The Future of the Distributed Network

Back in December of 2014, I wrote a blog post about the complexities of the network as a distributed system. In it I pointed out that networks have traditionally been built as distributed systems, and that our entire management and knowledge base for networks is based on this. But, is this the best approach for current and future networking needs?

As humans we have our own ideas of how to best solve problems. While we are immensely creative, our solutions aren’t always the best (or will never be). We often look to nature as a guide for how to improve our manmade solutions. When we look at how large complex systems in nature have been created and evolved, perhaps we should look no further than ourselves. The human body is possibly one of the most complex systems we know. If we think of the brain as the centralized control system, it is easy to see that we are, in fact, highly centralized beings.

We live and function, however, in a social environment that has no clearly established central control system. We are organized by different permanent and temporary control systems. We create environments with centralized direction of work to be Continue reading

The Upload: Your tech news briefing for Monday, April 20

Is Nokia on the way back to the phone market?When it sold off its device business to Microsoft, Nokia seemed to be saying goodbye to the mobile phone market it once helped define. But now sources tell re/code that projects in development at the small Nokia Technologies division indicate it’s plotting to return when it’s no longer under contract restrictions that prevent it from directly selling or licensing phones under its brand.DOJ said to be leaning against Comcast-Time Warner dealAttorneys at the U.S. Department of Justice are looking unfavorably on the proposed merger of two U.S. cable and Internet giants, Bloomberg reported. Lawyers in the antitrust division may this week recommend blocking Comcast’s bid to buy Time Warner for $45.2 billion.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Monday, April 20

Is Nokia on the way back to the phone market?When it sold off its device business to Microsoft, Nokia seemed to be saying goodbye to the mobile phone market it once helped define. But now sources tell re/code that projects in development at the small Nokia Technologies division indicate it’s plotting to return when it’s no longer under contract restrictions that prevent it from directly selling or licensing phones under its brand.DOJ said to be leaning against Comcast-Time Warner dealAttorneys at the U.S. Department of Justice are looking unfavorably on the proposed merger of two U.S. cable and Internet giants, Bloomberg reported. Lawyers in the antitrust division may this week recommend blocking Comcast’s bid to buy Time Warner for $45.2 billion.To read this article in full or to leave a comment, please click here

Broadcom’s Trident II Gets a VXLAN Booster

Broadcom’s Trident II Gets a VXLAN Booster Broadcom is announcing a new version of its Trident II Ethernet switch chip family today, with one notable feature being improved performance for VXLAN and other tunneling protocols. The StrataXGS Trident-II+, a drop-in replacement for the Trident II, arrives as Broadcom tries to spread its Ethernet switch franchise into new areas. The recently announced StrataDNX Read more >

Mozilla to debut Firefox for iPhone ‘soon’

Mozilla will introduce Firefox for Apple's iPhone "soon," according to a company announcement of an open marketing position.As the senior mobile marketing manager, the candidate will "lead marketing for Firefox on both Android and iOS," the listing stated, adding that "a new Firefox for iOS application [will be] arriving soon." Mozilla An early rendition of Firefox on iOS features a "tab tray" that shows open sites in a vertical orientation. (Image: Mozilla.)To read this article in full or to leave a comment, please click here

Twitter accounts outside of the US now fall under EU data protection rules

Twitter revised its privacy policy over the weekend, changing where it handles the account information of users outside the U.S. and clarifying some points.As of Saturday, account information for Twitter users outside the U.S. is handled by Twitter International in Dublin, Ireland. This means that all account information will be subject to Irish privacy and data protection law, which is based on the European Union’s Data Protection Directive, Twitter said on its site.The accounts of U.S. users will still be handled by Twitter’s head office in San Francisco under U.S. law.Dublin is popular with U.S. tech companies, which often base their international and EU operations there. The country’s favorable corporation tax regime is often seen as a reason for IT companies to settle there—as is the small staff of its privacy regulator, which has a staff of just 29 to tackle domestic and international companies.To read this article in full or to leave a comment, please click here

New products of the week 04.20.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Acronis Backup ServicePricing: By cloud storage:·         5,000 GB -> $8,500·         1,000 GB -> $2,400·         500GB -> $1,300·         250GB -> $750Key features: Acronis Backup Service solves your business data protection challenges with a complete and easy-to-manage service that backs up any data from any source and recovers to any destination or system. More info.To read this article in full or to leave a comment, please click here

New products of the week 04.20.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Acronis Backup ServicePricing: By cloud storage:·         5,000 GB -> $8,500·         1,000 GB -> $2,400·         500GB -> $1,300·         250GB -> $750Key features: Acronis Backup Service solves your business data protection challenges with a complete and easy-to-manage service that backs up any data from any source and recovers to any destination or system. More info.To read this article in full or to leave a comment, please click here

Junos export policy not working?

