IDG Contributor Network: Network engineers are from Mars, application engineers are from Venus

Application and network engineers see the world differently. Unfortunately, these differences often result in resentment, with each party keeping score. Recently, application engineers have encroached on networking in a much bigger way. Sadly, if technical history repeats itself, we will revisit many of the long-ago problems again as application engineers rediscover the wisdom held by networking engineers.There are many areas of network engineering and application engineering where there is no overlap or contention. However, the number of overlapping areas is increasing as the roles of network and application engineers expand and evolve.Application engineers will try to do anything they can with code. I’ve spoken to many network engineers who struggle to support multi-cast. When I ask them why they are using multi-cast, they nearly always say, “the application engineers chose it, because it's in the Unix Network Programming book.” The Berkley Socket programming interface permits using multi-cast. The application engineers then provide lost packet recovery techniques to deliver files and real-time media using unicast and multicast. The Berkeley Socket does not easily support VLANs. Thus VLANs have always been the sole property of the network engineer. Linux kernel network programming capabilities in recent years become much more Continue reading

History Of Networking – Mike Sullenberger – DMVPN

In this History of Networking episode, Mike Sullenberger joins Network Collective to talk about the history of DMVPN.

Mike Sullenberger
Guest
Russ White
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Mike Sullenberger – DMVPN appeared first on Network Collective.

Ansible Tower 3.3 Available Now

RedHat-Tower-3-3-Social-A

We're happy to announce that Red Hat Ansible Tower 3.3 is now generally available. In this release, there are a number of enhancements that can help improve the automation in any organization. The team has been hard at work adding functionality with Red Hat OpenShift Container Platform, more granular permissions, scheduler improvements, support for multiple Ansible environments, and many other features.

Here are a few we are excited about!

Ansible Tower + OpenShift Container Platform

Push-button Ansible Tower deployment for Red Hat OpenShift Container Platform users is now here! Ansible Tower 3.3 is now a supported offering on Red Hat OpenShift Container Platform. The new Ansible Tower pod service in Red Hat OpenShift makes it easy to add capacity to Ansible Tower by adding additional pods. This enables users to scale at runtime as needed. Best of all, Ansible Tower is configurable directly from Red Hat OpenShift Container Platform.

  • Scale Ansible Tower up and down at runtime as needed
  • Add capacity to Ansible Tower by adding additional pods

All configurable directly from the Red Hat OpenShift Container Platform UI, CLI, and API.

More Granular Control

Ansible Tower now allows for even easier configuration of jobs for use Continue reading

Alternatives to Nmap: from simple to advanced network scanning

This month marks the 20th anniversary of Nmap, the open-source network mapping tool that became the standard used by many IT professionals, but that can be a bit much if you only need to do general network maintenance and are intimidated by its command-line interface.There are alternatives – not many – that range in technical sophistication from tools with GUIs that can ease you into performing the essentials of network maintenance to more advanced software that is similar to Nmap itself.[ Also see reviews of Icinga, Observium, Nagios and Zabbix network-monitoring software.] Like Nmap, all these network tools are free.To read this article in full, please click here

Alternatives to Nmap: from simple to advanced network scanning

This month marks the 20th anniversary of Nmap, the open-source network mapping tool that became the standard used by many IT professionals, but that can be a bit much if you only need to do general network maintenance and are intimidated by its command-line interface.There are alternatives – not many – that range in technical sophistication from tools with GUIs that can ease you into performing the essentials of network maintenance to more advanced software that is similar to Nmap itself.[ Also see reviews of Icinga, Observium, Nagios and Zabbix network-monitoring software.] Like Nmap, all these network tools are free.To read this article in full, please click here

Adjusting System State with Infrastructure as Code

This is the second blog post in “thinking out loud while preparing Network Infrastructure as Code presentation for the network automation course” series. If you stumbled upon it, you might want to start here.

An anonymous commenter to my previous blog post on the topic hit the crux of the infrastructure-as-code challenge when he wrote: “It's hard to do a declarative approach with Ansible and the nice network vendor APIs.” Let’s see what he was trying to tell us.

Read more ...

