Archive

Category Archives for "Networking"

Don’t forget to tune into our CCNA Kickoff Session tomorrow!

Watch our March 2018 CCNA Kickoff Session with Keith Bogart TOMORROW at 1:30 PM EST.

 

This kickoff session for those who are interested in, or have started to study for the CCNA certification. In this free session, we will cover common trouble areas that most people experience when getting started with their certification. Topics include: how to approach making a study schedule, strategies for not becoming overwhelmed during the study process, deciding whether to take one test or two to get your CCNA, what to expect when you walk into the testing center, which topics to study and how in depth, and what study tools can be useful. Keith will also discuss the testing experience and the CCNA Certification test format.

When: March 7th at 10:30 am PST/ 1:30 pm EST

Estimated Length: 3 hours

Instructor: Keith Bogart CCIE #4923

Cost: FREE

NAT To Be Missed At SXSW

NAT To Be Missed At SXSW

We’re at the EDGE of our seats, about to LANd in Austin, Texas in route for SXSW. (TKIP, hip, hooray!)

ARP you going to be there? We R going to have three epoch sessions by Cloudflare speakers. Ifdown, seems apt you could SELECT to JOIN. Cat make it? Not a bg deal, wget it (though it mega hertz we won’t C you). All the audio from the three sessions will be recorded, you can listen to the cd.

WPS! I almost forgot to tel(net) you whois going to be there, and WAN and where to go.

On Friday, March 9, I’m moderating a panel with Emily Schechter from Google, Aaron DeVera from Deloitte and Gabe Kassel from eero about how Wi-Fi networks work and WEP happens when attackers coax people into joining insecure networks. It’s at Salon K in the Hilton at 3:30PM.

On Sunday the 11th, Nitin Rao is on a panel with Heather West from Mozilla, Stefan Lederer from Bitmovin and Fred Benenson from Unlimited Liability Corporation LLC about the impact of the recent revocation of Net Neutrality rules on online video streaming. It’s at 11AM at Salon J in the Continue reading

DFS and Low Points

On a recent history of networking episode, Alia talked a little about Maximally Redundant Trees (MRTs), and the concept of Depth First Search (DFS) numbering, along with the idea of a low point. While low points are quickly explained in my new book in the context of MRTs, I thought it worthwhile to revisit the concept in a blog post. Take a look at the following network:

On the left side is a small network with the nodes (think of these as routers) being labeled from A through G. On the right side is the same network, only each node has been numbered by traversing the graph, starting at A. This process, in a network, would either require some device which knows about every node and edge (link) in the network, or it would require a distributed algorithm that “walks” the network from one node to another, numbering each node as it is touched, and skipping any node that has already been visited (again, for more details on this, please see the book).

Once this numbering has been done, the numbers now produce this interesting property: if you remove the parent of any node, and the node can still reach Continue reading

IDG Contributor Network: What to understand about health care IoT and its security

As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our prior column, we spoke about this topic in the context of the Smart Electric Grid. Today we’re taking a look at how IoT is disrupting the health care market and how we can take steps to secure it.To read this article in full, please click here

IDG Contributor Network: What to understand about health care IoT and its security

As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our prior column, we spoke about this topic in the context of the Smart Electric Grid. Today we’re taking a look at how IoT is disrupting the health care market and how we can take steps to secure it.To read this article in full, please click here

BrandPost: What Is Intelligent Automation?

The operations environment for service providers is growing increasingly complex. While advancements like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) enable on-demand services, among many other benefits, existing network management and Operational Support Systems (OSSs) lack the scale and flexibility to meet the requirements of these more dynamic network technologies.Simple automation techniques like custom scripting are often used to reduce repetitive manual tasks, but providers are looking for more robust automation capabilities to reduce operational complexity and improve efficiency, at scale. By leveraging software purpose-built for dynamic SDN/NFV environments, and incorporating recent advancements in big data analytics and machine learning, network operators can make true intelligent automation possible from end-to-end and, as a result, run their businesses smarter and much more efficiently.  To read this article in full, please click here

BrandPost: What is Intelligent Automation?

The operations environment for service providers is growing increasingly complex. While advancements like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) enable on-demand services, among many other benefits, existing network management and Operational Support Systems (OSSs) lack the scale and flexibility to meet the requirements of these more dynamic network technologies.Simple automation techniques like custom scripting are often used to reduce repetitive manual tasks, but providers are looking for more robust automation capabilities to reduce operational complexity and improve efficiency, at scale. By leveraging software purpose-built for dynamic SDN/NFV environments, and incorporating recent advancements in big data analytics and machine learning, network operators can make true intelligent automation possible from end-to-end and, as a result, run their businesses smarter and much more efficiently.  To read this article in full, please click here

The real cause of large DDoS – IP Spoofing

A week ago we published a story about new amplification attacks using memcached protocol on UDP port 11211. A few things happened since then:

Let's take a deep breath and discuss why such large DDoS attacks are even possible on the modern internet.

