Archive

Category Archives for "Networking"

62% off Etekcity Wireless Bluetooth 4.0 Receiver – Deal Alert

Stream audio from your Bluetooth device to any non-Bluetooth enabled receiver, speaker, or car stereo with this adapter from Etekcity, which is currently discounted 62% down to just $18.88. Simply connect the receiver to your speaker system via a traditional RCA or 3.5mm aux audio input, and pair with your Bluetooth device. Its compact design makes it super portable, and its long lasting battery provides up to 10 hours of streaming before needing a re-charge. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Amazon Discounts Fire Devices Once Again, For a Limited Time – Deal Alert

There's always a reason to celebrate, and Amazon does it with discounts, often times on their own devices. To celebrate Halloween, apparently, Amazon has once again activated a limited time discount on Fire tablet devices. Amazon's devices are packed with features and are suitable low cost alternatives to other high priced devices on the market. If you've been thinking about a tablet for yourself, or for the family, consider these deals:Fire Tablet Halloween Promotion, 10/22 12AM ET to 10/28 11:59PM ET $20 off Fire Kids Edition https://www.amazon.com/dp/B01J90MSDS $30 off Fire HD 8 Kids Edition https://www.amazon.com/dp/B01J94SBEY $50 off Fire Kids Edition 2-pack https://www.amazon.com/dp/B073VVC94R $80 off Fire HD 8 Kids Edition 2-pack https://www.amazon.com/dp/B072BYGPPZ To read this article in full or to leave a comment, please click here

History Of Networking – Donnie Savage – EIGRP

Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.


Donnie Savage
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.

History Of Networking – Donnie Savage – EIGRP

Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.


Donnie Savage
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.

What is virtualization?

No advance in information technology in the past six decades has offered a greater range of quantifiable benefits than has virtualization. Many IT professionals think of virtualization in terms of virtual machines (VM) and their associated hypervisors and operating-system implementations, but that only skims the surface. An increasingly broad set of virtualization technologies, capabilities, strategies and possibilities are redefining major elements of IT in organizations everywhere.Virtualization definition Examining the definition of virtualization in a broader context, we define virtualization as the art and science of making the function of an object or resource simulated or emulated in software identical to that of the corresponding physically realized object. In other words, we use an abstraction to make software look and behave like hardware, with corresponding benefits in flexibility, cost, scalability, reliability, and often overall capability and performance, and in a broad range of applications. Virtualization, then, makes “real” that which is not, applying the flexibility and convenience of software-based capabilities and services as a transparent substitute for the same realized in hardware.To read this article in full or to leave a comment, please click here

What is virtualization?

No advance in information technology in the past six decades has offered a greater range of quantifiable benefits than has virtualization. Many IT professionals think of virtualization in terms of virtual machines (VM) and their associated hypervisors and operating-system implementations, but that only skims the surface. An increasingly broad set of virtualization technologies, capabilities, strategies and possibilities are redefining major elements of IT in organizations everywhere.Virtualization definition Examining the definition of virtualization in a broader context, we define virtualization as the art and science of making the function of an object or resource simulated or emulated in software identical to that of the corresponding physically realized object. In other words, we use an abstraction to make software look and behave like hardware, with corresponding benefits in flexibility, cost, scalability, reliability, and often overall capability and performance, and in a broad range of applications. Virtualization, then, makes “real” that which is not, applying the flexibility and convenience of software-based capabilities and services as a transparent substitute for the same realized in hardware.To read this article in full or to leave a comment, please click here

What does hot potato routing mean? Why hot potato routing is important?

What does Hot Potato Routing mean ? Why hot potato routing is important ? What is the default policy of the Internet Service Providers ? In which case Hot Potato Routing is not wanted ? I will explain these questions and more in this post.   What does Hot Potato Routing Mean ?   If …

The post What does hot potato routing mean? Why hot potato routing is important? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Create Network Diagram from LLDP Neighbor Information

One of the sample Ansible playbooks I published to help the attendees of my Building Network Automation Solutions course get started collects LLDP neighbor information on all managed devices and converts that information into a network diagram.

Here’s the graph I got from it when I ran it on my 6-node OSPF network (the Inter-AS VIRL topology from this repository). Please note I spent zero time tweaking the graph description (it shows).

