Archive

Category Archives for "Networking"

BrandPost: Commencing countdown: It’s time for Packet Networking Summer Camp!

Ciena Susan FriedmanMarketing Campaign Expert Clear your calendar. Ciena’s Packet Networking Summer Camp is blasting off to space. Train like an astronaut with four out of this world webinar missions and three Ciena specialists.Ever wondered what it’s like to be part of a space exploration? So did we. That’s why we are taking Ciena’s successful Packet Networking Summer Camp series to space. Join Ciena’s network specialists for this series of fast-paced and information-packed 30-minute webinar missions to explore where no network has gone before. As a bonus, we’ve added a lightning round Q&A mission, so bring your questions to challenge our specialists. And, it’s all virtual, a perfect learning adventure. To read this article in full, please click here

History Of Networking – Steve Crocker – The RFC Series

The RFC series has been one of the leading forces in establishing standards-based interoperability in networking. Steve Crocker joins Network Collective to talk about his role in the RFC series and how it came to be what it is today.

Steve Crocker
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Steve Crocker – The RFC Series appeared first on Network Collective.

IETF 102, Day 3: DNSSEC, DPRIVE & IoT

This week is IETF 102 in Montreal, Canada, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. And today’s topics include DNS Security & Privacy, along with more IPv6 and IoT.

The first DNSOP session will start at 09.30 EDT/UTC-4, and will continue on Thursday evening. Topics of interest include a draft on Algorithm Implementation Requirements and Usage Guidance for DNSSEC, which updates current algorithm implementation requirements and usage guidance for DNSSEC (obsoleting RFC 6944). Another draft on Multi Provider DNSSEC models describes how to deploy DNSSEC in environments where multiple DNS providers are in use, whilst Delegation_Only DNSKEY flag introduces a new flag for DNSSEC keys that can address a potential attack.


NOTE: If you are unable to attend IETF 102 in person, there are multiple ways to participate remotely.


Alternatively, the relatively new working group SUIT will also be meeting at the same time. Vulnerabilities in Internet of Things (IoT) devices have raised the need for secure firmware updates that are also suitable for a constrained environments, and this group aims to develop an interoperable update mechanism. There are three drafts up for discussion, including the description of the firmware Continue reading

Web-scale: a healthy choice for healthcare networks

Major cloud providers are able to achieve impressive uptime by distributing the load across a large number of commodity servers. There’s no single master server that can fail and bring down the entire infrastructure. It’s not surprising then that so many healthcare networks are already relying on major cloud providers to run electronic medical records (EMR) and imaging applications and store patient data. So doesn’t it make sense to adopt the same approach for the network?

Healthcare networks face a unique challenge that many other networks don’t: how do you grow your network quickly and reliably while remaining compliant? As patient data grows, this tension between growth and compliance is increasing. Healthcare networks are feeling the pressure to move data faster, and this often requires adding more connections and switches, which entails routing and other configuration changes. These continual and rapid changes come at the cost of long, sometimes unplanned, outages. Planned outages are to be expected, but unexpected outages are a nightmare. Consequently, many healthcare networks have understandably opted for slower network growth to maintain a stable, reliable network.

But thanks to the advent of web-scale networking, the tension between growth and compliance is quickly becoming a thing Continue reading

The Philippines Embraces the Multistakeholder Model in the Development of Its National ICT Ecosystem Framework 2022

Earlier this month in Manila, the Philippines Government Department of ICT (DICT) signed a Memorandum of Understanding (MoU) with the Internet Society (ISOC) to facilitate the development of its National ICT Ecosystem Framework (NIEF) 2022.

The NIEF 2022 – a successor to the Philippine Digital Strategy initiative from 2011-2016 – will serve as a roadmap for the management and development of national Information and Communication Technology (ICT) in the country’s plans, programmes, and projects. NIEF will also serve to promote innovation and development of the ICT sector, encourage collaborative use of ICTs, and promote accessibility, security and sustainability.

Some 67 million people are connected to the Internet in the Philippines today – and a large number are prolific users. The country is a significant market for a number of multinational social media and content providers and has a strong Business Process Outsourcing (BPO) industry. These facts make ICTs a key area of development and critical for the future of the economy.

