Can Wave 2 handle the wireless tsunami heading toward us?

There seems to be a shift in our industry from wireless N to AC, as we have seen large leaps forward in bandwidth and client saturation handling. With more wireless options going in the workplace, widespread connectivity continues to rise and wireless requirements are becoming greater and greater.Now, with Wave 2 becoming more common, is AC really able to handle the tsunami-like wave of wireless internet requests to meet this growing demand?Also on Network World: REVIEW: Early Wave 2 Wi-Fi access points show promise There's only one way to find out. We need to step out of the comfort zone provided by past wireless technologies and expand the idea of what wireless is capable of providing to meet these demands.To read this article in full or to leave a comment, please click here

Can Wave 2 handle the wireless tsunami heading toward us?

There seems to be a shift in our industry from wireless N to AC, as we have seen large leaps forward in bandwidth and client saturation handling. With more wireless options going in the workplace, widespread connectivity continues to rise and wireless requirements are becoming greater and greater.Now, with Wave 2 becoming more common, is AC really able to handle the tsunami-like wave of wireless internet requests to meet this growing demand?Also on Network World: REVIEW: Early Wave 2 Wi-Fi access points show promise There's only one way to find out. We need to step out of the comfort zone provided by past wireless technologies and expand the idea of what wireless is capable of providing to meet these demands.To read this article in full or to leave a comment, please click here

IDG Contributor Network: ElectOS uses open source to restore trust in voting machines

When people doubt that an election will be conducted fairly, their trust in the outcome and their leaders naturally erodes. That’s the challenge posed by electronic voting machines. Technology holds the promise of letting people vote more easily and remotely. But, they’re also prone to hacking and manipulation. How can trust be restored in voting machines and election results?Voting demands the ultimate IoT machine (to borrow a line from BMW). The integrity of these machines with their combination of sensors, security and data analysis produce the results that impact every aspect of all our lives.To read this article in full or to leave a comment, please click here

How The Largest Tech Deal In History Might Affect Systems

Private equity firm Silver Lake Partners has an appetite for tech, and securing funding for Dell to take itself private and then go out and buy EMC and VMware is now going to take a backseat in terms of deal size – and in potential ripple effects in the datacenter – now that chip giant Broadcom is making an unsolicited bid, backed by Silver Lake, to take over often-times chip rival Qualcomm.

Should this deal pass shareholder and regulatory, it could finally create a chip giant that can counterbalance Intel in the datacenter – something that Broadcom and Qualcomm both

How The Largest Tech Deal In History Might Affect Systems was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: How a smart grid can empower a smart city

As smart cities continue to depart the realm of fiction and instead become a staple of life in the 21st century, eager entrepreneurs and aspirational scientist alike are increasingly turning to smart grids to power these cities of the future. Designing the infrastructure which enables smart cities is anything but easy, however, and many people today seem entirely unfamiliar with even the basic concept of a smart grid.So, what exactly is a smart grid, and how are they increasingly shaping how America’s smart cities are taking form? Anyone who hopes to understand the cities of tomorrow should keep these facts in mind as they picture tomorrow’s cityscapes in their minds.To read this article in full or to leave a comment, please click here

IPv6 deployment guide

IPv6 has been gaining traction since it was developed in the late 1990s, and enterprises that are implementing it now are considered to be among the early majority – meaning widespread adoption is well underway – so if you haven’t already begun, you need to start planning IPv6 deployment.To read this article in full or to leave a comment, please click here(Insider Story)

IPv6 deployment guide

IPv6 has been gaining traction since it was developed in the late 1990s, and enterprises that are implementing it now are considered to be among the early majority – meaning widespread adoption is well underway – so if you haven’t already begun, you need to start planning IPv6 deployment.To read this article in full or to leave a comment, please click here(Insider Story)

The Three Paths of Enterprise IT

Everyone knows that Service Providers and Enterprise networks diverged decades ago. More precisely, organizations that offer network connectivity as their core business usually (but not always) behave differently from organizations that use networking to support their core business.