During a project recently, I was promptly reminded about the construction of Junos route export (i.e. route redistribution) policies. Specifically when filtering prefixes during the export/redistribution. The logic goes something like this:

a) Create prefix-list of prefixes to export
b) Create policy which references the protocol and prefix list to export
c) Attach policy to protocol

An example is here:

policy-options {
    prefix-list CUST_A {
        192.0.2.1/32;
    }

	policy-statement REDISTRIBUTE_STATICS_CUST_A {
    	/* FROM PREFIX-LIST TEST TO METRIC TYPE 1 FOR CUST A */
    	term 1 {
        	from {
            	prefix-list CUST_A;
        	}
        	to protocol ospf2;
        	then {
            	external {
                	type 1;
            	}
            	accept;
        	}
    	}
	}
}

protocols {
	ospf {
		export REDISTRIBUTE_STATICS_CUST_A
		area 0.0.0.0 {
		interface x-x/x/x.x
		}
	}
}

With Junos export policies for routing, if you want to export more prefixes of the same type, adding an additional policy which also references the same protocol for the export will just not work. If you do the below, then you’re out of luck.

policy-options {
    prefix-list CUST_A {
        192.0.2.1/32;
    }

    prefix-list CUST_B {
        192.0.2.2/32;
    }

	policy-statement REDISTRIBUTE_STATICS_CUST_A {
    	/* FROM PREFIX-LIST TEST TO METRIC TYPE 1  Continue reading

HTIRW: Reality at the Mic (3)

Let’s take one look back over the IETF before we move on to the next piece of the infrastructure of the ‘net. Why does it take so long for a single document to get through the process, and result in a standard? There is, of course, the formal process, which requires the document to proposed, […]

Author information

Russ White

Principal Engineer at Ericsson

Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, LinkedIn, and his author page on Amazon.

The post HTIRW: Reality at the Mic (3) appeared first on Packet Pushers Podcast and was written by Russ White.

What is the real reason behind IP and MPLS Traffic Engineering ?

MPLS traffic engineering has many use cases and it helps to solve the problems in an MPLS enabled networks. These use cases are in general; QoS guarantee, End to End SLA , Fast reroute, Admission control and so on. All of them at the end is done for the COST SAVING. The real reason behind MPLS Traffic… Read More »

The post What is the real reason behind IP and MPLS Traffic Engineering ? appeared first on Network Design and Architecture.

Sony introduces new flagship Xperia Z4 smartphone

Sony has announced its new flagship smartphone, the Xperia Z4, that will ship in summer in the Japanese market.The device is clearly meant for global markets as well, since it supports a number of languages besides Japanese, including English, Chinese and some European languages.The move by Sony comes amid reports that the company was planning to scale down or even pull out of its smartphone business.The phone, which is powered by the Qualcomm Snapdragon 810 processor, has a display of 5.2 inches at 1920 X 1080 pixel resolution like its predecessor, the Xperia Z3, and will run Android 5.0 operating system. The Snapdragon 810 processor features 64-bit computing on eight CPU cores.To read this article in full or to leave a comment, please click here

Russian hackers uses Flash, Windows zero-day flaws

A fresh attack by a long-known hacking group suspected to be linked with Russia did little to mask its activity in an attack a week ago.The computer security firm FireEye wrote on Saturday that the group—called APT 28—attacked an “international government entity” on April 13, using two recently disclosed software flaws, one of which has not been patched.The attack sought to trick victims into clicking on a link that led to a website which attacked their computer. It first used a vulnerability in Adobe Systems’ Flash player, CVE-2015-3043, then used a still unpatched Microsoft vulnerability, CVE-2015-1701, to gain higher privileges on a computer.To read this article in full or to leave a comment, please click here

iPhone 7 rumor rollup: Killer camera on the way?

Apple’s confirmed-but-not-confirmed acquisition this past week of Israeli camera maker LinX has iPhone 7 watchers wishing, begging and hoping that the next great smartphone will incorporate advanced photo-taking technologies. Neither Apple nor LinX is confirming the buyout, estimated at $20 million by the Wall Street Journal, although Apple did give its standard response that it does sometimes acquire small companies and is not compelled to let the public know. Assuming this deal is real, Apple watchers have begun slobbering all over themselves in anticipation of improved camera features for the next iPhone. After all, the iPhone is one of the world’s most popular cameras already, and is Number 1 on photo-sharing site Flickr.To read this article in full or to leave a comment, please click here

Running an etcd-Backed Docker Swarm Cluster

In this post, I’ll build on a couple of previous posts and show you how to build your own Docker Swarm cluster that leverages etcd for cluster node discovery. This post builds on the information presented on how to run an etcd 2.0 cluster on Ubuntu as well as the information found in this post on running a Consul-backed Docker Swarm cluster.

To help you follow along, I’ve created a Vagrant environment that you can use to turn up the configuration described in this blog post. These files are found in the “docker-swarm-etcd” directory of my GitHub learning-tools repository. Feel free to use the files in this directory/repository to help with the learning process.

There are 3 major components to this configuration:

  1. A cluster of three Ubuntu 14.04 systems running etcd 2.0 (specifically, etcd 2.0.9, the last release as of this writing). This etcd cluster serves as a discovery back-end for Docker Swarm.
  2. A set of hosts running the Docker daemon (version 1.4.0 or higher, as required by Swarm). In this particular instance, I’m using CoreOS Linux (version 557.2.0 from the stable branch).
  3. A few containers running on the CoreOS hosts; Continue reading