Archive

Category Archives for "Networking"

Cisco POE, POE+ and UPOE introduction

Today I am going to talk about Cisco UPOE. Before we are going to discuss about the Cisco UPOE we will run through POE and POE+

Cisco POE : Cisco POE means Power over Ethernet by which you can provide the power to the endpoint in the LAN infrastructure. So now question is where and why we required POE in the LAN infrastructure. Well sometimes we have the infrastructure where we have some power issues or cabling issues while extending the power to the IP phones. The best to provide the power via LAN network POE switch.

Fig 1.1- Basic POE Switch connected with IP Cameras


IP telephones need power for operation, and Power over Ethernet supports scalable, manageable power delivery and simplifies IP telephony deployments. As wireless networking emerged, Power over Ethernet began powering wireless devices in locations where local power access did not exist.

As per the Cisco offers a comprehensive range of 802.3af-based Power over Ethernet support across the Cisco Catalyst Intelligent Switching portfolio which includes both 10/100/1000 and 10/100 PoE LAN connections, including a 96-port 10/100 PoE module for the Cisco Catalyst 6500 Switch.

Fig 1.2- POE switch with IP-Phones

Well Cisco 802. Continue reading

A New Cybersecurity Strategy for Europe

October is European Cybersecurity Month, an annual advocacy campaign to raise awareness of cyber risks among citizens and businesses, and to share best practices in cybersecurity. This year’s campaign was launched at an event in Estonia, a country which both holds the current Presidency seat of the European Council and is well known as being highly cyber aware and digitally savvy.

It is fitting, therefore, that it is under Estonia’s Presidency that the European Commission announced a number of initiatives last month aimed at stepping up the European Union’s cybersecurity capacity and response to cyber attacks, while laying the foundations for increased cyber awareness and better cyber hygiene overall.

This EU’s Cybersecurity Strategy is a welcome initiative, as we already know that the overall cyber threat level is rising. At Cloudflare, we deal with a new type of DDoS attack every 3 minutes, and it has been that way for the last 6 months. This year alone, we've seen a DDoS attack that peaked at 300 Mpps and another at 480 Gbps. Furthermore, as DDoS mitigation companies like Cloudflare have become adept at handling 'traditional' DDoS attacks, the attackers have also adapted and increasingly try out new techniques.

A holistic Continue reading

Introduction to Sophos XG Firewalls

Today I am going to talk about the Sophos Firewall. The article is basically an introduction to the firewalls by Sophos. I am not taking all segment firewalls here and will take you through for Sophos XG firewall series in this article.

Sophos XG Firewall brings a fresh new approach to the way you manage your rewall, respond to threats, and monitor what’s happening on your network. Get ready for a whole new level of simplicity, security and insight. 

Sophos XG Firewalls provide the unified policy and provide you the single pane of glass to manage, view, filter of the users on the basis of the traffic flow, application used and other stuff in a single screen, I knew we have other firewalls in this segments who are doing the same. Looking what NGFW is doing now a days, all vendors are working hard to make the innovation in this segment. Palo-Alto and Cisco NGFW are head to head in this space. I am so impressed with the Cisco NGFW and Palo-Alto feature sets what they are providing to their customers.

Here, I am not going to talk about the Cisco NGFW or Palo-Alto as this article is basically Continue reading

All Of Ethan’s Podcasts And Articles For September 2017

Here’s a catalog of all the media I produced (or helped produce) in September 2017.

Packet Pushers Weekly Podcast

Packet Pushers Priority Queue Podcast

Datanauts Podcast

EthanCBanks.com

Newsletters

I closed down the Hot Aisle newsletter after months of struggling to know what to do with it. Originally, the Hot Aisle was a way for me to express my individual voice about networking, design, emerging trends, and the IT industry without necessarily having that opinion attached to Packet Pushers, my company. It was also an unsponsored newsletter, which I felt was a nice thing to be able to Continue reading

All Of Ethan’s Podcasts And Articles For September 2017

Here’s a catalog of all the media I produced (or helped produce) in September 2017.

