Archive

Category Archives for "Networking"

IDG Contributor Network: HTTP and DNS in a 5G World

The internet has of course been wildly successful over the last thirty years as more and more functionality has moved online. A large part of this success has been due to two key protocols that have allowed the internet to scale relatively gracefully: HTTP which stands for Hypertext Transmission Protocol, and DNS which stands for Domain Name System. HTTP is the protocol used to send data between a web browser running on a laptop or mobile phone and the web page or application that it is communicating with, which is running on a server in the network. No matter where the web page is located or who develops the web browser, it is guaranteed that they will be able to interoperate because they all use the standardized HTTP protocol to communicate. DNS is equally fundamental as it is the protocol which allows end user devices to translate a given human readable URL such as “www.google.com” to a machine usable IP address that the network can make sense of.To read this article in full or to leave a comment, please click here

Interoperability is the key to IoT success

This week at the Cisco Live conference in Las Vegas, Cisco made a couple of big IoT platform announcements. The networking giant showed off upgrades to its Cisco Jasper platform with Jasper Control Center 7.0, and it introduced Cisco Kinetic (and discussed a partnership with IBM).+ Also on Network World: Cisco upgrades one IoT platform and announces another + The new IoT platforms seem great, but do they really address the elephant in the IoT room: interoperability? As far as I can tell, the Cisco platforms offer improved ways to manage IoT devices in a wide variety of use cases. But they don’t deal with what many observers call the biggest challenge facing the Internet of Things. As Altimeter puts it, “IoT requires standards to enable horizontal platforms that are communicable, operable, and programmable across devices, regardless of make, model, manufacturer, or industry.”To read this article in full or to leave a comment, please click here

Not enough fiber to grow the internet for 5G, says consultant

Treatment will be brought to the patients and patient data will be centralized, “turning hospitals into data centers,” a telco equipment maker says in a recent report.Ericsson, in its 2017 Mobility report (PDF), published this month, says patient treatment will, in the future, no longer be performed in hospitals located far from patients’ homes, but performed remotely through new 5G wireless radio.+ Also on Network World: Reliability, not principally speed, will drive 5G + Wearables will be among the tools used for keeping an eye on folks’ health and dishing out medication. Diagnosis will be accomplished through online consultations, and robots will remotely execute surgeries at nearby healthcare clinics rather than far-off hospitals.To read this article in full or to leave a comment, please click here

Another Cyber-attack : Petya Cyberattack after Wannacry Shutdowns Europe

Another Cyber-attack shocked Europe as many of the Firms like Airport industries, Banks, Government departments effected by this Petya Cyberattack. It was said that it is the beginning of the attacks and will have many more attacks in near future. Cyber security is one of the most demanding feature now a days who can save you from these cyber attacks.

Fig 1.1- Petya Cyberattack After Wannacry


Experts says, Petya Ransomware attack is just a test and will come up with more worse in the future. So you need to take care about the attacks by applying best security features like Cisco OpenDNS as a first line of security of the big and the other enterprise networks.

Many of the vendors come up with their inputs on the cyberattack where most of the industries across Ukraine, Russia and some part of Europe effected. Most of the firms from Danish and Spanish are effected as well. It may grow towards the Asia and the American region but still no footprints of these attacks.

It is said that ( the effected industries review)- The virus is believed to be ransomware - a piece of malicious software that shuts down a computer system and Continue reading

Control Plane for our L3VPN based virtual network

In the last two blogs, I have gone through the process of developing a L3VPN base virtual network. One thing that we ignored is the amount of configuration that we need to change to add or remove nodes or provision new edge routers. While, some of these steps are part of the infrastructure provisioning, like … Continue reading Control Plane for our L3VPN based virtual network