Linus Torvalds has kept the "Shuffling Zombie Juror" code-name for Linux 3.17.
Finally it's time for Linux 3.17 kernel release, after it got delayed by one week. Linux 3.17 has come out with all its glory and as Linus Torvalds' travel plan is on, Linux 3.18 merge window will be kept open for around three weeks. Lots of great features have been included in Linux 3.17, which is called a big improvement by experts.
![](data:image/webp;base64,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)
The features of Linux 3.17 include:
* AMD Radeon R9 290 support
* Xbox One controller support
* DMA-BUF cross-device synchronization
* ARM hardware improvements
* free-fall support for Toshiba laptops
* Intel Braswell and Cherry Trail are enabled
* EFI Xen Dom0 boot support
* file-system improvements and so on.
Hence Linux 3.17 must be called a very exciting update and for any avid Steam user, this release will sound a good one as it allows controllers get connected to desktops via Microsoft Xbox One controller support without any vibration. In addition, the open-source NVIDIA driver has also received several improvements. Distros like Arch, Fedora, Korora and Manjaro, which are open to frequent updates, are expected to get Linux 3.17 update soon. Torvalds has kept the "Shuffling Zombie Juror" code-name for Linux 3.17.
As Linus will be traveling next week and the LinuxCon EU event will take place the following week, the merge window for Linux 3.18 will be technically opened till almost 26 October. Linux users will be looking forward to open source graphics driver improvements in Linux 3.18 along with other changes. But for now, check out the formal announcement of Linus Torvalds here, while releasing the final Linux 3.17 kernel.
The Internet consists of a plethora of networks (public, private, government etc.) which carry an abundant range of information, services and resources and connect to each other via bundles of data called packets. Everything that we use in our daily lives such as E-mail, Search Engines, VoIP, Peer-to-Peer file sharing are a result of the transference of these data packets. Shipping packets around the world involves cooperation between different organizations and can be quite challenging. Packets can also be lost during transmission due to the distance, collision or excessive crowding. This packet transfer across the Internet is made easier by Internet eXchange Points (IXP) where local networks efficiently exchange information at a common point within a country. At an IXP, Internet Service Providers (ISPs) exchange traffic using high speed network/Ethernet switch. An Internet Service Provider is a company or organization that provides web access to its clients by maintaining a direct line to the internet and web servers. AT&T, Hathway, Verizon, Bharti Airtel, Sify are some well-known Internet Service Providers.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u4L8Maz_SZdqqSKf-SMGHFraPWe3oxeIykbMDiAeg2I913esx_hOuG3KYYF_TpoyfwejgpP6bW3e5sbgPH5Kx09pdvA8xUZpUYUu_B5Vuyo4BWw1uZPelkT8zAzePf69x5JaNUPtIbEwN_vLuSmaTctDyfZdjI5QYAJkNFSWDnOWz1G-WlBjAMfnnD5zWiuaLsc4hQMQ=s0-d)
The above figure depicts the ISP scenario both without an IXP and with an IXP. In case of an IXP, every ISP has to buy just one whole circuit from their ISP to the IXP instead of several half circuits to every other ISP. This removes the complexity of direct one-to-one connections between ISPs as well as reducing the cost for further connections. Through the IXP, traffic is exchanged locally within the country rather than using the local Internet traffic overseas. This saves international bandwidth which can be used for backup or international traffic. A comprehensive layout of the Internet hierarchy is shown below.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_soxNqIzOd1eszBoCNDi_jbDtEFdSJGbKhysRGqP5lF9lqfus5oSKdGeDFXwu4cFu-ZrUbdg1Y6ToXyH1pnVDTSApQcZLjVqOpJqTjteLoQtZumSiW4RC1jPWZsIf-PnGi4L_WybCXxHgqw1_VwedjQhEuVjg5n9c59PongRUw2eldvdU6t1gn0Yfbd5DfNiKwYoo9e-g=s0-d)
IXP Architecture
There are usually two kinds of IXP architectures: Layer2 and Layer3. In Layer 2 (L2), all the ISPs are interconnected using Ethernet switch whereas in Layer 3 (L3), all the ISPs are interconnected using a router. Layer 3 is not widely used as it is router based and thus was overwhelmed by the rapid growth of the Internet. Today, it is merely a marketing concept used by Transit ISPs. Layer 2 topology uses a common network medium like Ethernet (100 Mbps/1 Gbps/10 Gbps/100 Gbps technologies) which is connected to neighbouring ISPs. Members bring their own routers and circuits from their backbone and they are free to set up peering agreements with each other as they wish. All traffic is exchanged outside routers that are connected to a shared media (Ethernet switch).
