Archive

Category Archives for "Networking"

Community Networks: By Indigenous Communities, for Indigenous Communities

At the Internet Society, we believe that the Internet is for everyone. We’re standing by that belief by supporting network development and deployment for indigenous communities that face Internet access challenges.

Community networks, communications infrastructure deployed and operated by local people, offer indigenous communities a way to access the Internet to meet their own needs. These community networks offer a connection to health, education, and economic strength. For many, affordable, high-quality Internet access means community sustainability. In addition, community networks encourage policymakers and regulators to examine new ways and means to fill local digital divides, like supporting local content in the appropriate language(s).

These benefits are not theoretical; we have seen great changes through small projects and united community members working toward a common goal. There are many success stories of indigenous community networks around the world. Take a look at how some of our partners have been working with indigenous communities to develop community networks:

  • The First Mile Connectivity Consortium supports remote and rural First Nations developing and innovating with information and communication technologies (ICT) through research, policy, and outreach. Their website highlights stories of people like Bruce Buffalo, who developed a system that offers four free Internet access Continue reading

IoT can learn from smartphone security

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device principals that we have been working with for years, particularly enhanced security and privacy. With so many distinct applications, device scope and diversity represent a unique security challenge that so far has not been met.I estimate that 85 percent or more of current IoT devices deployed in the real world do not have adequate security installed, and it’s likely that the vast majority of those will never be upgraded (or are not even capable of being upgraded). That means not only do current devices being installed pose a risk, but over the next one to two years, the vast majority of devices that will be deployed also pose a risk.To read this article in full or to leave a comment, please click here

IoT can learn from smartphone security

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device principals that we have been working with for years, particularly enhanced security and privacy. With so many distinct applications, device scope and diversity represent a unique security challenge that so far has not been met.I estimate that 85 percent or more of current IoT devices deployed in the real world do not have adequate security installed, and it’s likely that the vast majority of those will never be upgraded (or are not even capable of being upgraded). That means not only do current devices being installed pose a risk, but over the next one to two years, the vast majority of devices that will be deployed also pose a risk.To read this article in full or to leave a comment, please click here

Making a Clickable HTML Network Diagram using OmniGraffle

As a Mac user, I have to give my diagramming love to OmniGraffle and I try not to envy the Visio users too much. I maintain that Graffle diagrams subjectively look nicer than Visio, but in terms of features, Visio wins the day. Despite that, sometimes poor old Graffle does so something helpful and in this case, it’s being able to export a diagram as an image with an HTML image map.

The Plan For A Web-Based Network Diagram

My plan was to create a web-based network diagram for my home network where I could click on any device on the diagram and be connected to it using the appropriate protocol handler (e.g. SSH or HTTPS). This hypothetical page would not serve as a diagram of the network, but might also provide useful information for my long-suffering, geek wife, who tells me with despair in her eyes that she has no idea what the network looks like any more after I’ve messed around with it so much. She has a point. After considering making something in HTML, I realized that OmniGraffle would do the hard work for me, and it would be much easier to update later, too.

For Continue reading

Apstra intent-based networking bridges the physical, virtual

Intent-based systems have been all the rage since Cisco announced its “Network Intuitive” solution earlier this year. For Cisco customers, its solution is certainly interesting. But what about businesses that want an alternative to Cisco? Or companies that want to run a multi-vendor environment?Over a year before Cisco’s launch, a start-up called Apstra shipped the closed-loop, intent-based solution. It was designed to be multi-vendor in nature with support for Cisco but also Arista, Juniper, HP and others, including white box. Apstra operates as an overlay to networks built on any of the leading vendors to deliver intent-based networking in heterogeneous environments.To read this article in full or to leave a comment, please click here

Apstra intent-based networking bridges the physical, virtual

Intent-based systems have been all the rage since Cisco announced its “Network Intuitive” solution earlier this year. For Cisco customers, its solution is certainly interesting. But what about businesses that want an alternative to Cisco? Or companies that want to run a multi-vendor environment?Over a year before Cisco’s launch, a start-up called Apstra shipped the closed-loop, intent-based solution. It was designed to be multi-vendor in nature with support for Cisco but also Arista, Juniper, HP and others, including white box. Apstra operates as an overlay to networks built on any of the leading vendors to deliver intent-based networking in heterogeneous environments.To read this article in full or to leave a comment, please click here

Apstra bridges the physical — virtual network divide

Intent-based systems have been all the rage since Cisco announced its “Network Intuitive” solution earlier this year. For Cisco customers, its solution is certainly interesting. But what about businesses that want an alternative to Cisco? Or companies that want to run a multi-vendor environment?Over a year before Cisco’s launch, a start-up called Apstra shipped the closed-loop, intent-based solution. It was designed to be multi-vendor in nature with support for Cisco but also Arista, Juniper, HP and others, including white box. Apstra operates as an overlay to networks built on any of the leading vendors to deliver intent-based networking in heterogeneous environments.To read this article in full or to leave a comment, please click here

Set up a dedicated virtualization server on Packet.net

Packet is a hardware-as-a-service vendor that provides dedicated servers on demand at very low cost. For me and my readers, Packet offers a solution to the problem of using cloud services to run complex network emulation scenarios that require hardware-level support for virtualization. Packet users may access powerful servers that empower them to perform activities they could not run on a normal personal computer.

