Showing posts with label Network. Show all posts
Showing posts with label Network. Show all posts

Monday, November 27, 2017

Net Neutrality: Dodging Government Bullets & Disabling The Shooter

Abstract:

The Internet had been an open agreement between various peers, where one organization chooses to allow access from another peer organization if they both provide similar traffic patterns. Mutual organizational agreement with unfettered freedom in the United States had created the most aggressively growing and robust redundant network the world has ever known. Freedom in the United States had changed with the former Presidential appointees producing some 400 pages of regulation on behalf of political donors... and the search for freedom is happening again.

What is The Internet?

The world-wide community of volunteers created the Internet Engineering Task Force (IETF) to perform the care-taking aspects of The Internet. The Internet's stewards define The Internet as:
The Internet: A large, heterogeneous collection of interconnected
systems that can be used for communication of many different types
between any interested parties connected to it.  The term includes
both the "core Internet" (ISP networks) and "edge Internet"
(corporate and private networks, often connected via firewalls,
NAT boxes, application layer gateways and similar devices).  The
Internet is a truly global network, reaching into just about every
country in the world.
 They have declared their support
The IETF community wants the Internet to succeed because we
believe that the existence of the Internet, and its influence on
economics, communication, and education, will help us to build a
better human society.
  Ultimately, The Internet has been a self-regulating body. They define their scope as:
The Internet isn't value-neutral, and neither is the IETF.  We want
the Internet to be useful for communities that share our commitment
to openness and fairness.  We embrace technical concepts such as
decentralized control, edge-user empowerment and sharing of
resources, because those concepts resonate with the core values of
the IETF community.  These concepts have little to do with the
technology that's possible, and much to do with the technology that
we choose to create.
 The "concepts" embraced by The Internet's Stewards have experienced some difficulty, lately.

[1995-2010 Internet Usage Trend, courtesy tubularinsights]

Protecting The Internet For Fair Use and From Abuse

There is NEVER enough bandwidth on a telecommunication carrier's network to provide peak possible bandwidth for all customers at the same time. Customers are over-provisioned and share resources at different points along the entire way. This becomes especially noticeable during peak times, like breakfast, lunch, students coming home from school, adults getting home from work. Most people want to be able to check email, check voice mail, check social media accounts, do homework, submit papers from home, get the news, etc. Normally, these are interactive protocols, where user experience suffers the most during peak times.

The U.S. Government protected legitimate application providers, who compete with the carriers. (i.e. Vonage vs Madison River in 2005), while allowing carriers to protect normal interactive web surfing customers from a few heavy network bandwidth non-interactive [mostly illegal] bulk file tools (i.e. peer-to-peer transfers 2007.) Most people complain about traffic being sporadically blocked. Carriers maintain heuristics of the traffic volumes, times, and when they get the most trouble ticket calls in from their customers. Reducing trouble calls from a majority of paying customers is a high priority, with shared resources... especially when bulk transfers can resend data with little impact when people's usage of interactive usage diminishes. As time progresses, the percentage of interactive web traffic (and "other" traffic) is getting increasingly squeezed by Video.

[Indigenous peoples protecting from Viking Invaders, courtesy IFTN ]

Protecting The Internet from Attack

Recently, the Internet Engineering Task Force (IETF) has come out against intrusion into Privacy by Hacking by various Government and Criminal Organizations. The Internet's care-takers had released a clear public memo regarding privacy in 2014 - RFC7258:
Abstract

Pervasive monitoring is a technical attack that should be mitigated
in the design of IETF protocols, where possible.
 
Status of This Memo

This memo documents an Internet Best Current Practice.

This document is a product of the Internet Engineering Task Force
(IETF).  It represents the consensus of the IETF community.  It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG).
This 2014 decision placed the Internet's Care-Taker in direct competition with: Criminal Organizations, trying to steal identification information for nefarious purposes; Terrorist Organizations, trying to kill, maim, and destroy the lives of civilians; Government Organizations, trying to monitor terrorist activity in order to fulfill their role in protecting citizens.


[Ethernet Cable, courtesy The Register]

Government Attacks The Internet

Soon after The Internet Engineering Task Force suggests government was a hostile actor through "pervasive monitoring" (along with organized crime, terrorists and criminals, one might suppose), government regulators proved they were.

[Funny Video Entertainment, courtesy The Archive]

Net Neutrality: Pretext for Bondage Required

People do not normally give up their freedom, without a fight, and people do not normally successfully take away freedom without a pretext. The 2015 FCC rules for Government to constrain The Internet did not occur in a vacuum.

[Kowtow or bowing image, courtesy Wikipedia]

Net Neutrality: Failed Election Results & Campaign Donors 

January 2014, a federal appeals court struck down FCC’s first Internet Regulation attempt.

After an election year beating, November 2014, the former U.S. President demanded regulation of the Internet. The Crony Capitalists the former President kowtowed to, in order to reward them for their campaign dollars during a horrible Democratic election season, had their demands revealed by the New York Times:
Etsy, Kickstarter and Vimeo, among others, met with Megan J. Smith, Mr. Obama’s chief technology officer, and other senior officials to ask the president to lean on the F.C.C. to impose the stricter rules
When the big campaign donors come, one can be sure that politicians listen, and the poor political showing became the pretext for the government assault on The Internet. Retribution begins.