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v7mLfkxwBkhi26BkeUKqLNUBm5G8QgPdJHBKRhWGc4B-20ezxBO_8V0Zd1X-ZF3Rh0rWqcrElNvHlxy5fq_xzm3RawXacDi4IoXb-U35Wn1OmwLeWRxDzA3XahdulVs_FszSZ82PU4fNrI7sM8wYXC6m0YmDBiRLw-AZ0iZJbvl2T6DqiH77CEwyjzXewo2_dv2Xz4LA=s0-d)
A Layer 2 IXP has a proven upgrade path with a simplistic design. Also, it can scale up to 60 IXP members with low cost entry for its participants. Services are offered such as Search engines, Internet portal, DNS Root, Looking Glass etc. ISPs also use two switches for load-sharing or redundancy. In a Layer 2 exchange, each member has to peer with every other member as part of their IXP membership. This is called Mandatory Multi-lateral Peering.
Peering at an IXP using BGP
An ISP can exchange traffic with any of the other ISPs through the IXP switch (public peering) or directly by having a physical interconnection (private peering). Peering between ISPs requires exchange of routes used between Autonomous Systems (AS). Autonomous Systems (AS) are independently run networks or a set of related networks, some being commercial ISPs which come under one administrative domain. For successful peering, the ISP router needs to be able to run BGP, an Ethernet port to connect to the IXP switch and a WAN port to connect to the ISP backbone’s WAN media. The peering is done through the Border Gateway Protocol (BGP) which is basically a path vector routing protocol that exchanges routes for IP address ranges or prefixes.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tYYVMag2_xfDz59tYn09MfMPdjKL8Qt2MB4czBGhY5ENx3lEjwmKBZObx7ZNp0xh7Fvvf7UCuaLJNZVuP1Ds4rVYy2YZcGR_n5pyvrUmF5hhw7zKZgfpIJzKXNO75jMKPErtKyenCS5ldQ7mdQOmYbW770B9Bq8yQF8kdtDtaLmUawrTY4k0gn_WgddP90Cgm7GuGQAg=s0-d)
The BGP routes between domains and unifies network organizations while helping in choosing the best route by using preferences local to AS and AS path length. As a BGP route travels from AS to AS, the AS number of each AS is stamped on it when it leaves that AS which is called the AS-path. IXPs themselves do not require Autonomous System Numbers (ASN) as the Ethernet switch does not run BGP, but the services run by the IXP requires a transit router that needs a Public ASN and Address space as well. ASNs make it easier for the BGP to route through IXP traffic. Each participating ISP in an IXP needs to run BGP for peering to take place as external BGP configures directly with other participants in the IXP. The BGP operation is shown below.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v05V6p9MNe41TdHB-1b_yMhfR2kh3BN_kywMkeX0K94CiJO5Ha3sREjveg5SrwPoL-qhdawxX_8F_ObZ3ww4r_LkQFNHK-33oEl2YWkRq_JogNDEoKVboOE51sH4R0Rmq0BYbegqpw9KxH9UwtnIT5gpU6E7jE6xFuzdnQVtUVDIYYVOzzIuaYvkfibwtmfuGoJXOJWw=s0-d)
Salient features of an IXP:
· Neutral, accessible and secure.
· Reliable and Redundant due to multiple switches.
· L2 IXP is the most common architecture used where the core is the Ethernet switch.
· IXP traffic steadily increases with increase in member Autonomous Systems.
· Majority of the IXP traffic comes from Tier-2 ISPs.
· Most of the Peer-to-Peer traffic at IXP remains invisible.
· BGP based efforts for discovering Peer-to-Peer links in AS levels have limited success and provides at best lower bound for number of links in the internet. In contrast, number of Peer-to-Peer links at a single IXP exceeds even lower bounds.
· IXP has a diverse ecosystem in terms of member ASes, peering strategy, traffic and geographical coverage that mimics the Internet’s AS ecosystem.
We looked at some of the fundamentals of the Internet’s network hierarchy namely, Internet eXchange Point (IXP), Internet Service Provider (ISP), Border Gateway Protocol (BGP) and Peering. This article aims to provide a practical viewpoint of the above concepts along with its applications. To get a good understanding of the ISP network, let us consider a local IXP – National Internet eXchange of India (NIXI). It is a neutral exchange point of ISPs setup in 2003 and funded by the Government of India. NIXI was set up for peering of ISPs among themselves for the purpose of routing the domestic traffic within the country, instead of taking it all the way to US/Abroad, thereby resulting in reduced latency and saving on International Bandwidth. Currently, it has 7 exchange points in Delhi (Noida), Mumbai, Hyderabad, Bangalore, Chennai, Kolkata and Ahmedabad.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v_i602JUw9-WeY-JS4oTpG5NFeK6vdY4dT3EXr1K8HaqRi4cGu8qtRt87TY0na_SpNiVEY9lALVeKLy2_XwEUJExR7j_xRXg0m5_gViI1ANup1tdy1OWJm4fof43zXi3uiusjHv_xODOu0kDpXPzd-Pz0X1uvlOLL-_BFnUp3LA1VFIxyCxdm2auAipLoDEz8JOVgHi4TkUO6uEUQ=s0-d)
NIXI Tool: Looking Glass
We can use the NIXI website for gathering data and performing an analysis of ISPs with various tools, one of which is a Looking glass. A Looking glass, as it is aptly named, provides public view of routing information available at an IXP by making route collector routes available for global view. It also provides a web interface for running a limited set of commands on routers. The route collector makes use of a router/UNIX system running Border Gateway Protocol (BGP) to gather routing information from service provider routers at an IXP by peering with each ISP. It does not forward packets, only holds the IXP routes. NIXI uses Layer 2 IXP architecture where all the ISPs are interconnected with an Ethernet switch. NIXI also implements the multilateral mandatory peering policy among all its participants.
When using the NIXI looking glass, we use the ‘show ip bgp summary’ command to list out the routing and connection data of the ISPs. The command produces a lot of parameters to take into consideration. The typical output that we obtain from the NIXI site is as shown below:
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uS7PZ3jnbjkNGF8L_OtF_HGGEr8t8OVy2odPHZs8zRaccT7THYrJth9eB66D53lUR5YlJs6zCjclXSCjHPmWbDlLwgrUXMPlAh1NWwPOiB1fAouzTgjfGndilJEzjOSFf18W2-JSpfbz4uxKQJDFNSUMvQjNAEkGHZwk7MC9W3y9Vh34oQ6YE7N9OQ6XP2R3Zdy6w3jg=s0-d)
The individual parameters of the command output are as follows:
BGP router identifier - It is the IP address (218.100.48.1) that all other BGP speakers recognize as representing the BGP router. It can be defined as the highest IP address or the router identifier specified by the bgp router-id command.
Local AS number – Autonomous System with which the BGP router is associated (24029).
BGP Table Version – Internal version number of BGP database (508508).This number increases in increments when BGP table changes.
Main routing table version – It is the last version of BGP database that was injected into the main routing table (508508).
Network entries – number of unique prefix entries in the BGP database (13163 using 1540071 bytes of memory).
Path entries - Number of path entries in the BGP database (14844 using 771888 bytes of memory). Only a single path entry will be installed for a given destination. If multipath routes are configured, a path entry will be installed for each multipath route.
BGP path/best path attribute entries – Number of unique BGP attribute combinations for which a path is selected as best path (1606/1372 using 224840 bytes of memory).
BGP AS-PATH entries – Number of unique AS-PATH entries (1116 using 29944 bytes of memory).
BGP community entries - Number of unique BGP community attribute combinations (275 using 11024 bytes of memory).
BGP route-map cache entries – Number of BGP route-map match and set clause combinations. Here, 0 indicates that the route cache is empty.
BGP filter-list cache entries - Number of filter-list entries that match an AS-path access list permit or deny statements. Here, 0 indicates that the filter-list cache is empty.
Total bytes of memory – Total amount of memory, in bytes, used by the BGP process.
