Archive

Category Archives for "Networking"

History Of Networking – Fred Baker – RAVEN and Internet Surveillance

Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.

Show Notes


Fred Baker
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.

History Of Networking – Fred Baker – RAVEN and Internet Surveillance

Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.

Show Notes


Fred Baker
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.

IDG Contributor Network: How to use the IoT for continuous business improvement

Few things are drawing as much attention in today’s markets and society alike as the Internet of Things. Almost entirely unknown to the public but a few years ago, today’s IoT is continuously reshaping our lives, changing how we communicate, do business, and share our ideas. Given that few businesses seem to know where to begin when it comes to leveraging the IoT for continuous improvements to their commercial models, then, what steps should managers be taking today to improve their future?A quick review of the IoT’s positive impact on business efficacy shows just how vital it is for corporate CEOs and small business owners alike to get moving immediately when it comes to IoT investment. It’s a brave new interconnected world out there, and those who don’t learn how to manipulate the IoT for their own success will quickly find themselves left in the dust.To read this article in full or to leave a comment, please click here

How SAP is making the shift to industrial IoT

The view of the industrial Internet of Things (IoT) as billions of sensors connected into intelligent systems distracts from its true role: digital transformation. The gargantuan task and investment of making all these connections, reliably and securely, is pointless unless there is a solid business reason — and there are two very good ones.2 reasons manufacturers invest in IoT The first reason big companies invest in IoT is they are worried about being digitally disrupted by a Tesla, Uber, or the next AirBnb in their industries — disrupt or be disrupted.The second reason: a company’s slowing growth and the need for increased productivity. BCG’s Olivier Scalabre explained that driver during a 2016 Ted talk.To read this article in full or to leave a comment, please click here

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest – Deal Alert

Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,800 people on Amazon (read reviews), where its typical list price of $34.25 is discounted 15% to $28.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest – Deal Alert

Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,800 people on Amazon (read reviews), where its typical list price of $34.25 is discounted 15% to $28.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Introduction to TACACS and TACACS+ (Terminal Access Controller Access Control System)

Today I am going to talk about the TACACS and TACACS+ basics with you. I am sure most of you already knew TACACS and TACACS+ as many of you worked and configured the configuration on your devices whether it will Cisco, Juniper or any other vendor in your network.

Here in this article I am Just talk about TACACS and TACACS+ as follow.

What is TACACS and TACACS+ ?
Well all of you already listern this term so many times but many of you confuse what is TACACS and TACACS+.

Terminal Access Controller Access Control System or called as TACACS is a authentication protocol and is commonly used within the UNIX based networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.

TACACS and TACACS+
TACACS is a simple UDP-based access control protocol originally developed by BBN for MILNET. TACACS+ is an enhancement to TACACS and uses TCP to ensure reliable delivery.

Fig 1.1- TACACS and TACACS+ Server
TACACS+ is an enhancement to the TACACS security protocol. TACACS+ improves on TACACS by separating the functions of authentication, authorization, and accounting (AAA) and Continue reading

DMVPN or Firewall-Based VPNs?

One of my readers sent me this question:

I'm having an internal debate whether to use firewall-based VPNs or DMVPN to connect several sites if our MPLS connection goes down. How would you handle it? Do you have specific courses answering this question?

As always, the correct answer is it depends, in this case on:

Read more ...

Difference Between Cisco ACI Multi-Pod Vs Cisco ACI Multi-Site

Today I am going to talk about the difference between the Cisco ACI Multi-Site and Cisco ACI Multi-Pod deployment. I already talk about the basics of Cisco ACI Multi-Site and Cisco ACI Multi-Pod in my earlier posts. If you want to look through it, Please have a look to the below link to understand the Cisco ACI Multi-Pod and Cisco ACI Multi-Site

Introduction to Cisco ACI stretched fabric and ACI Multi-pod Fabric Designs
Introduction to ACI Multi-Site Fabric Design Network

Hope you go through the above links to understand, So let me talk about the basic difference between the Cisco ACI Multi-Pod and Cisco ACI Multi-Site. 


Fig 1.1- ACI Multi-Site and Multi-Pod Deployments

Below are the difference as :
  • In Multi-Pod you can have, Full ACI functionality across an entire Multi-Pod fabric while in in Multi-Site you can have Tenants, Applications, VRFs, BDs, Subnets, EPGs (including μSeg), policies stretched across ACI fabrics 
  • Availability Zone: In Multi-Pod, Single availability zone with one APIC cluster for an entire Multi-Pod fabric that provides central point of management while in Multi-Site we have Multiple availability zones.In each fabric with its separate APIC cluster is an availability zone managed by Multi-Site.
  • VM Migration : In Multi-Pod, Live Continue reading

Rough Guide to IETF 100 – IPv6

In this post for the Internet Society Rough Guide to IETF 100, I’m reviewing what’ll be happening at IETF 100 in Singapore next week.

IPv6 global adoption rates passed 20% shortly after IETF 99, with a number of countries making substantial strides in IPv6 deployment in the past few months. Belgium still leads the way at over 60%, but India has shot up to over 50% which is extremely encouraging in such a large market. Adoption rates also exceed 40% in the United States and Germany, and with most major content and cloud providers now supporting IPv6, there’s a substantial amount of IPv6-related work happening in Singapore. In fact, there’s no less than five IPv6-related working groups on the first day alone.

The IPv6 Operations (v6ops) Working Group is always one of the key groups, and since the last meeting has published two RFCs on Host Address Availability Recommendations (https://tools.ietf.org/html/rfc7934) and Local-Use IPv4/IPv6 Translation Prefix (https://tools.ietf.org/html/rfc8215). The meeting kicks off on Monday afternoon and continues on Thursday morning, starting with a case study on IPv6-only deployment at Cisco.

There are also seven drafts being discussed including 464XLAT Deployment Guidelines for Operator Continue reading

BrandPost: FlexWare: Year Two

It’s been over a year since AT&T introduced its FlexWare offering. It was positioned as the next big thing in enterprise networking, and in the intervening months, AT&T has rolled out a number of important virtual network functions (VNFs) that run on its x86-based FlexWare devices.Those VNFs essentially replace proprietary boxes that historically have been costly to operate and replace in terms of time and money.Light Reading’s Carol Wilson said that AT&T’s venture into “white box services” is “a clear signal to traditional telecom suppliers that the gig’s up on closed system sales.” That’s cheery news to enterprises that have long chafed over the relative inflexibility of on-site equipment solutions.To read this article in full or to leave a comment, please click here

Top 5 From The Last 3 Months

 

In the year 2017, news comes at you fast. So, it’s easy to miss the important or informational items that just weren’t on your radar when they first arrived. While we believe VMware NSX should be firmly on everyone’s virtualization radar, we understand that you may miss a few items from time to time. That’s why we’re putting together this VMware NSX news round-up.

This news round-up recaps the latest NSX-related material you may have missed over the past few months for you peruse at your leisure. We’ll compile these posts again from time to time, so be sure to keep your eye on this space for more VMware NSX news rounds-ups and informational posts!

Real World Use Cases for NSX and Pivotal Cloud Foundry

From the post: Pivotal Cloud Foundry (PCF) is the leading PaaS solution for enterprise customers today, providing a fast way to convert their ideas from conception to production. This is achieved by providing a platform to run their code in any cloud and any language taking care of all the infrastructure “stuff” for them.

From building the container image, compiling it with the required runtime, deploying it in a highly available mode and connecting Continue reading