The former President used phrases appealing to voters selfishness and populism, with a modern re-branding of Red Communism ideology, declaring that "fast lanes" should not exist for the Internet. (The irony is people buy "fast lanes" to the internet, all the time, when they purchase bandwidth.)


[Bound in Chains image, courtesy Candid Kerry]

Net Neutrality: Binding the Freeman:

In 2015, the U.S. Government published their 400 page Regulation of the U.S. Internet. Some foreign technical journals have tried to put a "positive spin" on American Government putting shackles on previously unfettered Internet, but reciting the Government's suggestion that "400 pages" of regulation is a “light-touch” is preposterous.

Comparing the first (400 page) Internet Rule to ~100 years of "more than 700 codified rules and statutory provisions" placed on the former U.S. Telecommunications Monopoly is deceptive, at best. This is the beginning of a never-ending cycle of regulation, which will not stop, as demonstrated by decades of history and millions of pages of regulation.


[Formerly Free: Inexpensive Voice Service]

Net Neutrality: Impact the Freeman

As already discussed, The Internet Engineering Task Force caretakers wrote in their mission that the Internet is "used for communication of many different types". Not all communication is equal.

One type of traffic, Voice over IP communication for example, is HIGHLY dependent upon Quality of Service. This means that your voice will sound crackly may echo if the traffic is not prioritized to run faster than other traffic (like a web page loading, a pirated movie download, or movie streaming.) In the past, companies were able to pay for their traffic protocol to be prioritized for timely service (consuming no additional bandwidth), but that has now been made illegal.


[Man being whipped, courtesy Citizen Warrior]

Net Neutrality: VoIP - The First Whipping Boy

Reading through the 400 page Executive Branch Edict document shows one of the very first victims:
18. No Paid Prioritization.
Paid prioritization occurs when a broadband provider accepts payment (monetary or otherwise) to manage its network in a way that benefits particular content, applications, services, or devices. To protect against “fast lanes,” this Order adopts a rule that establishes that:
A person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not engage in paid prioritization. “Paid prioritization” refers to the management of a broadband provider’s network to directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, resource reservation, or other forms of preferential traffic management, either (a) in exchange for consideration (monetary or otherwise) from a third party, or (b) to benefit an affiliated entity.18
The underlining was for clarity. The IETF clearly understands that "communications of many different types" requires different treatment. The technical mechanisms of achieving these communications include what was just made "illegal", without Congress even writing a law! What does footnote 18 say?
18. Unlike the no-blocking and no-throttling rules, there is no “reasonable network management” exception to the paid prioritization rule because paid prioritization is inherently a business practice rather than a network management practice.
VoIP traffic was certainly in the cross-hairs, when this rule was made. Any protections designed by groups of "smart people" over man years had been made illegal, through the stroke of a pen. This appears to be a "Crony Capitalism" move, by the former Administration appointees, eliminating competition with those who are not one of the big three carrier types (i.e. wireless, wire-line, and cable.)

Any college drop-out who took Telecommunications 101 understands the need for different types of service, such as Voice over IP. There is a cost, to manually create the rules, manually check the rules, and provision such rules. Requesting reimbursement for manual processes of unique customer traffic with special timeliness needs, to implement IETF engineering solutions, is certainly reasonable. If it were not "reasonable" - the industry would not have invested thousands of man-hours solving the technical problem. The politicians were clearly unreasonable.


[Remote Surgical Robot, courtesy Wikipedia]

Net Neutrality: Medicine - Killing Lifesaving Innovation

Voice over IP is not the only type of service which could require prioritization. Prioritization is only one of the methodologies now illegal to use on The Internet, to guarantee Quality of Service, through minimizing latency and optimizing connectivity. Highly skilled surgeons performing remote control operations via robots to small hospitals in remote rural areas in a nation or third world countries require Quality of Service.
The first true and complete remote surgery was conducted on 7 September 2001 across the Atlantic Ocean, with French surgeon (Dr. Jacques Marescaux) in New York performing a cholecystectomy on a 68-year-old female patient 6,230 km away in Strasbourg, France. It was named Operation Lindbergh.[5] after Charles Lindbergh’s pioneering transatlantic flight from New York to Paris. France Telecom provided the redundant fiberoptic ATM lines to minimize latency and optimize connectivity, and Computer Motion provided a modified Zeus robotic system. After clinical evaluation of the complete solution in July 2001, the human operation was successfully completed on 9/7/2001.
This life saving technology, dating back ~15 years, has been conducted over The Internet, reducing costs.
To date Dr. Anvari, a laparoscopic surgeon in Hamilton, Canada, has conducted numerous remote surgeries on patients in North Bay, a city 400 kilometres from Hamilton.[citation needed] Even though he uses a VPN over a non-dedicated fiberoptic connection that shares bandwidth with regular telecommunications data, Dr. Anvari has not had any connection problems during his procedures.
Requesting to pay to ensure internet traffic for life-saving medical treatment get priority over people watching movies or pirating illegal content at home is now illegal, in the United States... unless one wants to purchase dedicated network bandwidth [a "fast lane"] bypassing The Internet, at a significant premium to the hospitals (and patients) involved.

