While external perimeter protection requirements will most likely command hardware acceleration and support for the foreseeable future, the distributed nature of the services inside the data center calls for a totally different set of specifications.
Some vendors have recently claimed they can achieve micro-segmentation at data center scale while maintaining a hardware architecture. As I described in my recent article in Network Computing, this is unlikely because you have to factor in speed and capacity.
To quickly recap the main points describing the model in the article:
In this post I’ll show how to build REST SDK to authenticate, create labs and nodes in UnetLab. I’ll briefly cover the difference between composition and inheritance design patterns and demonstrate how to use test-driven development.
Continue readingIEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active.
The post Datacenter Design: Shortest Path Bridging appeared first on Network Design and Architecture.
IEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active. In sum, it supports layer 2 multipath. SPB is used in the datacenter; however, it can also be used in the local area network. In this article, Figure-1 will be used to […]
The post Datacenter Design: Shortest Path Bridging appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
BT deploys three kinds of Cisco security to defend itself.
The theme question is actually quite a good one, because it may seem like the fight has already been won by IS-IS in the Service Provider segment, and by OSPF on the enterprise market. So why ask it then? Well, because I got the following answer one too many times: “IS-IS is awesome, OSPF not so much. I have no idea how IS-IS works but it’s great. OSPF is so complicated and offers so little flexibility…”.
Well, that’s really wrong from my point of view. No protocol can be neither awesome nor despicable. They both offer you advantages and disadvantages, and knowing how they both work will help you make the best decision based on the needs of the network, not just because people say one is “great” and the other is not.
So, I am going to follow the steps I took to come to terms with IS-IS, and then we’ll see together, even though you’ll probably figure it out for yourselves by then, the comparative analysis of the two IGPs.
Step 1: Understanding CLNS & CLNP
Often network engineers freak out when they hear about the OSI stack, CLNP (Connectionless Network Protocol) and CLNS (Connectionless Network Service). Continue reading
How many bits does the VLAN ID have in the 802.1Q header ?
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
In this exciting webinar Q&A, experts from Cisco answer post webinar questions & elaborate on how to capture the huge business opportunity of virtual services.
Nutanix reveals huge losses; HPE gets ousted from Telefónica’s NFV project.

The post Worth Reading: Data Center Vanity appeared first on 'net work.
The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.
Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.
To read this article in full or to leave a comment, please click here