Tuesday, December 31, 2013

Telcos boost mobile networks for Marina Bay New Year's Eve celebrations

Published on Dec 31, 2013
1:58 PM



Oh gosh, you mean they can actually boost networks?
Why don't do mobile operators do it all the time!

     
     
    • Avatar

      Should do right sizing instead of over-sizing (this is the beauty of precise engineering) - so that price plan will be reasonable and not costly.

      Backend infrastructure with the advent of Ethernet – for Telcos which is called MetroEthernet – have no issue of boosting their bandwidth. From 10Mbps to 100Mbps to 1Gigabit to 10Gigabit – now with 40Gbps even to 100Gbps
      in the pipeline, the Ethernet technology bandwidth keep increasing exponentially.
      Even if one pipe of such high bandwidth is deem not sufficient, bandwidth can be aggregated by combining 2 or more port-channels and bundle into 1 thick pipe such as bundle 2 GE links from 1 GE to 2 GE bandwidth):-
      Interface port-channel 1
      Description etherchannel port 14
      Switchport mode trunk
      Switchport trunk encapsulation dot1q
      Switchport trunk allowed vlan 1,2,3,1002-1005
      Interface port-channel 2
      Description etherchannel port 15
      Switchport mode trunk
      Switchport trunk encapsulation dot1q
      Switchport trunk allowed vlan 1,2,3,1002-1005
      Vtp mode transparent
      Vlan2
      Name Vlan2-Etherchannel
      Mtu 1500
      Vlan3
      Name vlan3-etherchannel
      Mtu 1500
      Interface ge1/14
      Channel-group 1 mode active
      Switchport mode trunk
      Switchport trunk encapsulation dot1q
      Switchport trunk allowed vlan 1,2,3,1002-1005
      Interface ge1/15
      Channel-group 2 mode active
      Switchport mode trunk
      Switchport trunk encapsulation dot1q
      Switchport trunk allowed vlan 1,2,3,1002-1005
      The issue is the access point bandwidth – which can burst up – if there are too many human traffic appear at one place – that will cause congestion to the nearest access point base-station.
      For eg. If 1 base-station can handle concurrent 500 connection from 500 human mobile access, a surge of 1000 human at one location by connecting to the same access point base-station – will overload the base-station and cause congestion.
      If QoS (Quality of Service) are configured in the ingress port
      at the backend with rate-limit to discard congested packet, then many connections will be discarded. For eg.:-
      Rate-limit input qos-group 1 80000 1510 80000 conform-action transmit exceed-action drop
      Mobile base-station will help the surge of mobile access to be connected to it without overloading the standing base-station – only for this special event.
      After the event, the traffic load will drop back to normal and the mobile base-station will no longer be required.
      More practise make perfect – otherwise become rusty ………………


      does boost = uncap bandwidth?

        • Avatar

          Bandwidth is not unlimited. There is always a cap
          to bandwidth.
          For eg. at the backend, bandwidth can be throttle
          based on monitored average bandwidth and spike bandwidth - so that spare bandwidth can be virtually provisioned for other used - this will not result in
          wastage.
          For eg. 1 GE is the maximum bandwidth. But if only
          5Mbps is used for the mobile phone, then the
          bandwidth will be throttle as below for used by mobile phone. :-
          access-list 1 permit 10.10.10.0
          access-list 2 permit 20.20.20.0
          traffic-shape group 1 5000000
          traffic-shape group 2 15000000
          The rest of the bandwidth can be virtually provision
          for other used.
          Virtual provision can be as follow :-
          ip vrf VRF-mobilephone
          rd 100:1
          ip vrf VRF-Internet
          rd 100:2
          int ge0/1.10
          description provision 5Mbps for mobilephone
          ip encapsulation dot1q 10
          ip vrf forwarding VRF-mobilephone
          ip address 10.10.10.10 255.255.255.0
          traffic-shape group 1 5000000
          int ge0/1.20
          description provision 15Mbps for Internet, and the
          rest of bandwidth reserved
          ip encapsulation dot1q 20
          ip vrf forwarding VRF-Internet
          ip address 20.20.20.20 255.255.255.0
          traffic-shape group 2 15000000
          However, if more bandwidth are required more than 1GE eg. 1.5GE, free GE ports can be provisioned by channelising eg. the free GE port to aggregate
          ports to together to thicken the pipe by
          Etherchannel or by Link Aggregation 802.1ad for
          layer 2 and load-balancing such as glbp for ingress
          port and bgp for egress port for layer 3.
          At the front end, if additional bandwidth are required, additional base-station such as the mobile
          base-station - can be used to the join wireless
          network to increase the connection caps.

