Archive

Category Archives for "Networking"

Taking EVPN & open networking to new heights with Broadcom Trident3 and Cumulus Linux

As highlighted in our recent press release, Cumulus Networks and Broadcom are expanding their commitment to open networking by introducing support of Cumulus Linux to the widely successful Broadcom Trident3  The Trident3-based switches will be available with Cumulus Linux in the Fall of 2018.

When Trident3 came to the market it offered a fully programming packet processing silicon as well as improved power efficiency. It’s additional benefit was a broad range of scalability, starting at 200 Gbps of throughput scaling all the way up to 3.2 Tbps on a single chip.

We are thrilled to have the world’s most powerful open network operating system, Cumulus Linux, now running on this innovative Broadcom chip. I see three benefits of utilizing these two solutions in data center networking 1) Simplified EVPN, 2) Scalable VXLAN, and 3) investment protection.

  1. Simplified EVPN operations

    With the Cumulus and Trident3 EVPN implementation, teams can utilize well-understood and simple networking protocols like BGP to effortlessly build a highly scalable, layer-3-routed, underlay fabric for different address families, including IPv4, IPv6 and EVPN routes. EVPN will automatically set up neighbors, discover information, and exchange that information among nodes. With just a few lines of code, you can Continue reading

Worth Reading: Using DNS as a Single Signon

Internet-wide identity management is one of the hot issues currently — dealing with hundreds of separate usernames and passwords is insecure and unfriendly for users. Increasingly, people use their social network accounts to log into websites, which works well, but forces you to allow either Google or Facebook to track all your logins — you don’t have a lot of choice. —Vittorio Bertola @APNIC

BrandPost: Ethernet Adventures: Turning Enterprise Networking Pipedreams into Reality

Ciena Chris Sweetapple, Consultant, Managed Service Providers In the first installment of this 3-part series, we begin the story of one hero’s road to streamlined enterprise networking operations. Ciena’s Chris Sweetapple details Our Hero’s journey as he navigates the convoluted tangle of enterprise networking.Our hero, responsible for running his enterprise network, is hopelessly stuck in an enormous tangle of network complexity. He needs the best connectivity for collaboration, applications and cloud access. But he knows that the networking technology he has today won’t cope with the demands of tomorrow. The business depends on online transactions, connections to multiple data centers and real-time data. Failover, backup, load balancing and stringent security are essential.To read this article in full, please click here

We’ve Added Another CCIE Security v5.0 Technologies Course to Our Library

Log into your Members Account, or check out our online store the view or purchase Rohit Pardasani’s latest CCIE Security v5.0 Technologies video; CCIE Security V5 Technologies: ASA Firewall.

About The Course

This course is a deep dive in ASA and features of ASA firewall, and is a primary study resource for the CCIE Security v5 Lab Exam. Students looking for a thorough and well-structured learning tool will benefit from these videos, which help create a solid foundation of the concepts covered in the CCIE Security v5 Lab Exam.

In this course, we will walk you through the basics of ASA and help you dive into more practical and advanced topics. We will start by helping you understand the security levels in ASA and understand the Adaptive Security Algorithm. Then we will break down the ACL’s and objects and object-groups. We will further look at differences between ASA in router mode vs ASA in transparent mode. We will also focus on deep inspection of packets and later move on to creating virtual firewalls and running ASA in active/standby or active/active mode. Lastly, but not the least, we would focus on clustering.

Prerequisites

Basic understanding of firewalls and basic Continue reading

Low-heat radios could replace cable links in data centers

Future 5G-based wireless networking equipment and data center equipment will combine antennas and the corresponding radio guts into one microprocessor unit, researchers from the Georgia Institute of Technology say.Integrating all of the wireless elements that one needs in a radio will reduce waste heat and allow better modulation, according to the group, which has been working on a one-chip, multiple transmitter and receiver package design. Longer transmission times and better data rates will result, they say.“Within the same channel bandwidth, the proposed transmitter can transmit six- to ten-times higher data rate,” says Hua Wang, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering, in a news article on the university’s website about the idea.To read this article in full, please click here

Low-heat radios could replace cable links in data centers

Future 5G-based wireless networking equipment and data center equipment will combine antennas and the corresponding radio guts into one microprocessor unit, researchers from the Georgia Institute of Technology say.Integrating all of the wireless elements that one needs in a radio will reduce waste heat and allow better modulation, according to the group, which has been working on a one-chip, multiple transmitter and receiver package design. Longer transmission times and better data rates will result, they say.“Within the same channel bandwidth, the proposed transmitter can transmit six- to ten-times higher data rate,” says Hua Wang, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering, in a news article on the university’s website about the idea.To read this article in full, please click here

Adaptive Micro-segmentation at Interfaith Medical Center

Christopher Frenz is the Associate Vice President of Infrastructure Security at Interfaith Medical Center (IMC) and has been with the company since 2013.

