Archive

Category Archives for "Networking"

Response: The OSI Model Is a Lie

Every now and then I stumble upon a blog post saying “OSI 7-layer model sucks” or “OSI 7-layer model is a lie”, most recent one coming from Robert Graham.

Before going into the details, let’s agree on the fundamentals.

Most everyone who ever tried to build a network spanning more than one transmission technology and including intermediate nodes came to the conclusion that layered approach to networking makes sense.

Whether you have three, four, five, or seven layers in your model doesn’t matter. What really matters is that your model contains all the functionality you need to implement host-to-host networking in target environment.

Read more ...

AT&T’s Debt Lands It in Crosshair of Activist Investor

Elliott Management is targeting the media conglomerate for what it calls “long-term...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Packet analysis using Docker

Why use sFlow for packet analysis? To rephrase the Heineken slogan, sFlow reaches the parts of the network that other technologies cannot reach. Industry standard sFlow is widely supported by switch vendors, embedding wire-speed packet monitoring throughout the network. With sFlow, any link or group of links can be remotely monitored. The alternative approach of physically attaching a probe to a SPAN/Mirror port is becoming much less feasible with increasing network sizes (10's of thousands of switch ports) and link speeds (10, 100, and 400 Gigabits). Using sFlow for packet capture doesn't replace traditional packet analysis, instead sFlow extends the capabilities of existing packet capture tools into the high speed switched network.

This article describes the sflow/tcpdump  and sflow/tshark Docker images, which provide a convenient way to analyze packets captured using sFlow.

Run the following command to analyze packets using tcpdump:
$ docker run -p 6343:6343/udp -p 8008:8008 sflow/tcpdump

19:06:42.000000 ARP, Reply 10.0.0.254 is-at c0:ea:e4:89:b0:98 (oui Unknown), length 64
19:06:42.000000 IP 10.0.0.236.548 > 10.0.0.70.61719: Flags [P.], seq 3380015689:3380015713, ack 515038158, win 41992, options [nop,nop,TS val 1720029042 ecr 904769627], length 24
19:06:42.000000 Continue reading

Microsoft Launches Azure Into Orbit With ExpressRoute

The cloud giant announced partnerships with SES, Viasat, and Intelsat to bring Azure to remote...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Veteran AT&T Exec Gets Candid About Operator Challenges

Mobile network operators need to make money now and have “massive strengths” that remain...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Fortifies Kubernetes Nodes Against Boot Attacks

The Google angle hardens the underlying Google Kubernetes Engine node against rootkits and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to use Terminator on Linux to run multiple terminals in one window

If you’ve ever wished that you could line up multiple terminal windows and organize them in a single window frame, we may have some good news for you. The Linux Terminator can do this for you. No problemo!Splitting windows Terminator will initially open like a terminal window with a single window. Once you mouse click within that window, however, it will bring up an options menu that gives you the flexibility to make changes. You can choose “split horizontally” or “split vertically” to split the window you are currently position in into two smaller windows. In fact, with these menu choices, complete with tiny illustrations of the resultant split (resembling = and ||), you can split windows repeatedly if you like. Of course, if you split the overall window into more than six or nine sections, you might just find that they're too small to be used effectively.To read this article in full, please click here

Network Break 251: AWS Outage Is A Backup Reminder; What’s New At FutureNET?

Today's Network Break podcast delves into an AWS outage, tracks a slump in server sales, examines acquisitions by Commvault and Microsoft, and shares highlights from VMworld's FutureNET program. Guest Ed Horley stops by to share commentary and insights.

The post Network Break 251: AWS Outage Is A Backup Reminder; What’s New At FutureNET? appeared first on Packet Pushers.

BrandPost: Moving to SD-WAN? Consider Security Carefully, Say Experts and IT Managers

For those of you migrating from MPLS to SD-WAN, here’s a truism that all too often is forgotten: don’t overlook your security architecture.Failure to consider security as part of SD-WAN deployments is a major cause of security breaches.  Last year, enterprises with completed SD-WAN implementations were 1.3 times more likely to experience a branch office security breach than those without one, says Shamus McGillicuddy, Research Director at analyst firm Enterprise Management Associates.To read this article in full, please click here

The Week in Internet News: Covert Social Media Campaign Champions Military Rulers

The Internet as warfighting tool: Military rulers in Sudan and other countries are paying “Internet warfare” firms to develop social media campaigns to praise their leadership, the New York Times reports. The story highlights a social media company called New Waves, run by a former member of the Egyptian military and a self-described “researcher on Internet wars.”

Internet warfare, part 2: Meanwhile, a “virtual army” from mainland China has focused on recent protests in Hong Kong, with social media posts boosting government interests, the South China Morning Post writes. New recruits to the nationalist Diba group are taught how to use VPNs and circumvent the government firewall to reach the “battlefield” – social media pages and websites normally banned.

Protestors strike back: The Hong Kong protestors had their own Internet-related tactics, QZ.com reports. In response to threats of Internet shutdown, protestors began to use Bluetooth-based mesh networking technologies, allowing them to communicate through a network of devices that are linked locally, rather than over an Internet connection.

Encryption loves blockchain: The Tide Foundation, a nonprofit building an open-source framework for protecting data, has developed a blockchain-based encryption approach, Silicon Angle says.  This type of encryption is much more difficult Continue reading

Samsung Taps Amdocs to Combine 5G and Virtualization in ONAP

The companies are collaborating to support operators as they combine VNFs, SDN, and 5G in ONAP.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Replacing a Network Element Config System with Git

In this post I’ll explore replacing the heart of a network operating system’s configuration mechanism with the software developers take on version control. It can be argued that network operating systems, or at least good ones, already have a version control system. It’s that very system that allows you to roll back and carry out operations like commit-confirmed. More specifically, this is a version control system like Git but not specifically git.

As my day job rotates around Junos, I’ll concentrate on that. So why would anyone want to rip out the heart of Junos and replace it with a git backed directory full of configuration snippets? Software developers and now automation skilled engineers want the advantages of being able to treat the network like any other service delivering node. Imagine committing human readable configuration snippets to a network configuration directory and having the network check it out and do something with it.

Junos already has a configuration engine capable of rollbacks and provides sanity through semantic and syntax commit time checks. Mgd (the service you interact with) provides mechanisms to render interfaces through YANG models and generates the very configuration tree you interact with. You could say mgd takes Continue reading

Why we cannot live without a Telco Cloud, and how does one build one?

There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.

Let me explain.

Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.

While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.

So, what’s the big deal with mobile connections growing?

Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.

Not Continue reading

Why we cannot live without a Telco Cloud, and how does one build one?

There are a more mobile phone connections (~7.9 billion) than the number of humans (~7.7 billion) colonising this planet.

Let me explain.

Clearly, not every person in the world has a mobile device. Here we’re talking about mobile connections that come from people with multiple devices (dual SIMs, tablets) and other integrated devices like cars, and other smart vehicles, and of course the myriad IOT devices. I don’t have to go too far — my electric 2 wheeler has a mobile connection that it uses to cheerfully download the updated firmware version and the software patches every now and then.

While the global population is growing at 1.08% annually, the mobile phone connections are growing at 2.0%. We will very soon be outnumbered by the number of mobile subscriptions, all happily chatting, tweeting and in general sending data over the network. Some of it would need low latency and low jitter, while some may be more tolerant to the delays and jitter.

What’s the big deal with mobile connections growing?

Well, historically most people have used their mobile phones to talk; to catch up on all the gossip on your neighbours and relatives.

Not anymore.

Continue reading

Money Moves: August 2019

Here are some of the most prominent venture capital and merger and acquisition news items from...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.