Monday, December 30, 2024

What is the Purpose of Measurement Swiss Army-Knife (MSAK) By Panagiotis Vouzis


 At NetBeez, we’re pretty familiar with the different tools that help measure upload and download speeds, latency, jitter, and bandwidth. There are a lot of options out there. Previously, we talked about how speed tests from Ookla, NDT, Fast.com, Cloudflare, and more work and how they differ from each other. Our monitoring tool can analyze data from hundreds or thousands of end users by orchestrating and collecting measurements in an automated way. Why do we need another speed test when we already have so many options?

The answer is that FCC has laid out requirements of how end-user ISP bandwidth, latency, jitter, and packet loss should be measured to have a standard way of reporting and comparing values fro... https://netbeez.net/blog/msak



Wednesday, December 25, 2024

Don't Be Afraid - Paul W. Smith

 

We spend an average of 6 ½ hours every day on the World Wide Web, a portion of the Internet consisting of pages and documents connected by hyperlinks.  Over five billion people - two-thirds of the world’s population - works remotely, scrolls through information, and streams content using popular search engines and browsers to index and view web pages.  The Web we know is an enormous creature.  Still, it represents less than 10% of the total Internet – the tip of the iceberg.

 

The remainder of the Internet, the part below the surface which requires a special “Tor” browser, is often referred to as the “Dark Web.”  While the Dark Web is perfectly legal, it’s sketchy reputation comes from people like Ross Ulbricht and his darknet market website Silk Road.  For two years, Silk Road facilitated the sale of narcotics as well as other illegal products and services.  The enterprise was a huge success, earning Ross free room and board for life at the United States Penitentiary in Tucson.

 

The dark web itself predates Ross.  Around the turn of the millennium, Ian Clarke was wrapping up his student thesis project at the University of Edinburgh.  Ian’s goal was to create an innovative way of communicating and sharing files anonymously on the Internet. He released his “Freenet” in 2000, forming the basis of the Tor project which began 2 years later and launched its first browser in 2008.  Users could now peruse the Dark Web anonymously, their information routed through thousands of relay points that make browsing virtually impossible to trace.  The U.S. Department of Defense was an early adopter.

 

Ross Ulbricht and Silk Road may be offline, but the Dark Web is far from safe.  Those brave enough to give it a try are advised to update their security software often, browse only through a robust VPN, and use a non-standard email address.  There at still plenty of Silk Road wannabe’s, and cybersecurity threats – including large-scale data breaches – continue to provide employment opportunities for Government IT specialists.

 

Don’t be afraid.  Just stay off the Dark Web and everything will be fine, right?  The Dark Web may be the devil we know, but we still face less obvious threats even without Tor.  While many may seem comparatively benign, they range from annoying to expensive.  This latter group is loosely characterized under the heading “dark patterns.”

 

The average Internet user has little or no experience with the Dark Web, yet all of us who browse conventionally have been exposed to dark patterns.  Dark patterns are tricks web designers use to get us to do what they want.  If you’ve ever signed up, subscribed, made a purchase, or changed your mind and tried to cancel, you’ve fallen under the spell of a dark pattern. 

 

All of this has not escaped the watchful screens of those busy Government IT specialists.  The General Data Protection Regulation is a European set of guidelines (in the US there is the CCPA, or California Consumer Privacy Act) that addresses some of the issues.  In a bid to thwart those tricky web designers, Article 7 of the GDPR simply states – “It shall be as easy to withdraw as to give consent.” In case you didn’t read the terms until after you hit “Enter”, there may still be hope.

 

I’ve been exploring this very issue myself lately.  I confess that I typically receive more than 300 emails daily. The recent deluge of political ads finally prompted me to quit procrastinating and start cleaning up my inbox.  About a dozen of those emails are of some value to me.  The challenge is to identify and rid my system of the rest.

 

To comply with the GDPR, a newsletter or other regular mailing must have an “unsubscribe” or similar live-link clearly identified at the bottom of the page, making it “as easy to withdraw as to give consent.”  Phrases like “unsubscribe”, “cancel”, or “change email preferences” are usually buried in a long paragraph in barely readable text at the bottom of a long email.  Once you locate and click on one, it often requires you to enter your email address (!), confirm you want to be removed, review all your mailing preferences, or some combination of the above.  UX (User Experience) researcher Harry Brignull has dubbed this common pattern a “Roach Motel” – easy to get into and hard to get out of. 

 

Harry has gone so far as to categorize the various different types of dark patterns,  and has even created a Hall of Shame with numerous examples.  Have you ever noticed a speck of dust on your screen while browsing?  In one dark scenario, web designers will “dirty up” your touchscreen so that when you try to brush it off with your finger, you are unwillingly selecting an ad.  Sticking to major web players – e.g. Google, Amazon or Tumblr – will not protect you from darkness.  If you’ve tried closing your account on Amazon, for example, you know just how hard it can be.  Submitting complaints will shed some light on the ethical companies, while the others will undoubtedly become more devious

 

Don’t be afraid.  Browsing the Web is like doing the laundry – it all starts with separating the light from the dark.


Monday, December 23, 2024

Using the LinkRunner AT 4000 for Surveillance Video Camera Installation


 I’m a big believer when it comes to hand held diagnostic tools, in that they should have several key features that can help you identify, validate, and report statistics to you.  Some common tools a network engineer has in their toolbox is a network cable tester, primarily used for testing network cable termination.  These tools are great when you’re trying to perform a quick check to see if a network cable is terminated properly.  And that right there is the issue-- it’s a quick check and not a complete comprehensive network cable test, validation, and reporting tool. 

 

Nowadays with so many devices running off of PoE, Integrated Layer-3 switch/firewall, multi-gig network interfaces, and not to mention a lack of an updated network diagram, it’s really hard to know how your installation and network devices will perform.

 


ree

Enter NetAlly LinkRunner AT 4000 (LRAT-4000), a hand-held advanced network discovery and cable testing tool for multi-gigabit and fiber networks.  With a touch of a button, the LRAT-4000 will immediately and comprehensively perform a network discovery of all your devices, across multiple VLANS and subnets, with a path analysis.  It tests and verifies network cable and termination, coupled with advanced PoE testing up to 90W with TruePower loading, it displays device IP settings, DHCP, DNS with response time statistics, verifies link speed and duplex settings, performance testing with iPerf, packet capture at line-rate and so much more.

 

What I’m trying to tell you here is that the LRAT-4000 removes all of the guesswork of a basic cable tester/wire mapper and puts you in a position as a network admin to confidently know how your devices will perform without second guessing a single thing.

 

In this first video installment with the LRAT-4000, we perform a custom installation of a surveillance video camera system for a business site.  We begin with a network discovery of the site, followed by path analysis, test network cables, PoE load test, validate VLAN, IP, DNS, DHCP response times, performance test, packet capture, and reporting.  Follow along with me and watch how the LRAT-4000 makes this custom installation project a breeze.



Monday, December 16, 2024

Switch and Router Configuration Validation with Wireshark

 


I get involved in a lot of network migration or installation projects.

In some cases, I am not responsible for configuring the equipment, nor do I have access.

Regardless who configured the equipment, I always take a sample trace before I do anything to confirm how the device is configured. For example:

-          Is DHCP configured correctly

-          same point for DHCP forwarders or ip helper addresses

-          am I on the correct vlan

-          can I access networks that are allowed?  Or blocked

-          is DNS working properly

I’m sure you get the idea

In this video I test to ensure that the vlan I’m connected to is behaving as expected as well as the router/DHCP server.  Its literally a 2 min video, the point being these tasks do not take a long time.



Popular post