Archive

Category Archives for "Networking"

Huawei Q&A: Paving a Trusted Way for Cloud-based Transformation

Paving a Trusted Way for Cloud-based Transformation Q&A Thanks to all who joined us for the Huawei 2017 Infrastructure Security Report Webinar: Paving a Trusted Way for Cloud-based Transformation. During the webinar, Huawei discussed a fresh approach when it comes to your cloud journey that is characterized by the transition to cloud computing, mobile Internet, Big Data, and virtual networks. After the webinar, we... Read more →

5 Reasons to buy NetQ

It’s becoming clear that web-scale networking is the future of networking, and companies need the technology in order to remain competitive against cloud giants like Amazon. So, how do organizations looking to move on from traditional networking start to get their feet wet and bring web-scale efficiencies like automation and scalability to their operations?

That’s where NetQ steps in to save the day. NetQ is a telemetry-based fabric validation system that enables organizations to deploy & operate data center networks with the speed and agility of web-scale giants. Where network configuration used to be slow, require manual intervention, and cause network downtime, NetQ automates configuration and ensures that your network is behaving as intended. It’s preventative, proactive, and diagnostic, and should be the next product you incorporate into your data center.

Here are the top five benefits of NetQ:

  1. Save money and reduce downtime: Having a traditional, non automated system means that whenever there’s far more room for manual error. This leads to increased downtime, which costs businesses a lot of money. In fact, hourly downtime can cost up to $1 million or even $5 million! NetQ, however, is a preventative system that validates network behavior on a per-pod Continue reading

First self-powered data center opens

What does it take to open the world’s first self-powered data center? For Aruba S.p.A., it involved three elements: Flowing river water Photovoltaic solar panels Always cold, pumped-to-the-surface underground water as the principal cooling source Aruba’s newest data center, named the Global Cloud Data Center (IT3) is located near Milan, Italy, and claims to be 100 percent green. The 49-acre ANSI/TIA-942 Rating 4 standard facility (at 200,000 square meters) opened earlier this month.Also on Network World: Space-radiated cooling cuts power use 21% Low-impact credentials at the site come largely because the data center has its own dedicated hydroelectric plant. The facility is located on the banks of the River Brembo, an Aruba representative told me. Electricity is generated from the running river water through the operation of turbines. That power is stored and then injected into the national grid infrastructure. Electricity is supposedly guaranteed for the campus by the national grid in exchange for the input.To read this article in full or to leave a comment, please click here

First self-powered data center opens

What does it take to open the world’s first self-powered data center? For Aruba S.p.A., it involved three elements: Flowing river water Photovoltaic solar panels Always cold, pumped-to-the-surface underground water as the principal cooling source Aruba’s newest data center, named the Global Cloud Data Center (IT3) is located near Milan, Italy, and claims to be 100 percent green. The 49-acre ANSI/TIA-942 Rating 4 standard facility (at 200,000 square meters) opened earlier this month.Also on Network World: Space-radiated cooling cuts power use 21% Low-impact credentials at the site come largely because the data center has its own dedicated hydroelectric plant. The facility is located on the banks of the River Brembo, an Aruba representative told me. Electricity is generated from the running river water through the operation of turbines. That power is stored and then injected into the national grid infrastructure. Electricity is supposedly guaranteed for the campus by the national grid in exchange for the input.To read this article in full or to leave a comment, please click here

What Does “Internet Availability” Really Mean?

The Oracle Dyn team behind this blog have frequently covered ‘network availability’ in our blog posts and Twitter updates, and it has become a common topic of discussion after natural disasters (like hurricanes), man-made problems (including fiber cuts), and political instability (such as the Arab Spring protests). But what does it really mean for the Internet to be “available”? Since the Internet is defined as a network of networks, there are various levels of availability that need to be considered. How does the (un)availability of various networks impact an end user’s experience, and their ability to access the content or applications that they are interested in? How can this availability be measured and monitored?

