Build your own network simulator using open-source DevOps tools

Open-source DevOps tools are used to deploy applications and services in datacenter server networks, but they may also enable researchers or students to simulate networks. In this post, we will survey popular open-source DevOps tools and provide links to information that shows how to use them to create network simulation scenarios.

Most open-source network simulators simplify the setup and configuration of virtual machines and the networking connections between virtual machines. DevOps tools such as OpenStack do the same things, although they expose more of the complexities of the virtualized infrastructure to the user.

If you are already using DevOps tools for other activities you may find it useful to also use them when you need to create a simulated network instead of learning to use a network simulator.

Comparing simulators to DevOps tools

Both open-source network simulators and a coordinated set of DevOps tools perform the same role: they orchestrate the setup, interconnection, and configuration of virtual nodes in a virtual network.

Open-source simulators are built to support small-scale simulation scenarios on one computer, although some can run in a distributed mode across multiple computers. DevOps tools are designed to work in datacenters composed of hundred or thousands of servers, Continue reading

iOS gets a first in Microsoft’s OneNote: New to-do list feature

Microsoft has rolled out a new OneNote feature to the iPhone first before any other platform, showing off the company’s interest in promoting cross-platform use of its note-taking system.OneNote users with Apple’s smartphones will now be able to convert notes with checklists in them into a special list mode that will organize items based on whether they’re checked off or not. A note formatted as a list also includes an “add item” button at the top that will create a new blank to-do.The feature is designed to make it easier for people to quickly interact with their checklists on touch devices without having to deftly pick out a single checkbox in a long column of little boxes. At any time, notes that have been converted to the new checklist format can be converted back without much fuss, and the notes will still be readable by other versions of OneNote as long checklists.To read this article in full or to leave a comment, please click here

Packets of Interest (2015-06-19)

It's been a while since I've done a POI so here we go. The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns https://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/ Kaspersky Lab found this new variant of the Duqu malware in their own network. They wrote a paper based on their analysis of this new malware. It fascinates me how sophisticated these software packages are and how much effort the threat actors put into them. Diffie-Hellman Key Exchange Diffie-Hellman (DH) is the world's first public key crypto system.

Google’s driverless car fleet to double as it prepares for new tests

Google’s autonomous car fleet is undergoing a major expansion. In the last month, the number of cars it is permitted to drive on public streets has more than doubled, and Google now accounts for more than half of the driverless cars that are legal in California.As of Wednesday, the company has been issued 48 permits for driverless vehicles, according to records at California’s Department of Motor Vehicles. About a month earlier, on May 15, Google held just 23 permits.The additional 25 permits are for a new fleet of prototype cars that are undergoing testing on private roads, the company said. The cars, tiny two-seaters, are designed for neighborhood driving and have a top speed of 25 miles per hour. They’ll be hitting public streets some time over the summer near Google’s headquarters in Mountain View.To read this article in full or to leave a comment, please click here

Samsung to plug security hole on Galaxy smartphones

Samsung will update the security software on its Galaxy smartphones to address a flaw that researchers warned could let attackers access people’s devices.Earlier in the week, researchers at NowSecure, a mobile security company, identified the flaw in SwiftKey, a keyboard application that comes preloaded on Galaxy smartphones. The flaw could be exploited even when SwiftKey was not used as the default keyboard, NowSecure said.On Thursday, Samsung said it would issue a fix that would roll out over the coming days to owners of the Galaxy S4, released in 2013, and later models. Those devices have Samsung’s Knox security platform installed by default and can receive over-the-air security policy updates. Users must have automatic updates activated in their phone’s settings, Samsung said on its website.To read this article in full or to leave a comment, please click here

Samsung to plug security hole on Galaxy smartphones

Samsung will update the security software on its Galaxy smartphones to address a flaw that researchers warned could let attackers access people’s devices.Earlier in the week, researchers at NowSecure, a mobile security company, identified the flaw in SwiftKey, a keyboard application that comes preloaded on Galaxy smartphones. The flaw could be exploited even when SwiftKey was not used as the default keyboard, NowSecure said.On Thursday, Samsung said it would issue a fix that would roll out over the coming days to owners of the Galaxy S4, released in 2013, and later models. Those devices have Samsung’s Knox security platform installed by default and can receive over-the-air security policy updates. Users must have automatic updates activated in their phone’s settings, Samsung said on its website.To read this article in full or to leave a comment, please click here

