Archive

Category Archives for "Networking"

IDG Contributor Network: Chaos in the enterprise: Managing IoT services across edge and cloud

Over recent years, the Internet of Things (IoT) has been a huge growth market. From consumer gadgets and wearables to connected cars and smart home devices, the proliferation has been rapid, and IHS predicts that the number of IoT devices globally will reach 30.7 billion by 2020 and 75.4 billion by 2025.IoT is also beginning to touch all aspects of the enterprise. This will only fuel its growth as industry sectors from healthcare to manufacturing become more dependent on IoT communications to drive business processes and missions critical systems.IoT is a key driver of the digital transformation (DX) that is taking place across industry sectors. As the demand for new digital and IoT services continues to grow, close monitoring and management of this transformation will be crucial ensure its success. The rise of IoT has been rapid and will continue to gather pace, to the point where we will soon see entirely new IT infrastructure emerge to support IoT applications and critical systems, spanning the edge, core, and cloud of the service delivery infrastructure.To read this article in full or to leave a comment, please click here

NSX Load Balancing – Accelerated Layer 4 Virtual Servers

In the previous blog, we investigated the basic feature set of NSX Load Balancing, some of the business reasons to use it, and deployed an ESG (Edge Services Gateway), the NSX load balancing platform.  Today, we are going to setup our first virtual server.  When we look at load balancing, it operates at the Transport layer or above of the OSI model and is inclusive of the network layer.  In the most basic of terms, Load Balancing looks at a “session” from the transport layer and applies a load balancing algorithm and a NAT policy to the traffic. I put “session” in quotes because we can load balance both TCP and UDP based applications, but UDP does not have a stateful session, but we can still load balance UDP services.

Whenever someone has stated that and given application cannot be load balanced, I first ask them if the traffic can be processed by a NAT at either the client or server end. If the answer is yes, odds are that it can be load balanced with sufficient understanding of the application and the required ports, protocols and persistence to make the application function correctly. This is Continue reading

Open19: A New Step for Data Centers

While most network engineers do not spend a lot of time thinking about environmentals, like power and cooling, physical space problems are actually one of the major hurdles to building truly large scale data centers. Consider this: a typical 1ru rack mount router weighs in at around 30 pounds, including the power supplies. Centralizing rack power, and removing the sheet metal, can probably reduce this by about 25% (if not more). By extension, centralizing power and removing the sheet metal from an entire data center’s worth of equipment could reduce the weight on the floor by about 10-15%—or rather, allow about 10-15% more equipment to be stacked into the same physical space. Cooling, cabling, and other considerations are similar—even paying for the sheet metal around each box to be formed and shipped adds costs.

What about blade mount systems? Most of these are designed for rather specialized environments, or they are designed for a single vendor’s blades. In the routing space, most of these solutions are actually chassis based systems, which are fraught with problems in large scale data center buildouts. The solution? Some form of open, foundation based standard that can be used by all vendors to build equipment Continue reading

US defense contractor stored intelligence data on Amazon server without a password

About 28GB of sensitive US intelligence data was discovered on a publicly-accessible Amazon Web Services’ S3 storage bucket. The cache, containing over 60,000 files, was linked to defense and intelligence contractor Booz Allen Hamilton, which was working on a project for the US National Geospatial-Intelligence Agency (NGA). NGA provides satellite and drone surveillance imagery for the Department of Defense and the US intelligence community.The unsecured data was discovered by Chris Vickery, who now works as a cyber risk analyst for the security firm UpGuard.According to UpGuard, the “information that would ordinarily require a Top Secret-level security clearance from the DoD was accessible to anyone looking in the right place; no hacking was required to gain credentials needed for potentially accessing materials of a high classification level.”To read this article in full or to leave a comment, please click here

US defense contractor stored intelligence data on Amazon server without a password

About 28GB of sensitive US intelligence data was discovered on a publicly-accessible Amazon Web Services’ S3 storage bucket. The cache, containing over 60,000 files, was linked to defense and intelligence contractor Booz Allen Hamilton, which was working on a project for the US National Geospatial-Intelligence Agency (NGA). NGA provides satellite and drone surveillance imagery for the Department of Defense and the US intelligence community.The unsecured data was discovered by Chris Vickery, who now works as a cyber risk analyst for the security firm UpGuard.According to UpGuard, the “information that would ordinarily require a Top Secret-level security clearance from the DoD was accessible to anyone looking in the right place; no hacking was required to gain credentials needed for potentially accessing materials of a high classification level.”To read this article in full or to leave a comment, please click here

Capacity Planner Version 2.0 Released

Modern Wi-Fi networks are complex beasts. Despite all the fancy new features in products, the technology is only becoming more complex and the demands on the network are only growing. Wi-Fi is the most heavily used method to transport user data today, eclipsing cellular and LAN traffic volumes according to multiple reports from analysis firms including Cisco, Ofcom, Mobidia, Ovum, and others. Meanwhile, the technical complexity contained within the IEEE 802.11 standard results in a technical document that is over 3,200 pages long!  This means deploying a network right is no easy task.

