Archive

Category Archives for "Networking"

Lifting the Hood on Cisco Software Defined Access

If you're an IT professional and you have at least a minimal awareness of what Cisco is doing in the market and you don't live under a rock, you would've heard about the major launch that took place in June: “The network. Intuitive.” The anchor solution to this launch is Cisco's Software Defined Access (SDA) in which the campus network becomes automated, highly secure, and highly scalable.

The launch of SDA is what's called a “Tier 1” launch where Cisco's corporate marketing muscle is fully exercised in order to generate as much attention and interest as possible. As a result, there's a lot of good high-level material floating around right now around SDA. What I'm going to do in this post is lift the hood on the solution and explain what makes the SDA network fabric actually work.

The next big thing in hard disks may be glass

Hard disk makers are in a big of a struggle for survival. As SSDs grow in capacity and shrink in price, hard disk makers are losing business on the low end. Only the cheapest of laptops don’t have a SSD standard any more. And with affordable 1TB SSDs on the market, it’s a good choice for most desktops, as well. Their solution has been to increase capacity tremendously, since people are generating so much content these days. Forget 3TB or 6TB hard disks, we now have 12TB and 14TB drives coming to market. These are done by cramming a lot of disk platters in the drive case and using helium inside the drive to reduce friction.Even there, drive makers are reaching the limits of physics. But a Japanese firm, Hoya Corp., thinks it has the solution. The company told Nikkei Technology it believes glass substrates, already used in 2.5-inch notebook drives, can be designed for 3.5-inch desktop and server disks. To read this article in full or to leave a comment, please click here

5 reasons why device makers cannot secure the IoT platform

If Akamai, Cisco and Google’s post-platform security and privacy machine learning security systems protecting the web and mobile platforms are indicative of the future, IoT device makers will only be part of a larger security ecosystem. That’s because they will not have the data to train the AI machine learning models.  As a result, IoT post-platform security and privacy will become a layer on top of IoT device security. These five factors are why that will happen.1. Product developers underestimated IoT security In their race to market, product developers building for new platforms will underestimate the security and privacy features that should be built into their products. In some cases, this will be an act of commission, but most will be an act of omission because it is difficult to anticipate the vulnerabilities until the products reach the market at scale. Windows and mobile devices experienced something similar. They have been hardened, but earlier in their evolution they were an easy target for cyber criminals.To read this article in full or to leave a comment, please click here

5 reasons why device makers cannot secure the IoT platform

If Akamai, Cisco and Google’s post-platform security and privacy machine learning security systems protecting the web and mobile platforms are indicative of the future, IoT device makers will only be part of a larger security ecosystem. That’s because they will not have the data to train the AI machine learning models.  As a result, IoT post-platform security and privacy will become a layer on top of IoT device security. These five factors are why that will happen.1. Product developers underestimated IoT security In their race to market, product developers building for new platforms will underestimate the security and privacy features that should be built into their products. In some cases, this will be an act of commission, but most will be an act of omission because it is difficult to anticipate the vulnerabilities until the products reach the market at scale. Windows and mobile devices experienced something similar. They have been hardened, but earlier in their evolution they were an easy target for cyber criminals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Measuring how warming oceans fuel stronger hurricanes

Tracking storms and weather patterns accurately has become even more critical as weather records fall like bowling pins.What causes hurricanes? How are ocean temperatures monitored across thousands of square miles? What kinds of sensors are used? How is this data converted into actionable intelligence to save lives and protect property? What role does global warming have to play?We should all know this given the devastation from Hurricanes Harvey and Irma.What causes hurricanes? Hurricanes are severe storms with winds that rotate at 74 miles per hour or more around a central, low-pressure core. They result from weather disturbances that pull in warm surface air to interact with warm seawater. Hurricanes occur close to the equator where the seawater is hot enough to power the storms and the rotation of the Earth makes them spin.To read this article in full or to leave a comment, please click here

MPLS Traffic Engineering: RSVP Resource Reservation Protocol

Today I am going to talk about the other MPLS traffic Engineering protocol named as RSVP or stands for Resource Reservation Protocol. In my earlier article I talked about the CR-LDP protocol and i promised to discuss about the RSVP protocol. Lets talk about the RSVP protocol in details to understand. I will come up with the configuration part of the RSVP protocol in later stage.

Before starting with the RSVP Protocol, Please have a look on the below mentioned link which will describe you CR-LDP protocol in details.

CR-LDP Protocol



Now Lets Talk about RSVP Protocol.
Resource Reservation Protocol - Traffic Engineering RSVP is a separate protocol at the IP level. It uses IP datagrams (or UDP at the margins of the network) to communicate between LSR peers. It does not require the maintenance of TCP sessions, but as a consequence of this it must handle the loss of control messages 

Fig 1.1- MPLS Traffic Engineering- RSVP Protocol
The Ingress LSR, LSR A, determines that it needs to set up a new LSP to LSR C. The traffic parameters required for the session or administrative policies for the network enable LSR A to determine that the route for Continue reading

MPLS Scenario : CR-LDP(Constraint-based Routing Label Distribution Protocol)

Today i am picking very interesting topic about the MPLS. Some of People are aware of MPLS technology and how it works in the ISP - Internet Service Provider environment but some of them are not aware of the MPLS concept even.

This topic is basically for those students who knew the concept of MPLS ( May be the Frame mode MPLS or ATM based MPLS - L2 MPLS or you can say the L3MPLS concept ). Those who don't knew about MPLS, please go through the basic MPLS before this topic as this is one of the advance topic in MPLS named as " MPLS Traffic Engineering " which tells you about the how RSVP or CR-LDP works in the environment.

MPLS is a technology that offers to open up the internet by means of offering many additional services to programs using IP. MPLS forwards statistics using labels which are attached to each facts packet. these labels must be dispensed among the nodes that include the network.

So i have a question for you, Can you please let me know how many labels are used in the MPLS environment ? Did you read that ? Well i guess you knew, there Continue reading

Basics on Cisco DSL Router Configuration

Today I am going to talk about the DSL router basics and the configuration of the Cisco DSL router. People who are from the Routing and Switching background should have this as a basics level of learning. You can connect Cisco DSL router with the PC. A console connection is made with a rolled cable and connects the console port of the Cisco Digital Subscriber Line (DSL) Router to a COM port on a PC. The console cable that is included with the Cisco DSL Router is a flat light blue cable. 

For more information on the pin outs of a rolled cable, or the pin outs of an RJ−45 to DB9 converter, see Cabling Guide for Console and AUX Ports.
  • Connect the RJ−45 connector on one end of a Cisco console cable to the console port of the Cisco DSL Router.
  • Connect the RJ−45 connector at the other end of the console cable to an RJ−45 to DB9 converter.
  • Connect the DB9 connector to an open COM port on your PC.
Fig 1.1- Cisco 871W DSL Router 
Now Lets talk about how to set up the basic configurations on the above mentioned Cisco DSL router in Continue reading

How network automation can speed deployments and improve security

Five years ago, IT was decentralized at the University of New Mexico. “Every school or college had their own IT, and in most cases they were completely under-resourced – a one-person shop having to do phones, apps, email, desktop, servers, storage, disaster recovery, all of that,” said Brian Pietrewicz, deputy CIO at University of New Mexico.The university transitioned to a self-service model that enables each of its more than 100 departments to deploy infrastructure and application services itself and have them managed by the now-centralized IT team.Adopting VMware’s vCloud Automation Center enabled departments to consume cloud resources, but also give the management team the ability to curtail that consumption if necessary.To read this article in full or to leave a comment, please click here

How network automation can speed deployments and improve security

Five years ago, IT was decentralized at the University of New Mexico. “Every school or college had their own IT, and in most cases they were completely under-resourced – a one-person shop having to do phones, apps, email, desktop, servers, storage, disaster recovery, all of that,” said Brian Pietrewicz, deputy CIO at University of New Mexico.The university transitioned to a self-service model that enables each of its more than 100 departments to deploy infrastructure and application services itself and have them managed by the now-centralized IT team.Adopting VMware’s vCloud Automation Center enabled departments to consume cloud resources, but also give the management team the ability to curtail that consumption if necessary.To read this article in full or to leave a comment, please click here