Chinese university opens Microsoft-backed U.S. outpost

China’s Tsinghua University has teamed up with the University of Washington and Microsoft to launch the Global Innovation Exchange (GIX)—a tech-focused graduate school that’s the first of its kind.The program, which was announced Thursday afternoon, will bring people from around the world to a new facility in Bellevue, Washington, near Seattle, to learn and work together. The launch marks the first time a Chinese research institution has opened a physical presence in the U.S., the backers said.Tsinghua is a prestigious, Beijing-based institution that counts current Chinese President Xi Jinping and his predecessor Hu Jintao as alumni. UW is a key player in the tech industry with alumni including U.S. Deputy Chief Technology Officer Ed Felten and Apple Vice President Bud Tribble.To read this article in full or to leave a comment, please click here

Oracle taps former HP exec Donatelli for key hardware role

Confirming rumors dating back to as early as March, Oracle announced on Thursday it has appointed former Hewlett-Packard executive David Donatelli as executive vice president for converged infrastructure.Donatelli will report directly to Oracle CEO Mark Hurd and will be responsible for infrastructure offerings including the company’s engineered systems, server, storage, networking and tape products. He will also help oversee Oracle hardware products designed for hybrid cloud environments.Donatelli joined HP in 2009 and served as executive vice president and general manager of HP’s Enterprise Group, with responsibility for the enterprise hardware business, including storage, server, networking and converged infrastructure products. He reportedly was considered a contender for HP’s CEO role before the appointment of Meg Whitman.To read this article in full or to leave a comment, please click here

Virtual Mobile Infrastructure: Secure the data and apps, in lieu of the device

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Corporate use of smartphones and tablets, both enterprise- and employee-owned (BYOD), has introduced significant risk and legal challenges for many organizations.

Other mobile security solutions such as MDM (mobile device management) and MAM (mobile app management) have attempted to address this problem by either locking down or creating “workspaces” on users’ personal devices. For BYOD, this approach has failed to adequately secure enterprise data, and created liability issues in terms of ownership of the device – since it is now BOTH a personal and enterprise (corporate)-owned device.

To read this article in full or to leave a comment, please click here

SAP Hana users warned of security vulnerability

Hard on the heels of the release of a newly updated version of SAP Hana, a security researcher has warned of a potentially serious vulnerability in the in-memory platform.“If an attacker can exploit this vulnerability, he can get access to all encrypted data stored in an SAP Hana database,” said Alexander Polyakov, CTO with ERPScan, which presented the details Thursday at the Black Hat Sessions XIII conference in the Netherlands.Polyakov’s firm specializes in testing enterprise resource planning (ERP) software from companies such as Oracle and SAP for security purposes. Last year, it had already found SAP Hana installations to be vulnerable to SQL injection attacks, he said.To read this article in full or to leave a comment, please click here

NSA uses OpenFlow for tracking… its network

SANTA CLARA -- Just as the industry is becoming more comfortable with SDNs, the NSA says it’s using them too.The embattled National Security Agency, which has been surreptitiously collecting phone records on all of us for many years as part of a secret surveillance operation, is implementing an OpenFlow SDN for its own internal operations. No mention was made whether an OpenFlow SDN also supports the agency’s surveillance operations – it’s doubtful the NSA would open up on the underpinnings of its spy network.But internally, the agency faces the same issues any large enterprise IT shop faces: do more, faster and at less cost with fewer people. And with a lot of oversight.To read this article in full or to leave a comment, please click here

Fearing net neutrality rules, Sprint stops throttling heavy data users

Sprint says it has stopped throttling its heaviest data users on congested networks, in what appears to be the first tangible benefit of the Federal Communications Commision’s new net neutrality rules.Sprint had added a throttling clause for its top 5 percent of data users last year, saying they might see slower speeds in congested areas. But the carrier has now ended this policy, The Wall Street Journal reports, saying it wanted to steer clear of the FCC’s Open Internet Order.To read this article in full or to leave a comment, please click here