The multistakeholder model will help facilitate perspectives from a range of stakeholders, which in turn will help NIEF 2022 to be in tune with what would work best for the people of the Philippines. This collaborative approach encourages inclusivity Continue reading

New to the INE Course Library – Building Modern Clouds: Docker, DevOps & Kubernetes

This course covers the basics of Docker and Kubernetes by showing how to build modern clouds with these technologies. By the end of this course students will be able to launch a Kubernetes cluster and deploy self-healing and scalable applications, as well as create their own continuous integration, and continuous delivery pipeline.



Why You Should Watch:

Kubernetes has quickly become the standard platform for running containerized workloads. All the major public clouds now have a Kubernetes-as-a-Service offering and popular container management tools, like Rancher, have migrated their underlying platform from in-house software, like Cattle, to Kubernetes. Even Docker themselves are now natively supporting Kubernetes.

This course is meant to teach you how to get started building modern clouds with Kubernetes and Docker, while covering the basic concepts of DevOps.


Who Should Watch:

This course is intended for anyone wanting to learn about Kubernetes and Docker. A basic familiarity with the Linux command line and the basic high-level concepts of the public cloud are recommended. The recommended public cloud platform for this course is Google Cloud Platform.


About The Instructor

David Coronel has been in the IT field since 2002. David started as a call center agent and quickly made his way to systems administration. David is a Certified Kubernetes Administrator, a Docker Certified Associate, a Certified OpenStack Administrator as well as an AWS Certified Solutions Architect Associate. David is currently employed as a Technical Account Manager at Canonical, the company behind Ubuntu.

ISP Design – Building production MPLS networks with IP Infusion’s OcNOS.

Moving away from incumbent network vendors

 

1466540435IpInfusion interivew questions

 

One of the challenges service providers have faced in the last decade is lowering the cost per port or per MB while maintaining the same level of availability and service level.

And then add to that the constant pressure from subscribers to increase capacity and meet the rising demand for realtime content.

This can be an especially daunting task when routers with the feature sets ISPs need cost an absolute fortune – especially as new port speeds are released.
whitebox-switch_500px-wide

Whitebox, also called disaggregated networking, has started changing the rules of the game. ISPs are working to figure out how to integrate and move to production on disaggregated models to lower the cost of investing in higher speeds and feeds.

Whitebox often faces the perception problem of being more difficult to implement than traditional vendors – which is exactly why I wanted to highlight some of the work we’ve been doing at iparchitechs.com integrating whitebox into production ISP networks using IP Infusion’s OcNOS.

Things are really starting to heat up in the disaggregagted network space after the announcement by Amazon a few days ago that it intends to build and sell whitebox Continue reading

ISP Design – Building production MPLS networks with IP Infusion’s OcNOS.

Moving away from incumbent network vendors

 

1466540435IpInfusion interivew questions

 

One of the challenges service providers have faced in the last decade is lowering the cost per port or per MB while maintaining the same level of availability and service level.

And then add to that the constant pressure from subscribers to increase capacity and meet the rising demand for realtime content.

This can be an especially daunting task when routers with the feature sets ISPs need cost an absolute fortune – especially as new port speeds are released.
whitebox-switch_500px-wide

Whitebox, also called disaggregated networking, has started changing the rules of the game. ISPs are working to figure out how to integrate and move to production on disaggregated models to lower the cost of investing in higher speeds and feeds.

Whitebox often faces the perception problem of being more difficult to implement than traditional vendors – which is exactly why I wanted to highlight some of the work we’ve been doing at iparchitechs.com integrating whitebox into production ISP networks using IP Infusion’s OcNOS.

Things are really starting to heat up in the disaggregagted network space after the announcement by Amazon a few days ago that it intends to build and sell whitebox Continue reading

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

Thoughts on Impostor Syndrome

How many times, on reading my blog, a book, or watching some video of mine over these many years (the first article I remember writing that was publicly available, many years ago, was the EIGRP white paper on Cisco Online, somewhere in 1997), have you thought—here is an engineer who has it all together, who knows technology in depth and breadth, and who symbolizes everything I think an engineer should be? And yet, how many times have you faced that feeling of self-doubt we call impostor synddome?

I am going to let you in on a little secret. I’m an impostor, too. After all these years, I still feel like I am going to be speaking in front of a crowd, explaining something at a meeting, I am going to hit publish on something, and the entire world is going to “see through the charade,” and realize I’m not all that good of an engineer. That I am an ordinary person, just doing ordinary things.

While I often think about these things, what has led me down the path of thinking about them this week is some reading I’ve been doing for a PhD seminar about human nature, work Continue reading