One of the most difficult aspects to get right when deploying a Wi-Fi network is understanding capacity requirements. It is not sufficient enough to use rule-of-thumb guidelines based on number of clients per access point or number of access points per square foot/meter since they often result in networks that do not adequately meet actual end-user demands and perform poorly. More rigor is required while maintaining simplicity of use so that most network administrators can be confident of a successful outcome.

Essential to wireless network performance and capacity planning is understanding the interaction between access point capabilities, network configuration, client device capabilities, and the RF Continue reading

Tempered Networks makes it HIP to connect the unconnectable

IP networks were originally designed to be fairly simple. There’s a source and a destination address, and the network devices use this information to perform some fancy calculations—and magically, things connect. But as the internet has grown and more endpoints have been connected, networking has become a black magic. Since it’s impossible to give every device its own unique IP address, the clever folks at networking companies came up with an assortment of workarounds, such as being able to NAT (network address translation) non-routable, private addresses. And as we’ve added more dynamic environments, such as private and public cloud, defining policy based on addresses or ranges has become unsustainable. To read this article in full or to leave a comment, please click here

Tempered Networks makes it HIP to connect the unconnectable

IP networks were originally designed to be fairly simple. There’s a source and a destination address, and the network devices use this information to perform some fancy calculations—and magically, things connect. But as the internet has grown and more endpoints have been connected, networking has become a black magic. Since it’s impossible to give every device its own unique IP address, the clever folks at networking companies came up with an assortment of workarounds, such as being able to NAT (network address translation) non-routable, private addresses. And as we’ve added more dynamic environments, such as private and public cloud, defining policy based on addresses or ranges has become unsustainable. To read this article in full or to leave a comment, please click here

$10 off TP-Link AC1200 Wi-Fi Range Extender Powerline Edition – Deal Alert

The AC1200 is a wifi range extender that transmits its signal through your home wiring via your wall outlets, so walls and floors won't slow it down. Game online and watch HD movies in any room. The powerline adapter is simple to use -- it sets up in minutes, plugs into any power outlet, works with all routers, and up to 16 can be added to the same network, making it easy to expand your Wi-Fi across your home. Right now the price on this highly rated wifi extender will be reduced $10 to $99.99 in your shopping cart when you "clip" a special coupon.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

$10 off TP-Link AC1200 Wi-Fi Range Extender Powerline Edition – Deal Alert

The AC1200 is a wifi range extender that transmits its signal through your home wiring via your wall outlets, so walls and floors won't slow it down. Game online and watch HD movies in any room. The powerline adapter is simple to use -- it sets up in minutes, plugs into any power outlet, works with all routers, and up to 16 can be added to the same network, making it easy to expand your Wi-Fi across your home. Right now the price on this highly rated wifi extender will be reduced $10 to $99.99 in your shopping cart when you "clip" a special coupon.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Transforming the Internet Society’s web presence

Have you struggled to find information on our current website? Have you found it difficult to know what actions you can take on important issues such as connecting the unconnected and building trust on the Internet?

You are not alone.

In one of the most visible and important changes we are making this year, we are working hard on giving our website a deep refresh.  We are building it to be a direct vehicle for action. We are redesigning it from the ground up to help us achieve our objective of connecting everyone, everywhere to a globally connected, trusted Internet. 

It will look different, it will feel different, it will be more accessible and will be more aligned with this strategic goal. 

James Wood

Multi-site Active-Active Solutions with NSX-V and F5 BIG-IP DNS

I’ve written several prior blogs on multi-site solutions with NSX-V discussing topics such as fundamentals, design options, multi-site security, and disaster recovery; see below links to review some of the prior material. In this post, I’ll discuss how VMware NSX-V and F5 BIG-IP DNS (prior known as F5 GTM) can be used together for Active/Active solutions where an application is spanning multiple sites and site-local ingress/egress for the application is desired. F5 offers both virtual and physical appliances; in this post I demonstrate using only the virtual (VE) F5 appliances. Big thanks to my friend Kent Munson at F5 Networks for helping with the F5 deployment in my lab and for providing some of the details to help with this blog post. This is the first of several blog posts to come on this topic.  Continue reading