Packet Pushers Weekly Podcast

Packet Pushers Priority Queue Podcast

Datanauts Podcast

EthanCBanks.com

Newsletters

I closed down the Hot Aisle newsletter after months of struggling to know what to do with it. Originally, the Hot Aisle was a way for me to express my individual voice about networking, design, emerging trends, and the IT industry without necessarily having that opinion attached to Packet Pushers, my company. It was also an unsponsored newsletter, which I felt was a nice thing to be able to Continue reading

Arista’s Programmability Strategy

Arista is largely known for its operating system, best known as EOS. Arista has been known to deploy new features at a more rapid pace than other vendors and to have a more open OS–since EOS was the first production-grade network network operating system to expose any form of Linux to end users.

Because of this, I believe it’s perceived Arista has a better programmability strategy than other vendors. From what I can tell, it is not the case. However, given a few features Arista has in EOS, it makes programming EOS a bit easier than other platforms. Let’s take a look.

At Network Field Day 16, Arista reviewed their programmability strategy. There were 5 core components reviewed:

  1. EAPI
  2. OpenConfig
  3. NetDB Streaming
  4. Turbines
  5. EosSdk

Arista Programmability Strategy

Before diving into each of these, I’ll first point out that when I look at “OS programmability,” what is important [to me] is device-level programmability (not controllers or streaming capabilities–those are important topics, but should be covered on their own). Programmability is the ability to program change on a device, isn’t it? Now let’s look at the 5 components in Arista’s strategy.

EAPI - it’s a great API for learning to program an EOS switch. This Continue reading

Arista’s Programmability Strategy

Arista is largely known for its operating system, best known as EOS. Arista has been known to deploy new features at a more rapid pace than other vendors and to have a more open OS–since EOS was the first production-grade network network operating system to expose any form of Linux to end users.

Because of this, I believe it’s perceived Arista has a better programmability strategy than other vendors. From what I can tell, it is not the case. However, given a few features Arista has in EOS, it makes programming EOS a bit easier than other platforms. Let’s take a look.

At Network Field Day 16, Arista reviewed their programmability strategy. There were 5 core components reviewed:

  1. EAPI
  2. OpenConfig
  3. NetDB Streaming
  4. Turbines
  5. EosSdk

Arista Programmability Strategy

Before diving into each of these, I’ll first point out that when I look at “OS programmability,” what is important [to me] is device-level programmability (not controllers or streaming capabilities–those are important topics, but should be covered on their own). Programmability is the ability to program change on a device, isn’t it? Now let’s look at the 5 components in Arista’s strategy.

EAPI - it’s a great API for learning to program an EOS switch. This Continue reading

Not Rolling the KSK

Until a few days ago the intention was to roll the KSK of the root zone of the DNS on the 11th October, altering the root to trust used by DNSSEC for all DNSSEC-validating DNS resolvers. However, earlier this week, ICANN announced the postponement of this key roll.

America’s first exascale supercomputer set for 2021 debut

The next step up in supercomputer performance is exaflops, and there is something of an arms race between nations to get there first — although it’s much more benign than the nuclear arms race of the last century. If anything, it’s beneficial because these monster machines will allow all kinds of advanced scientific research. An exascale computer is capable of processing one exaflop, one quintillion (1,000,000,000,000,000,000) calculations of floating point operations per second. That’s about a trillion times more powerful than a consumer laptop. + Also on Network World: Texas goes big with 18-petaflop supercomputer + China has said it will have an exascale computer by 2020, one year sooner than the U.S.To read this article in full or to leave a comment, please click here

America’s first exascale supercomputer set for 2021 debut

The next step up in supercomputer performance is exaflops, and there is something of an arms race between nations to get there first — although it’s much more benign than the nuclear arms race of the last century. If anything, it’s beneficial because these monster machines will allow all kinds of advanced scientific research. An exascale computer is capable of processing one exaflop, one quintillion (1,000,000,000,000,000,000) calculations of floating point operations per second. That’s about a trillion times more powerful than a consumer laptop. + Also on Network World: Texas goes big with 18-petaflop supercomputer + China has said it will have an exascale computer by 2020, one year sooner than the U.S.To read this article in full or to leave a comment, please click here

