I would like to share with you every week some networking resources , can be video , article , book , diagram , another website etc.
Whatever I believe can be useful for the computer network engineers, mobile network providers, satellite engineers ,transmission experts, datacenter engineers, basically whatever I am interested in and I like, I will share in a blog post.
There will not be any order of importance among the resources. You can open and go through anyone you want.
I will try to limit the list with 5 resources as I want you to read the posts that I publish on the website. Sometimes can be more than 5 though!
Let’s get started!
TCP vs QUIC – Quic is a new transport protocol I think everyone should have a look at. What are the high level differences between them etc.
TCP vs QUIC: A New Transport Protocol
2. Below post explains how BGP As-Path prepending , when it is done more than couple times , can be dangerous for the attacks on BGP information security
Excessive BGP AS-PATH prepending is a self-inflicted vulnerability
3. This presentation is one of the best presentation about BGP Continue reading
SDxCentral Weekly Wrap for Nov. 22, 2019: The burgeoning SASE market lures another entrant; Nokia...
Original TCP/IP and OSI network stacks had relatively clean layered architecture (forgetting the battle scars for the moment) and relied on end-to-end principle to keep the network core simple.
As always, no good deed goes unpunished - “creative” individuals trying to force-fit their mis-designed star-shaped pegs into round holes, and networking vendors looking for competitive advantage quickly destroyed the idea with tons of middlebox devices, ranging from firewalls and load balancers to NAT, WAN optimization, and DPI monstrosities.
You need free ipSpace.net subscription to watch the video, or a paid ipSpace.net subscriptions to watch the whole How Networks Really Work webinar.
Western Digital and Liqid demonstrated the ability to orchestrate NVMe over Fabrics across...
“Everybody does automation,” Extreme’s Dan DeBacker said. “But we believe we’re the only...
400GE First Data Networks: Caltech, Starlight/NRL, USC, SCinet/XNET, Ciena, Mellanox, Arista, Dell, 2CRSI, Echostreams, DDN and Pavilion Data, as well as other supporting optical, switch and server vendor partners will demonstrate the first fully functional 3 X400GE local ring network as well as 400GE wide area network ring, linking the Starlight and Caltech booths and Starlight in Chicago. This network will integrate storage using NVMe over Fabric, the latest high throughput methods, in-depth monitoring and realtime flow steering. As part of these demonstrations, we will make use of the latest DWDM, Waveserver Ai, and 400GE as Continue reading
CA’s NetOps 19.1 release simplifies Cisco Vipela and Versa SD-WAN management to help you optimize...
“It’ll be a fascinating test. It’s something we can’t control. I certainly have...
The changes will "strongly position the company against our competitors," according to an internal...
BitLife: Life Simulator, also called BitLife for short, is digital-based, single player cartoon video game for Android / iOS released in 2018 by CandyWriter LLC. The game has become extremely popular, as people live the simulated digital life that they choose. Many players of this game want to become famous winning the “Famous Ribbon,” but becoming famous is no cake-walk, as you will have to spend years of your life working towards fame and fortune you want and feel you deserve. Still, for those brave souls with that much time on their hands, here are a few tips on how to get famous in BitLife.
Being good looking is extremely important in your effort to becoming famous. So, you may want to keep resetting your character until you score at 80% in the looks department. The better looking you are and become throughout your life, the easier it may be to become famous. Later, in life you can choose to have plastic surgery or other procedures in order to help you become better looking. Remember, we’re talking about a video game life simulator here, not Continue reading
The new Zero Trust Architecture blocks connectivity to servers and applications from unknown...
Good day Network experts
It has been a great pleasure and an honor working with Tarique Shakil and Vinit Jain on this book below, deep-diving on this amazing LISP protocol.
I would like also to take this opportunity to thank Max Ardica, Victor Moreno and Marc Portoles Comeras for their invaluable help. I wrote the section on LISP Mobility deployment with traditional and modern data center fabrics (VXLAN EVPN based as well as ACI Multi-Pod/Multi-Site), however this could not have been done without the amazing support of these guys.
Available from Cisco Press
or from Safari book Online
Implement flexible, efficient LISP-based overlays for cloud, data center, and enterprise
The LISP overlay network helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility.
LISP Network Deployment and Troubleshooting is the definitive resource for all network engineers who want to understand, configure, and troubleshoot LISP on Cisco IOS-XE, IOS-XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to address key issues such Continue reading
Internet security is accomplished by many unsung heroes. People who put their talent and passion into improving the Internet, making it secure and trustworthy. This is a feature of the Internet: security isn’t achieved through a central mandate but through the hard work and tenacity of individuals working across the globe.
Rachel Player, a cryptographic researcher, is one of those unsung heroes. She’s just been awarded the Radiant Award from the Internet Security Research Group, the folks behind Let’s Encrypt, for her work in post-quantum cryptography and homomorphic encryption. Homomorphic encryption allows people to do computations on encrypted data, so that information can remain private and still be worked with. This is a highly-relevant field in any area that deals with sensitive and personal data, such as medicine and finance. Player is also interested in lowering the barriers for young people – young women, especially – to work professionally on topics like cryptography.
Want to know more about Let’s Encrypt? Read a comprehensive overview of the initiative – from inspiration to Continue reading