Archive

Category Archives for "Networking"

Resource Contention In IT – Time Is Never Enough

I’m at Future:NET this week and there’s a lot of talk about the future of what networking is going to look like from the perspective of vendors like Apstra, Veriflow, and Forward Networks. There’s also a great deal of discussion from customers and end users as well. One of the things that I think is being missed in all the talk about resources.

Time Is Not On Your Side

Many of the presenters, like Truman Boyes of Bloomberg and Peyton Maynard-Koran of EA, discussed the idea of building boxes from existing components instead of buying them from established networking vendors like Cisco and Arista. The argument does hold some valid ideas. If you can get your hardware from someone like EdgeCore or Accton and get your software from someone else like Pluribus Networks or Pica8 it looks like a slam dunk. You get 90% to 95% of a solution that you could get from Cisco with much less cost to you overall.

Companies like Facebook and Google have really pioneered this solution. Facebook’s OCP movement is really helping networking professionals understand the development that goes into building their own switches. Facebook’s commitment is also helping reduce the price of the Continue reading

Down to the WireX

Over the course of the last few weeks, a botnet comprised mainly of Android mobile devices has been utilized to launch a high-impact DDoS extortion campaign against multiple organizations in the travel and hospitality sector. This botnet, dubbed ‘WireX’, is only the second mobile botnet […]

30 ways to improve IoT privacy

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s forecasted growth.A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. The nine-page report details 30 points about implementing strong privacy protections. This report is summarized below.To read this article in full or to leave a comment, please click here

IoT privacy: 30 ways to build a security culture

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s forecasted growth.A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. The nine-page report details 30 points about implementing strong privacy protections. This report is summarized below.To read this article in full, please click here

IoT privacy: 30 ways to build a security culture

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s forecasted growth.A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. The nine-page report details 30 points about implementing strong privacy protections. This report is summarized below.To read this article in full, please click here

30 ways to improve IoT privacy

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s forecasted growth.A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. The nine-page report details 30 points about implementing strong privacy protections. This report is summarized below.To read this article in full or to leave a comment, please click here

35% off Etekcity Smart Plug 2 Pack, Energy Monitoring and Alexa Compatible – Deal Alert

With this smart plug from Etekcity, you can turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate the on/off cycle with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices are powered down. With this deal, a 2-pack of smart plugs is discounted 35% down to $38.74, or just under $20 per plug. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

What are the changes in August 2017 CCDE Practical exam ?

What are the changes in 2017 CCDE Practical/Lab exam ?    As you might know, CCDE Practical/Lab exam was cancelled on May 2017 due to some leakage. Some people tried to sell the scenarios, Cisco cancelled the exam and revoke the certifications of those who involved with that cheating. Some people among them can be […]

The post What are the changes in August 2017 CCDE Practical exam ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: 2 myths I believed about Disaster Recovery as a Service

Maybe it’s because I’ve been married 16 years. Maybe it’s because we have 4 young children. Whatever the reason, at 42 years old, I’m slowly learning something about myself.I’m sometimes… wrong. [gasp]And when I notice it, it’s much better to admit it than make up an excuse. Can you relate?So, here is how this matters to you… I was wrong about Disaster Recovery as a Service (a.k.a. DRaaS). [bigger gasp]As the CEO of a business cloud and telecom brokerage, DRaaS is something I’ve heard about for a long time. But for a couple of years, I dismissed it. I didn’t think it was a fit for the majority of our clients (i.e. small- and medium-sized companies).To read this article in full or to leave a comment, please click here

Part II- Quick Interview questions on Routing

As per my earlier article on Quick interview question on Networking and Switching, Now I am coming up with the Quick interview question on Routing. If you want to look on the Part-I, click the link below


Lets have a Quick Interview questions on Routing now

Basics
  • What is Router and Routing ?
  • What is the difference between router and switch ?
  • What is the difference between the static and dynamic routing protocols ?
  • What is the difference between distance vector and Link state routing protocols ?
  • What is the AD value of RIP, EIGRP, OSPF and BGP ?
  • How we can define the static routing in the network ?

Fig 1.1- CCIE Lab routing


Dynamic Protocols- Internal Routing Protocols
  • What is the difference between RIPv1, RIPv2 and RIPv3 ?
  • How route is calculated in EIGRP protocol ?
  • What is the EIGRP Stuck in Active state and how it can be resolved ?
  • What is EIGRP passive interface ?
  • What is EIGRP stub routing feature ?
  • What are the different route types in EIGRP ?
  • What is the offset list in EIGRP and how it is useful ?
  • What are the neighbor states of OSPF and how it works ?
  • What are the different types of areas and Continue reading

New: Metro- and Carrier Ethernet Encryptors Market Overview

My friend Christoph Jaggi published new versions of his Metro- and Carrier Ethernet Encryptor documents:

  • Technology introduction, including an overview of encryption mechanisms, Carrier Ethernet connectivity models, typical deployments, and key management challenges.
  • Market overview, including standards, control- and data plane considerations, key- and system management, and network integration.

Enjoy!

MACSec – Media Access Control Security

How Does Internet Work - We know what is networking

Media Access Control Security or MACSec is the Layer 2 hop to hop network traffic protection. Just like IPsec protects network layer, and SSL protects application data, MACSec protects traffic at data link layer (Layer 2). MACSec is standardized IEEE 802.1AE hop-by-hop encryption that enables confidentiality and integrity of data at layer 2. It encrypts entire Ethernet packet except Source and Destination MAC addresses on any device-to-device, switch-to-switch, router-to-switch, host-to-switch directly connected wired L2 connection. If we compare MACSec with, for example IPsec, MACsec provides same security but on layer 2 for each hop separately. On each hop, packets are

MACSec – Media Access Control Security