet.
IoT devices offer endless opportunities to improve productivity, economic growth, and quality of life. Think smart cities, self-driving cars, and the ways connected medical devices can monitor our health. The potential growth of IoT is virtually infinite.
But with opportunity comes a significant amount of risk. As much as we’d like to trust manufacturers to make sure burglars can’t watch our homes through data from an automated vacuum, many new devices lack even basic security features. And thousands of new devices are coming online each year without commitment to basic measures such as using unique passwords, encrypting our data, or updating software to address vulnerabilities.
To help people and businesses around the world prepare, a dedicated group is rising to the challenge of securing the Internet of Things though cooperation across borders and sectors.
They are government agencies, non-governmental organizations, and other organizations and experts working on IoT security joined together to form the IoT Security Policy Platform. We are proud to say the Internet Society is amongst them too. Together we’ve been discussing and sharing best practices and Continue reading