There are mainly three IPv6 transition methods; Dual-Stack, Tunnelling and Translation. Careful engineers can understand the difference between IPv6 migration and IPv6 transition.
What is IPv6 dual stack ? From some questions and comments on the website, I understand that there is a confusion about it. So, what does exactly dual stack IPv6 mean ?
Settlement-Free Peering Requirements.
This term is very important to understand if you are deploying dual stack IPv6 network.
Network Design should be simple! Simplicity is the first network design best practice that I want you to remember. If you have been in the field long enough, you have probably heard about the KISS principle.
Most fundamental network design attribute should be simplicity.
Is Inter-AS MPLS VPNs commonly deployed ? In real-life deployment which Inter-AS MPLS VPN Option is most common ? What are the use cases of Inter-AS MPLS VPNs ? This is not a theory post , I will share practical information with you.
It doesn’t immediately make sense, does it: the terms peace and cyber hygiene in the same breath. Still, there is a reason why these two come together at the Paris Peace forum this week. That reason is simple though. Cyber hygiene – taking basic and common measures to secure software, devices, and networks – reduces the attack vectors that can be used by criminals and state actors alike. Cyber hygiene will reduce the odds that your network is seen as a belligerent actor just because it has been hacked by others. Cyber hygiene helps to create a more trustworthy and secure environment where people can go about their daily business in confidence that nothing dreadful will happen to them. It is one of the tools in the toolbox of confidence-building measures that enable peace.
Supporters of the Paris Peace Call, which was launched at the Peace Forum last year, are committed to working together to, among other things, “improve the security of digital products and services as well as everybody’s ‘cyber hygiene.’” The Internet Society has joined with a significant number of states, companies, and organizations to sign the Paris Call.
The topic of cyber hygiene is not Continue reading
MPLS Traffic Engineering Fast Reroute Link Protection – I will explain it in plain English and the most important point of MPLS TE FRR Link Protection among other Fast Reroute mechanisms.
IPv6 Business drivers can be many and different businesses have different reasons to deploy IPv6 on their network.
IPv6 is more commonly deployed in the Service Providers than Enterprises or Small Medium Businesses. Do you know why ?
What is PLR, Point of Local Repair in MPLS Traffic Engineering ?
PLR is the term is used in the context of Fast Reroute. I briefly mentioned from PLR in the MPLS Traffic Engineering Fast Reroute Link Protection post earlier and in this post, will explain it in more detail.
Cloud security posture management includes processes and tools to avoid cloud misconfigurations...
There are many broadband services Service Providers offer to their customers today. As a network engineer you need to know the most common services and their advantages, disadvantages, design characteristics and so on.
What is last mile and first mile ? This is an important telecommunication term which is used in all broadband communication methods. In this post, I will explain the term, differences and some detail about this term.
Network complexity plays a very important role during network design. Every network designer tries to find the simplest design.
MP-BGP (Multiprotocol BGP) is an extensions to BGP protocol. Standard BGP only supports IPv4 unicast address family, whereas MP-BGP supports more than 15 different BGP address families.