Recent routing leaks remind us why monitoring Internet routing and performance is important and requires effective tools. Routing leaks are the ‘benign cousin’ of the malicious BGP route hijack. They happen accidentally, but the result is the same: traffic to affected prefixes is redirected, lost, or intercepted. And if they happen to you, your online business and brand suffers.
In this blog, we look at examples of a full-table peer leak, an origination leak, and a small peer leak and what happens to traffic when these incidents occur. As we will see, some events can go on for years, undetected and hence, unremediated, but extremely impactful never the less. As you read this blog, keep the following questions in mind. Would you know if the events described here were happening to you? Would you know how to identify the culprit if you did?
iTel/Peer1 routing leak
Starting on 10 October at 10:54 UTC, iTel (AS16696) leaked a full routing table (555,010 routes) to Peer 1 (AS13768). Normally, iTel exports 49 routes to Peer 1; however, over the course of several minutes, it leaked 436,776 routes from Hurricane Electric (AS6939) and 229,537 Continue reading
Welcome the OmniSwitch 6900-X72.
Savvius has launched a new monitoring appliance, Insight, that integrates with Splunk and can capture packets for forensic analysis.
The post Savvius Launches Low-Cost Monitoring, Packet Capture Appliance appeared first on Packet Pushers.
New Citrix white paper on how to maximize multitenancy and build robust cloud-based data centers. Read more here.
A recent impact report from 451 Networks calls the move to port Open Netvisor Linux OS onto Dell’s Open Networking switches “great” for customers. Find out why.
Looking at https://tools.ietf.org/html/rfc1323 there is a nice title: 'TCP Extensions for High Performance'. It's worth to take a look at date May 1992. Timestamps option may appear in any data or ACK segment, adding 12 bytes to the 20-byte TCP header.
Using TCP options, the sender places a timestamp in each data segment, and the receiver reflects these timestamps back in ACK segments. Then a single subtract gives the sender an accurate RTT measurement for every ACK segment.
To prove this let's dig into kernel source:
./include/net/tcp.h:#define TCPOLEN_TSTAMP_ALIGNED 12
./net/ipv4/tcp_output.c:static void tcp_connect_init(struct sock *sk)
...
tp->tcp_header_len = sizeof(struct tcphdr) +
(sysctl_tcp_timestamps ? TCPOLEN_TSTAMP_ALIGNED : 0);
The Datanauts and Howard Marks serve up a buffet of storage topics, including the pros and cons of all-flash and hybrid arrays, the ins and outs of cloud and object storage, and what's up with Virtual Volumes.
The post Datanauts 012: The Scintillating Storage Smorgasbord appeared first on Packet Pushers.
Amdocs tells Tier 1s: Get with the program and deploy vCPE.
A 15% growth outlook might have been a little much.
DT, Vodafone, Orange, and Verizon tell production tales of NFV.