Archive

Category Archives for "Networking"

A glance back at the looking glass: Will IP really take over the world?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies, were just starting to come into their own, and all optical switching was just beginning to be considered for large scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: “The past is a foreign country; they do things differently there.”

In the midst of this change, the Association for Computing Machinery (the ACM) published a paper entitled “Will IP really take over the world (of communications)?” This paper, written during the ongoing discussion within the engineering community over whether packet switching or circuit switching is the “better” technology, provides a lot of insight into the thinking of the time. Specifically, as the author say, the belief that IP is better:

…is based on our collective belief that packet switching is inherently superior to circuit switching because of the efficiencies of statistical multiplexing, and the ability of IP to route around failures. It is widely assumed that IP is simpler than circuit Continue reading

Can Wave 2 handle the wireless tsunami heading toward us?

There seems to be a shift in our industry from wireless N to AC, as we have seen large leaps forward in bandwidth and client saturation handling. With more wireless options going in the workplace, widespread connectivity continues to rise and wireless requirements are becoming greater and greater.Now, with Wave 2 becoming more common, is AC really able to handle the tsunami-like wave of wireless internet requests to meet this growing demand?Also on Network World: REVIEW: Early Wave 2 Wi-Fi access points show promise There's only one way to find out. We need to step out of the comfort zone provided by past wireless technologies and expand the idea of what wireless is capable of providing to meet these demands.To read this article in full or to leave a comment, please click here

Can Wave 2 handle the wireless tsunami heading toward us?

There seems to be a shift in our industry from wireless N to AC, as we have seen large leaps forward in bandwidth and client saturation handling. With more wireless options going in the workplace, widespread connectivity continues to rise and wireless requirements are becoming greater and greater.Now, with Wave 2 becoming more common, is AC really able to handle the tsunami-like wave of wireless internet requests to meet this growing demand?Also on Network World: REVIEW: Early Wave 2 Wi-Fi access points show promise There's only one way to find out. We need to step out of the comfort zone provided by past wireless technologies and expand the idea of what wireless is capable of providing to meet these demands.To read this article in full or to leave a comment, please click here

IDG Contributor Network: ElectOS uses open source to restore trust in voting machines

When people doubt that an election will be conducted fairly, their trust in the outcome and their leaders naturally erodes. That’s the challenge posed by electronic voting machines. Technology holds the promise of letting people vote more easily and remotely. But, they’re also prone to hacking and manipulation. How can trust be restored in voting machines and election results?Voting demands the ultimate IoT machine (to borrow a line from BMW). The integrity of these machines with their combination of sensors, security and data analysis produce the results that impact every aspect of all our lives.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How a smart grid can empower a smart city

As smart cities continue to depart the realm of fiction and instead become a staple of life in the 21st century, eager entrepreneurs and aspirational scientist alike are increasingly turning to smart grids to power these cities of the future. Designing the infrastructure which enables smart cities is anything but easy, however, and many people today seem entirely unfamiliar with even the basic concept of a smart grid.So, what exactly is a smart grid, and how are they increasingly shaping how America’s smart cities are taking form? Anyone who hopes to understand the cities of tomorrow should keep these facts in mind as they picture tomorrow’s cityscapes in their minds.To read this article in full or to leave a comment, please click here

IPv6 deployment guide

IPv6 has been gaining traction since it was developed in the late 1990s, and enterprises that are implementing it now are considered to be among the early majority – meaning widespread adoption is well underway – so if you haven’t already begun, you need to start planning IPv6 deployment.To read this article in full or to leave a comment, please click here(Insider Story)

IPv6 deployment guide

IPv6 has been gaining traction since it was developed in the late 1990s, and enterprises that are implementing it now are considered to be among the early majority – meaning widespread adoption is well underway – so if you haven’t already begun, you need to start planning IPv6 deployment.To read this article in full or to leave a comment, please click here(Insider Story)

The Three Paths of Enterprise IT

Everyone knows that Service Providers and Enterprise networks diverged decades ago. More precisely, organizations that offer network connectivity as their core business usually (but not always) behave differently from organizations that use networking to support their core business.

Obviously, there are grey areas: from people claiming to be service providers who can’t get their act together, to departments (or whole organizations) who run enterprise networks that look a lot like traditional service provider networks because they’re effectively an internal service provider.

Read more ...

Introduction to RADIUS- Remote Authentication Dial-In User Service

Today I am going to talk about the major component of the network which provide you the authentication services whenever called from the user. The major component is called as RADIUS. This major component hosted on the server which is capable of giving the right reports of the users authentication. Let's talk about the RADIUS server or so called Remote Authentication Dial-In User Service

What is RADIUS- Remote Authentication Dial-In User Service?
RADIUS( Remote Authentication Dial-In User Service) is a server systems with which we can secures our networks against unauthorised access. So RADIUS clients run on supported routers and switches. Clients send authentication requests to a central RADIUS server, which contains all user authentication and network service access information. 

If i talk about RADIUS in other simpler words you can say that the system is a network protocol  by which we are defining rules and conventions for communication between network devices - for remote user authentication and accounting. 

What is the main purpose of RADIUS servers ?
Well the major purpose of the RADIUS server in the network is described as below.
  • Authenticates users or devices before allowing them access to a network 
  • Authorises those users or devices Continue reading