Archive

Category Archives for "Networking"

One Week to IPv6, Routing Security, and More at ION Belgrade

One week from today, we’ll be at ION Belgrade! Our last event of the year take place on Thursday, 23 November 2017, alongside the 3rd Republic of Serbia Network Operators’ Group (RSNOG).

As always, ION Conferences bring network engineers and leading industry experts together to discuss emerging technologies and hot technology topics. Early adopters provide valuable insight into their own deployment experiences and bring participants up to speed on new standards emerging from the IETF.

Agenda

The half-day agenda and all our great speakers for ION Belgrade will make this a great event. Here’s a quick look at the day:

  • Opening Remarks
  • Welcome from the ISOC Serbia Chapter
  • MANRS, Routing Security, and Collaboration
  • NAT64check
  • What’s Happening at the IETF? Internet Standards and How to Get Involved
  • Panel Discussion: IPv6 Success Stories
  • Closing Remarks

Registration

ION Belgrade registration is open! Learn more about our co-host on the RSNOG main page.

Webcast

RSNOG will be live streaming the ION in the morning and RSNOG in the afternoon. The stream will be embedded on the conference main page, right above the agenda, here (Serbian) and here (English).

IPv6 Tutorial

Jordi Palet Martinez will conduct an IPv6 training session the day before the ION. Continue reading

Basics of VRF(Virtual Routing forwarding)

Today I am going to talk about one of the most important concept on which MPLS works. I understand many of you already knew about the MPLS but some of you guys are still want me to explain the concept of MPLS and the MPLS starts from the concept of VRF. 
Before we will start with the concept of the VRF, Please subscribe our Youtube Channel, as we are going to upload many networking videos there soon.
Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go
What is VRF- Virtual Routing forwarding ?
As you already knew that VRF stands for Virtual Routing Forwarding and is a separate routing table within a router. VRFs are to a router what VLANs are to a switch. Using VRFs, it is possible to virtualize a single router into several instances, each of them being (relatively) independent of each other, allowing for overlapping subnets, separate instances of routing protocols, separate set of interfaces assigned to each VRF. 
In other words you can say that VRF stands for virtual routing and forwarding. When you create a vrf, you tell it what routes to import/export. Then you assign that vrf to an interface. Once the vrf is attached to Continue reading

How to gauge your network’s openness

So, you’ve done your research, learned about the many benefits of open networking, and decided you’re interested in building an open network. Congratulations, and welcome to the future of networking! You’ve made a great first step, but maybe you’re concerned about where to begin when it comes to vendors. A lot of network providers will claim that they have open solutions…but how can you be sure you’re choosing the best one? Or how can you determine if your vendor is truly an open solution? Fortunately, there are ways to gauge if your solution is as open as you need it to be. If you don’t want to get duped by phony open vendors, make sure to keep these three things in mind:

The definition of “open networking” is not set in stone

While there are common criteria and ideologies that tend to be associated with open networks, the definition of open networking is still very fluid and can mean different things to different vendors. So, when you’re trying to decide which vendor to go with, don’t let them off easy with simple answers. Ask specific questions about what exactly “open” means to them. Simplicity, flexibility, and modularity are Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  🙂   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  ?   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

NANOG 75 Overview

Click through to the full list of NANOG 75 meeting information.

NANOG 75 Hackathon will take place February 17, 2019 and the NANOG 75 conference is February 18-20, 2019. Both will offer a great opportunity to network with colleagues, freshen-up skills, learn advanced networking techniques, and discover new network applications.  

We will be gathering at the Hyatt Regency San Francisco.   A crimson bridge, cable cars, a sparkling bay, and streets lined with elegant Victorian homes—San Francisco is undeniably one of the world’s great cities. Located along the Northern California at the state’s distinctive bend in the coast, the region has an alluring magic that stretches beyond the bay to diverse cities with nightlife and trend-setting cuisine. 

NANOG 75 host sponsor is

DigitalRealty_JPG_1.30

 

Join NANOG today and receive a $25 discount on standard registration fees for any NANOG conference.

 

 

MEETING REGISTRATION

Meeting Registration is now open.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here