The cynic might suggest that this was also political payback, negatively impacting the health care of people in rural areas, since these citizens often did not vote for the former Administration or his political party. (The faster the contrary citizens die off, the more quickly political power can be re-consolidated)


[Neo from The Matrix image courtesy DailyPop.in]

Net Neutrality: Fast Lanes Created - Dodging Government Bullets

About a year later in 2016, The Internet has quietly been changing. The Register sums up the issue:
"Today's Problem... Latency and jitter are very real problems for real-time applications like voice and video, and anything over the public internet will experience spikes and variations in both. Peering spats between ISPs can and do cause throughput problems when different locations are on different ISPs. In short, unmanaged public internet is not really a great choice when reliable connectivity..."

Since providers in the United States can no longer prioritize network traffic over the public internet, a redundant network is built along side the Internet connections, and a new case for routing is executed.
...an emerging technology called Dynamic Path Selection (DPS). DPS actually looks at what types of traffic are in use (for example, by looking at destination port numbers) and chooses different paths for the traffic based on that.
...latency-sensitive applications can be fired over managed WAN connections for some or all of the journey. These can ride the MPLS connectivity all the way to the destination, or merely take advantage of the lower latency in order to get to an internet breakout point that is geographically (or logically) closer to the destination.
A similar solution to the Executive Order items made illegal, a little more expensive, but the solution is no longer available for regular consumers and hidden behind the complexity of "cheap internet".


[Self Driving Car Fatality picture, courtesy USA Today]

Net Neutrality: Automobiles - Avoiding Road Deaths

In 2017, a new application appeared, commonly referred to as "self driving cars". Prioritizing real-time network traffic over The Internet, could offer fewer risks to the hundreds of millions of citizens who would be at-risk from a few network packets not reaching their destination in a timely fashion when dealing with road conditions (i.e. obstacles, sudden bad weather, road failures, crashes, etc.)

Of course, just as businesses have always done, if the Net Neutrality rule is not lifted, the Automobile Industry will just build parallel "fast lanes", pass the higher cost down to the wealthier consumer who is able to pay for the cost uplift for safety... or pass the traffic over The Internet [without prioritization] and Americans would suffer the [possibly fatal] consequences of dropped or late packets because of Internet video-on-demand programming, pirating, and porn.


[Russian Jaeger Mark-1 "Cherno Alpha" model from Pacific Rim courtesy GoodSmile]

Net Neutrality: Million Russian Robots to Defend

In 2017, when it became apparent that the previous Government Executive appointees made the only workable solutions [for United States telecommunications, medical, and businesses with other time-sensitive traffic], was to build parallel "fast lanes" everywhere, the call for canceling Net Neutrality became more aggressive.

The call was answered unusually - by millions of Robots, often Robots from Russia, to fight for & against American Citizen interests. The politicization by technically inept decision-makers, to make illegal many man-years of IETF efforts to solve technical problems plaguing common Americans, was bad enough. Calling in robots, to help facilitate even more technically ignorant, to stop the rollback of horrible policy which negatively impacted Americans most vulnerable [who could not afford to buy their own "fast lanes", like the wealthy & businesses could] was completely unreasonable.


[North American Internet Usage by Type as of March 2016, courtesy Statista]

The Changing Face of The Internet

As time goes on, usage on The Internet has changed. The downward trend with pirated copyright material continues declining, with low cost streaming options readily available. Bulk buffered video streaming now dominates the usage, with interactive buffered video streaming as a distant second. All other TCP/IP protocols are now considered marginal, by volume. Peak usage time is becoming evenings, as people passively stream to their televisions at home.

New and innovative protocols will be so small, by volume in comparison, that they will not even be quantifiable on a "Top Usage" graph. These protocols will be heavily impacted during peak congestion times by network traffic far protocols consuming far greater bandwidth. There is a true danger for innovation in the realm of low bandwidth but time sensitive applications, such as real-time IoT applications, which have the potential to greatly enhance the lives of American Citizens, not to mention the world.

Conclusion

December 15th in 2017 is the date for the Net Neutrality showdown. Beware of "Appeals to Selfishness" by those who proclaim a "Noble Cause". All should hope for a simple document, eliminating government coercion, and a return to the IETF to provide technological solutions to technology problems... a disabling of "the shooter."  It is time to end the experiment called "Net Neutrality", end Obama Era "Fast Lanes", add a half-decade's worth of previously over provisioned private "Fast Lane" bandwidth for normal every day Americans on The Internet, and innovate by re-legalizing the offering of Quality of Service guarantees on The Internet for lower bandwidth protocols requiring real-time responsiveness.

Monday, May 21, 2012

LogMatrix: NerveCenter Basics


Abstract:
NerveCenter was one of the first network management platforms in the industry, providing full Fault and Performance Management. Originally created by a company called NetLabs, ports of the software were created by AT&T and NCR under AT&T UNIX and NCR UNIX MP-RAS. Larry Wall, the creator of Perl joined NetLabs in 1991 - Perl is heavily integrated into NerveCenter. NerveCenter was known to scale well, back in 1996. NerveCenter was later purchased by Seagate, Veritas, Open Service Inc., and is now owned by LogMatrix.


New Release:
LogMatrix recently released NerveCenter 6.0. Features include: MIB Browser, Windows 2008R2 support, data enrichment.

Strengths:
NerveCenter provides a platform to model the health of systems using multi-state finite state machines. Most systems understand up/down (Durable Events under SMARTS / EMC Ionix / EMC ITOI) or monitoring single events (Momentary Events under SMARTS / EMC Ionix / EMC ITOI.) The user community can easily provision their own rules by visually building a finite state machine in a drag & drop environment - perhaps the simplest configuration available in any network management platform today.

