Who won Super Bowl LVI? A look at Internet traffic during the big game

Who won Super Bowl LVI? A look at Internet traffic during the big game
“It's ridiculous for a country to get all worked up about a game—except the Super Bowl, of course. Now that's important.”
- Andy Rooney, American radio and television writer
Who won Super Bowl LVI? A look at Internet traffic during the big game

When the Super Bowl is on, there are more winners than just one of the teams playing, especially when we look at Internet trends. By now, everyone knows that the Los Angeles Rams won, but we also want to look at which Super Bowl advertisers were the biggest winners, and how traffic to food delivery services, social media and messaging apps, and sports and betting websites changed throughout the game.

We covered some of these questions during our Super Bowl live-tweeting on our Cloudflare Radar account. (Hint: follow us if you’re interested in Internet trends).

Cloudflare Radar uses a variety of sources to provide aggregate information about Internet traffic and attack trends. In this blog post, as we did last year, we use DNS name resolution data to estimate traffic to websites. We can’t see who visited the websites mentioned, or what anyone did on the websites, but DNS can give us an estimate of the interest generated by the ads or across a set of sites in Continue reading

Learn About the Threats Lurking in Your Linux-Based Multi-Cloud

78% of the most popular websites are powered by Linux, which means malware targeting Linux-based operating systems are attacking multi-cloud environments at an alarming rate. Threats such as ransomware, cryptomining components, and remote access tools (RATs) take advantage of weak authentication, vulnerabilities, and misconfigurations in container-based infrastructures. To support IT leaders and cybersecurity professionals in their transformation to top-tier ransomware and malware defense, VMware is proud to sponsor a 1-hour long live webcast on Exposing Threats Lurking in Your Linux-Based Multi-Cloud, on February 28th, at 2 pm ET, presented by SC Media. 

In this exclusive partnership with CyberRisk Alliance, our subject matter researchers Giovanni Vigna, Sr. Director of Threat Intelligence, VMware, and Brian Baskin, Technical Lead, Threat Analysis Unit, VMware, explore: 

  • Existing characterization techniques and how to safeguard against sophisticated malware 
  • Ransomware and cryptominer power players that target Linux systems following cross-pollination and evolution 
  • How to fight back against these threats with a combination of approaches, policies, and mechanisms 

The webinar is an extension of the recently released Exposing Linux-based Threats Lurking in Your Multi-Cloud threat report, which included in-depth research conducted by the VMware Threat Analysis Unit (TAU) on Continue reading

IBM brings cloud-app services to z/OS mainframes

IBM continues to evolve the services that will keep its z/OS mainframes at the heart of the growing enterprise cloud-application development.Big Blue has rolled out two new services—IBM Z and Cloud Modernization Stack 2022, and Wazi as-a-Service—that will let customers more easily develop and test mainframe applications as-a-service in a public cloud environment.How to build a hybrid-cloud strategy IBM Z and Cloud Modernization Stack 2022.1.1 offers industry-standard tools to modernize z/OS applications on a pay-per-use basis. For example, the service includes support for features including:To read this article in full, please click here

Network Break 369: Cisco SD-WAN Ramps Up Webex, Microsoft 365 Access; Pluribus Adds Virtual Packet Broker

Take a Network Break! This week we cover Cisco’s SD-WAN getting users to cloud services such as Webex and Microsoft 365 faster; as well as new capabilities in Pluribus’s Netvisor network OS including container visibility, a virtual packet broker, and flow tracking. Contamination at chip fabs affects flash memory production, plans are afoot for a... Read more »

Network Break 369: Cisco SD-WAN Ramps Up Webex, Microsoft 365 Access; Pluribus Adds Virtual Packet Broker

Take a Network Break! This week we cover Cisco’s SD-WAN getting users to cloud services such as Webex and Microsoft 365 faster; as well as new capabilities in Pluribus’s Netvisor network OS including container visibility, a virtual packet broker, and flow tracking. Contamination at chip fabs affects flash memory production, plans are afoot for a […]

The post Network Break 369: Cisco SD-WAN Ramps Up Webex, Microsoft 365 Access; Pluribus Adds Virtual Packet Broker appeared first on Packet Pushers.

