Archive

Category Archives for "Networking"

VXLAN designs: 3 ways to consider routing and gateway design (part 2)

In my previous post, I focused on the concepts of what is called off box routing and centralized routing. They were two different yet similar solutions. The first one being the simplest solution leveraging an external gateway to route between VXLANs. The second solution integrated the edge device to be both an external gateway and VXLAN end point (VTEP).

To expand on my previous post, the next logical place to put a gateway in VXLAN designs is to distribute them all on the top of rack (TOR), also known as the leaf. This TOR acts as a VTEP in the VXLAN solution. Its primary purpose is to encapsulate and decapsulate traffic. This solution is also colloquially known as Anycast Gateway VXLAN Routing. Anycast Gateway VXLAN Routing can only be performed on ASICs that support routing in and out of tunnels (RIOT), as discussed in the previous post. For the rest of this post, when I refer to VXLAN Routing, I specifically mean Anycast Gateway VXLAN Routing unless otherwise noted.

In the simplest form, VXLAN Routing allows the TOR to perform a route lookup on the inbound packet before encapsulating the traffic into a VXLAN tunnel. There are two ways that Continue reading

IDG Contributor Network: How the end of Net Neutrality will affect IoT

The ongoing debate over net neutrality has the internet abuzz, and for good reason; forthcoming changes to how internet service providers are regulated could fundamentally reshape the modern internet, with unknown implications for the internet of things. As the IoT continues to grow at a staggering pace, it’s important for its advocates to understand the ongoing hubbub surrounding net neutrality, and how its cessation will impact the IoT for years to come.So, what exactly is net neutrality, and what specific obstacles may spring up in the IoT’s path should it come to an end? By examining the heated ongoing debate surrounding net neutrality, IoT enthusiast can come to have an understand as to how vital a free and open internet is towards its continued success, and prepare themselves for a future where net neutrality is gone.To read this article in full, please click here

The time to deal with IoT security is now

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.”But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula, global product management leader and security expert at SenecaGlobal, what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected devices.To read this article in full, please click here

The time to deal with IoT security is now

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.”But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula, global product management leader and security expert at SenecaGlobal, what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected devices.To read this article in full, please click here

This Holiday Season, Make Sure Your Smart Toy Isn’t a Toy Soldier

In the classic holiday story The Nutcracker, toy soldiers under command of a nutcracker spring to life to fight an army of evil mice. With the growth of smart toys, armies made up of toy “soldiers” could soon become reality. Using the same features that make them “smart,” smart toys can be taken over by outside actors and forced to do their bidding.

But rather than being led by a nutcracker to fight off evil rodents, real armies of toys could be led by criminals to attack you or me.

“Smart toys” (Internet or Bluetooth-enabled toys) are some of the most popular toys this holiday season. Internet or Bluetooth functionality enables smart toys to have amazing features. There are:

  • stuffed animals that play back messages sent from loved one’s smartphones
  • robots that teach children how to code
  • toys integrated with apps that teach reading and spelling skills while still providing physical exercise

Smart toys can do incredible things. Yet, if left unsecured, they not only present real privacy risks to the children and families who use them, but also security risks to everyone who relies on or uses the Internet.

Any Internet-connected device, be it a computer, connected thermostat, or smart toy, is at risk of being Continue reading

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

History Of Networking – Jeff Tantsura – Segment Routing

In this episode of History of Networking, Jeff Tantsura (Chair of the IETF Routing Area Working Group and Consulting VP of Network Architecture at Futurewei) joins Network Collective to discuss the origins and history of Segment Routing.

Episode Links:


Jeff Tantsura
Guest
Jordan Martin
Host
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Jeff Tantsura – Segment Routing appeared first on Network Collective.