Weaknesses:
 There used to be a bundled reporting tool. Graphs were able to be produced, using logged data, with the option to view and print reports. This feature was supported by NetLabs in addition to an AT&T (who ported a copy of NerveCenter to SVR4.)
NerveCenter came from an environment which provided a clean and fast X Windows Interface. This interface was exchanged, for a bulky Win32 interface (which cross-compiled into an even bulkier X Windows interface) for the benefit of fat Windows client.

Basics Video:
The following video clip describes a basic fundamental building blocks in NerveCenter.

Friday, May 11, 2012

HP Network Node Manager 9.10i - WhyUpgrade?


HP Network Node Manager 9.10i - WhyUpgrade?
Abstract:
Reasons to move from NNM 7 to NNM 9i: completely web based, scales even better, bundled virtualization technologies,  and smart plugins for enhanced capabilities. A company called Pepperweed created additional value-add technology referred to as "ePacks". The ePacks provide a fixed price skew which include best practice implementation, including: knowledge pack. The Pepperweed representative indicates that ePacks are designed to get you up and running in under a week

Video:
The following video introduces the Pepperweed CTO and allows him to introduce his product with NNM 9i to the general network management community.




[Pepperweed CTO, Alex Ryals, introduced NNMi platform and their product]

Data Sheets and Specification:
See the SNMP Resources Tab on the Network Management blog for more details.

Thursday, January 12, 2012

The Network: Consuming More Data

The Network: Consuming More Data
Abstract:
With the creation of new devices, usage will normally increase. The creation of the original Apple iPhone saw a rise in data usage previously unknown to telephone carriers. With faster devices hitting the networks, capacity continues to increase with no bounds.

Data Usage:
Data usage on wireless network carriers was measured. The iPhone 3G was used as a base unit of measurement.
iPhone 3G -> iPhone 4 = 1.6x increase
iPhone 3G -> iPad 2 = 2.3x increase
iPhone 3G -> iPhone 4S = 3x increase

Network Speed:
AT&T was generally shown as faster than Verizon.

Network Coverage:
Verizon was generally shown to have wider coverage than AT&T.

Next Generation 4G:
Verizon started rolling out 4G services in December 2010.
AT&T brought 4G to 15 cities by end of 2011.
AT&T expanded 4G to a total of 26 cities in Jan 2012.

Wednesday, October 12, 2011

RIM: Unbelievably Down, Unbelievably Long


RIM: Unbelievably Down, Unbelievably Long
Abstract:


Sun had a saying "The Network is The Computer". When a network is down, the computer is nearly useless. RIM is now experiencing "The Network is The BlackBerry". The BlackBerry is pretty much useless without the network. The impact to the market may be terrible.

A Short History:

Apple had made an attempt to build a "Personal Digital Assistant" market in 1987. The "Newton" seemed to target educators and students. Some other vendors released competing products, but none of them seem to be successful. It was a product "before it's time".

In 1996, U.S. Robotics created the "Palm Pilot", new digital assistant. This became successful, the technology moved to 3Com, Handspring, Palm.

Nokia started the merging of personal digital assistant software into the phone in the late 1990's, later on with some weak web browsing capability. Nokia cobbled together their phone with HP's software. The term "smart phone" was created. Ericson released a concept PDA and phone in 1997 with the eventual culmination of a touchscreen "smartphone" in 2000. The phone used the SymbianOS.


[2008-2009 Market Trend]

RIM seems to have virtually created the "smart phone" market in 1999. The merging of digital personal assistant and cell phone seemed to drive their success. Their primary target community was business and financial segments, who could afford an uplifted phone cost for the side benefit of becoming more efficient. The product offering was a success.


[2006-2009 Market Trend]

In the early 2000's, Palm released a merged their personal digital assistant with cell phone technology. The "smart phone" market had a new competitor. Eventually, the technology was purchased by HP, where it resides today.

[2009-2010 Market Trend]

Apple computer started designing the iPhone in 2005 and released it in January 2007. Their new "smart phone" (i.e. iPhone), which was speculated to be a "flop" since it did not come with a keyboard. The product targeted the "creative" and "youth" segments, merging functionality from their wildly popular iPod portable music & video playing devices. Also bundled was the first real web browser - until this point, internet HTTP experience was poor. The product offering was a success and placed pressure on RIM by slowly intruding into the business and financial sectors, while other vendors (like Palm and Microsoft) were getting devastated.


[2010-2011 Market Trend]

Google started a parallel track to Apple. They purchased Android, Inc in late 2005 and eventually released an operating system called "Android" in late 2007, after the wildly successful Apple iPhone introduction earlier that year. Phone manufacturers jumped on-board Android, trying to get a chunk of the "smart phone" market, without the heavy investment and innovation performed by companies like Palm, RIM, and Apple.


Cell phone giant, Nokia, had been losing market share. Microsoft had been losing marketshare in the mobile phone operating system market. These two shrinking titans agreed in April 2011 to combine forces - Nokia providing hardware with Microsoft's OS. It could stem the bleeding from both companies or the two shrinking titans might become one sinking titanics.

The Nightmare Scenario

RIM had "secret sauce" embedded into it's BlackBerry communicator - all communciation from their phones were carried over their network infrastructure, in addition to the telephone carrier's infrastructure. RIM's encrypted network allowed them to provide add-on services, as well as security to their business users.