UDP vs TCP for real-time streaming telemetry

This article compares UDP and TCP and their suitability for transporting real-time network telemetry. The results obtained demonstrate that poor throughput and high message latency in the face of packet loss makes TCP unsuitable for providing visibility during congestion events. We demonstrate that the use of UDP transport by the sFlow telemetry standard overcomes the limitations of TCP to deliver robust real-time visibility during extreme traffic events when visibility is most needed.
Summary of the AWS Service Event in the Northern Virginia (US-EAST-1) Region, "This congestion immediately impacted the availability of real-time monitoring data for our internal operations teams, which impaired their ability to find the source of congestion and resolve it." December 10th, 2021

The data in these charts was created using Mininet to simulate packet loss in a simple network. If you are interested in replicating these results, Multipass describes how to run Mininet on your laptop.

sudo mn --link tc,loss=5

For example, the above command simulates a simple network consisting of two hosts connected by a switch. A packet loss rate of 5% is configured for each link.

Simple Python scripts running on the simulated hosts were used to simulate transfer of network telemetry.

#! Continue reading

Ansible Automation Platform – A video tour

Many people are familiar with the community version of Ansible, the command line automation tool, but I wanted to elaborate on how our enterprise offering, Red Hat Ansible Automation Platform, and how it expands the possibilities of Ansible for our customers in Red Hat's most recent release.

Red Hat Ansible Automation Platform forges that open source innovation into a single, secure enterprise solution. We released our latest version Ansible Automation Platform 2.1 in December 2021, and there are a ton of new components, features and capabilities. So the technical marketing team put together a video tour of Ansible Automation Platform 2. It’s an 8 minute overview that we hope will provide automators with a useful guide to all of the new tools available to them, and how all the parts of Ansible Automation Platform fit together. 

 

If you’re looking to learn more about a specific component of the platform, you can jump right to it:

5 best practices for making smart-building LANs more secure

Power, they say, corrupts, and absolute power corrupts absolutely. While that was said about politics, it sure seems like it was tailor-made for smart buildings.Facility-control technology is exploding because the concept is useful and often saves money. Unfortunately, smart devices have also proven to be an on-ramp for major intrusions. Smart buildings are surely absolutely powerful in a way; are they absolutely corruptible? Maybe, if we’re not very careful.[Get regularly scheduled insights by signing up for Network World newsletters.] If corruption means overall bad-ness, then hacking a smart building surely qualifies. It could let intruders mess with lights, heating and air conditioning, and maybe other critical systems, too. We also know from news stories that a hacker could use a successful smart building intrusion to sneak into other business applications, potentially compromising them and  critical company information. It’s important to address these risks, and that means starting with how they arise.To read this article in full, please click here

5 best practices for making smart-building LANs more secure

Power, they say, corrupts, and absolute power corrupts absolutely. While that was said about politics, it sure seems like it was tailor-made for smart buildings.Facility-control technology is exploding because the concept is useful and often saves money. Unfortunately, smart devices have also proven to be an on-ramp for major intrusions. Smart buildings are surely absolutely powerful in a way; are they absolutely corruptible? Maybe, if we’re not very careful.[Get regularly scheduled insights by signing up for Network World newsletters.] If corruption means overall bad-ness, then hacking a smart building surely qualifies. It could let intruders mess with lights, heating and air conditioning, and maybe other critical systems, too. We also know from news stories that a hacker could use a successful smart building intrusion to sneak into other business applications, potentially compromising them and  critical company information. It’s important to address these risks, and that means starting with how they arise.To read this article in full, please click here

EIGRP Stub

EIGRP Stub – It is actually one of the EIGRP Scalability features but also it helps many other things in EIGRP. Also, in this post, we will share a topology that will be used to explain some design caveats with EIGRP design.

