GPUs would make terrific network monitors

The task of monitoring networks requires reading all the data packets as they cross the network, which “requires a lot of data parallelism,” Wenji said.

Wenji has built a prototype at Fermilab to demonstrate the feasibility of a GPU-based network monitor, using a Nvidia M2070 GPU and an off-the-shelf NIC (network interface card) to capture network traffic. The system could easily be expanded with additional GPUs, he said.

via Super Computing 13: GPUs would make terrific network monitors – Network World.

Targeted Internet Traffic Misdirection

In practical terms, this means that Man-In-the-Middle BGP route hijacking has now moved from a theoretical concern to something that happens fairly regularly, and the potential for traffic interception is very real. Everyone on the Internet — certainly the largest global carriers, certainly any bank or credit card processing company or government agency — should now be monitoring the global routing of their advertised IP prefixes.

This kind of attack should not happen. You cannot carry out this kind of hijacking without leaving permanent, visible footprints in global routing that point right back to the point of interception. We believe that people are still attempting this because they believe (correctly, in most cases) that nobody is looking.

via The New Threat: Targeted Internet Traffic Misdirection – Renesys.

Understanding Packet Delivery Performance In Dense Wireless Sensor Networks

I found this paper very useful.

ABSTRACT

Wireless sensor networks promise fine-grain monitoring  in a wide variety of environments. Many of these  environments (e.g., indoor environments or habitats) can be harsh for wireless communication. From a networking perspective, the most basic aspect of wireless communication is the packet delivery performance: the spatio-temporal characteristics of packet loss, and its  environmental dependence.

These factors will deeply impact the performance of data acquisition from these networks.

In this paper, we report on a systematic medium-scale (up to sixty nodes) measurement of packet delivery in three different environments: an indoor office building, a habitat with moderate foliage, and an open parking lot. Our  findings have interesting implications for the design and  evaluation of routing and medium-access protocols for  sensor networks.

via Understanding Packet Delivery Performance In Dense Wireless Sensor Networks

You Are a Rogue Device

The user’s guide for one of Aruba’s recent software products states: “The wireless network has a wealth of information about unassociated and associated devices.” That software includes “a location engine that calculates associated and unassociated device location every 30 seconds by default… The last 1,000 historical locations are stored for each MAC address.”

For now, Seattle’s mesh network is concentrated in the downtown area. But the SPD has indicated in PowerPoint presentations—also acquired by The Stranger—that it hopes to eventually have “citywide deployment” of the system that, again, has potential surveillance capabilities that the SPD declined to answer questions about. That could give a whole new meaning to the phrase “real-time situational awareness.”

via You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley – Seattle Features – The Stranger, Seattle’s Only Newspaper.

This is why you should always have wifi  disabled, in “airplane mode,” turned off when not in use.  Only turn on wifi for your device manually when you need to use a network.  Doing this also extends battery life because running the radio interface uses a lot of juice.  This network they built in Seattle would have great public benefit if it were open for all to use and there’s few engineering reasons why it can’t be.   Since emergencies are rare may as well utilize it and then kick people off indiscriminately when the network truly is needed.  I suspect however it’s not open for use by the rabble.  Another blurb from the article:

It’s reasonable to assume that locally gleaned information will be shared with other organizations, including federal ones. An SPD diagram of the mesh network, for example, shows its information heading to institutions large and small, including the King County Sheriff’s Office, the US Coast Guard, and our local fusion center.

Fusion centers, if you’re unfamiliar with the term, are information-sharing hubs, defined by the Department of Homeland Security as “focal points” for the “receipt, analysis, gathering, and sharing” of surveillance information.

At least if they’re going to spy  provide some value to the spied upon “user.”

High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

Patch antennas focus the radio beam within a specific area. (A couple of vendors, Ruckus Wireless and Xirrus, have developed their own built-in “smart” antennas that adjust and focus Wi-Fi signals on clients.) Depending on the beamwidth, the effect can be that of a floodlight or a spotlight, says Jeff Lime, Ventev’s vice president. Ventev’s newest TerraWave High-Density products focus the radio beam within narrower ranges than some competing products, and offer higher gain (in effect putting more oomph into the signal to drive it further), he says.

via High-gain patch antennas boost Wi-Fi capacity for Georgia Tech – Network World.

At Georgia Tech, each antenna focused the Wi-Fi signal from a specific overhead access point to cover a section of seats below it. Fewer users associate with each access point. The result is a kind of virtuous circle. “It gives more capacity per user, so more bandwidth, so a better user experience,” says Lime.

Ultrasonics for Local Area Communication

I intend to examine the prospects of ultrasonics for wireless, local area communication. In other words, I will try to decide whether or not it might be feasable to create a system for objects in the same room to communicate with one another by sharing information through ultrasonic sound. To do this, I will work through issues such as the spectrum, transducers, beam width, transmission distance, bandwidth, and noise.

This work builds on the work done by Vadim Gerasimov, in the Things That Talk project, that transmits data by sound in the audible range. His site is a good starting point to visit before working through this information.

via Ultrasonics for Local Area Communication.

The Cost of Connectivity 2013

The new data underscores the extent to which U.S. cities lag behind cities around the world, further emphasizing the need for policy reform. Rather than allowing American cities to fall behind, policymakers should reassess current policy approaches and implement strategies to increase competition, in turn fostering faster speeds and more affordable access.

via The Cost of Connectivity 2013 | NewAmerica.org.

Critical NETGEAR ReadyNAS Frontview security vulnerability

Frontview is the ReadyNAS web management interface; the vulnerability allows command injection and fails to validate or sanitize user input and can be triggered without authentication, Young said.

“The consequence is that an unauthenticated HTTP request can inject arbitrary Perl code to run on the server,” Young wrote on the Tripwire blog. “Naturally, this includes the ability to execute commands on the ReadyNAS embedded Linux in the context of the Apache web server.”

via Critical NETGEAR ReadyNAS Frontview security vulnerability | Threatpost | The First Stop For Security News.

BT To Trial Huawei G.FAST FTTdp Copper Broadband Technology

The new option takes the fibre to a “distribution point” closer to the customer’s permises, and makes use of the shorter distance, to apply G.FAST technology, a faster version of DSL which can offer speeds of 1Gbps over a distance of up to 250 metres using copper, and deliver faster speeds without the expense and disruption caused by FTTP deployment.

via BT To Trial Huawei G.FAST FTTdp Copper Broadband Technology.

Cerowrt

CeroWrt is a project built on the OpenWrt firmware to resolve the endemic problems of bufferbloat in home networking today, and to push forward the state of the art of edge networks and routers. Projects include proper IPv6 support, tighter integration with DNSSEC, and most importantly, reducing bufferbloat in both the wired and wireless components of the stack.

via Cerowrt – Overview – Bufferbloat.

From their wiki page on buffer bloat:

Bufferbloat is a huge drag on Internet performance created, ironically, by previous attempts to make it work better. The one-sentence summary is “Bloated buffers lead to network-crippling latency spikes.”

The bad news is that bufferbloat is everywhere, in more devices and programs than you can shake a stick at. The good news is, bufferbloat is relatively easy to fix. The even better news is that fixing it may solve a lot of the service problems now addressed by bandwidth caps and metering, making the Internet faster and less expensive for both consumers and providers.