Archive

Category Archives for "Networking"

The Week in Internet News: Your Doorbell is Spying on You

We’ve got our eyes on you: Ring, the Amazon-owned, IoT-powered video doorbell and security system vendor, has partnered with 400 police departments across the U.S. and is providing them with video footage, the Washington Post reports. Privacy advocates have raised concerns, saying the partnerships could subject innocent people, including those who Ring users have flagged as “suspicious,” to greater surveillance.

We’re listening, too: Meanwhile, Apple has apologized for some of its contractors listening in to recordings of customer’s interactions with the Siri digital assistant, Fox Business News says. Apple had been using the recordings for quality control, but the practice was not in line with Apple’s “high ideals,” the company said.

Also, the apps: Google has pulled a popular file-scanning app, CamSpanner, from the Google Play store, after reports that it contains malware, CNN reports. Researchers Kaspersky had found several negative reviews on the app’s profile that complained the app had the “presence of unwanted features.” The malware could show “intrusive advertising” to users.

Internet spycraft: China and other nations are using popular networking site LinkedIn to recruit spies in Western nations, the New York Times reports. One former foreign policy official in U.S. President Barack Obama’s Continue reading

Day Two Cloud 017: Grappling With Multi-Cloud’s Operational Implications

More and more organizations are adopting “multi-cloud" strategies. Some do it as a hedge against cloud system failures, others as a competitive cudgel. Day Two Cloud looks at the business, technical, and process implications with guest Alex Neihaus, a cloud infrastructure architect.

The post Day Two Cloud 017: Grappling With Multi-Cloud’s Operational Implications appeared first on Packet Pushers.

What is Optimal Routing and Suboptimal Routing in Networking

What is Optimal Routing and Suboptimal Routing in Networking? This may be seen very easy for some of you but let’s make a philosophy a little bit, means let’s design around optimal routing.  Network engineers know that one of the tradeoff in network design is Optimal Routing. We want our application traffic to follow Optimal …

The post What is Optimal Routing and Suboptimal Routing in Networking appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Recommended Resources for September 2019 First Week

I would like to share with you every week some networking resources , can be video , article , book , diagram , another website etc. Whatever I believe can be useful for the computer network engineers, mobile network providers, satellite engineers ,transmission experts, datacenter engineers,  basically whatever I am interested in and I like, …

The post Recommended Resources for September 2019 First Week appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

BGP Optimal Route Reflection – BGP ORR

BGP Optimal Route Reflection provides Optimal Routing for the Route Reflector Clients without sending all available paths.  I recommend you to read this post if you don’t know about BGP Route Reflector. If you are looking to learn BGP starting from Zero to Hero, Click Here.  Service Providers mostly prefers Hot Potato Routing in their …

The post BGP Optimal Route Reflection – BGP ORR appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

Operators Dish on 5G Strategies for Enterprise

5G heralds a new framework for mobile connectivity and has enterprises poised to gain entirely new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Will CCDE Practical Exam (Lab) Change in 2020?

Will CCDE Exam (Lab) change in 2020. I have been receiving this question again and again after Cisco’s announcement on Cisco certification exam changes.  Short answer is NO. Little bit long answer is, it will not change in February 2020 and in fact it has been the only design certification since many years. (Cisco I …

The post Will CCDE Practical Exam (Lab) Change in 2020? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Technologies and the protocols may not be used for what they were intended

I was reading a book today , called Deploying QoS for Cisco IP and NGN networks, which I can recommend you for history and future for QoS in networking industry, there was couple paragraph in the book, which lead me to share my thoughts about the protocols/technologies and their usage.   In the book, as …

The post Technologies and the protocols may not be used for what they were intended appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

SDxCentral’s Top 10 Articles — August 2019

HCX, VMware’s Top-Secret Sauce, Comes Out; VMware Buys Veriflow for Network Monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lanner Joins Forces With Hot OCP Ecosystem

Networking manufacture Lanner, well known for its uCPE and white box appliances, is the latest...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Huawei Accuses US of Cyberattacks, ‘Menacing’ Its Employees

Huawei accused the U.S. government of using cyberattacks and “every tool at its disposal” to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Asks to Play With Its mmWave 5G Spectrum

The carrier has asked the FCC for early access to the 24 GHz spectrum it won during a recent...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

2019 Chapterthon – Our Chapters, Connecting the World One Community at a Time

Each year, the Chapterthon project competition brings enthusiasm and excitement among our global community. We look forward to this time of year, when our communities mobilize and work alongside each other to achieve a common goal for the development of the Internet.

For the 2019 Chapterthon, we are delighted to announce that 34 Chapters and Special Interest Groups (SIGs) from across the globe have started implementing their work on local solutions that will bring some of the hardest-to-reach places and community segments online—connecting the unconnected.

Over the next two months, these 34 projects will:

  • connect underprivileged and rural areas in Armenia, Bangladesh, Benin, Mali, and South Africa;
  • build a community network in Kenya;
  • establish online databases for rural farmers in Burkina Faso and Saint Vincent and the Grenadines;
  • create an online audio library for people living with disabilities in northern rural Argentina;
  • revolutionize a mobile network unit in Madagascar for use in the event of a natural disaster;
  • educate and empower over fifty rural women on how to use the Internet during a friendly game of “Tag”;
  • build an FM broadcast system in rural Ghana; preserve Indigenous culture in rural Brazil;
  • sweat it out at a bootcamp in Continue reading

Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored)

Today's sponsored Tech Bytes explores how Big Switch Networks applies cloud design principles to data center and cloud networks. Network engineers can provide a developer-friendly environment while still enforcing policy, enabling security controls, and getting visibility into the network. Our guest is Big Switch CTO Paul Unbehagen.

The post Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored) appeared first on Packet Pushers.

Forwarding using sFlow-RT

The diagrams show different two different configurations for sFlow monitoring:
  1. Without Forwarding Each sFlow agent is configured to stream sFlow telemetry to each of the analysis applications. This configuration is appropriate when a small number of applications is being used to continuously monitor performance. However, the overhead on the network and agents increases as additional analyzers are added. Often it is not possible to increase the number of analyzers since many embedded sFlow agents have limited resources and only support a small number of sFlow streams. In addition, the complexity of configuring each agent to add or remove an analysis application can be significant since agents may reside in Ethernet switches, routers, servers, hypervisors and applications on many different platforms from a variety of vendors.
  2. With Forwarding In this case all the agents are configured to send sFlow to a forwarding module which resends the data to the analysis applications. In this case analyzers can be added and removed simply by reconfiguring the forwarder without any changes required to the agent configurations.
There are many variations between these two extremes. Typically there will be one or two analyzers used for continuous monitoring and additional tools, like Wireshark, might be deployed Continue reading