Archive

Category Archives for "Networking"

Risk Management in Submarine Cable Systems

Risk Management in Submarine Cable System   Submarine networks carry over 99% of the world’s Intercontinental electronic communications traffic. There is misconception that Satellites carry data from continent to continent. If we ask anyone in the world, 95% of people give answer as satellites carry international traffic. This is absolutely wrong.   The Internet, International […]

The post Risk Management in Submarine Cable Systems appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Top storage certifications for IT pros

Skilled storage pros are in demand as enterprise IT teams take on exponential data growth and strategically migrate data assets from legacy systems to more modern options.For these professionals who are looking for a new job or aiming to advance in their current role, a certification could potentially differentiate them from other one candidates. And for hiring managers, certifications can help trim some of the risk from the recruitment process by validating to some extent expertise in areas such as network-attached storage, storage area networks, and storage configuration and operations management.Vendor neutral vs. vendor specificTo read this article in full or to leave a comment, please click here

Top storage certifications for IT pros

Skilled storage pros are in demand as enterprise IT teams take on exponential data growth and strategically migrate data assets from legacy systems to more modern options.For these professionals who are looking for a new job or aiming to advance in their current role, a certification could potentially differentiate them from other one candidates. And for hiring managers, certifications can help trim some of the risk from the recruitment process by validating to some extent expertise in areas such as network-attached storage, storage area networks, and storage configuration and operations management.Vendor neutral vs. vendor specificTo read this article in full or to leave a comment, please click here

Bluetooth Mesh networks: Is a standards body right for IoT innovation?

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. It is clear that the Internet of Things (IoT) is the intended market. The SIG says: Bluetooth Mesh is “ideally suited for building automation, sensor networks and other IoT solutions where tens, hundreds, or thousands of devices need to reliably and securely communicate with one another.” Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. The IoT-purpose-built Zigbee—a low-power, low-bandwidth ad hoc network—is a mesh network. Dating to 2002, Aruba Networks was founded to build Wi-Fi mesh networks. In 2014, student protesters in Hong Kong used mobile app FireChat to turn the crowd’s smartphones into a Wi-Fi and Bluetooth mesh network so authorities could not interrupt protester’s coordinating conversations by blocking 3G and 4G network access. Bluetooth Mesh has some very desirable features:To read this article in full or to leave a comment, please click here

Bluetooth Mesh networks: Is a standards body right for IoT innovation?

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. It is clear that the Internet of Things (IoT) is the intended market. The SIG says: Bluetooth Mesh is “ideally suited for building automation, sensor networks and other IoT solutions where tens, hundreds, or thousands of devices need to reliably and securely communicate with one another.” Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. The IoT-purpose-built Zigbee—a low-power, low-bandwidth ad hoc network—is a mesh network. Dating to 2002, Aruba Networks was founded to build Wi-Fi mesh networks. In 2014, student protesters in Hong Kong used mobile app FireChat to turn the crowd’s smartphones into a Wi-Fi and Bluetooth mesh network so authorities could not interrupt protester’s coordinating conversations by blocking 3G and 4G network access. Bluetooth Mesh has some very desirable features:To read this article in full or to leave a comment, please click here

Juniper Q-fabric Solution

Today I am going to talk about the Juniper Q-Fabric solution which is an alternate approach to the Cisco SDA - Software Defined Access solution in the market. If you check the SDA in detail, Cisco uses Fabric network and on the top of it they are using LISP and VXLAN in the campus environment as a overlay protocols. On top of it there is Automation, Analytics and Authentication which is then connected via different APIs in the network.

Let's talk about the Q-fabric which is introduced by Juniper in the market. The so called Q-fabric of juniper is composed of multiple components working together as a single switch to provide high-performance, any-to-any connectivity and management simplicity in the data center or in the campus as well that depends where the requirement actually have.

QFabric System flattens the entire data center network to a single tier where all access points are equal, eliminating the effects of network locality and making it the ideal network foundation for cloud-ready, virtualized data centers.

With the help of QFabric System you can actually improves application performance with low latency and converged services in a nonblocking, lossless architecture that supports Layer 2, Layer 3, Continue reading

RFC 8196: IS-IS Autoconfiguration

Finally a group of engineers figured out it’s a good idea to make things less complex instead of heaping layers of complexity on top of already-complex kludges.

RFC 8196 specifies default values and extensions to IS-IS that make it a true plug-and-play routing protocol. I wonder when we’ll see it implemented now that everyone is obsessed with intent-based hype.

Mind-reading computer moves closer to reality

Computer scientists are developing a mind-reading computer that deciphers symbols that people have looked at.The device accurately replicates shapes seen. The computer scans brain activity, then successfully redraws those numerals and symbols, say scientists working on the project.It’s a “step towards a direct ‘telepathic’ connection between brains and computers,” said the Chinese Academy of Sciences (CAS) in a May news article. And indeed, should it work reliably, it would be a significant improvement on simple Functional Magnetic Resonance Imaging (fMRI) scans, which just read activity in parts of the brain and are used primarily for research.To read this article in full or to leave a comment, please click here