Deriving Insight From BGP Data

Many Tweets from @DynResearch feature graphs similar to this one, which was included in a September 20 post that noted “Internet connectivity in #PuertoRico hangs by a thread due to effects of #HurricaneMaria.”

There are two graphs shown — “Unstable Networks” and “Number of Available Networks”, and the underlying source of information for those graphs is noted to be BGP Data. The Internet analysis team at Oracle Dyn collects routing information in over 700 locations around the world, giving us Continue reading

Cisco Meraki Security – Meraki MX Security Appliances


Meraki Cloud Managed Security Appliance Series 

Today I am going to talk about Cisco acquired Meraki or Cisco Meraki MX Security Appliances. These appliances are ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed, installation and remote management is simple.  So it means that these security appliances will be managed on cloud.The Meraki MX has a comprehensive suite of network services, eliminating the need for multiple appliances. These services include Layer 7 application firewall, content filtering, web search filtering with intrusion prevention, web caching, Intelligent WAN with multiple uplinks and 4G failover. 

Fig 1.1- Cisco Meraki MX Security Appliances

Security Features 
  • With the help of Meraki MX Security appliances we can have Application-aware traffic control which can set bandwidth policies based on Layer 7 application type (e.g., YouTube, Skype, P2P). 
  • Another best feature is the content Filtering which can be used as CIPA-compliant content filtering and safe search enforcement.
  • Meraki based Intrusion prevention ( IPS feature) : PCI-compliant IPS sensor using industry-leading SNORT signature database from Cisco Sourcefire. 
  • With the help of Meraki MX security appliances, you can have the Anti-virus and anti-phishing with flow Continue reading

Episode 14 – Digging Deep into the IS-IS Routing Protocol

In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
 


Russ White
Guest
Nicholas Russo
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 14 – Digging Deep into the IS-IS Routing Protocol appeared first on Network Collective.

Episode 14 – Digging Deep into the IS-IS Routing Protocol

In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.

 

Show Links

https://www.iso.org/standard/30932.html

https://tools.ietf.org/html/rfc1142

https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm

 

Show Notes

  • IS-IS Characteristics
    • IS-IS is a graph
      • Vertices, edges, link types, cost
      • Uses Dijkstra’s algorithm
      • Based on Type Link Value protocol (TLV) instead of fixed type fields which allows IS-IS to be very extensible
      • Similar to OSPF, but the P-node is called the DIS, not the DR, and behaves a bit differently
      • Originally built for host routing
    • Not an IP protocol
      • direct encapsulation to L2, ethertype 0xFEFE
      • Provides some inherent security benefits (very hard to reach in and attack; OSPF solved this with TTL security)
    • QoS over L2VPNs

IDG Contributor Network: 5 cloud computing trends to prepare for in 2018

As we enter the last quarter of 2017, business and IT executives are turning more of their attention to how they can use technology to accomplish their 2018 business objectives. We’ve compiled a list of five trends in cloud computing that strategic businesses will prepare for in the coming year.1. Exponential growth in cloud services solutions Software as a Service (SaaS) opened a flexible and financially attractive door for businesses and consumers to try early cloud services. The growth of infrastructure and platform as a service (Iaas and PaaS, respectively) has expanded the number of cloud solutions available in the public and private sectors. In 2018, we expect to see many more organizations take advantage of the simplicity and high-performance the cloud guarantees.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 5 cloud computing trends to prepare for in 2018

As we enter the last quarter of 2017, business and IT executives are turning more of their attention to how they can use technology to accomplish their 2018 business objectives. We’ve compiled a list of five trends in cloud computing that strategic businesses will prepare for in the coming year.1. Exponential growth in cloud services solutions Software as a Service (SaaS) opened a flexible and financially attractive door for businesses and consumers to try early cloud services. The growth of infrastructure and platform as a service (Iaas and PaaS, respectively) has expanded the number of cloud solutions available in the public and private sectors. In 2018, we expect to see many more organizations take advantage of the simplicity and high-performance the cloud guarantees.To read this article in full or to leave a comment, please click here