The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society
What are These "Things? The Intruders of Things
Internet [email protected], taking place June 6-8, 2017 at Javits Center, New
York City, is co-located with 20th [email protected] and will feature
technical sessions from a rock star conference facult... (more)
What Is the Domain Name System (DNS)?
Imagine how difficult it would be to use the Internet if you had to remember
dozens of number combinations to do anything. The Domain Name System (DNS)
was created in 1983 to enable humans to easily identify all the computers,
services, and resources connected to the Internet by name—instead of by
Internet Protocol (IP) address, an increasingly difficult-to-memorize string
of information. Think of all the website domain names you know off the top of
your head and how hard it would be to memorize specific IP addresses for all
those domain names. Think of DNS as the Internet’s phone book. A DNS server
translates the domain names you type into a browser, like www.f5.com, into an
IP address (188.8.131.52), which allows your device to find the resource
you’re looking for on the Internet.
DNS is a hierarchical distributed naming sy... (more)
The time of year when crystal balls get a viewing and many pundits put out
their annual predictions for the coming year. Rather than thinking up my own,
I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek
slideshow looking at areas like IoT, ransomware, automated attacks and the
security skills shortage in the industry. Chris Preimesberger (@editingwhiz),
who does a monthly #eweekchat on twitter, covers many of the worries facing
10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10
Predictions for 2016 and no doubt, IoT will continue to cause havoc. People
focus so much on the ‘things’ themselves rather than the risk of an
internet connection. This list discusses how IoT will grow up in 2017, how
having a service component will be key, the com... (more)
As more organizations deploy IoT applications in their data centers and
clouds, they’re going to need their ADC to understand the unique protocols
these devices use to communicate.
In this Lightboard Lesson, I light up how IoT protocol MQTT (Message Queuing
Telemetry Transport) works on BIG-IP v13. iRules allow you to do Topic based
load balancing along with sensor authentication. And if you missed it, here
is the #LBL on What is MQTT?
Lightboard Lessons: What is MQTT? Security Trends in 2016: Securing the
Internet of Things The Intruders of Things The IoT Ready Platform Using F5
BIG-IP with IBM MessageSight
Application Delivery Basics
One of the unfortunate effects of the continued evolution of the load
balancer into today’s application delivery controller (ADC) is that it is
often too easy to forget the basic problem for which load balancers were
originally created—producing highly available, scalable, and predictable
application services. We get too lost in the realm of intelligent application
routing, virtualized application services, and shared infrastructure
deployments to remember that none of these things are possible without a firm
basis in basic load balancing technology. So how important is load balancing,
and how do its effects lead to streamlined application delivery?
Let’s examine the basic application delivery transaction. The ADC will
typically sit in-line between the client and the hosts that provide the
services the client wants to use. As with most th... (more)
A Little History
Application Delivery got its start in the form of network-based load
balancing hardware. It is the essential foundation on which Application
Delivery Controllers (ADCs) operate. The second iteration of purpose-built
load balancing (following application-based proprietary systems) materialized
in the form of network-based appliances. These are the true founding fathers
of today’s ADCs. Because these devices were application-neutral and resided
outside of the application servers themselves, they could load balance using
straightforward network techniques. In essence, these devices would present a
“virtual server” address to the outside world, and when users attempted
to connect, they would forward the connection to the most appropriate real
server doing bi-directional network address translation (NAT).
Figure 1: Network-based load balancing appliance... (more)
What is VDI?
Imagine not having to carry around a laptop or be sitting in a cubicle to
access your work desktop applications. Virtual desktop infrastructure (VDI)
is appealing to many different constituencies because it combines the
benefits of anywhere access with desktop support improvements.
Employees typically use a wide range of mobile devices from laptops to
tablets and from desktops to smartphones are being used. The diversity of
these mobile devices and the sheer number of them in the workplace can
overwhelm IT and strain your resources.
Desktop Virtualization centralizes sets of desktops, usually in a data center
or cloud environment, and then provide access to your employees whether they
are in the office, at home or mobile. VDI deployments virtualize user
desktops by delivering them to distinctive endpoint devices over the network
from a central locatio... (more)
Security Trends in 2016: Securing the Internet of Things
Whenever you connect anything to the internet, there is risk involved. Just
ask the millions of IoT zombies infected with Mirai. Sure, there have been
various stories over the years about hacking thermostats, refrigerators,
cameras, pacemakers, insulin pumps and other medical devices along with cars,
homes and hotel rooms…but Mirai took it to a new level.
And it’s not the only IoT botnet out there nor are these nasty botnets
going away anytime soon. There’s a gold mine of unprotected devices out
there waiting to either have their/your info stolen or be used to flood
another website with traffic.
This is bound to compound in the years to come.
A recent Ponemon Institute report noted that an incredible 80% of IoT
applications are not tested for vulnerabilities. Let’s try that again –
only 20% of the IoT appl... (more)
The entire intent of load balancing is to create a system that virtualizes
the “service” from the physical servers that actually run that service. A
more basic definition is to balance the load across a bunch of physical
servers and make those servers look like one great big server to the outside
world. There are many reasons to do this, but the primary drivers can be
summarized as “scalability,” “high availability,” and
Scalability is the capability of dynamically, or easily, adapting to
increased load without impacting existing performance. Service virtualization
presented an interesting opportunity for scalability; if the service, or the
point of user contact, was separated from the actual servers, scaling of the
application would simply mean adding more servers or cloud resources which
would not be visible to the end user.
High Availability ... (more)
The Year of the (Fire) Rooster will soon be upon us and the talkative,
outspoken, frank, open, honest, and loyal Rooster could influence events in
2017. Whether you were born under the symbol or not, Roosters strive on trust
and responsibility, essential for any organization especially in these times.
2016 (Year of the Monkey) brought us a crazy year of high profile breaches, a
500% increase in ransomware, a 0-day per day and slick malware each looking
to cause havoc on all parts of society including your mobile device. The
monkey’s shenanigans exhausted many of us in 2016 and 2017 will require
some quick thinking and practical solutions to battle the ongoing,
A year ago I noted, Mobility, both the state of being and the devices we use,
will continue to grow and be an immense enabler and/or inhibitor for
organizations. Today, we are the devices... (more)
JANUARY 8, 2014 02:00 PM EST
When we talk about the impact of BYOD and BYOA and the Internet of Things, we
often focus on the impact on data center architectures. That's because there
will be an increasing need for authentication, for access control, for
security, for application delivery as the number of potential endpoints
(clients, devices, things) increases. That means scale in the data center.
What we gloss over, what we skip, is that before any of these "things" ever
makes a request to access an application it had to execute a DNS query.
Every. Single. Thing.
Maybe that's because we assume DNS can handle the load. So far it's done
well. You rarely, if ever, hear of disruptions or outages due directly to the
execution of DNS. Oh, there has been some issues with misconfiguration of DNS
and of exploitation of DNS (hijacking, illicit use in reflection attacks,