Fearing net neutrality rules, Sprint stops throttling heavy data users

Sprint says it has stopped throttling its heaviest data users on congested networks, in what appears to be the first tangible benefit of the Federal Communications Commision’s new net neutrality rules.Sprint had added a throttling clause for its top 5 percent of data users last year, saying they might see slower speeds in congested areas. But the carrier has now ended this policy, The Wall Street Journal reports, saying it wanted to steer clear of the FCC’s Open Internet Order.To read this article in full or to leave a comment, please click here

Google’s data centers grow too fast for normal networks, so it builds its own

Google has been building its own software-defined data-center networks for 10 years because traditional gear can’t handle the scale of what are essentially warehouse-sized computers.The company hasn’t said much before about that homegrown infrastructure, but one of its networking chiefs provided some details on Wednesday at Open Network Summit and in a blog post.The current network design, which powers all of Google’s data centers, has a maximum capacity of 1.13 petabits per second. That’s more than 100 times as much as the first data-center network Google developed 10 years ago. The network is a hierarchical design with three tiers of switches, but they all use the same commodity chips. And it’s not controlled by standard protocols but by software that treats all the switches as one.To read this article in full or to leave a comment, please click here

Twitter’s Project Lightning will be a whole new way to track events

Twitter is planning some big changes to the way people follow events using its service, with a major new feature that will group together tweets, photos and videos related to whatever’s happening in the moment.The move could make Twitter more useful for tracking current events at a time when its user growth is sagging. It’s dabbled in the area of events before, but the new initiative, dubbed Project Lightning, should make it much easier to find content related to scheduled events like the Grammys or major news events such as an earthquake.There’ll be a new button on Twitter’s mobile app that takes users to a page listing various events happening at that moment. Selecting one will take the user to a page of tweets, videos and photos related to that event. The content will be curated by Twitter staff, and users will be able to swipe through full-screen photos and videos.To read this article in full or to leave a comment, please click here

Skype Translator now speaks German, French

The Skype Translator beta app now can help people say “guten tag” to their friends in Germany, thanks to an update it received on Thursday.Microsoft’s real-time translation app can now provide live voice and text translations for conversations involving people who speak German and French, in addition to English, Italian, Mandarin and Spanish.For example, someone who speaks English can call up another Skype Translator user who speaks German, and each will have their side of the conversation translated into the other’s native language in real time. The app will provide both a computerized voice translation and a running text transcript that allows users to read what’s being said.To read this article in full or to leave a comment, please click here

Cumulus Linux — The Foundation of OpenStack Automation

OpenStack is the de facto open source orchestration standard for modern cloud infrastructure. The foundational components stitch together compute, storage and, of course, networking. Linked together, these components are used for both public and private clouds all around the world. Cumulus Networks naturally fits into this ecosystem, and Cumulus Linux is the universal underlay or enabler for such deployments.

Solution Guide

Over the past two quarters, Cumulus Networks has shared solution guides for our 2.5.x releases. In this post we’re going to dive into how you can automate a proof-of-concept OpenStack deployment. For those who learn by watching, a recent video from the OpenStack Vancouver (May 2015) summit event may be helpful; the presentation summarizes all of the behind-the-scenes tasks described below.

Prerequisites

Our goal is to set up an end-to-end OpenStack deployment with the fewest interactive steps, making it as unattended as possible, and ideally taking no more than 20 minutes. The configuration scope includes all networking, server and storage components.

To facilitate a consistent architecture, we’ve imposed a few basic cabling and physical requirements. To make the PoC easy to implement, we assume no external Internet access is available — the entire solution is autonomous with all prerequisites present or cached.

Matt-Blog Correct Pic

For our first Continue reading

Google opens up on its SDN

At this week’s Open Network Summit, Google spoke for the first time publicly about its custom data center network. For nearly a decade, we’ve been hearing, reading and writing about how Google was building its own switches and writing its own software to handle the tremendous traffic load on its search engine and applications because vendor offerings were either not up to the task, too expensive, or both.This week we found out how they did it. In a keynote presentation at ONS, Amin Vahdat, Google Fellow and Technical Lead for Networking, described the company’s data center network architecture, capabilities and capacity for a rapt audience thirsting for information on software-defined networking implementations and experiences.To read this article in full or to leave a comment, please click here