Before we explain the EIGRP Stub, let me explain some EIGRP convergence behaviors.

If you are looking for much more detail on EIGRP Design and Practical Labs, have a look at our EIGRP Training.

 

EIGRP Stub Orhan Ergun

 

When the EIGRP node loses the Connection to the prefixes. If there is no feasible successor installed in the EIGRP topology database.

The router is marked as active and the EIGRP query is sent to every neighbor.

In the above topology, Router D doesn’t know the 192.168.0.0/24 network. Router C sends a summary 192.168.0.0/16. That’s why it replies without asking Router E.

Router B has an alternate path, thus, Router B replies immediately.

Router J doesn’t have any EIGRP neighbors. It replies to the Query immediately.

Router G doesn’t know the 192.168.0.0/24 network. Router F filters the 192.168.0.0/24.

That’s why Router G replies without asking Router H.

So, as you can see, Continue reading

ABR vs ASBR in OSPF

ABR vs ASBR in OSPF. If you are new to Network Engineering and you are learning Dynamic Routing Protocol from scratch, you want to understand the differences between ABR vs ASBR and if there are similarities you would like to learn those too. In this post, we will learn both similarities and differences.

Let’s first understand both of these terms. ABR is purely an OSPF terminology, but ASBR is not. In fact, the detailed post about ASBR and the usage of ASBR in Different Places of Networking is explained in our What is ASBR Blog post.

ABR – Area Border Router is a device which is connecting two different OSPF Areas. One of those OSPF areas has to be Area 0, which is also known as Backbone Area.

OSPF ASBR

 

In the above topology, R3 is an ABR, connecting Area 0 and Area 1, R4 is an ABR as well, connecting Area 0 and Area 2.

R1 is referred to as Internal Backbone Roter as it doesn’t have any other connection than Area 0, Backbone Area.

In this topology, there is also an ASBR – Autonomous System Boundary Router. It is called ASBR because on that router external prefixes are injected Continue reading

Packet Forwarding 101: Header Lookups

Whenever someone asks me about LISP, I answer, “it’s a nice idea, but cache-based forwarding never worked well.” Oldtimers familiar with the spectacular failures of fast switching and various incarnations of flow switching usually need no further explanation. Unfortunately, that lore is quickly dying out, so let’s start with the fundamentals: how does packet forwarding work?

Packet forwarding used by bridges and routers (or Layer-2/3 switches if you believe in marketing terminology) is just a particular case of statistical multiplexing – a mechanism where many communication streams share the network resources by slicing the data into packets that are sent across the network. The packets are usually forwarded independently; every one of them must contain enough information to be propagated by each intermediate device it encounters on its way across the network.

Packet Forwarding 101: Header Lookups

Whenever someone asks me about LISP, I answer, “it’s a nice idea, but cache-based forwarding never worked well.” Oldtimers familiar with the spectacular failures of fast switching and various incarnations of flow switching usually need no further explanation. Unfortunately, that lore is quickly dying out, so let’s start with the fundamentals: how does packet forwarding work?

Packet forwarding used by bridges and routers (or Layer-2/3 switches if you believe in marketing terminology) is just a particular case of statistical multiplexing – a mechanism where many communication streams share the network resources by slicing the data into packets that are sent across the network. The packets are usually forwarded independently; every one of them must contain enough information to be propagated by each intermediate device it encounters on its way across the network.

What is MPLS used for?

What is MPLS used for?. A very common question among IT Engineers. What are the common use cases of MPLS – Multi-Protocol Label Switching? 

When it is first invented, 20+ years ago, it was considered one of the most scalable ways of doing VPNs. Faster packet processing could be achieved compared to IP destination-based routing because the IP address was 32 bits long but the Labels are just 20 bits long.

But, quickly after the first invention purpose, MPLS VPNs became the most dominant reason for Networks to deploy MPLS – Multiprotocol Label Switching technology.