      It's official: Pope has not abolished sin, says Vatican


      Published on Dec 31, 2013
      7:31 PM


      By declaring "abolishing sin" - means people will act with impunity without regards to karma - and people will sin badly.
      With human body living in mundane world, one should never "abolish sin" - means declaring - whatever one do, one will not elicit any karma.
      This only happen in Nirvana & PariNirvana - where 3 evil roots of No-Self, Greed and Ignorance of Universal Law are effectively eradicated - not even suppressed.
      With Human Body (which is a pile of garbage) in Mundane World - karma continue to operate in tandem with Universal Law.
      Even Attained Arahats with Human Body - will still succumb to manifestation of karma in mundane world.

      Cracks appear in Spanish ruling party over abortion

      Published on Dec 31, 2013
      6:19 PM


      babe 
      Pregnancy involve human lives.
      Abortion should not be taken lightly.

      China officials set corpse ablaze in cremation row

      Published on Dec 31, 2013
      4:04 PM

       

      When a person passed away - 尘归尘,土归土。The soul is already reborn in another realm.
      The skeleton or ashes is just a remembrance of our ancestors as part of our filial piety.

      Monday, December 30, 2013

      China says over 3 million hectares of land too polluted to farm

      Published on Dec 30, 2013
      2:47 PM



      It is important that big Country with large growing population must attempt to be self-sufficient in food even though there is aspiration to improve the living standard of the population.
      Fast industrialisation is good but food crops that are produced locally must not be depleted and instead rely more and more on import of food crops - that will grossly upset the supply of World food chain.
      Environmental damage can be reversed. With depletion in land space that are used for agriculture, with more land space used for industrialisation, high-tech production of high yield food crops using smaller but vertical land area will become increasingly important.
      Also by investing in high tech farming method, less farmers (many have moved to cities for work) will be required as high tech machinery can produced more crops per farmer.

      Also environment touch on every aspect of human life, that is made up of :-
      (1) Air quality - affect the air people breathe
      (2) Soil quality - will come into contact with people's skin - causing skin problem.
      (3) Water source - will affect drinking water to keep people alive.
      All these in turn will impact whether food crops can grow, whether greenery like trees, plants, shrubs, grasses can survive; whether worms, good bacteria for soil, insects etc can live to help the soil fertile to ensure food crops and greenery can flourish.
      When nature can grow naturally, human can survive and grow well.
      When nature cannot survive, human cannot survive for too long too - because nature nourish human.

      Skies slightly hazier than usual with PSI hitting 50


      Published on Dec 30, 2013
      5:54 PM


      babe 
      Look more cloudy and cooling than hazy.
      What cause the haze?

      Sunday, December 29, 2013

      Hacker took over BBC server, tried to 'sell' access to other cyber criminals


      Soulranger – little boy where are you?
      Your prescribed method of security - password access security – you see another website got hacked.

      Compromise a server that managed the obscure password-protected website ---- sound like this compromise server is a Directory Service server that manage the userid-password for access to the website. Could be LDAP server for Linux or Unix webserver or AD server for Windows IIS webserver?

      Root admin of the server compromised?

      Once the hacker take over the root admin of the Directory Service, he can reset the password of all the users' userids or issue them new password so that the owner of all the respective userids can no longer login with their old passwords and have to buy from the hacker to reset their password to grant them access.

      If not, it could compromise the ssh client that manage the Linux Web server or rdp services that manage the IIS Windows Web Server.
      Little Soulranger boy - any opinion you want to offer? “ 鸟子不懂 elastic”.
      You remember your own buzzwords - "Why do you keep yakking on 'confidentiality'?"
      You should change your name from "Soulranger" to "DangerSoul".


      I think hacker will do account lockout rather than resetting the password - so that when the account is lockout - even if supplying the right password will have no access to the website - until the hacker unlock the account.


      I am sure this hacker probably will come up with a catalog of service with pricing attached eg. :
      (1) Unlock account = $A
      (2) Reset password = $B
      (3) Assign trust to a container of OU = $C
      (4) Assign right & map right to resources = $D
      (5) Host a web page with IIS web site = $E
      (6) Create new user account = $F
      (7) Allocate diskspace to user = $G
      etc

      Hacker will has transformed his hacking operation into a business – by asking users to transfer money to his bank account for each catalog service. I am sure user like Soulranger will pay – to store all his document and data there.

      Hacker should post his bank account number in the web page so that users can pay him mah.
      Otherwise this hacker hack for what? For fun?

      babe 
      The BBC security team should have created a honeypot to let the hacker to continue to sell his service without alarming him.

      As the hacker does not have physical custody of the physical server but a remote custody of the server, the security team should have quietly de-link and disconnect the compromised server from the BBC network and continue to let it run standalone and transformed it into a honeypot - to let the hacker have continued control over the compromise server - and let the hacker operate and sell his "prized possession"  - until he is tracked and caught red-handed.

      Meanwhile, I am sure BBC will have backup copy of the Directory Service replica and schema from the backup storage or reconstructed by replicas from other master or slave servers from other sites to be restored into a fresh new server in the compromised site - to operate as the real DS server to continue to serve the user access of the Web Service.
      Now tracking him is much harder.