In this post, I will describe the procedure to set up an on-demand bare metal server and to create and maintain persistent data storage for applications. I will describe a generic procedure that can be applied to any application and that works for users who access Packet services from a laptop computer running any of the common operating systems: Windows, Mac, and Linux. In a future post, I will describe how I run network emulation scenarios on a Packet server.

Table of Contents

  1. Packet.net
    1. Controlling costs when using bare metal servers
    2. Create a Packet account and Login
    3. Create a project
  2. Generate SSH Keys
    1. Windows
    2. Mac
    3. Linux
    4. Copy public key to Packet.net
  3. Deploy a Server
  4. SSH Server on local machine
    1. Windows
    2. Mac
    3. Linux
  5. Set up the remote server
    1. Test X11 forwarding
  6. Create block storage
    1. Create Continue reading

Time to rethink how much customer data you store

Does the company you work for (or own) retain data on customers? Odds are pretty high that it does, at least in some form (often fairly extensively). It's often attractive to do so for both marketing and functionality purposes.But here's the thing, storing that data is probably a bad business decision. One that could cost your business a huge amount of money and, even worse, potential loss of trust by your most valuable customers.Storage costs  Just from the IT infrastructure point of view: As your business grows and the amount of data you store on each customer slowly expands (it always does), your cost for storing that data also grows. Rather quickly. Even if your data center is already well equipped, this is a not-insignificant recurring expense (failing drives, energy costs, other equipment needs, etc.).To read this article in full or to leave a comment, please click here

Time to rethink how much customer data you store

Does the company you work for (or own) retain data on customers? Odds are pretty high that it does, at least in some form (often fairly extensively). It's often attractive to do so for both marketing and functionality purposes.But here's the thing, storing that data is probably a bad business decision. One that could cost your business a huge amount of money and, even worse, potential loss of trust by your most valuable customers.Storage costs  Just from the IT infrastructure point of view: As your business grows and the amount of data you store on each customer slowly expands (it always does), your cost for storing that data also grows. Rather quickly. Even if your data center is already well equipped, this is a not-insignificant recurring expense (failing drives, energy costs, other equipment needs, etc.).To read this article in full or to leave a comment, please click here

IP Fast Reroute, LFA and Remote LFA Discussion for real network deployment

IP Fast Reroute , LFA (Loop Free Alternate) , Remote LFA and in general recovery and protection discussion. In this post, I will share the discussion with one of my slack group member, Driss Jabbar. He is a CCDE and highly skilled network engineer and also author of some posts in this website. You can […]

The post IP Fast Reroute, LFA and Remote LFA Discussion for real network deployment appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Update for the Free Network Engineers Group

A while ago, I created a slack group for the network engineers. Some of you might be a part of the group and have been enjoying, learning, discussing the networking topics, real life deployments, for a while.   I wanted to say that, I started to extend the group. It started initially for the Telco, […]

The post Update for the Free Network Engineers Group appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cisco 6K Switch Supervisor Engines ( SUP 6T Vs SUP 2T)

I have been asked many times from many of the followers of the blogs about the SUP engines in Cisco catalyst 6k Series product mainly in Cisco 6500 Switches. Well first of all i would like to inform you that Cisco already announce Cisco 6500 chassis end of sale and also the previous SUP engines SUP-720 already end of life announcements.

As the question is related to Cisco 6500 Chassis only and the question is which chassis in Cisco 6500 Chassis supports SUP 2T and SUP 6T supervisor engines ?
Well the answer is SUP 2T and SUP 6T supported in the E-series 6500 chassis only. So if I am talking about the E-Series Chassis they are

  • Cisco Catalyst 6503-E 
  • Cisco Catalyst 6504-E
  • Cisco Catalyst 6506-E
  • Cisco Catalyst 6509-E
  • Cisco Catalyst 6509-V-E 
  • Cisco Catalyst 6513-E 

What are the capabilities of Cisco SUP 2T supervisor engines ?
Supervisor Engine 2T is designed to deliver higher performance, better scalability, and enhanced hardware enabled features. It integrates a high-performance 2-terabit (Tb) crossbar switch fabric that enables 80-Gbps switching capacity per slot on all Cisco Catalyst 6500 Series Switches.

Image of SUP 2T supervisor ?
Below is the image of the SUP 2T 

Fig 1.1- SUP Continue reading