QSYM: a practical concolic execution engine tailored for hybrid fuzzing

QSYM: a practical concolic execution engine tailored for hybrid fuzzing Yun et al., USENIX Security 2018

There are two main approaches to automated test case generated for uncovering bugs and vulnerabilities: fuzzing and concolic execution. Fuzzing is good at quickly exploring the input space, but can get stuck when trying to get past more complex conditional causes (i.e., when randomly generated inputs are unlikely to satisfy them). Concolic execution, which we saw in action earlier in the week, uses symbolic execution to uncover constraints and pass them to a solver. It can handle complex branch conditions, but it’s much slower. Hybrid fuzzers combine both coverage-guided fuzzing and concolic execution, bringing in the big guns (concolic) when the fuzzer gets stuck. In non-trivial real-world applications though, even the hybrid approach has been too slow. Until now.

For me, the attention grabbing paragraph in this paper is to be found on page 8 (752) in section 5.1. Google’s OSS-Fuzz was previously used to test a number of important real-world applications and libraries including libjpeg, libpng, libtiff, lepton, openjpge, tcpdump, file, libarchive, audiofile, ffmpeg, and binutils.

It is worth noting that Google’s OSS-Fuzz generated 10 trillion test inputs Continue reading

IDG Contributor Network: Are you seeing what I’m seeing?

Enterprises are investing in their networks at an accelerating rate. As legacy IT on-premises infrastructure gives way to hybrid cloud and virtualized environments, and an escalating data tsunami drives data center expansions, increasing investments of time and money are raising the stakes ever higher. Unfortunately, end users’ expectations for service are growing as well, piling additional demands onto network operators and engineers who are already wrestling with network migration challenges.Yet despite the fact that the enterprise networking environment is rapidly changing, IT support teams are still using the same network performance metrics to monitor their networks and evaluate whether or not service delivery is up to par. The problem is that they’re using a one-dimensional tool to measure a subjective experience that tool was not designed to even understand, much less aid in troubleshooting.  It’s kind of like trying to tighten a screw with a hammer.To read this article in full, please click here

IDG Contributor Network: Are you seeing what I’m seeing?

Enterprises are investing in their networks at an accelerating rate. As legacy IT on-premises infrastructure gives way to hybrid cloud and virtualized environments, and an escalating data tsunami drives data center expansions, increasing investments of time and money are raising the stakes ever higher. Unfortunately, end users’ expectations for service are growing as well, piling additional demands onto network operators and engineers who are already wrestling with network migration challenges.Yet despite the fact that the enterprise networking environment is rapidly changing, IT support teams are still using the same network performance metrics to monitor their networks and evaluate whether or not service delivery is up to par. The problem is that they’re using a one-dimensional tool to measure a subjective experience that tool was not designed to even understand, much less aid in troubleshooting.  It’s kind of like trying to tighten a screw with a hammer.To read this article in full, please click here

Vapor IO secures new funding for major U.S. rollout

Vapor IO, the edge computing specialist that builds mini data centers for deployment at locations such as cell phone towers, has secured Series C financing, which the company says will help accelerate the deployment of its Kinetic Edge Platform as a national network for edge colocation.Vapor IO has been all about developing a model for a distributed network of edge colocation sites, with micro modular data centers in containers about the size of a shipping container. The company had been working with Crown Castle, the nation’s largest provider of shared wireless infrastructure, on an edge collaboration project under the name Project Volutus.Vapor IO has now acquired the assets of Project Volutus from Crown Castle and will offer it under the brand name The Kinetic Edge. It uses both wired and wireless connections to create a low-latency network of its colocation sites, allowing cloud providers, wireless carriers and web-scale companies to deliver cloud-based edge computing applications via its data centers.To read this article in full, please click here

Vapor IO secures new funding for major U.S. rollout

Vapor IO, the edge computing specialist that builds mini data centers for deployment at locations such as cell phone towers, has secured Series C financing, which the company says will help accelerate the deployment of its Kinetic Edge Platform as a national network for edge colocation.Vapor IO has been all about developing a model for a distributed network of edge colocation sites, with micro modular data centers in containers about the size of a shipping container. The company had been working with Crown Castle, the nation’s largest provider of shared wireless infrastructure, on an edge collaboration project under the name Project Volutus.Vapor IO has now acquired the assets of Project Volutus from Crown Castle and will offer it under the brand name The Kinetic Edge. It uses both wired and wireless connections to create a low-latency network of its colocation sites, allowing cloud providers, wireless carriers and web-scale companies to deliver cloud-based edge computing applications via its data centers.To read this article in full, please click here