This week, there has been a multi-day outage for BlackBerry users, across the globe. The problem was with a switch in THEIR INFRASTRUCTURE - which means it is not the fault of a telephone company. Only BlackBerry users are affected - while the rest of the SmartPhone market is unaffected.

Don't Lie To The Customer

RIM's "secret sauce" is appearing to be their "achilles heel". Without RIM and their network, the BlackBerry is pretty much useless.

This very week, there is BlackBerry training happening in my corporate headquarters, and when questions regarding the BlackBerry difficulties came up - the trainer said "there must be something wrong with your company's network."

The truth is not only out, but it appears the issue is isolated to THEIR customer network.

Bad Discusssions

When investors and analysts start to talk about situations like these, the language does not get any worse than this.
Jefferies analyst Peter Misek crushed RIM in a research note today. His memo to activists was that RIM's turnaround will take a long time...

Specifically, Misek said that RIM can't be broken up until its migration to QNX is complete in roughly six months. Meanwhile, a management change is difficult. Motorola Mobility CEO Sanjay Jha would be a candidate to lead RIM, but he's highly thought of at Google. Other executives at Apple and Microsoft are largely locked up from going to RIM. PC makers, smartphone rivals, and other takeover options look slim.

Add it up and RIM's only real option at the moment is to execute well and bolster momentum for the BlackBerry. The outages aren't helping that cause.

Surviving because there are no other options on the table when investors are thinking about chopping your comany up into little pieces it not a good place to be.


When Sharks Attack

During this very week, Apple had announced their long-anticipated iPhone 4S, a faster SmartPhone with build-in "Cloud Syncronization" - Apple will no longer require a user to have a computer in order to keep their phones backed up or syncronized with music. Apple's phone will no longer require Apple or a PC in order to get the full functionality of it. Apple's open-sourced MacOSX based iPhone was poised for serious growth, without the BlackBerry disaster.

Google is about to feed the market, with it's army of hardware manufacturers, with more open-sourced Android phones while sinking-faster-than-a-brick Nokia and Microsoft are trying to establish a new marketplace with Microsoft's closed-source operating system. Microsoft, with their business relationships, may actually float Nokia, with this unfortunate BlackBerry disaster.

This will surely be a feeding frenzy for the three major remaining phone operating system vendors.


Bad for the Free Market

The Free Market is all about choice - the loss of any major competitor in the market is bad for all of the consumers.

One might argue that RIM's "monopoly" of providing THE centralized infrastructure for all BlackBerries to traverse is the due penalty for their anti-capitalistic tendencies... and their customers deserve what they get for placing all their "eggs in one basket".

This author is not interested in seeing the diverse market competitors become centralized, since the evil is self-evident, it is dangerous for innovation. There must be freedom to innovate in the highly government regulated market of telecommunications.

Network Management

The probable decline of RIM is due to one massive network infrastructure error.

Had their network been better managed, their future decline may not be so sure.

It is possible that they will recover, but I would hate to be in that company today, and I would hate to be the team managing that network today.

The network is the rise and fall of a company - don't mis-manage your network.

Monday, August 29, 2011

Solaris Tab - Solaris 10 Neworking Update


Solaris Tab - Solaris 10 Networking Update

The following has been added to the Solaris Tab for Networking information.

Solaris Reference Material
2009-07 [PDF] OpenSolaris Crossbow: Virtual Wire in a Box
2010-05 [HTML] Solaris 10 Neworking - The Magic Revealed
2011-08 [HTML] Solaris 11 Express Network Tunables

Saturday, July 23, 2011

Technical Posts for 2H July

Technical Posts for 2H July
  • Apple unveils 'World's First Thunderbolt Display'

    The 27-inch Thunderbolt Display has an LED-backlit, 2560-by-1440 pixel. A single two-ended cable attaches to a Thunderbolt-equipped MacBook Pro or Air, one lead going to the notebook's MagSafe power port, and the other to its Thunderbolt port. The display has three powered USB 2.0 ports, plus one FireWire 800 and one Gigabit Ethernet port, all connected to its Thunderbolt host. The display also has its own Thunderbolt port so you can daisy-chain up to five more Thunderbolt devices.

  • Sandy Bridge's GPU makes room for Thunderbolt in new MacBook Air

    Apple's latest MacBook Air has already made its way to iFixit's labs, and it's currently in 12 pieces. Though its insides and outsides are barely different from the last-generation Air released last October, a couple internal changes were necessary to add support for the backlit keyboard, Bluetooth 4.0, and Thunderbolt.

  • Apple posts record quarter on sales of 20 million iPhones, 9 million iPads

    A large chunk of that revenue is due to massive increases in iPhone and iPad sales. Apple sold 20.34 million iPhones, a 142 percent increase over last year's third quarter, and up sequentially from last quarter's 18.65 million units. The iPhone accounted for $13.3 billion of quarterly revenue, or 46.6 percent.

  • T-Mobile's new data plans: limited 3G/4G, unlimited 2G

    T-Mobile will begin offering unlimited data plans starting July 24, the company announced today. T-Mobile says that "high-speed" (read: 3G and HPSA+) data will be capped at 2GB, 5GB, or 10GB a month depending on the plan, so only data as slow as 2G will flow freely.