Interfaith is a multi-site healthcare system located in Central Brooklyn. The 287-bed non-profit teaching hospital and its network of ambulatory care clinics treat over 250,000 patients every year.

 

Transforming Security in Healthcare

Chris Corde, Senior Director of Security Product Management, had the chance to talk with Christopher about his journey with the VMware NSX portfolio.

Interfaith Medical Center, like many companies in the healthcare industry, is embracing new technology in the form of electronic health records (EHR) systems. The hospital also has an online portal that allows patients to view information about their treatment and prescriptions and take a more active role in their own care.

While IMC began considering VMware NSX for compliance reasons, they discovered the many benefits micro-segmentation brought to their increasing number of Internet of Things (IoT) devices.

On top of what IMC implemented with micro-segmentation, they also deployed VMware AppDefense, a product that leverages the VMware ESX hypervisor to build a compute least-privilege security model for applications. AppDefense manages the intended state of an application, then uses the ESX hypervisor to Continue reading

IDG Contributor Network: Moving apps to the cloud? 3 steps to ensure good customer experiences

Many businesses today are moving customer-facing websites and applications to the cloud—and rightfully so. Cloud computing allows enterprises to reduce infrastructure costs and spend more time focusing on revenue generation and business growth. But cloud computing requires a shift in thinking about how to ensure high-quality user experiences and repeat business.Simply going live with a cloud deployment isn't enough. You also need to embrace openness and think about what happens outside the walls of your cloud provider's data center. Here are three steps all businesses can take to help make sure customers have a speedy, positive experience when accessing cloud-based websites and applications.To read this article in full, please click here

IDG Contributor Network: 4 forces driving the re-networking of the digital world

In a world with vastly increasing amounts of data and dependency on the Internet, digital transformation is now paramount to the long-term survival of enterprises. But what will digital transformation in the years ahead involve? A crucial component for companies will be ensuring they have enough interconnection bandwidth to handle business demands in the future.Interconnection bandwidth is the ability to support direct private data exchange across a variety of hubs and interconnection points within a network, bypassing the public Internet. These private connections are important because they offer scalability, security, and direct connections to copartners and service providers that companies cannot get otherwise.To read this article in full, please click here

IDG Contributor Network: 4 forces driving the re-networking of the digital world

In a world with vastly increasing amounts of data and dependency on the Internet, digital transformation is now paramount to the long-term survival of enterprises. But what will digital transformation in the years ahead involve? A crucial component for companies will be ensuring they have enough interconnection bandwidth to handle business demands in the future.Interconnection bandwidth is the ability to support direct private data exchange across a variety of hubs and interconnection points within a network, bypassing the public Internet. These private connections are important because they offer scalability, security, and direct connections to copartners and service providers that companies cannot get otherwise.To read this article in full, please click here

IDG Contributor Network: Guarding against the threat from IoT killer drones

IoT is being weaponized. The same sensors, networks and real-time data analysis used monitoring classrooms can morph into weapons for targeted killing. How do such malicious drones operate and what can be done to protest against their airborne threat?Background Here are three data-points of weaponized drones. The recent assassination attempt on the President of Venezuela with drones. “Aug 4, 2018. CARACAS, Venezuela — A drone attack caused pandemonium at a military ceremony where President Nicolás Maduro of Venezuela was speaking on Saturday, sending National Guard troops scurrying in what administration officials called an assassination attempt.” The use of drones to shoot down incendiary kites in the Israeli-Palestinian conflict. ”IDF reservists to help; troops able to shoot down flying objects 40 seconds from detection” Slaugtherbots. “A video by the Future of Life Institute and Stuart Russell, a professor of computer science at Berkeley presenting a dramatized near-future scenario where swarms of inexpensive microdrones use artificial intelligence and facial recognition to assassinate political opponents based on preprogrammed criteria.” How do they work? Drones are aerial IoT devices. They’re mounted with sensors that relay their location, altitude and other sensor readings such as images to a back-end system or Continue reading

My Experience As an APrIGF18 Fellow

The 2018 Asia Pacific Regional Internet Governance Forum (APrIGF) took place last month in Vanuatu. Tripti Jain, who attended as an APrIGF Fellow, shared her experiences.

This was my first experience at AprIGF, my first fellowship and also my first time as a speaker on a panel. Believe me, I was anxious and scared but thanks to the APrIGF community: organizers, members, participants and fellows, everyone made me feel at home a thousand miles away from my abode. I had one of the best learning weeks and couldn’t have asked for a better venue to learn with little to no distractions around and beautiful sunsets to watch while walking back to our rooms everyday. Fellows were facilitated with everything that we could have needed: cozy rooms, good food, articulate speakers and joyful socials every night.

One of the perks of being a fellow at APrIGF 2018 was that my learning experience began weeks before even getting to Vanuatu. All the fellows were required to participate and go through a basic course on Internet Governance by the Internet Society. This course was one of my personal favorite bits of the fellowship. I learnt a lot through this exercise. There are Continue reading