BGP activity - Displays the number of times that memory has been allocated or released for a path or prefix.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vrce53jV8ZS6u4N1xIZa3PjeeQvX-OWY5n1b-db38yzIx2Ef204ZWehBbBc9z8TxUN4lJeHopbo-s-XhpBnZFEiymKhmJrK9LHAXZQNYu1ErTRdBc4kjWiIoUlqjibRtT7hrsNJhcoe_s8K57JlZmtLNUjlZsNj-_Ftwg_BbuO3ROVZ8809R8eLQ5kju9ZyauFjw84=s0-d)
The command output also contains a table towards the end; the columns of the table are further elaborated below:
Neighbour – IP address of the neighbour with which this router is setting up a relationship. This is available in the Connected Networks section of the website.
V - The version of BGP this router is running with the listed neighbour.
AS - The listed neighbour’s Autonomous System number.
MsgRcvd - The number of BGP messages received from this neighbour.
MsgSent - The number of BGP messages sent to this neighbour.
TblVer – It is the last version of the BGP database table that was sent to this neighbour. It is basically the router table version. Under normal circumstances, this should be the same if routing is stable.
InQ - The number of messages from this neighbour that are waiting to be processed.
OutQ - The number of messages queued and waiting to be sent to this neighbour. TCP flow control prevents this router from overwhelming a neighbour with a large update.
Up/Down - The length of time this neighbour has been in the current BGP state (established, active, or idle). If the BGP session to the neighbour is up in the "Established" state, this is the duration of the current TCP session. If it's not up, this will display the current state of the connection.
State/PfxRcd – Current state of BGP session: active, idle, open sent, open confirm, or idle (admin). If the state field shows active, the router is actively attempting to create a TCP connection to this neighbour. If the session is in the established state, a state is not displayed; instead, a number representing the PfxRcd is displayed. If the TCP session is up and the routers are exchanging routes, then this field will be a numeric value that shows how many route prefixes (BGP network entries) have been received from the remote neighbour or peer group.
NIXI Tool: MRTG Statistics
We can also use MRTG statistics to find traffic graphs for different locations.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sjVHz1XTwhBHn91G3nVq1YRKSYNLb5PCbHESQCSrj2kzpSgtQC4Aa52GzHFtZROCtMWvoMnZwqASlLbm66RV3KweyFeGMvsNONHNNnd-G-zD8De60VA2pdpJDGt3Kj7mFEIVbnM9PO_ftWh9ZASjXrDCkwkhPxB_TxKW1pBwR23B63DOIkw9C5L6m7nMvvTOxdx9-7mA=s0-d)
Applications
The NIXI site gives us the Autonomous System Number (ASN) by which we can identify the network. This information from the NIXI website, coupled with tools like Looking glass can be put to use in several applications, some of them which include:
· Creating a graphical representation of the ISP network showcasing the interconnection between various ISPs.
· Finding the Hop count between ISPs and thus calculating the cost incurred to them to send or receive their packets through a particular ISP.
· Analysis of shortest path, One-hop and Multi-hop routing between two ISPs.
· Identification between routing pattern of different ISPs which can be helpful in further navigation.
· Several in-depth analyses like Traffic vs. increasing Bandwidth vs. Access which can be worked upon to derive certain case studies.
Before we bid a heartbreaking farewell to the witness to our so many precious memories, let's recall why we used to love Orkut so much.
Orkut means the beginning of an era – the era of social networking. When Orkut started on 24 January, 2004, there was no Facebook, and that's why every teenager and college pass-outs, with Internet access, used to have a super-active profile on Orkut, full of scraps, photographs, testimonials and status updates. Then Facebook entered the social networking market and business figures as well as prospects continued running downwards, without any hope of revival. That's when Google decided to shut down this store and the day has come today.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sYth6iALMlb_ZpdtvkcfDee_Ph5sl3-PhVVUEMCR459-d3T9yUvcWRuHCBbGdFNXl8sdymxjwxJG9pbwTKt7UI2knB8KeH0bO8fn9KhtPw-Tr_OkL48Ba0Vld9-xN43bfmwr-DPUU=s0-d)
So before we bid a heartbreaking farewell to the witness to our so many precious memories, let's recall why we used to love Orkut so much. What are those features we'll miss about Orkut. Let's walk together down the Orkut lane and relive all the special moments we have left backwards.
1. Orkut as a communication tool:
Orkut led to a new way to communicate with our near-and-dear ones who are far away. A new communication language emerged from Orkut communication like 'cool' became 'kewl', 'my' became 'mah', 'fine' became 'f9' and 'how are you' became 'hwz u'.