  • Acer to deliver ARM notebook within nine days

    The battle of the 'books will really kick off next year, when, it has been forecast, some 7.6m ARM-based machines will ship, rising to a whopping 74m - 22.9 per cent of the laptop market - by 2015.
  • Shale gas frees Europe from addiction to Putin's Pipe

    The Baker Institute estimates that with shale as little as 13 per cent of Europe's gas imports will come from Russia by 2040, compared to 27 per cent today. The European Union gets 80 per cent of its gas imports from Russia via the Ukraine. Russian's state energy company, Gazprom, has used its gas exports as a political weapon: most recently turning off the tap to the Ukraine, which affected some European countries as collateral damage.
  • Shale Gas and U.S. National Security

    This study assesses the impact of U.S domestic shale gas development on energy security and U.S. national security. Prepared in conjunction with an energy study sponsored by the Baker Institute and supported by the U.S. Department of Energy. (Publication date: July 19, 2011 )
Network Management Connection

Newer trends in higher-end user workstations continue to show promise, where new network management centers will be able to provide their workforce portability for better 24x7 escalation performance, without the need for traditional docking stations, using Thunderbolt technology, which integrates data and video. This author remembers combined data/video being used was with SPARC Printers, where basically a video port was used to print to a printer.

The global use of energy efficient laptops and the creation of global energy are two topics which go hand-in-hand. New highly efficient form factors are being produced and consumed. Ultra-light laptops, smart phones, and tablets are becoming the most common form factors. The reduction in energy consumption as well as the combining of battery technology into common computing allows computing to work without "reliable power" at the same time where new energy sources are being tapped world-wide to provide stable priced reliable "base power" to highly available networking infrastructure, to allow modern society to function.

Information consumers require greater access to highly available networks in formerly unreliable places is a cornerstone to modern society. Reliable electrical power for servers & network infrastructure is as key to modern Western information based society as water and sanitation was in the former Western industrial society.

Monday, April 19, 2010

HP & 3Com - Perfect Together



HP & 3Com - Perfect Together

History:

3Com has been in the network business for decades while HP (and the many acquired companies under it's umbrella) has been in the computing business for decades. Huawei, a Chinese manufacturer, had invested in 3Com and regulators recently shot down an attempt to gain a more significant portion. Not long after, HP had purchased 3Com, with promising results from regulators.

Combined:

The Register wrote a summary of the recent moves by HP.

HP has announced a new HP Networking brand, under it which it will offer an edge-to-core set of sub-brands: the A Series; E Series; V Series; and S Series products. The ProCurve and 3Com brands will go away.

...

The ProCurve brand will be transitioned into the E Series. The 3Com brand will be transitioned into the A Series, except in China where the H3C brand has done very well and will be retained. There will be a single converged channel programme using the best-of-breed features of the existing 3Com and HP channel programs

...

Donatelli said the A Series is for large enterprises, the E series for mid-sized customers, and the V series for small and medium enterprises. The S Series is for customers with network security needs, and the TippingPoint intrusion-prevention products will be featured there.

Network Management Implications:

For those of you who have been unfortunate enough to have to deal with Huawei, 3Com, and H3C devices, you will remember that the comman line interfaces are close enough to be helpful but different enough to cause nasty automation problems.

Some devices can have page size adjusted when displaying infomation, some have the option to shut off paging, some devices can not even shut off the pager - making it very difficult to script multiple device automations. Sometimes, sleeps need to be placed in the scripts, to make sure device automations actually work!

Plan on a nightmare of new issues related to automations on these devices, as updates are released. Some hope HP will fix some of the old issues on old hardware, but other do not hold out much hope, considering fixing old software would not drive new hardware sales.

Monday, February 22, 2010

Network Management is About Uptime

Network Management is About Uptime

Thanks to Rob for sending me toward xkcd for this one!



Tuesday, December 8, 2009

Network Management: IBM "In The Cloud'


Network Management: IBM "InThe Cloud"

Abstract:
Server Management can normally be done with or more recently, without a piece of software deployed on the remotely managed server. The hardware and software performing the management is normally referred to as server management system while the software deployed on the managed servers are normally called "agents".
There are two two traditional options: (1) do it yourself by investing into the hardware, software, and human infrastructure or (2) outsource it with a good analyst interfacing back to the service provider and gague performance through metrics. IBM recently talked up an option based upon the second option.

Option 1: Do It Yourself
Much of the content of this site discusses what is required to "do it yourself". The nuts and bolts of hardware, software, performance, acceleration, software, etc. are all involved. There is a level of knowledge

Option 2: Outsource It
Traditionally, a service provider will provide monitoring by containing management hardware and software in a data center with secure connections to a customer's data center. Pricing is sometimes difficult to gauge when going into a request for proposal.

Virtualize It
Take the management station and stick it in the internet somewhere. Seems to be related to Option #2, since most outsourcers  already provide web interfaces into their management systems and reporting, but we have yet to see the specifics on it. Here is IBM's latest offer with Tivoli "in the cloud".

The web-based Tivoli Live supports monitoring of 25 to 500 nodes...

A "Touchless" option monitors devices and operating systems (Windows, Linux, AIX, Solaris, HP-UX) using an agent-less Tivoli Monitoring 6.2.1. That goes for $44 per month per node.


