Archive

Category Archives for "Networking"

IDG Contributor Network: Ethernet frames and packets: what’s the difference?

When discussing Ethernet data, the terms frame and packet are often used interchangeably. Frames and packets are the electronic containers that carry our data from point-to-point by navigating LANs and WANs and, as they both serve similar functions, their differences are often misunderstood.So what’s the difference? To simplify matters, imagine frames and packets as envelopes of information that are going to be sent from one person to another. The key difference between a frame and a packet is how they encapsulate the information and that depends on where the information is being sent.Frames explained Imagine a company with inter-department mail where a person can send documents to another person within their private/local organization. The contents are placed in an internal envelope and the sender writes their name and department in the “From” field, then writes the recipient’s name and department in the “To” field. To read this article in full or to leave a comment, please click here

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full or to leave a comment, please click here

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full or to leave a comment, please click here

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full, please click here

DWDM – The Innovation Technology

Today I am going to talk about the technology named as DWDM, DWDM stands for Dense Wavelength Division Multiplexing.  So the question now is why and where we are using the DWDM technology and Who are using these technology.

DWDM is a technology used to used to increase bandwidth over existing fiber optics backbone and is generally used by the service provider across the globe. The need to have the higher bandwidth in the backbone because the count of the users and the customers increases day by day and service provider required higher bandwidth in the core or backbone networks.

The Technology behind the DWDM is used the multiple signals together at different wavelength on the same fiber. DWDM became market in the year of 1995 whilst CWDM (Coarse WDM) emerged after 2000, stimulated by using the telecom crisis. CWDM brings less complicated technological standards as compared to DWDM, reducing down costs, but suits just the lower transmission ability markets, together with the metro and corporation networks. extra recently,  new paradigmatic revolutions have made their manner into the optical communique market: ROADM (Reconfigurable Optical upload-Drop Multiplexing) and Coherent Optical systems. whilst those optical technology are the suitable solutions to fulfil Continue reading

WATCH LIVE: the “25 under 25” Award Ceremony, Monday, 18 September, at 9:00am PDT

Want to learn more about our “25 Under 25” award recipients?  How are they using the Internet to change the communities in which they live?  On Monday, September 18, 2017, at 9:00am US Pacific (16:00 UTC), you will have the chance to learn about the amazing work they are doing. The awards ceremony will be streaming live out of Los Angeles on both Livestream.com and Facebook. You can watch at:

22 of the awardees will be in L.A. to receive their awards. (Three were denied visas.) One of the initiatives supporting the Internet Society’s 25th Anniversary, the program recognizes 25 young people from around the globe who are passionate about using the Internet to make a positive impact in their communities and the world.

Representing 19 countries on five continents, the 25 Under 25 awardees’ initiatives include creating an anti-cyberbullying youth movement in Australia, providing e-health education to teens in Tanzania, and using ICTs to break the cycle of poverty for families in Costa Rica.

Join us to be inspired in how these young people are working to #ShapeTomorrow!

The post WATCH LIVE: the Continue reading

This Week: Data Center Deployment with EVPN/VXLAN

Brand new book – This Week: Data Center Deployment with EVPN/VXLAN.

Author did a great job explaining and showing various examples of real world implementations of EVPN-VXLAN and DCI.
Definitely must read for anybody aiming for JNCIE-DC lab. I wish I’ve read this before my lab attempt – this book really helps to update and systematize all EVPN-VXLAN related knowledge.
But that’s for sure not the first book to read if you doesn’t know anything about EVPN-VXLAN. I recommend firstly read all materials from this post, and only after that this book will be really useful to you.

Network Engineer Jobs


So you want to work for Google as Network Engineer? Check out one of the job ads here. I pasted the screenshot below just in case the ad is removed once the position is no longer available.

"You'll build software for distributed services, abstractions and the components of the system that operates and powers Google." OK, even this is not common in Network Engineer job description, it makes sense since Google is running one of the world's largest networks to connect its data centers that are scattered all around world. As minimum requirement, you must have experience in software development in one or more modern programming languages e.g. C++, Java, Python, Go, etc. And learn how to code using "Teach yourself Python in 24 hours" won't be enough since it is expected for you to have experience in data structures, complexity analysis and software design.