Large attacks use IP spoofing

8426525097_cf3ed2db55_z

CC BY-SA 2.0 image by DaPuglet

All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. For greater speed these packets are hand crafted by attackers - they are not generated using high-level, well-behaved libraries. Packets are mashed together as a series of bytes and fired onto the network to inflict the greatest damage.

L3 attacks can be divided into two categories, depending on where the attacker directs their traffic:

  • Direct: where the traffic is sent directly against a victim IP. A SYN flood is a common attack of this type.

  • Amplification: the traffic is sent to vulnerable Continue reading

Cisco Live CAE and Guest Keynote Announcements

As you may have heard by now, there have been a few exciting announcements from Cisco Live 2018 regarding the venue for the customer appreciation event and the closing keynote speakers.

Across The Universe

The first big announcement is the venue for the CAE. When you’re in Orlando, there are really only two options for the CAE. You either go to the House of the Mouse or you go to Universal Studios. The last two times that Cisco Live has gone to Orlando it has been to Universal. 2018 marks the third time!

Cisco is going big this year. They’ve rented the ENTIRE Universal Studios park. Not just the backlot. Not just the side parks. They WHOLE thing. You can get your fix on the Transformers ride, visit Harry Potter, or even partake of some of the other attractions as well. It’s a huge park with a lot of room for people to spread out and enjoy the scenery.

That’s not all. The wristband that gets you into the CAE also gets you access to Islands of Adventure before the full park opens! You can pregame the party by hanging out at Hogwarts, going to Jurassic Park, or joining your Continue reading

Cumulus content roundup: March

Welcome back to the Cumulus content roundup! This month we’re all about trying new networking solutions and practices. Whether it’s experimenting with EVPN or allowing automation to improve your network, we’re providing you with everything you need to help you start testing out the waters. We’ve got webinars, white papers and more to guide you, so get out your compass and start navigating the new world of networking!

What’s cooking at Cumulus?

The business benefits of Cumulus EVPN: Cumulus Ethernet Virtual Private Network (EVPN) is here to provide the solutions to your architectural complexities and make your data center even more efficient. Don’t believe us? Read this EVPN white paper to learn about the high-level business benefits your organization can leverage with Cumulus EVPN.

Networking in the container age: You definitely don’t want to miss this webinar! In this episode, you’ll learn about the popular container networking models and the pros and cons of each. Watch it now and find out how to best leverage orchestration tools such as Docker and Kubernetes.

5 Ways you can leverage the Linux community for your data center network: One of the greatest advantages of using a network operating system based Continue reading

IDG Contributor Network: IoT security: whose job is it anyway?

It’s been nearly two decades since the coining of the term “Internet of Things,” yet we are still asking the same question: “Whose responsibility is it to secure the billions of IoT devices?” Given the market’s progress of late, you would think we’d have it figured out by now; but, it’s not that simple.Although IoT security has long been a hot topic of discussion, it has become more important—and more challenging – than ever. First, gone are the days when operational technology (OT) was single-handedly responsible for securing IoT, often taking a “security by obscurity” approach by physically separating production operations and industrial networks from enterprise networks and the Internet. Although enterprises are realizing the need to converge IT with OT to drive new use cases, enable an open flow of data between networks and applications, support better business decisions, lower costs, and reduce complexity, new attack surfaces are arising between the gaps in IT and OT practices.To read this article in full, please click here

IDG Contributor Network: Submarine cable boom fueled by new tech, soaring demand

It’s been 160 years since the world’s first submarine cable linked a remote corner of Trinity Bay, Newfoundland, with Valentia Island on the west coast of Ireland in 1858. That telegraph cable failed after three weeks, but a new method for transoceanic communications had been established, and today submarine cables are a critical piece of digital infrastructure that’s fast expanding in prevalence and prominence globally – though not yet quickly enough to meet voracious demand for capacity.Between 2013 and 2017, the subsea cable industry has added an average of 32 percent of capacity annually on major submarine cable routes, according to the industry magazine SubTel Forum. Still, the industry needs to do more. “It will have to increase activity to stay ahead of demand,” SubTel Forum said in its annual report this year.To read this article in full, please click here