Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

ThousandEyes Looking at EchoLink – Cisco Blogs

Researcher by Researcher
July 27, 2022
in Networking
0
ThousandEyes Looking at EchoLink – Cisco Blogs
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


I’m working with a Cisco service called ThousandEyes. Now, the best application of ThousandEyes would be to spot problems, especially with cloud services. If you offer a service in the cloud and customers are complaining about performance, ThousandEyes can reveal where the bottlenecks exist. Then you can execute a plan of action to get the issues addressed. But, indulge me a moment to explain the excuse I’m using to play with it.

I recently passed my Amateur Radio exam to get licensed again after letting my Advanced license expire 30 years ago. Before I share my new call sign, here’s a note for the benefit of non-hams (ham is common lingo for an Amateur Radio operator). It is customary to use a standard phonetic alphabet when giving your call sign on the air. For example, WB2GJ would be Whiskey Bravo 2 Golf Juliet. But someone might say WB2 George Jetson just for fun. (If you recognize the name, you’re dating yourself. And no hams were doxed for this blog; there is no WB2GJ.)

Related articles

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023

I mention this because the FCC assigns KI5VDI as my new call sign. I didn’t think any call sign could be worse than the one I had in Colorado, KB0FU. Yeah, say that one out loud and you’ll get it. But KI5VDI? I just know someone will say or at least think “KI5 Venereal Disease Infection”. So, I purchase a vanity call sign similar to my original Advanced call sign, WB2EWS. I get N2EWS. That’s good news. I’m now cured of Venereal Disease Infection.

As a revitalized ham, I find myself listening to a conversation on 2 meters. (We hams refer to frequency ranges by their approximate wavelength. The 144-148 MHz frequency wavelength is about 2 meters.) People you speak with on the 2-meter band are generally very close by. These signals don’t travel far unless you have the opportunity to do something fancy pants like bounce your signal off a meteor. Even then, voice communication would be virtually impossible. So, I am shocked to hear a local Texan talking with someone in South Korea. How? Repeaters extend the range on 2 meters so your signals can jump over objects like mountains or tall buildings, but even a daisy chain of repeaters isn’t going to reach South Korea.

It turns out they are using EchoLink. This free software lets you link your radio to your computer and connect anywhere with VoIP. You talk on the radio, and EchoLink forwards everything to the remote location, typically the other person’s radio connected to EchoLink.

I download and install EchoLink to give it a try. Being a Cisco guy, the first thing I think about is how reliable VoIP will be with this software and EchoLink destinations. Network latency and jitter can be a problem for VoIP.

This is where ThousandEyes (finally) comes in. ThousandEyes analyzes network traffic in detail. Fair warning: This is not a typical reason for using ThousandEyes, and I’m using ICMP to simplify the test. Normally you would use TCP and a port to get a more realistic view. Unfortunately, EchoLink doesn’t like tests on its VoIP port. But even these simple ICMP results are very interesting.

I see that EchoLink chooses a server in San Diego for my connection (nasouth.echolink.org). When I use EchoLink for ham radio, I’ll use it on my personal PC. But I’m testing it on my work PC, which adds a level of complexity since I use a Meraki router on the Cisco network. I install a ThousandEyes agent on my work PC so I can test the network from my work PC to the EchoLink server. The agent isn’t working. What’s my boggle? The agent is a Chrome extension and I’m using Firefox. No problem. I switch to Chrome and be well.

I run the first test. The path visualization (see Figure 1) shows some interesting information. The blue dots are nodes that have ThousandEyes agents. When I click on a blue dot, it shows the node information. The empty circles with numbers are unidentified node hops. The number tells you how many unidentified hops there are in that chain. Not every node in the Interwebs is equipped for ThousandEyes, yet.

Figure 1: The path visualization from the work PC to the EchoLink server

The table view shows the latency and jitter. The jitter is higher than I expected, but it shouldn’t be a problem.

Figure 2: The latency and jitter of this connection

That is only half of an EchoLink connection, though. The other half would go from the contact in South Korea to the San Diego server. When you define a ThousandEyes test, you can pick multiple agents from anywhere in the world. I can even select multiple countries at a time for a single test. In this case, I only want one country, South Korea. But I can specify several South Korea nodes as starting points.

Figure 3: I don’t have the location of a user in South Korea, but I can check various ISPs

The table below shows that all but one source in South Korea have very low latency and jitter. But even the 3.2ms jitter is unlikely to be a problem.

Figure 4: Table of latency and jitter for each South Korea starting point

Now let’s look at the paths. There are enough hops to be an IPA recipe. The red lines are links between two nodes where the delay is greater than 100ms. It is entertaining to hover over the dots to see traffic details. In one case, for Google (gcp asia-northeast3), the first jump is from South Korea to Illinois! Azure koreacentral is the only starting point with a path that has no delays. Since none of the delays add up to a significant latency, as shown in the above table, the delays are unlikely to be significant when using EchoLink.

Figure 5: The paths from South Korea to EchoLink

Let’s try another location for Amber Heards and giggles. How about war-torn Ukraine? Surely this will show network problems.

Figure 6: Choosing starting locations in Ukraine

I see two IPv4 agents in Ukraine, one in Kyiv and the other in Kharkiv. Kyiv uses Deltahost Company. Kharkiv uses Ukrainian Internet Names Center LTD. The results (see Figure 7) are impressive for a war torn country. Check out Figure 8 for the paths. No delays and no dead ends. Do we have Elon Musk to thank for this? I click on a few blue dots and see that several nodes are through Cogent Communications.

Figure 7: Low latency and no jitter to speak of

Figure 8: The paths to freedom

Overall, EchoLink communications should work very well, even to Ukraine.

I’m impressed with ThousandEyes. As more routers become ThousandEyes agents, there should be fewer and fewer unidentified nodes in test results. I’ll keep experimenting and report whatever may be interesting. You can check out ThousandEyes for yourself in the DevNet ThousandEyes Intro Learning Lab.

In the meantime, I encourage everyone to look into getting licensed for Amateur Radio. The average age of licensed hams is currently 68. Let’s get some of you young whippersnappers licensed. Until then, 73s and 88s to all you ham radio operators, and bye for now to the rest.


We’d love to hear what you think. Ask a question or leave a comment below. And stay connected with Cisco DevNet on social!

LinkedIn | Twitter @CiscoDevNet | Facebook | YouTube Channel

 

Share:





Source link

Tags: BlogsCiscoEchoLinkThousandEyes
Share76Tweet47

Related Posts

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
0

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as...

How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
0

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. https://www.youtube.com/watch?v=TfVCXaMRNgM...

Window Closing for Australian Businesses to Upgrade From 3G

Window Closing for Australian Businesses to Upgrade From 3G

September 13, 2023
0

Image: Jon Anders Wiken/Adobe Stock It is the end of an era. Twenty years ago, 3G wireless connectivity started rolling...

Google Cloud Next ‘23: New Generative AI-Powered Services

Google Cloud Next ‘23: New Generative AI-Powered Services

August 30, 2023
0

Image: Sundry Photography/Adobe Stock Google unveiled a wide array of new generative AI-powered services at its Google Cloud Next 2023...

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

August 29, 2023
0

Image: Timon/Adobe Stock A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved