Archive

Category Archives for "Networking"

9 career boosting Wi-Fi certifications

If you’re looking to add more certifications to your resume, don’t forget about wireless! Whether you’re just starting your IT career, have been in IT before Wi-Fi was a thing, or even if you have a non-IT position, there are certifications to help prove your wireless knowledge and skills.For starters, there are vendor-neutral certifications from Certified Wireless Network Professionals (CWNP), one of most popular programs in the wireless world. These are great if you aren’t already loyal to a networking brand. And even if you already have a favorite brand, these go deeper into the 802.11 standards and radio frequency (RF) technology without all the proprietary details and brand specifics.To read this article in full, please click here

9 career-boosting Wi-Fi certifications

If you’re looking to add more certifications to your resume, don’t forget about wireless! Whether you’re just starting your IT career, have been in IT before Wi-Fi was a thing, or even if you have a non-IT position, there are certifications to help prove your wireless knowledge and skills.For starters, there are vendor-neutral certifications from Certified Wireless Network Professionals (CWNP), one of most popular programs in the wireless world. These are great if you aren’t already loyal to a networking brand. And even if you already have a favorite brand, these go deeper into the 802.11 standards and radio frequency (RF) technology without all the proprietary details and brand specifics.To read this article in full, please click here

WHAT YOU SHOULD KNOW ABOUT YOUR EXTENDED SOCIAL MEDIA NETWORK.

Social media is one of the most used sites all over the world used by most mobile users counting to hundreds of millions of users. It provides different services to its users. It can be used as a fun site to upload images and videos, as a means of communication, as a way to meet different people of different beliefs and cultures all over the world, to learn and explore new and different things, and also as a business place. You reading this article also includes you among the social media users and you’ll know that there is a lot to benefit from using these sites. Let’s consider some of the most popular social media sites and what you should know about them.

  • Facebook: This is one of the most popular social media sites used by over 350 million users. You get to be friends with other Facebook users. In this case, a friend request would be sent and it has to be accepted by the receiver. It is a platform where people mostly share images and videos of various content under various genres. You can always access your genre of interest by using the search icon shaped like a Continue reading

Should We Use LISP?

LISP started as yet-another ocean-boiling project focused initially on solving the “we use locators as identifiers” mess (not quite), and providing scalable IPv6 connectivity over IPv4-only transport networks by adding another layer of indirection and thus yet again proving RFC 1925 rule 6a. At least those are the diagrams I remember from the early “look at this wonderful tool” presentations explaining for example how Facebook is using LISP to deploy IPv6 (more details in this presentation).

Somehow that use case failed to gain traction and so the pivots1 started explaining how one can use LISP to solve IP mobility or IP multihoming or live VM migration, or to implement IP version of conversational learning in Cisco SD-Access. After a few years of those pivots, I started dismissing LISP with a short “cache-based forwarding never worked well” counterargument.

Should We Use LISP?

LISP started as yet-another ocean-boiling project focused initially on solving the “we use locators as identifiers” mess (not quite), and providing scalable IPv6 connectivity over IPv4-only transport networks by adding another layer of indirection and thus yet again proving RFC 1925 rule 6a. At least those are the diagrams I remember from the early “look at this wonderful tool” presentations explaining for example how Facebook is using LISP to deploy IPv6 (more details in this presentation).

Somehow that use case failed to gain traction and so the pivots1 started explaining how one can use LISP to solve IP mobility or IP multihoming or live VM migration, or to implement IP version of conversational learning in Cisco SD-Access. After a few years of those pivots, I started dismissing LISP with a short “cache-based forwarding never worked well” counterargument.

Using ClamAV to detect viruses on Linux

One popular and easy-to-use tool for detecting virus infections on Linux systems is ClamAV. It's open source and free, and runs on many Linux systems, Ubuntu and Fedora included. In this post, we'll take a look at how to install and use the tool on Ubuntu, Linux Mint, and related systems. Installing ClamAV on Linux Mint The first step for installing ClamAV on Ubuntu, Mint, and related distros should be to update your system.$ sudo apt update && sudo apt upgrade -y After that, you can install ClamAV and verify the installation with commands like these:$ sudo apt-get install clamav clamav-daemon $ clamscan --version ClamAV 0.103.5/26469/Wed Mar 2 04:27:25 2-22 ClamAV commands ClamAV's tools are clamscan to do the scanning and freshclam to update the list of known virus signatures.To read this article in full, please click here

Using ClamAV to detect viruses on Linux

One popular and easy-to-use tool for detecting virus infections on Linux systems is ClamAV. It's open source and free, and runs on many Linux systems, Ubuntu and Fedora included. In this post, we'll take a look at how to install and use the tool on Ubuntu, Linux Mint, and related systems. Installing ClamAV on Linux Mint The first step for installing ClamAV on Ubuntu, Mint, and related distros should be to update your system.$ sudo apt update && sudo apt upgrade -y After that, you can install ClamAV and verify the installation with commands like these:$ sudo apt-get install clamav clamav-daemon $ clamscan --version ClamAV 0.103.5/26469/Wed Mar 2 04:27:25 2-22 ClamAV commands ClamAV's tools are clamscan to do the scanning and freshclam to update the list of known virus signatures.To read this article in full, please click here

Micro-segmentation and Beyond with NSX Firewall

VMware-based workload environments are the norm in private clouds for enterprise-class customers. 100%[1] of Fortune 500 companies deploy vSphere/ESXi. Further, ~99% of Fortune 1000 and ~98%[2] of Forbes Global 2000 companies deploy vSphere/ESXi. VMware’s deep presence in enterprise private clouds has made NSX Firewall the preferred micro-segmentation solution for these enterprises.

Below, we expand on how the NSX Firewall has developed its prominent position in enterprise private clouds.

Agentless and Agent-based Operation

Virtualized x86 workloads on hypervisors represent ~80%[3] of all enterprise workloads. VMware’s hypervisor-based micro-segmentation solution – NSX Firewall – is the preferred agentless solution for such workloads because of the solution’s tight integration with the rest of the VMware eco-system.

~15% of workloads at enterprises are x86-based (Windows, Linux) but not virtualized. The NSX Firewall handles these workloads with NSX agents.

~5% of workloads at enterprises are non-x86-based. VMware provides an (agentless) layer 2-7 gateway firewall that supports micro-segmentation for these workloads. Note that the gateway firewall eliminates the need for integration with physical switches, routers, and load-balancers.

Between these mechanisms, 100% of all workloads in the private cloud are protected. In practice, given VMware’s penetration of enterprises, VMware’s agentless solutions apply to the vast Continue reading

Hedge 121: Computing in the Network with Marie-Jose Montpetit

Can computation be drawn into the network, rather than always being pushed to the edge of the network? Taking content distribution networks as a starting point, the COIN research group is looking at ways to make networks more content and computationally aware, bringing compute into the network itself. Join Alvaro Retana, Marie-Jose Montpetit, and Russ White, as we discuss the ongoing research around computing in the network.

download

What’s next for Ethernet?

Higher, more cost-efficient speeds and getting better integration between IT and operational technology (OT) environments are two of the hottest areas of Ethernet development.That was on display this week at the Optical Fiber Communication conference where the Ethernet Alliance issued its latest Ethernet Roadmap, and a variety of vendors showed off the interoperability of the ubiquitous networking technology, now nearly 50 years old.What is SDN and where it's going “Ethernet is the most important thing in the world that no one ever sees,” said Peter Jones, chair of the Ethernet Alliance and distinguished engineer with the Enterprise, Data Center & IoT Networks group at Cisco.To read this article in full, please click here

Modernizing Network Monitoring with InfluxDB and Telegraf

Charles Mahler Charles is a technical marketing writer at InfluxData. Charles’ background includes working in digital marketing and full-stack software development. As the technology landscape continues to change at a rapid pace, enterprise companies are in a rush to catch up and modernize their legacy IT and network infrastructure to capture the benefits of newly developed tools and best practices. By adopting modern DevOps techniques, they can reduce their operational costs, increase the reliability of their services and improve the overall speed and agility at which their IT teams are able to move. Background

DNSSEC issues take Fiji domains offline

DNSSEC issues take Fiji domains offline
DNSSEC issues take Fiji domains offline

On the morning of March 8, a post to Hacker News stated that “All .fj domains have gone offline”, listing several hostnames in domains within the Fiji top level domain (known as a ccTLD) that had become unreachable. Commenters in the associated discussion thread had mixed results in being able to reach .fj hostnames—some were successful, while others saw failures. The fijivillage news site also highlighted the problem, noting that the issue also impacted Vodafone’s M-PAiSA app/service, preventing users from completing financial transactions.

The impact of this issue can be seen in traffic to Cloudflare customer zones in the .com.fj second-level domain. The graph below shows that HTTP traffic to these zones dropped by approximately 40% almost immediately starting around midnight UTC on March 8. Traffic volumes continued to decline throughout the rest of the morning.

DNSSEC issues take Fiji domains offline

Looking at Cloudflare’s 1.1.1.1 resolver data for queries for .com.fj hostnames, we can also see that error volume associated with those queries climbs significantly starting just after midnight as well. This means that our resolvers encountered issues with the answers from .fj servers.

DNSSEC issues take Fiji domains offline

This observation suggests that the problem was strictly DNS related, rather than connectivity related—Cloudflare Radar Continue reading

Segment Routing vs LDP in Hub-and-Spoke Networks

I got an interesting question that nicely illustrates why Segment Routing (the MPLS variant) is so much better than LDP. Imagine a redundant hub-and-spoke network with hundreds of spokes. Let’s settle on 500 spokes – IS-IS supposedly has no problem dealing with a link-state topology of that size.

Let’s further assume that all routers advertise only their loopbacks1 and that we’re using unnumbered hub-to-spoke links to minimize the routing table size. The global routing table thus contains ~500 entries. MPLS forwarding tables (LFIB) contain approximately as many entries as each router assigns a label to every prefix in the routing table2. What about the LDP table (LIB – Label Information Base)?