Archive

Category Archives for "Networking"

Routing design

Understanding everything about routing design is no brainer, especially if you have the chart below on your wall. The table below highlights the pros and cons of each routing protocol. Of course, you need to consider the design attributes shown in Figure A before embarking on routing design. Should you like the comparison of the […]

The post Routing design appeared first on Network Design and Architecture.

PQ Show 69: Sonus VellOS And QoE For Unified Communications (Sponsored)

Sonus joins the Packet Pushers to talk about VellOS, a network operating system for ensuring quality of experience for unified communications. With VellOS you can automate flows through a network and control bandwidth, packet marketing, MPLS values, and more to guarantee high-quality voice and video calls.

The post PQ Show 69: Sonus VellOS And QoE For Unified Communications (Sponsored) appeared first on Packet Pushers.

PQ Show 69: Sonus VellOS And QoE For Unified Communications (Sponsored)

Sonus joins the Packet Pushers to talk about VellOS, a network operating system for ensuring quality of experience for unified communications. With VellOS you can automate flows through a network and control bandwidth, packet marketing, MPLS values, and more to guarantee high-quality voice and video calls.

The post PQ Show 69: Sonus VellOS And QoE For Unified Communications (Sponsored) appeared first on Packet Pushers.

My Markdown Adventure

markdown-512

It was almost a year ago that I set forth the idea to start writing all my blog posts in Markdown. I’ve been doing my best to keep up with that throughout the year and now I’m fifty Markdown posts into my goal. How is it working out so far?

Markdown Mindset

Learning to write in Markdown took some adjustment. Before, I had just used the web editor or the occasional HTML editing suite to write my posts. Most of the HTML was hidden. With Markdown, you have to think about what you’re going to do before you start writing it. Where are the links going to appear? How is your post going to be organized? Putting a bit more thought into your post gives you more structure to your thoughts. That’s something that’s helped my writing a bit.

The table layout for the 2015 Cisco Live Twitter List really wasn’t all that difficult either. Once I put the initial code together, it was just a simple copy/paste job after that. I’m toying with the idea of putting all my notes into Markdown as well. But given how terrible I am with taking typed notes that may not happen.

Editing Continue reading

10 outsourcing trends to watch in 2016

This year, we saw companies embrace increased standardization and cloud computing options of all flavors, use their leverage to renegotiate or rebid their deals, and settle into a best-of-breed approach to offshore outsourcing.So what will 2016 bring? Our experts expect a number of shifts in the industry—including a focus on hyper-speed deal making, the emergence of new multi-sourcing headaches and potential cures, increased man-machine collaboration, and significant expansion of the service provider universe.1. Security takes center stageSecurity is top of mind from the boardroom to the break room, and it will influence outsourcing strategy in 2016. Indeed, security risk is poised to increase as telematics and the Internet of Things (IoT) becomes more prevalent in consumer and commercial products, says Paul Roy, partner in the business and technology sourcing practice of Mayer Brown. “Increasing numbers of threat actors will use increasingly creative ways to exploit weaknesses, often with devastating effect. Regulators will exact increasingly large fines for poor security. Service providers have often been the weakest link in a company’s security and will need to find better ways to address that concern.”To read this article in full or to leave a comment, please click here

Running VLAN, VXLAN and GRE together using Neutron & Openstack

There are numerous blogs out there with step by step instructions to setup OVS networking for openstack neutron to run various types of networks. I came up with this post to best explain how everything works in the Neutron land and what a typical openstack deployment looks like. If you are looking for a more step-by-step procedure to set things up this post is a good place to start i.e. understanding the networking concepts and design behind running all the commands listed on other blogs.

A Neutron openstack deployment or any cloud environment these days typically consist of a Network Controller (SDN controller) and a cluster of compute hosts or servers. The type of networking you choose to connect all of these together is entirely upto you and I've seen various ways by which this can be done. There is no correct or right way of doing this. It's what works for you but if you don't really have anything already setup and are planning on starting afresh you could probably use this as a template to design your networking.