Meanwhile, An agent-based OS and application monitoring option uses IBM Tivoli 6.2.1 and IBM Composite Application Manager for Applications, costing $58 per month per node.


IBM charges $14 per month per service extra for historical trend analysis, plus performance and capability reporting.


The service also requires a rather steep one-time $6,500 setup fee per customer for "on-boarding costs." Service contracts are a minimum of 90 days and run from one to three years.
This looks like a fine example of the outsourcer outsourcing their infrastructure to provide a service to a customer.

Saturday, July 25, 2009

A New Tablet on the Horizon?

A New Tablet on the Horizon?

Mac Tablet Rumors


There has been grumbling about Apple Macintosh "tablet" form factors for years, although the leaks have been getting more substantial as of late.

One such published rumor included a quote, from an enthusiast, which was highly criticized:
"The iTouch Tablet is about to change society as we know it."

This comment really all depends upon the execution by Apple.

Background to Successful Appliance Launches

What made the iPod, iPod Touch and iPhone successful?

Apple figured out how to change the industries in three markets: portable music players, PDA's, and Cell Phones. As a side note, Apple failed to create the PDA market with the Newton.

If Apple applies the same consideration into the Tablet market, they could do well.

Moving onto the Tablet

Making a successful consumer oriented appliance technology in a tablet which is easily manageable could be the key. Without the need for OS patches & upgrades in conjunction with virus updates, many traditional market outlets could choose the device over a portable PC or laptop:
  • home theater entertainment
  • eBook reading appliances
  • libraries
  • conference centers
  • church pulpits
  • university professors
  • university students
  • audio mixing consoles
  • video special effects generators
  • lighting control panels
Anyone who has used cheaply manufactured devices (made with little attention to software & hardware details) tire of the experience quickly (due to the issues inherent with trash design & manufacturing.) A large number of good ideas go to the technical graveyard when consumers believe they are poorly implemented the first time around. An Apple "iTablet" with the engineering of a Apple MacBook Air might be accepted rapidly.


Anyone who has used industrial devices, which have physical controls, spend a pretty penny for them - moving the technology to touch screen controls could result in a far better user experience and longevity in the device usage without substantial maintenance in cleaning sliders/pots.

If Apple does a tablet right, they could really revolutionize many industries.

Network Management

What does all of this have to do with Network Management?
  • Network Management uses obtuse interfaces from a variety of vendors.
  • The features from multiple vendors use significantly different interfaces, some of which provide poor user interface capabilities, and all are generally very expensive to implement on a per-user basis.
  • People are becoming familiar with many "Web 2.0" features in every day life and these are not being backfilled into the Network Management arena by vendors.
  • People are demanding more mobility and many Network Management vendors are not delivering these features by investing in a time of low revenue in an global economic recession.
How could these issues be resolved in a tablet?
  • Remote Control capabilities (such as RDP, VNC, Telnet) are all available & widely distributed today in the iPod Touch and iPhone via Apple iTunes today, at a very reasonable cost (per user.)
  • Remote debugging capabilities (such as Ping, Traceroute) are available & widely distributed today in the iPhone Touch and iPhone via Apple iTunes today, at a very reasonable cost (per user.)
  • Corporations are already leveraging portables such as iPod Touch and iPhone via Microsoft Exchange support for corporate applications.
  • VPN capabilities are built into remote devices like the iPhone today for remote capabilities.
  • Using a standard interface, imposed by the iPod Touch or iPhone API's for multiple existing Web 2.0 applications, help users reduce barriers to entry through simplification, and would reduce training requirements for existing Network Management applications due to obtuse user interfaces by the vendors.
  • Using a standard interface, imposed by the iPod Touch or iPhone API's for multiple existing Web 2.0 applications, would allow greater cross-vendor integration, since the platform would become the integration location.
  • User interaction with Network Management maps and displays often use mouse clicks and drags, while API's in the iPod Touch and iPhone offer much more intuitive interactions such as dragging your finger or pinch.
  • API integration of Google Maps into iPod Touch or iPhone with Location would reduce the burden of development on Network Management user interfaces - providing sophisticated geographical maps to the application provider without needing to create & license bloat-ware.
  • API integration of Google Maps into iPod Touch or iPhone with Location would reduce the burden of use with Network Management user interfaces - providing a unified look-and-feel to what users expect in typical mapping applications while on foot or in their car
  • People are already familiar with standard notification technology with their home computers through Web 2.0 interfaces and the mobile equivalents (through devices such as the Apple iPod Touch and Apple iPhone) - so the building of new notification technology filters by vendors becomes irrelevant, allowing users to use interfaces comfortable to them, while being productive more quickly when starting to use the standard interfaces
  • The cost of a Apple "iTablet" hardware (or whatever it will be called) would be far less than the licensing per-user that is typically paid to a vendor on a per-seat charge, if standard interfaces could be developed to Web 2.0 environment.
  • Not knowing what managed vendor equipment looks like is something that could be a thing of the past when leveraging software suite built into the Apple iPhone or iPod Touch - with the ability to have integrated photo library that sync's with a central database, a library could be kept up-to-date on all remote devices very easily, since the software management is built in.
Closing Thoughts

Will Apple release a tablet?

This is a great unknown, but all being said, moving Network Management applications to devices like the Apple iPod Touch and iPhone is a no-brainer.

A larger form factor in an appliance (that is not an Apple laptop) could easily infiltrate the Network Management business, especially if it can demonstrate cost savings during dire economic times.

