Every now and then I stumble upon a blog post saying “OSI 7-layer model sucks” or “OSI 7-layer model is a lie”, most recent one coming from Robert Graham.
Before going into the details, let’s agree on the fundamentals.
Most everyone who ever tried to build a network spanning more than one transmission technology and including intermediate nodes came to the conclusion that layered approach to networking makes sense.
Whether you have three, four, five, or seven layers in your model doesn’t matter. What really matters is that your model contains all the functionality you need to implement host-to-host networking in target environment.
Read more ...Elliott Management is targeting the media conglomerate for what it calls “long-term...
$ docker run -p 6343:6343/udp -p 8008:8008 sflow/tcpdump
19:06:42.000000 ARP, Reply 10.0.0.254 is-at c0:ea:e4:89:b0:98 (oui Unknown), length 64
19:06:42.000000 IP 10.0.0.236.548 > 10.0.0.70.61719: Flags [P.], seq 3380015689:3380015713, ack 515038158, win 41992, options [nop,nop,TS val 1720029042 ecr 904769627], length 24
19:06:42.000000 Continue reading
The cloud giant announced partnerships with SES, Viasat, and Intelsat to bring Azure to remote...
Mobile network operators need to make money now and have “massive strengths” that remain...
The Google angle hardens the underlying Google Kubernetes Engine node against rootkits and...
Today's Network Break podcast delves into an AWS outage, tracks a slump in server sales, examines acquisitions by Commvault and Microsoft, and shares highlights from VMworld's FutureNET program. Guest Ed Horley stops by to share commentary and insights.
The post Network Break 251: AWS Outage Is A Backup Reminder; What’s New At FutureNET? appeared first on Packet Pushers.
The Internet as warfighting tool: Military rulers in Sudan and other countries are paying “Internet warfare” firms to develop social media campaigns to praise their leadership, the New York Times reports. The story highlights a social media company called New Waves, run by a former member of the Egyptian military and a self-described “researcher on Internet wars.”
Internet warfare, part 2: Meanwhile, a “virtual army” from mainland China has focused on recent protests in Hong Kong, with social media posts boosting government interests, the South China Morning Post writes. New recruits to the nationalist Diba group are taught how to use VPNs and circumvent the government firewall to reach the “battlefield” – social media pages and websites normally banned.
Protestors strike back: The Hong Kong protestors had their own Internet-related tactics, QZ.com reports. In response to threats of Internet shutdown, protestors began to use Bluetooth-based mesh networking technologies, allowing them to communicate through a network of devices that are linked locally, rather than over an Internet connection.
Encryption loves blockchain: The Tide Foundation, a nonprofit building an open-source framework for protecting data, has developed a blockchain-based encryption approach, Silicon Angle says. This type of encryption is much more difficult Continue reading
I'm pretty sure that this creates a downgrade attack on DOH enabled browsers.
The post Configuring Networks to Disable DNS over HTTPS | Firefox Help appeared first on EtherealMind.
This post is a textual version of the talk I gave at NLNOG 2019, You can watch the recording of the talk on youtube below if that’s your preferred medium:
<iframe width=“700” height=“328” src=“https://www.
The companies are collaborating to support operators as they combine VNFs, SDN, and 5G in ONAP.
In this post I’ll explore replacing the heart of a network operating system’s configuration mechanism with the software developers take on version control. It can be argued that network operating systems, or at least good ones, already have a version control system. It’s that very system that allows you to roll back and carry out operations like commit-confirmed. More specifically, this is a version control system like Git but not specifically git.
As my day job rotates around Junos, I’ll concentrate on that. So why would anyone want to rip out the heart of Junos and replace it with a git backed directory full of configuration snippets? Software developers and now automation skilled engineers want the advantages of being able to treat the network like any other service delivering node. Imagine committing human readable configuration snippets to a network configuration directory and having the network check it out and do something with it.
Junos already has a configuration engine capable of rollbacks and provides sanity through semantic and syntax commit time checks. Mgd (the service you interact with) provides mechanisms to render interfaces through YANG models and generates the very configuration tree you interact with. You could say mgd takes Continue reading
Last week we started the Autumn 2019 Building Network Automation Solutions online course with an interesting presentation from Matthias Luft focused on open-source supply chain security
TL&DR: Can I download whatever stuff I found as my first Google hit and use it in my automation solution? ****, NO!
Matthias covered these topics:
Read more ...There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.
Let me explain.
Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.
While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.
So, what’s the big deal with mobile connections growing?
Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.
Not Continue reading
There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.
Let me explain.
Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.
While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.
What’s the big deal with mobile connections growing?
Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.
Not anymore.
Here are some of the most prominent venture capital and merger and acquisition news items from...