What you see above are three servers - one network node and two compute nodes.
First we'll go through Continue reading

Malware peddlers offered Raspberry Pi money to infect your micro-PC

The Raspberry Pi—the popular mini-PC that's about the size of credit card—is attracting attention from malware distributors. But not in the sense that you might think.Last Wednesday, the Raspberry Pi Foundation tweeted a screenshot of an email in which a company effectively asked to install malware onto users Raspberry Pis.+ ALSO ON NETWORK WORLD Ultimate guide to Raspberry Pi operating systems, part 2 +In the email, the company, whose name was redacted, offered the Foundation money in order to distribute an exe file on Raspberry Pi machines (never mind the fact that the Raspberry Pi doesn't run Windows). Installing the exe would place a shortcut icon on the desktop; if you open it, you'd be taken to the company's website. "Then this is our target," the email reads in part.To read this article in full or to leave a comment, please click here

The most innovative and damaging hacks of 2015

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.But looking beyond the garden-variety attacks and vulnerabilities lends great insight into the future of malicious activity and how to defend against it. And 2015 had its share of intriguing invasions, each of which highlighted the modified techniques that lead to new forms of breaches or pinpoint areas in need of new defenses. The past year saw cyber criminals adopting innovative approaches and state-sponsored actors becoming bolder. Motivations shifted, with financial gain no longer the sole reason for launching an attack. Inflicting physical damage, stealing trade secrets, hacking as a form of protest -- 2015 was a year in which malicious activity served many ends.To read this article in full or to leave a comment, please click here

Network Break 68: Juniper Firewall Burned, 2015 In Review

Network Break 68 looks at Juniper's ScreenOS vulnerabilities, analyzes NetApp's acquisition of SolidFire, and cheers Apple for opposing U.K. surveillance. Lastly, we review of some of our favorite stories from 2015, and a list of things we probably won't care about next year. Probably.

The post Network Break 68: Juniper Firewall Burned, 2015 In Review appeared first on Packet Pushers.

Network Break 68: Juniper Firewall Burned, 2015 In Review

Network Break 68 looks at Juniper's ScreenOS vulnerabilities, analyzes NetApp's acquisition of SolidFire, and cheers Apple for opposing U.K. surveillance. Lastly, we review of some of our favorite stories from 2015, and a list of things we probably won't care about next year. Probably.

The post Network Break 68: Juniper Firewall Burned, 2015 In Review appeared first on Packet Pushers.

The next wave of cybercrime will come through your smart TV

Smart TVs are opening a new window of attack for cybercriminals, as the security defenses of the devices often lag far behind those of smartphones and desktop computers. Running mobile operating systems such as Android, smart TVs present a soft target due to how to manufacturers are emphasizing convenience for users over security, a trade-off that could have severe consequences. Smart TVs aren't just consumer items, either, as the devices are often used in  corporate board rooms. Sales of smart TVs are expected to grow more than 20 percent per year through 2019, according to Research and Markets. While attacks against smart TVs are not widespread yet, security experts say it is only a matter of time before cybercriminals take note of the weaknesses.To read this article in full or to leave a comment, please click here

Dual Core Network Design

Dual core design, also known as dual plane or disjoint plane topologies, refers to a highly redundant network chosen by companies whose main objective is to improve the resiliency of their network. Created using different data planes, dual core design is implemented by companies that receive the service from the different service providers. Put simply, […]

The post Dual Core Network Design appeared first on Network Design and Architecture.

New products of the week 12.28.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.GigaVUE-FM applianceKey features: The GigaVUE-FM appliance simplifies the management and orchestration of visibility infrastructure and enables enterprises to increase the scale and reach of Gigamon’s Visibility Fabric with additional, dedicated compute capacity. More info.To read this article in full or to leave a comment, please click here