I am glad and excited to announce that my April 2015 online CCDE class will start tomorrow ( 07/04/2015) with 10 great guys. As I promised to them I limited to class to 10 , so everybody can ask as much as questions, join the discussions and share their comments. I will share their success… Read More »
The post April CCDE Training class is going to start tomorrow appeared first on Network Design and Architecture.
As the available supply of IPv4 addresses dwindles, the market for these virtual commodities is heating up. In recent months, the pace of the address transfers has greatly accelerated as evidenced by RIPE’s table of IPv4 transfers, as well as the increasing number of IPv4 brokers facilitating the exchange of IPv4 address space. However, the transfer of IPv4 address space isn’t always problem-free and, in this blog, we’ll review this new trend and some of the issues that can arise.
Buying and selling IPv4
In 2011, when Microsoft paid $7.5 million for 666,624 IPv4 addresses as part of the Nortel bankruptcy, observers wondered whether this development would usher in the era of the commercial sale of IPv4 address space. As statistics from European registrar RIPE show, the market may have had a slow start, but we’re in that new era now.
RIPE’s table of transfers of provider independent IPv4 address clearly shows a rapidly increasing rate of transfers of IPv4 address blocks and unique IPv4 addresses. The following two graphs illustrate the uptick in recent months of address space movement. February 2015 saw that most organizational transfers (373), while November 2014 saw the Continue reading
Another entrant in the battle for high-speed trading.
The other week (3/11/15) I was invited by Juniper Networks to their Sunnyvale, CA HQ location to particiapte in their 2015 Innovation Showcase. I have participated in Tech Field Day events in the past so I had an understanding of what to expect but what Juniper did blew me away – it turned out that this […]
The post Juniper Networks 2015 Innovation Showcase appeared first on Fryguy's Blog.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Experiencing a distributed denial-of-service (DDoS) attack is like having your home flood. Without warning, attackers can upend your enterprise. Every moment counts, but unfortunately by the time some DDoS solutions identify and report the attack, the damage is already done. You need a faster, more immediate means of threat detection to prevent severe damage.
When a DDoS attack hits your network, a long time can pass before the security/network staff fully realizes it is actually a DDoS attack that is affecting the services, and not a failing server or application. Even more time may pass before the actual mitigation of the threat starts to take effect.
To read this article in full or to leave a comment, please click here