It supported Ethernet over MPLS – EoMPLS, which is known as Point to Point Layer 2 MPLS VPN, and then soon after VPLS, which is Virtual Private Lan Service, vendors started to support.

VPLS is any to any, or also known as many to many technologies. It means you can connect. your multiple sites in Layer 2 and extend IP subnet by using VPLS technology. It works based on a full mesh of Pseudowires.

After Pseuodowire based Layer 2 VPNs, MPLS actual boom happened with MPLS Layer 3 VPNs.

With MPLS Layer 3 VPN, which is also known as Peer-to-Peer VPN, MPLS CE, Continue reading

2022 Top 10 Cyber Security Certifications

Before Starting Cyber Security

Cyber Security, sometimes you might find it as Cyber Operations, CyberOps, is the branch of Network Security that focuses on attacks, from the internet or from the inside of the network, gaps, bugs, look for them before they get used, fix them, and look again.

so the engineers continue to keep looking and fixing, as the internet is always evolving and generating more threats.

How to Study Cyber Security

generally, the domain of security (Information Security, Cyber Security) has nowadays hundreds of certifications and exams from many different vendors.

some are involved in the industry of making security devices/components, others are there just to teach us and make us the best engineers in the domain.

and mostly, cyber stuff comes from companies that focuses on creating the content/references more.

rather than information security exams and books that comes from vendors that produces platforms (Firewalls, IPS, IDS, NGFW, NGIPS, ESA, WSA, and many others).

so as a beginner, up to higher than an expert, many exams should be studied.

of course alongside with some other general/networking exams that you might already hold before studying the cyber security, and these exams will be mentioned below.

Top 10 Cyber Continue reading

CCNP ENCOR vs ENARSI

CCNP ENCOR vs ENARSI

is it even related?, or should I ask “comparable?”

yes it is both actually, and in this blog we will review both of the exams, talk about the agenda, which one should be taken before the other, and result of both of them.

Relation between CCNP ENCOR vs ENARSI

both the exam belongs to the certificate of Cisco CCNP Enterprise,  and taking each individually will grant you A Certificate!

so it is a win-win scenario, but still the question is which one should i take first, and that will be followed below

Difference between CCNP ENCOR vs ENARSI Agenda

ENCOR first, generally a Technology Core exam, focusing on 7 domains of knowledge:

  • Architecture
  • Virtualization (Device, Path, and Network Virtualization)
  • Infrastructure (Switching, Routing, and IP Service)
  • Assurance
  • Security
  • WLAN
  • Automation

and NO DEEP DIVE in any of these!!!

while for ENARSI:

  • Virtualization (Path Virtualization)
  • Infrastructure (Routing and IP Services)
  • Security

and that’s it!,

  • no Architecture
  • in Virtualization no Device nor Network Virtualization, and for the path Virtualization it is different than ENCOR.
  • as in the ENCOR you Continue reading

What is ASBR?

What is ASBR? Autonomous System Boundary Router. This seems easy, it is just used in OSPF, isn’t it?. In fact, that is wrong. You will learn in this post something, that is hopefully you will learn the first time. Let’s have a look at it.

ASBR is a node, that is connecting two or more networks. It can be a router or switch and it can be positioned at the Internet Edge. The router at the Internet Edge is referred to as IGW (Internet Gateway) Router and it can be an IGW Router.

It can be located between two different networks to provide MPLS service for example. Between two networks, service is referred to as Inter-AS MPLS VPNs and in RFC 2547, Section 10, 3 different Inter-AS MPLS VPN Options are explained. In all of them, the routers that are connecting two different Autonomous System is referred to as ASBR as well.

On those routers, usually, BGP runs in Inter-AS MPLS VPN service. OSPF is not mandatory.

Thus, saying it is used in OSPF would be a false claim. It can be used for many different services in the networks and ASBR can run any routing protocol, not just Continue reading