Read more ...

Introduction to Port Channels and LACP

Today I am going to talk about the LACP protocol or people also knew this as port-channel or ether-channel. This topic is basically based on the Arista Networks switches. I will discuss the basics of port channel and then we will have the configurations on the switches.

What is Port Channel ? when and where it is used ?
A port channel is a communication link between two switches that consists of matching channel group interfaces on each switch. A port channel is also referred to as a Link Aggregation Group (LAG). Port channels combine the bandwidth of multiple Ethernet ports into a single logical link. 
A channel group is a collection of Ethernet interfaces on a single switch. 

Fig 1.1- LACP between Cisco and HP Switches
A port channel interface is a virtual interface that consists of a corresponding channel group and connects to a compatible interface on another switch to form a port channel. Port channel interfaces can be configured and used in a manner similar to Ethernet interfaces. Port channel interfaces are configurable as layer 2 interfaces, layer 3 (routable) interfaces, and VLAN members. Most Ethernet interface configuration options are available to port channel interfaces. 

Encryption and law enforcement can work together

The Internet Society and Chatham House will be hosting a roundtable of experts to deconstruct the debate on encryption and law enforcement access this week. I am not under any illusion that we will walk away with the solution. This is a complex problem: one that many have tried to solve, often with limited success. However, I am optimistic that the people in the room have the potential to look beyond their own positions, to consider the impact of decisions they may make concerning encryption, and to work together to unite two important societal objectives: the security of infrastructure, devices, data and communications; and the needs of law enforcement.

Perhaps the biggest dilemma facing both law enforcement and companies that provide digital services is – how much encryption is “enough” and who gets to decide?

There is an “encryption dichotomy” in the market: some services are more “law enforcement access friendly” than others. This dichotomy is not new. But, in the last four years, a number of leading tech companies with substantial customers bases have added more encryption and removed their ability to decrypt their customers’ content, to increase the privacy and security of their services. A side-effect of these Continue reading

Internet in China

In this post I’ll describe some experiences I had with the Internet in China, and what it means for people making websites in the west in order to reach expats, visitors, and anyone else in China. So this should be useful information even if you don’t care about China as a market at all.

This blog post may be updated, as I have more thoughts on Internet in China.

My subjective experience is that “Internet in China” is an oxymoron. How exactly is there “Internet” without Google, Facebook, and Twitter? When attaching an Android phone to a WiFi in China it even says “Wi-Fi has no Internet access”.

OK, that’s not entirely serious. Especially since I’m obviously not aware of what the Chinese language Internet looks like, not speaking or reading Chinese. Baidu looks like it largely provides the services Google does (search, maps, …), but they’re pretty much not translated. The Baidu Map app seems fine, but is almost useless if you don’t speak Chinese. The one thing it’s good for is that unlike Google Maps (if you can even get to it. see below) it actually shows you a correct location within China.

But more importantly it’s not Continue reading

8 free Wi-Fi stumbling and surveying tools for Windows and Mac

There is enterprise-level software for surveying Wi-Fi networks, but even in large wireless networks, simple freeware tools are handy for a quick peek at the airwaves during design, deployment or troubleshooting.Here is a look at eight free tools – some for Windows and some for Mac OS X – that provide basic details about nearby Wi-Fi signals: SSIDs, signal strength, channels, MAC addresses and security status. Some can even reveal “hidden” or non-broadcasted SSIDs, display the noise levels, or display statistics on successful and failed packets of your wireless connection. One of them includes Wi-Fi password-cracking tools that are useful for educational or penetration testing purposes.To read this article in full or to leave a comment, please click here

8 free Wi-Fi stumbling and surveying tools

Stumbling and surveyingHere are 9 tools that provide important details on known and unknown aspects of your Wi-Fi network. Each of these tools gives you the basic wireless details: SSIDs, signal strength, channels, MAC addresses and security status. Some can even reveal “hidden” or non-broadcasted SSIDs, display the noise levels, or display statistics on successful and failed packets of your wireless connection. Two of the tools include Wi-Fi password cracking tools as well, useful for educational or penetration testing purposes.To read this article in full or to leave a comment, please click here