Obviously, there are grey areas: from people claiming to be service providers who can’t get their act together, to departments (or whole organizations) who run enterprise networks that look a lot like traditional service provider networks because they’re effectively an internal service provider.

Read more ...

Introduction to RADIUS- Remote Authentication Dial-In User Service

Today I am going to talk about the major component of the network which provide you the authentication services whenever called from the user. The major component is called as RADIUS. This major component hosted on the server which is capable of giving the right reports of the users authentication. Let's talk about the RADIUS server or so called Remote Authentication Dial-In User Service

What is RADIUS- Remote Authentication Dial-In User Service?
RADIUS( Remote Authentication Dial-In User Service) is a server systems with which we can secures our networks against unauthorised access. So RADIUS clients run on supported routers and switches. Clients send authentication requests to a central RADIUS server, which contains all user authentication and network service access information. 

If i talk about RADIUS in other simpler words you can say that the system is a network protocol  by which we are defining rules and conventions for communication between network devices - for remote user authentication and accounting. 

What is the main purpose of RADIUS servers ?
Well the major purpose of the RADIUS server in the network is described as below.
  • Authenticates users or devices before allowing them access to a network 
  • Authorises those users or devices Continue reading

November 2017 IETF Journal Now Available Online

The November 2017 issue of the IETF Journal is now online at https://www.ietfjournal.org/journal-issues/november-2017/. With IETF 100 in Singapore starting this coming weekend, this is the perfect time to get caught up on what’s been happening in the world of Internet standards lately. (Starting next week, you can also learn more about the Internet Society’s work at IETF 100 via our series of Rough Guide blog posts.)

In this issue, you’ll learn about implementation work taking place in the Human Rights Protocol Considerations Research Group, the latest security updates to Network Time Protocol, new email-related Working Groups JMAP and EXTRA, as well as the important coding work that took place as part of the IETF Hackathon.

Our regular columns from the IETF, IAB, and IRTF chairs and coverage of the Birds-of-a-Feather meetings and presentations from the Applied Networking Research Prize winners wrap up the issue.

There will be print copies available at IETF in Singapore, the email version will hit subscribers’ inboxes in the coming days, and print subscribers will receive their issues shortly thereafter.

This issue marks the final hardcopy version of the IETF Journal. As we explain in “We’re Continue reading

LavaRand in Production: The Nitty-Gritty Technical Details

Introduction

LavaRand in Production: The Nitty-Gritty Technical Details

LavaRand in Production: The Nitty-Gritty Technical Details

Lava lamps in the Cloudflare lobby

Courtesy of @mahtin

As some of you may know, there's a wall of lava lamps in the lobby of our San Francisco office that we use for cryptography. In this post, we’re going to explore how that works in technical detail. This post assumes a technical background. For a higher-level discussion that requires no technical background, see Randomness 101: LavaRand in Production.

Background

As we’ve discussed in the past, cryptography relies on the ability to generate random numbers that are both unpredictable and kept secret from any adversary. In this post, we’re going to go into fairly deep technical detail, so there is some background that we’ll need to ensure that everybody is on the same page.

True Randomness vs Pseudorandomness

In cryptography, the term random means unpredictable. That is, a process for generating random bits is secure if an attacker is unable to predict the next bit with greater than 50% accuracy (in other words, no better than random chance).

We can obtain randomness that is unpredictable using one of two approaches. The first produces true randomness, while the second produces pseudorandomness.

True randomness is any information learned through the Continue reading

Randomness 101: LavaRand in Production

Introduction

Randomness 101: LavaRand in Production

Randomness 101: LavaRand in Production

Lava lamps in the Cloudflare lobby

Courtesy of @mahtin

As some of you may know, there's a wall of lava lamps in the lobby of our San Francisco office that we use for cryptography. In this post, we’re going to explore how that works. This post assumes no technical background. For a more in-depth look at the technical details, see LavaRand in Production: The Nitty-Gritty Technical Details.

Background

Randomness in Cryptography

As we’ve discussed in the past, cryptography relies on the ability to generate random numbers that are both unpredictable and kept secret from any adversary.