Is Google really looking for Network Engineer (NE), and not Software Engineer (SWE)? Yup, you still need to have expertise in networking protocols and technologies, including end-to-end packet flow, forwarding and routing. Google knows that a world class distributed computing infrastructure must run on world class networking infrastructure that is operated reliably and Continue reading

The Concept of Native VLAN

Today I am going to talk about one of the most interesting topic and its none other than Native VLAN. I knew most of you guys know the concept and the requirement of the Native VLAN and most of you already using and configuring the same in your network environment. But there are so many people just starting studying the basics of the networking and this is one of the most important topic to understand the basics of switching. 

In my example I am taking the Cisco devices where I will show the Native VLAN working and the configurations of the Native VLAN on the devices.

So my first question is What is Native VLAN ?
What is the Use of the Native VLAN ?
When and where to use the Native VLAN concept ? 
Standards of the Native VLANs ?

I knew there are lot of questions in your mind, So lets start with the beginning on the Native VLAN part. The IEEE 802.1Q trunking protocol describes some thing called the “native VLAN”. All site visitors sent and acquired on an interface that is configured for 802.1Q gained have a tag on its Ethernet body. whilst you look Continue reading

Discovery Protocols- CDP and LLDP

Today I am going to talk about the CDP and LLDP protocols. As you guys already knew of CDP, I think most of you are using this command in your daily use to find the connected devices in Cisco devices environment while LLDP is same as CDP but it is a standard protocol for all other Vendors.

So If I am talking about the CDP, CDP Stands for Cisco Discovery Protocol and LLDP stands for Link Layer Discovery Protocol. The role and the working is same for both of these protocols.

CDP is a Cisco proprietary protocol and can be used only on Cisco devices While  LLDP is the standard protocol and can be used for interworking between different network vendors. We need to know only CDP with regards to discovery protocols. But it is always good to go beyond and above what is required in the exam topics. You might find yourself in the situation where you have to monitor and configure a multi-vendor network. LLDP knowledge will come in handy in that situation.

Fig 1.1- CDP Protocol

Some of the important facts about CDP Protocols are given below:-
  • CDP is used to discover the directly related neighboring gadgets, Continue reading

MPLS Design Scenario : Penultimate Hop Popping (PHP)

Today I am going to talk about one of the best practices we are doing while we configuring MPLS in our network. This post is basically for the Service Providers who provide MPLS services to their clients. Let's talk about the concept PHP in details. PHP Stands for penultimate hop popping.

Before you go with this article, Lets review all the articles which can be relevant with the service Provider Domain. Below are the links of these articles.


Now Let's talk about the PHP,  PHP is penultimate hop popping which means remove the label one hop before its destination.It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a Label Switch Router (LSR) before the packet is passed to an adjacent Label Edge Router.

Below is the diagram showing the PHP operation in MPLS environment

Fig 1.1- PHP in MPLS

The process is important in a Layer 3 MPLS VPN environment as it reduces the load on Continue reading

NFD16 First Impressions

Getting bored sitting at San Jose airport waiting for Vagrant to update guest additions in my Ubuntu VM (first item on my to-do list: prepare final version of material for next week’s Docker workshop), so here are my very first impressions of Networking Field Day 16 presentations we’ve seen in the last three days.

As always, there were great presentations, good presentations, … and a few that are best forgotten. I won’t mention those.

Read more ...

Keeping the door open

Last week we announced the names of twenty-five individuals who were selected as the awardees of our 25 under 25 program, an initiative which recognizes young people from around the globe who are using the Internet to make a positive difference.

The program forms part of the Internet Society’s 25th Anniversary celebrations this month, including a special recognition ceremony planned in Los Angeles, California on Monday 18 September for the 25 under 25. We invited all twenty-five awardees to Los Angeles to take part and receive their awards in person but we have learnt that unfortunately, not everyone will be able to travel. Three of the awardees have not been granted visas to enter the United States.

On hearing this news one awardee, Mariano Gomez, penned us an open letter. In it, he explains his frustration at a process which required him to travel over several days to a ten minute interview which resulted in rejection. He described with utter clarity the irony of being denied entry due to the very conditions he hopes to address with the innovations he is pursuing on the Internet.

We understand and applaud Mariano’s statement. Not only are we disappointed that he and two Continue reading