Why it pays to spend more on premium people

To spend, or not to spend — that is the question. Whether it’s wiser to invest in the latest and most-hyped hardware and suffer the great misfortune of mediocre talent, or to take the hit and invest in greater minds, and thus end troubles. We can wax poetic for much longer on the many dilemmas that accompany partitioning a budget, but we think our time is better spent providing an actual solution. The reality is that too much of funding is spent on hardware, and not enough is spent on investing in the people who make the technology mean something. In this blog post, we’ll help you understand the benefits of investing more money in employees, and then show you how you can reduce your TCO so that you can stop overspending on hardware and start investing in premium people.

What are the benefits of investing in people?

It pays to invest in people who can really make your company great. In fact, failing to properly invest in your hires can actually cost your company. A study in 2013 showed that seventy percent of American workers were actively disengaged at their job, which cost businesses more than $450 million. So, Continue reading

The Internet Society’s 25th Anniversary and the Renewal of Commitment

Last week was a proud and memorable moment for us at the Internet Society as we celebrated our 25th anniversary in Los Angeles. In addition to the well-known Internet Hall of Fame award ceremony and the annual InterCommunity 2017 event, this year’s event also had a dialogue on topics from  the 2017 Internet Society Global Internet Report: Paths to Our Digital Future and introduced the 25 under 25 award ceremony, which celebrated inspiring and remarkable ideas and projects that young and motivated entrepreneurs in the Internet space have initiated.

I was equally, however, touched by the strong drive and energy in the Internet Society leadership and staff, whose efforts and attention to detail have been clearly visible throughout the two-day event. The joyful spirit demonstrated by the Internet Society team at the Brussels interactive node helped ensure that the 15-hour InterCommunity 2017 marathon covering 16 interactive regional nodes was truly a global conversation. Using the Internet to connect those nodes demonstrated one practical application of the Internet to run a global event with precision and high productivity. Furthermore, the positive mood at Brussels appeared to be quite contagious as reflected by the celebrations that took place in at least another 55 Continue reading

IDG Contributor Network: Addressing the Great IoT Analytics Skills Gap

Expect to see a huge uptick in demand for people who have technology and business skills related to the Internet of Things (IoT), as organizations continue to ramp up their IoT projects in a big way.A new report by 451 Research notes that finding IoT-skilled workers is a big challenge. Nearly half of the 575 IT and IoT decision makers the firm surveyed, primarily in North America and Europe, said they face a skills shortage for IoT-related tasks.The skills companies need to acquire include expertise in areas such as cyber security, networking, device hardware, applications, and overall management of IoT strategy. But perhaps nowhere will demand be greater in the coming years than in areas related to data analytics. As companies seek to use IoT data to predict outcomes,  prevent failures, optimize operations and develop new products, advanced analytics competency—including artificial intelligence (AI) and machine learning (ML)—will be critical to their success.To read this article in full or to leave a comment, please click here

How Should We Handle Failure?

I had an interesting conversation this week with Greg Ferro about the network and how we’re constantly proving whether a problem is or is not the fault of the network. I postulated that the network gets blamed when old software has a hiccup. Greg’s response was:

Which led me to think about why we have such a hard time proving the innocence of the network. And I think it’s because we have a problem with applications.

Snappy Apps

Writing applications is hard. I base this on the fact that I am a smart person and I can’t do it. Therefore it must be hard, like quantum mechanics and figuring out how to load the dishwasher. The few people I know that do write applications are very good at turning gibberish into usable radio buttons. But they have a world of issues they have to deal with.

Error handling in applications is a mess at best. When I took C Programming in college, my professor was an actual coder during the day. She told us during the error handling Continue reading