Friday, June 5, 2009

OpenSolaris 2009.06 - Network Virtualization

OpenSolaris 2009.06 - Network Virtualization

Network Virtualization Technology: Project Crossbow

Sun has been working at re-architecting the TCP/IP stack in Solaris for Virtualization for close to 3 years, making progress each year with new features. OpenSolaris 2009.06 exhibits some of the most recent enhancements
http://link.brightcove.com/services/player/bcpid1640183659?bctid=24579687001

Network infrastructure in Solaris has been re-written at the NIC, Driver, and Socket levels - all the way up the stack.

Network Virtualization has to do with dedicated resources and isolation of network resources. They are talking about multiple: Hardware Ring Buffers in a NIC, TCP/IP Stacks in a Kernel, Kernel Ring Buffers in a Stack.

http://www.opensolaris.com/use/ProjectCrossbow.pdf
"Crossbow is designed as a fully parallelized network stack structure. If you think of a physical network link as a road, then Crossbow allows dividing that road into multiple lanes. Each lane represents a flow of packets, and the flows are architected to be independent of each other — no common queues, no common threads, no common locks, no common counters."

Some of the more interesting results of this integration: create networks with no physical NIC cards; create switches in software; assign bandwidth to a virtual NIC card (vNIC); assign CPU resources to a vNIC; assign quality of service (QoS) attributes to a vNIC; throttling protocols on a vNIC; virtualize dumb NIC's via the kernel to look like smart NIC's; switch automatically between interrupt and polled modes.

The implications are staggering:

  • Heavy consumption of network resources by an application does not necessarily have to step-on other mission critical applications running in another virtual server
  • Priorities for latency sensitive protocols (ex. VoIP) can be specified for traffic based upon various packet policies, like Source IP, Destination IP, MAC address, Port, or Protocol
  • Security is enhanced since Solaris 10 containers no longer have to share IP stacks for the same physical NIC, but physical NIC's can now have multiple IP stacks for each container
  • Multiple physical ports can be aggregated into a single virtual port and then re-subdivided into multiple virtual NIC's so many applications or many virtual servers can experience load sharing and redundancy in a simplified way (once at the lowest layer instead of multiple times, for each virtual machine)
  • Older systems can be retained for D-R or H-A since their dumb NIC's would be virtualized in the kernel and the newer NIC's with newer equipment can be added into the application cluster for enhanced performance
  • Heavily used protocols will switch a stack into "polled mode" to remove the overhead of interrupts to the overall operating system, providing better overall system performance, as well as providing faster network throughput to competing operating systems
  • Enhanced performance at a lower system resource expense is achieved by tuning the vNIC's to more closely match the clients mean flow control can happen at the hardware or NIC card level (instead of forcing the flow control higher in the TCP stack)
  • Modeling of applications and their performance can be done completely on a laptop, all application tiers, including H-A, without ever leaving the laptop - allowing architects to test the system performance implications by making live configuration settings
  • Repelling DoS attacks at the NIC card - if there is a DoS attack against a virtual server's vNIC card, the other virtual servers do not necessarily have to be impacted on the main system due to isolation and resource management, and packets are dropped at the hardware layer instead of at the kernel or application, where high levels of interrupts are soaking up all available CPU capacity.
Usually, adding & leveraging features like QoS and Virtualization will decrease performance to an operating system, but with OpenSolaris, adding these feature with a substantial re-write of code, enabled a substantial increase in read & write throughput over Solaris as well as substantial increase in read throughput (with close to on-par write throughput) in comparison to Linux on the same hardware.
http://www.opensolaris.com/learn/features/networking/networkperformance/

This OpenSolaris technology is truly ground-breaking for the industry.

Usage of Network Virtualization in Network Managment

In the realm of Network Management, there is usually a mix of unreliable protocols (ICMP and UDP) with reliable protocols (TCP sockets.) The unreliable protocols are used to gather (ICMP, SNMP) or collect (Syslog) data from the edge devices while reliable protocols are used to aggregate that data within the management platform cluster.

While the UDP packets are sent/received, they can be dropped under times of high utilization (event storms, denial of service attacks, managed network outages, etc.) - so applying higher quality of service to these protocols becomes desirable to ensure the network management tools have the most accurate view of the state of the network.

Communication to internal system, which are aggregating that data, require this data for longer term usage (i.e. monthly reporting) and must be maintained (i.e. backups) - but these subsystems are no where near as important to maintaining an accurate state of the managed network when debugging an outage, which affects the bottom line of the company. These packets can be delayed a few microseconds to ensure the critical packets are being processed.

Enhanced performance in the overall TCP/IP stack also means more devices can be managed by the network management platform while maintaining the same hardware.

Implementation of
Network Virtualization in Network Management

The H-A platform can be loaded up with OpenSolaris 2009.06 and the LDOM holding the Network Management application can be live-migrated seamlessly in minutes.
http://blogs.sun.com/weber/entry/logical_domain_mobility_between_solaris

After running on the production H-A platform for a time, the production platform can be upgraded, and the LDOM migrated back in minutes.

Conclusion

Operating systems like OpenSolaris 2009.06 offer to the Network Management Architect new options in lengthening asset lifespan, increasing return-on-investment for hardware assets, ensuring better system performance of network management assets, ensuring the best possible network management team performance possible.