But “random” is a pretty tricky term; it’s used in many different fields to mean slightly different things. And like all of those fields, its use in cryptography is very precise. In some fields, a process is random simply if it has the right statistical properties. For example, the digits of pi are said to be random because all sequences of numbers appear with equal frequency (“15” appears as frequently as “38”, “426” appears as frequently as “297”, etc). But for cryptography, this isn’t enough - random numbers must be unpredictable.

To understand what unpredictable means, it helps to consider that all Continue reading

Rough Guide to IETF 100 – Slinging Standards in Singapore

It’s time for the third and final IETF meeting of 2017. Starting on Sunday, 12 November, the Internet Engineering Task Force will be in Singapore for IETF 100, where about 1000 engineers will discuss the latest issues in open internet standards and protocols. All this week, we’re providing our usual Internet Society Rough Guide to the IETF via a series of blog posts on topics of mutual interest:

  • Internet of Things (IoT)
  • Routing Infrastructure Security Resilience
  • IPv6
  • DNSSEC, DANE and DNS Security
  • Identity, Privacy, and Encryption

All these posts can be found on our blog and will be archived through our Rough Guide to IETF 100 overview page.

Here are some of the activities that the Internet Society is involved in and some of my personal highlights.

IETF Journal

Catch up on highlights from IETF 99 in Prague by reading the IETF Journal. You can read all the articles online at https://www.ietfjournal.org, or pick up a hardcopy in Singapore.

This issue marks the final hardcopy version; starting in 2018, we’ll be shifting our focus to longer-form articles online and via our Twitter and Facebook channels. In the meantime, this issue has articles on the Human Rights Continue reading

Kubernetes on OpenStack: The Technical Details

This is a liveblog of the OpenStack Summit session titled “Kubernetes on OpenStack: The Technical Details”. The speaker is Angus Lees from Bitnami. This is listed as an Advanced session, so I’m hoping we’ll get into some real depth in the session.

Lees starts out with a quick review of Bitnami, and briefly clarifies that this is not a talk about OpenStack on Kubernetes (i.e., using Kubernetes to host the OpenStack control plane); instead, this is about Kubernetes on OpenStack (OpenStack as IaaS, Kubernetes to do container orchestration on said IaaS).

Lees jumps quickly into the content, providing a “compare-and-contrast” of Kubernetes versus OpenStack. One of the key points is that Kubernetes is more application-focused, whereas OpenStack is more machine-focused. Kubernetes’ multi-tenancy story is shaky/immature, and the nature of containers means there is a larger attack surface (VMs provide a smaller attack surface than containers). Lees also points out that Kubernetes is implemented mostly in Golang (versus Python for OpenStack), although I’m not really sure why this matters (unless you are planning to contribute to one of these projects).

Lees next provides an overview of the Kubernetes architecture (Kubernetes master node containing API server talking to controller manager Continue reading

Issues with OpenStack That Are Not OpenStack Issues

This is a liveblog of OpenStack Summit session on Monday afternoon titled “Issues with OpenStack that are not OpenStack Issues”. The speaker for the session is Sven Michels. The premise of the session, as I understand it, is to discuss issues that arise during OpenStack deployments that aren’t actually issues with OpenStack (but instead may be issues with process or culture).

Michels starts with a brief overview of his background, then proceeds to position today’s talk as a follow-up (of sorts) to a presentation he did in Boston. At the Boston Summit, Michels discussed choosing an OpenStack distribution for your particular needs; in this talk, Michels will talk about some of the challenges around “DIY” (Do It Yourself) OpenStack—that is, OpenStack that is not based on some commercial distribution/bundle.

Michels discusses that there are typically two approaches to DIY OpenStack:

  • The “Donald” approach leverages whatever around, including older hardware.
  • The “Scrooge” approach is one in which money is available, which typically means newer hardware.

Each of these approaches has its own challenges. With older hardware, it’s possible you’ll run into older firmware that may not be supported by Linux, or hardware that no longer works as expected. With new hardware, Continue reading