EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my …

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my …

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my […]

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Enterprises should be able to sell their excess internet capacity

Peer-to-peer exchanges of excess bandwidth could one day be commonplace, says a firm that is attempting to monetize redundant internet capacity. It wants to create a marketplace for selling internet data throughput that has been already bought by organizations, but which is often dormant during out-of-work hours — the bandwidth is customarily just lying around then, not being used.Dove Network wants to “do to the telecom industry what Airbnb did to the hotel industry,” co-founder Douglas Schwartz told me via email.The idea is that those with excess data capacity, such as a well-provisioned office or data center, which may not be using all of its throughput capacity all of the time — such as during the weekend — allocates that spare bandwidth to Dove’s network. Passing-by data-users, such as Internet of Things-based sensors or an individual going about business, would then grab the data it, he, or she needs; payment is then handled seamlessly through blockchain smart contracts.To read this article in full, please click here

Enterprises should be able to sell their excess internet capacity

Peer-to-peer exchanges of excess bandwidth could one day be commonplace, says a firm that is attempting to monetize redundant internet capacity. It wants to create a marketplace for selling internet data throughput that has been already bought by organizations, but which is often dormant during out-of-work hours — the bandwidth is customarily just lying around then, not being used.Dove Network wants to “do to the telecom industry what Airbnb did to the hotel industry,” co-founder Douglas Schwartz told me via email.The idea is that those with excess data capacity, such as a well-provisioned office or data center, which may not be using all of its throughput capacity all of the time — such as during the weekend — allocates that spare bandwidth to Dove’s network. Passing-by data-users, such as Internet of Things-based sensors or an individual going about business, would then grab the data it, he, or she needs; payment is then handled seamlessly through blockchain smart contracts.To read this article in full, please click here

Tech Companies Endorse MANRS Routing Security Actions

A coalition of more than 40 companies focused on protecting online users has endorsed a global community initiative, coordinated by the Internet Society, to improve the security of the Internet’s routing system.

The Cybersecurity Tech Accord, whose members include Facebook, Microsoft, Oracle, and Hewlett Packard Enterprise, will support the Mutually Agreed Norms for Routing Security (MANRS) initiative.

The goal of MANRS is to ensure a secure and resilient Internet by protecting its routing infrastructure. In 2017 alone, more than 14,000 routing outages or attacks – such as hijacking, leaks, or spoofing – resulted in stolen data, lost revenue, and reputational damage.

“The new endorsement is a good first step,” said Salam Yamout, Internet Society Lead for the MANRS initiative.

“It is not enough to talk about routing security; it is time for action,” Yamout added. “Because the Internet’s routing system was built on the principles of collaboration and shared responsibility, this endorsement from the Cybersecurity Tech Accord and our new partnership is a major step forward. It clearly reflects the will of industry to be proactive in implementing safe routing practices.”

MANRS focuses on four defensive actions that can reduce the most common routing threats:

Stuff The Internet Says On Scalability For August 10th, 2018

Hey, it's HighScalability time (out Thur-Fri, so we're going early):

 

London Maker Faire 1851—The Great Exhibition—100,000 objects, displayed along more than 10 miles, by over 15,000 contributors.

 

Do you like this sort of Stuff? Please lend me your support on Patreon. It would mean a great deal to me. And if you know anyone looking for a simple book that uses lots of pictures and lots of examples to explain the cloud, then please recommend my new book: Explain the Cloud Like I'm 10. They'll love you even more.

 

  • 90%: accuracy predicting gender from retinal image; $1 billion: Ebay sales per quarter from AI; $78 billion: global AI software market by 2025; $75m: penalty for botched SAP upgrade; 35 million: m^3 of mud dredged out of the Dutch waterways; 138 terabytes: memory per square inch; 500 million: Uber metrics per second; 22x: new faster JSON Sparser; 

  • Quotable Quotes:
    • @IanColdwater: The JIRA tickets will continue until morale improves
    • @david_perell: Three crazy stats from @mikedariano’s newsletter. 1. People watch more Minecraft hours than the NBA, NHL, NFL, and MLB combined.  2. Only 26 countries have more people than Continue reading

The rise of next-generation network packet brokers

Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called “tool sprawl” where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.Ideally, every tool would receive information from every network device, enabling it to have a complete view of what’s happening, who is accessing what, where they are coming in from, and when events occurred.To read this article in full, please click here

The rise of next-generation network packet brokers

Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called “tool sprawl” where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.Ideally, every tool would receive information from every network device, enabling it to have a complete view of what’s happening, who is accessing what, where they are coming in from, and when events occurred.To read this article in full, please click here

The rise of next-generation network packet brokers

Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called “tool sprawl” where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.Ideally, every tool would receive information from every network device, enabling it to have a complete view of what’s happening, who is accessing what, where they are coming in from, and when events occurred.To read this article in full, please click here

Optimising Caching on Pwned Passwords (with Workers)

Optimising Caching on Pwned Passwords (with Workers)

In February, Troy Hunt unveiled Pwned Passwords v2. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.

In supporting this project; I built a k-Anonymity model to add a layer of security to performed queries. This model allows for enhanced caching by mapping multiple leaked password hashes to a single hash prefix and additionally being performed in a deterministic HTTP-friendly way (which allows caching whereas other implementations of Private Set Intersection require a degree of randomness).

Since launch, PwnedPasswords, using this anonymity model and delivered by Cloudflare, has been implemented in a widespread way across a wide variety of platforms - from site like EVE Online and Kogan to tools like 1Password and Okta's PassProtect. The anonymity model is also used by Firefox Monitor when checking if an email is in a data breach.

Since it has been adopted, Troy has tweeted out about the high cache hit ratio; and people have been asking me about my "secret ways" of gaining such a high cache hit ratio. Over time I touched various pieces of Cloudflare's caching systems; in late 2016 Continue reading

Building Connectivity Across 27,000 Square Miles

In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership to work together to bridge the connectivity gap in indigenous communities in North America. One of the participants shared her story.

The Navajo Nation spans over 27,000 square miles across three states, making it the largest indigenous nation in the United States, in both geographic area and population. With such a sizable landmass, network building can face significant challenges.

“Infrastructure and coverage are tricky because of the way that the Navajo Nation is surrounded by highways and railways but none really cross through,” says Sylvia Jordan, Principal IT for the Navajo Nation Division of Community Development. “We are trying to bridge middle mile to last/first mile,” says Jordan, “while maintaining affordability for communities requesting access.”

The unique geographic features of the area can dictate connection quality in many areas on the Navajo Nation. Jordan explains that the ridge around Black Mesa, which is more than 8,000 feet high, is large enough that service can trickle down to some rural communities in the southern part of the Continue reading