2. Orkut Scraps:
Orkut had a scrapbook, which was later adopted by Facebook as Facebook Wall. Orkut scrapbooks used to be colourful enough to add fun to our boring lives.
3. Recent Visitors on Orkut Profiles:
Orkut had a feature through which we could check who are visiting our profiles. And if there was your crush's name in the list, your day couldn't have been better ever. This feature also used to let us know who are web-stalking us. This is a feature which is still untouched in all other social networking sites till date.
4. Orkut Testimonials:
We used to request our best buddies to write down some awesome words about us in the testimonial section. It used to work as an exchange offer – if you write mine, I'll write your's. The best part about this section was that, after reading up on it years later, it would definitely make you smile.
5. Orkut Themes:
Orkut pages could be personalised using all the colourful mood-based, festivals-based and season-based themes. But Facebook is boring all the time with its white and blue one. Themes are really missed in present social networking platforms which lack colours and youthful vibrancy.
6. Orkut Communities:
It was again a unique feature which allowed you to get connected to lots of communities of your interests and likes – cuisines, sports, celebrities, world leaders, ice-creams and so on. The more Orkut communities, the more you were a socialite.
7. Orkut Fans List:
Orkut had one more unique feature – its Fans list. With this feature you used to feel like a celebrity as the list kept on expanding. Orkut offered you a celebrity status, nonetheless.
These are some of the best reasons why Orkut will be missed from today onwards, 30 September, its closing day. As the clock is ticking and you still have not got your Orkut albums in your Google+ account then hurry up. But yes don't forget to send this message to Orkut as you log in for the last time: Orkut We'll miss you. Thank you for everything.
Your blogs, social networking sites, emails and online bank accounts can be accessed by the hackers through stolen passwords. But there are some steps you need to follow to prevent computer hacking and safeguard your critical information.
Hacking is not intended for government bodies or large enterprises only. It's a common incident with individuals too. Computer hacking can take place in different ways. Cyber criminals can hack your computer system and access your personal information. Your blogs, social networking sites, emails and online bank accounts can be accessed by the hackers through stolen passwords. But there are some steps you need to follow to prevent computer hacking and safeguard your critical information. Here are 8 such steps to help you:
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vwaBXYPRrLkRtCazmpQM4sER_Hy7q4TGjUI0t6hzCF3Qk6HV8KxoTU3U9Vf5g9UrBRG3piCrT8ex1FyYADgzsD5TR0lzqSJTmbw_sSZ8gnNCi20kyFzyXz9vT4vojP_02r3hl6v6I=s0-d)
Step 1: Tough Passwords:
Create separate passwords for each account, to ensure that even if one account gets hacked, others are safe. It's difficult to remember dozens of passwords and for that take help from password managers. Several third-party software programmes create as well as store your passwords. This is the first and foremost step which needs to be adopted by you as soon as possible to stop hacking.
Step 2: Perform required software updates:
Hackers target weaknesses in a computer system and the weakest computer system is that one which has not been updated since a long time. Always keep your system updated, download patches and ensure security of your operating system. Software updates should never be missed.
Step 3: Two-Part Authentication:
If you access shared computers for logging into email account, then you're quite vulnerable to hackers. Two-step verification is a way to ensure that before logging into your account a second step is required after providing the password and it's possible with your mobile number or any secondary email.
Step 4: Install firewall on your computer:
Firewalls are enabled to prevent outside threats like hackers and viruses reaching your system quite effectively. Always personalise your firewall settings and keep updating firewall regularly.
Step 5: Take proper back-up:
Always keep an external hard drive handy or an online could service accessible to store your data. It may be little time consuming and boring task, but much better than getting hacked.
Step 6: Keep changing passwords:
While creating strong passwords and managing them, also ensure that you don't keep the same password for any account for a long time. It's especially applicable in your banking and financial accounts.
Step 7: Use anti-virus software:
Sometimes anti-virus software comes pre-loaded in your computer but you need some more powerful software to keep your computer healthy all the time. Do proper research before choosing the best anti-virus software for you and also keep checking for the software updates.
Step 8: Don't trust emails from unknown sources:
Never ever trust in an email which comes as a spam or from unidentified sources and make sure you never download attachments from such emails.
The most important thing you need to do is always stay aware to stay away from hackers and viruses. Check out this video for complete knowledge about how to prevent hacking: