Archive

Category Archives for "Networking"

5 reasons why device makers cannot secure the IoT platform

If Akamai, Cisco and Google’s post-platform security and privacy machine learning security systems protecting the web and mobile platforms are indicative of the future, IoT device makers will only be part of a larger security ecosystem. That’s because they will not have the data to train the AI machine learning models.  As a result, IoT post-platform security and privacy will become a layer on top of IoT device security. These five factors are why that will happen.1. Product developers underestimated IoT security In their race to market, product developers building for new platforms will underestimate the security and privacy features that should be built into their products. In some cases, this will be an act of commission, but most will be an act of omission because it is difficult to anticipate the vulnerabilities until the products reach the market at scale. Windows and mobile devices experienced something similar. They have been hardened, but earlier in their evolution they were an easy target for cyber criminals.To read this article in full or to leave a comment, please click here

5 reasons why device makers cannot secure the IoT platform

If Akamai, Cisco and Google’s post-platform security and privacy machine learning security systems protecting the web and mobile platforms are indicative of the future, IoT device makers will only be part of a larger security ecosystem. That’s because they will not have the data to train the AI machine learning models.  As a result, IoT post-platform security and privacy will become a layer on top of IoT device security. These five factors are why that will happen.1. Product developers underestimated IoT security In their race to market, product developers building for new platforms will underestimate the security and privacy features that should be built into their products. In some cases, this will be an act of commission, but most will be an act of omission because it is difficult to anticipate the vulnerabilities until the products reach the market at scale. Windows and mobile devices experienced something similar. They have been hardened, but earlier in their evolution they were an easy target for cyber criminals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Measuring how warming oceans fuel stronger hurricanes

Tracking storms and weather patterns accurately has become even more critical as weather records fall like bowling pins.What causes hurricanes? How are ocean temperatures monitored across thousands of square miles? What kinds of sensors are used? How is this data converted into actionable intelligence to save lives and protect property? What role does global warming have to play?We should all know this given the devastation from Hurricanes Harvey and Irma.What causes hurricanes? Hurricanes are severe storms with winds that rotate at 74 miles per hour or more around a central, low-pressure core. They result from weather disturbances that pull in warm surface air to interact with warm seawater. Hurricanes occur close to the equator where the seawater is hot enough to power the storms and the rotation of the Earth makes them spin.To read this article in full or to leave a comment, please click here

MPLS Traffic Engineering: RSVP Resource Reservation Protocol

Today I am going to talk about the other MPLS traffic Engineering protocol named as RSVP or stands for Resource Reservation Protocol. In my earlier article I talked about the CR-LDP protocol and i promised to discuss about the RSVP protocol. Lets talk about the RSVP protocol in details to understand. I will come up with the configuration part of the RSVP protocol in later stage.

Before starting with the RSVP Protocol, Please have a look on the below mentioned link which will describe you CR-LDP protocol in details.

CR-LDP Protocol



Now Lets Talk about RSVP Protocol.
Resource Reservation Protocol - Traffic Engineering RSVP is a separate protocol at the IP level. It uses IP datagrams (or UDP at the margins of the network) to communicate between LSR peers. It does not require the maintenance of TCP sessions, but as a consequence of this it must handle the loss of control messages 

Fig 1.1- MPLS Traffic Engineering- RSVP Protocol
The Ingress LSR, LSR A, determines that it needs to set up a new LSP to LSR C. The traffic parameters required for the session or administrative policies for the network enable LSR A to determine that the route for Continue reading

MPLS Scenario : CR-LDP(Constraint-based Routing Label Distribution Protocol)

Today i am picking very interesting topic about the MPLS. Some of People are aware of MPLS technology and how it works in the ISP - Internet Service Provider environment but some of them are not aware of the MPLS concept even.

This topic is basically for those students who knew the concept of MPLS ( May be the Frame mode MPLS or ATM based MPLS - L2 MPLS or you can say the L3MPLS concept ). Those who don't knew about MPLS, please go through the basic MPLS before this topic as this is one of the advance topic in MPLS named as " MPLS Traffic Engineering " which tells you about the how RSVP or CR-LDP works in the environment.

MPLS is a technology that offers to open up the internet by means of offering many additional services to programs using IP. MPLS forwards statistics using labels which are attached to each facts packet. these labels must be dispensed among the nodes that include the network.

So i have a question for you, Can you please let me know how many labels are used in the MPLS environment ? Did you read that ? Well i guess you knew, there Continue reading

Basics on Cisco DSL Router Configuration

Today I am going to talk about the DSL router basics and the configuration of the Cisco DSL router. People who are from the Routing and Switching background should have this as a basics level of learning. You can connect Cisco DSL router with the PC. A console connection is made with a rolled cable and connects the console port of the Cisco Digital Subscriber Line (DSL) Router to a COM port on a PC. The console cable that is included with the Cisco DSL Router is a flat light blue cable. 

For more information on the pin outs of a rolled cable, or the pin outs of an RJ−45 to DB9 converter, see Cabling Guide for Console and AUX Ports.
  • Connect the RJ−45 connector on one end of a Cisco console cable to the console port of the Cisco DSL Router.
  • Connect the RJ−45 connector at the other end of the console cable to an RJ−45 to DB9 converter.
  • Connect the DB9 connector to an open COM port on your PC.
Fig 1.1- Cisco 871W DSL Router 
Now Lets talk about how to set up the basic configurations on the above mentioned Cisco DSL router in Continue reading

How network automation can speed deployments and improve security

Five years ago, IT was decentralized at the University of New Mexico. “Every school or college had their own IT, and in most cases they were completely under-resourced – a one-person shop having to do phones, apps, email, desktop, servers, storage, disaster recovery, all of that,” said Brian Pietrewicz, deputy CIO at University of New Mexico.The university transitioned to a self-service model that enables each of its more than 100 departments to deploy infrastructure and application services itself and have them managed by the now-centralized IT team.Adopting VMware’s vCloud Automation Center enabled departments to consume cloud resources, but also give the management team the ability to curtail that consumption if necessary.To read this article in full or to leave a comment, please click here

How network automation can speed deployments and improve security

Five years ago, IT was decentralized at the University of New Mexico. “Every school or college had their own IT, and in most cases they were completely under-resourced – a one-person shop having to do phones, apps, email, desktop, servers, storage, disaster recovery, all of that,” said Brian Pietrewicz, deputy CIO at University of New Mexico.The university transitioned to a self-service model that enables each of its more than 100 departments to deploy infrastructure and application services itself and have them managed by the now-centralized IT team.Adopting VMware’s vCloud Automation Center enabled departments to consume cloud resources, but also give the management team the ability to curtail that consumption if necessary.To read this article in full or to leave a comment, please click here

How network automation can speed deployments and improve security

Five years ago, IT was decentralized at the University of New Mexico. “Every school or college had their own IT, and in most cases they were completely under-resourced – a one-person shop having to do phones, apps, email, desktop, servers, storage, disaster recovery, all of that,” said Brian Pietrewicz, deputy CIO at University of New Mexico.The university transitioned to a self-service model that enables each of its more than 100 departments to deploy infrastructure and application services itself and have them managed by the now-centralized IT team.Adopting VMware’s vCloud Automation Center enabled departments to consume cloud resources, but also give the management team the ability to curtail that consumption if necessary.To read this article in full or to leave a comment, please click here

VMware adds whitelist security to the hypervisor

Overlooked in the hoopla around the VMworld conference was an announcement of the availability of AppDefense, a new product that lets companies restrict the types of operations applications are allowed to run on virtualized servers. AppDefense works with the VMware hypervisor and can also connect to third-party provisioning, configuration management and workflow automation platforms. It can send out alerts, quarantine apps, shut them down and even restore a VM from an image. All of this is based on AppDefense catching unusual behavior, such as trying to modify the kernel or communicate with an unrecognized remote server. VMware already has some security features built into its NSX and VSAN products, but those are around networking and storage. AppDefense secures the core virtual machines in vSphere itself. It does this by using behavior-based whitelisting, which is not easy to do on desktops because they run a lot of apps. But on a server, especially a virtual server, it’s a much easier proposition. In some cases, virtual servers run only one or two apps, so shutting out everything else is simple.To read this article in full or to leave a comment, please click here

VMware adds whitelist security to the hypervisor

Overlooked in the hoopla around the VMworld conference was an announcement of the availability of AppDefense, a new product that lets companies restrict the types of operations applications are allowed to run on virtualized servers. AppDefense works with the VMware hypervisor and can also connect to third-party provisioning, configuration management and workflow automation platforms. It can send out alerts, quarantine apps, shut them down and even restore a VM from an image. All of this is based on AppDefense catching unusual behavior, such as trying to modify the kernel or communicate with an unrecognized remote server. VMware already has some security features built into its NSX and VSAN products, but those are around networking and storage. AppDefense secures the core virtual machines in vSphere itself. It does this by using behavior-based whitelisting, which is not easy to do on desktops because they run a lot of apps. But on a server, especially a virtual server, it’s a much easier proposition. In some cases, virtual servers run only one or two apps, so shutting out everything else is simple.To read this article in full or to leave a comment, please click here

VMware adds whitelist security to the hypervisor

Overlooked in the hoopla around the VMworld conference was an announcement of the availability of AppDefense, a new product that lets companies restrict the types of operations applications are allowed to run on virtualized servers. AppDefense works with the VMware hypervisor and can also connect to third-party provisioning, configuration management and workflow automation platforms. It can send out alerts, quarantine apps, shut them down and even restore a VM from an image. All of this is based on AppDefense catching unusual behavior, such as trying to modify the kernel or communicate with an unrecognized remote server. VMware already has some security features built into its NSX and VSAN products, but those are around networking and storage. AppDefense secures the core virtual machines in vSphere itself. It does this by using behavior-based whitelisting, which is not easy to do on desktops because they run a lot of apps. But on a server, especially a virtual server, it’s a much easier proposition. In some cases, virtual servers run only one or two apps, so shutting out everything else is simple.To read this article in full or to leave a comment, please click here