Archive

Category Archives for "Networking"

HPE offers a SaaS-based tool for hybrid cloud management

While cloud computing holds out the promise of operational efficiency and cost optimization, most big companies will be operating hybrid computing environments for the foreseeable future. As a result, cloud technology for many companies adds yet another layer on top of an already complex computing infrastructure.Seeing an opportunity to help IT departments work with developers and lines of business to optimize their hybrid computing environments, HPE is offering what it calls the first SaaS-based multicloud management application for on-premises and public clouds. Dubbed OneSphere, the software is being unveiled at the company's Discover Conference in Madrid today.To read this article in full, please click here

IDG Contributor Network: The case for securing the SD-WAN

With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity.Among other things, this rapidly evolving threat environment can be attributed to new and expanding threat vectors that have opened the door for external threats to reach critical business assets via non-corporate entities, whether through a consumer device, poorly secured partner network or branch office. The Internet of Things (IoT) and guest tenant services, for example, force a unique method of segmenting the traffic service/workloads and introduce a level of operational complexity.To read this article in full, please click here

IDG Contributor Network: The case for securing the SD-WAN

With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity.Among other things, this rapidly evolving threat environment can be attributed to new and expanding threat vectors that have opened the door for external threats to reach critical business assets via non-corporate entities, whether through a consumer device, poorly secured partner network or branch office. The Internet of Things (IoT) and guest tenant services, for example, force a unique method of segmenting the traffic service/workloads and introduce a level of operational complexity.To read this article in full, please click here

BrandPost: Network Outages? Unacceptable. How to Ensure Availability

The rise of cloud applications has been well documented. The cloud era kicked off with a handful of SaaS applications, such as ERP, CRM and HR systems. Today, businesses are buying almost everything cloud-related — from compute services, contact center software, unified communications to anything else you can think of. These apps and services may look somewhat unrelated, but they all have one thing in common: They are highly dependent on the network to perform properly.Consider a consumer example. We pay Netflix a certain amount of money to watch a movie, but we are entirely dependent on our network connections to enjoy the experience. It doesn’t matter how much more money we pay Netflix; if our network connection performs poorly or is unavailable, the viewing experience suffers.To read this article in full, please click here

BGP Attribute : AIGP-BGP Accumulative IGP

Today I am going to talk about the BGP attribute called as BGP AIGP or so called Accumulated IGP which is now a days used to find the best path in the BGP protocol. 

Now Before i start with the BGP AIGP attribute, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now the question is why it is introduced in the BGP after so long ?
The Reason is facing day to day issues when enterprises or service providers come up with the multiple, contiguous BGP AS's in their network and want to handle by single administrator. The expectation is to have the best path from two different AS which is controlled by Single administrator domain. 

IEFT introduces the BGP attribute named as AIGP by which the BGP speakers can perform a best path-selection for a prefix based on IGP metric even if the nodes are in two different AS's.

What kind Continue reading

Switching Techniques: Root Guard Vs BPDU Guard

Today I am going to talk about the Root Guard and BPDU guard which is widely used in the switching LAN network with STP/RSTP protocol. Earlier i wrote about the RSTP in details which you can follow on the below mentioned link.

Rapid Spanning Tree Protocol and Configurations - RSTP

Now Before i start with the Root Guard and BPDU guard, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now let's talk about one by one in details, First let me talk about the Root Guard

Root guard
When we talk about the Root guard,If you have a port that is configured with root guard and it receives a superior BPDU it will move that specific vlan to a root inconsistent state which effectively means it will stop passing traffic to that vlan off that port.  Because of this you need to be very careful where you put the Continue reading

Wi-Fi standards and speeds explained, compared

In the world of wireless, the term Wi-Fi is synonymous with wireless access, even though the term Wi-Fi itself (and the Wi-Fi Alliance) is a group dedicated to interoperability between different wireless LAN products and technologies.The standards themselves are part of the 802.11 family of standards, courtesy of the IEEE. With terms such as “802.11b” (pronounced “Eight-O-Two-Eleven-Bee”, ignore the “dot”) and “802.11ac”, the alphabet soup of standards that began in the late 1990s continues to see improvements in throughput and range as we race to the future to get faster network access.Along the way, improvements are being made by adopting new frequencies for wireless data delivery, as well as range improvements and reduced power consumption, to help support initiatives like “The Internet of Things” and virtual reality.To read this article in full, please click here

Wi-Fi standards and speeds explained, compared

In the world of wireless, the term Wi-Fi is synonymous with wireless access, even though the term Wi-Fi itself (and the Wi-Fi Alliance) is a group dedicated to interoperability between different wireless LAN products and technologies.The standards themselves are part of the 802.11 family of standards, courtesy of the IEEE. With terms such as “802.11b” (pronounced “Eight-O-Two-Eleven-Bee”, ignore the “dot”) and “802.11ac”, the alphabet soup of standards that began in the late 1990s continues to see improvements in throughput and range as we race to the future to get faster network access.Along the way, improvements are being made by adopting new frequencies for wireless data delivery, as well as range improvements and reduced power consumption, to help support initiatives like “The Internet of Things” and virtual reality.To read this article in full, please click here

What is 802.11? Wi-Fi standards and speeds explained

In the world of wireless, the term Wi-Fi is synonymous with wireless access, even though the term Wi-Fi itself (and the Wi-Fi Alliance) is a group dedicated to interoperability between different wireless LAN products and technologies.The standards themselves are part of the 802.11 family of specifications written by the IEEE, eachwith its own letter code after the intial 80211, such as “802.11b” (pronounced “Eight-O-Two-Eleven-Bee”, ignore the “dot”) and “802.11ac”. This alphabet soup that began in the late 1990s continues evolve, with improvements in throughput and range as we race to the future to get faster network access.Along the way, improvements are being made by adopting new frequencies for wireless data delivery, as well as range improvements and reduced power consumption, to help support initiatives like “The Internet of Things” and virtual reality.To read this article in full, please click here

We Want to Hear from SD-WAN Customers

Sue Marek: Editor-in-Chief at SDxCentral We’ve all heard the tales of how software-defined wide-area networking (SD-WAN) can dramatically change the ways taht enterprises connect their branch offices and save companies thousands of dollars. But who better to tell those stories than the IT executives at those enterprises that are working with the technology every day?  We’d love to be able... Read more →