How Verizon’s $700M Outsourcing Deal May Impact Its Competitiveness
The service provider prides itself on its network superiority but can it maintain its competitive edge and still outsource its IT department?
The service provider prides itself on its network superiority but can it maintain its competitive edge and still outsource its IT department?
The company currently supports 50 services at the FedRAMP Moderate level with plans to push that to the FedRAMP High level by year-end.
Google on Monday also said it would shut down its Google+ social network after a vulnerability exposed the personal data of approximately 500,000 users.
Advances in visualization are essential for managing—and maximizing value from—the rising flood of data, the growing sophistication of simulation codes, the convergence of machine learning (ML) and simulation workloads, and the development of extreme-scale computers. …
Accelerating the Shift to Software Defined Visualization was written by Nicole Hemsoth at .
The Layer 2 service is provisioned over CenturyLink’s owned and operated global fiber as opposed to a leased backbone.
Like Cisco's intent-based networking its Business Critical Services use analytics and automation.
Orchestration is often used interchangeably with automation. The reality is these terms are very different. Understanding the distinction is important. It’s time to set the record straight.
In this post, I’m going to talk about what IP fragmentation is, how it works and why it’s needed. And while learning that, we’re going to touch on subjects like OSI Layers
/ PDU
/ MTU
/ MRU
and PMTUD
.
Knowledge about them is required for truly understanding IP fragmentation process and troubleshooting network connection issues in general.
This is basically a standardized model for network communications which breaks them into what’s called abstraction layers.
The original model consists of 7 layers: Physical
, Data link
, Network
, Transport
, Session
, Presentation
, and Application
.
Going up the OSI model hierarchy, layers stack up on top of one another.
Example 1:
In the reverse order, loading a secure web page would consist of:
HTTP
(Application layer)TLS
(Presentation Layer)TCP
(Transport Layer)IP
(Network Layer)Ethernet
(Data Link Layer)Ethernet physical layer
(Physical Layer)Each layer would add an overhead to the final size (Yes, even the physical layer!)1
More info can be found Here.
In the OSI model, each layer consists of units. They are called Protocol Data Units.
Any transmission between 2 entities on a layer, would be be done Continue reading
One of my subscribers sent me a nice email describing his struggles to master Ansible:
Some time ago I started to hear about Ansible as the new power tool for network engineer, my first reaction was “What the hell is this?” I searched the web and found many blah blahs about it… until I landed on your pages.
He found Ansible for Networking Engineers material sufficient to start an automation project:
Read more ...There have been some important developments towards improving routing security over the past few weeks, with announcements at NLNOG and AusNOG, as well as from Cloudflare about commitments to validate IP prefixes and reduce route leaks and hijacks. This supports the work we’ve being doing with the MANRS initiative to raise awareness of this issue, and to persuade network operators to take collaborative responsibility for this critical aspect of the Internet.
Cloudflare to deploy RPKI
Cloudflare has been a long-time advocate of routing security, and during their recent Crypto Week, they announced that they’ll be deploying RPKI on their networks. Resource Public Key Infrastructure (RPKI) allows IP address prefixes and AS numbers to be cryptographically verified (using Route Origin Authorization), and therefore provides some assertion that the holders of these have the right to announce them. The use of RPKI is included as one of the four MANRS actions “Global Validation – facilitating validation of routing information on global scale” which includes the creation of ROAs and the maintenance of accurate data in Internet Routing Registries (IRRs).
Cloudflare also announced GoRTR, which is an open-source implementation of the RPKI to Router (RTR) protocol (see RFC 6810). This is Continue reading
DT will use its fiber infrastructure to connect 5,000 Telefónica cell sites in Germany to support 3G, 4G LTE, and planned 5G services.
The company added a network friending service to its analytics platform, allowing its customers to benchmark their network performance against others’.
As the Director of Technology for the Southern California Tribal Chairmen’s Association I’ve been working with Native communities in San Diego County and Southern Riverside County of California in the United States for the past seventeen years. With a long background in Dot Com graphic design exposed to networking and web servers, the transition into technology was an obvious one.
A descendant of the Cree Nation with ancestors hailing from Norway and Finland may partially explain why I’ve been tagged a “cyber warrior for broadband.” I am 6’4” with long hair. Maybe it’s because I sketch in metal to build cyborg arms. But I believe it has more to do with the fact that I have lived in and among Southern California reservations since 2001, working with a team of local people, solving a myriad issues related to connectivity. We’ve come a long way, connecting thousands of homes to the Internet. Several thousand remain, but we are getting closer.
But more needs to happen.
The views, voices and knowledge of Indigenous people need to be included in the policy and tech that help build the Internet. If we’re not part of it, we’re literally written out of it.
So, Continue reading
Counting Up the Benefits that Leaf-Spine Architecture Brings to Enterprise Networks
If your network, like most, is growing in size and complexity, perhaps it’s time to consider whether the traditional three-tier network architecture has run its course. It’s becoming apparent that a flatter, two-tier leaf spine network topology can bring dramatic changes in the way we manage networks – with as good or better performance.
Common enterprise network challenges
For decades we’ve been building networks based on the three-tier model: access, aggregation and core. Typical enterprise environments based on this model can easily comprise hundreds or thousands of individual networking devices, creating numerous challenges for implementation and operations teams to overcome in managing and maintaining the networks.
Sure, the teams have lots of software tools to manage and monitor the infrastructure, but they often have little to no integration with each other. Ongoing configuration management along with upgrades, policy and security changes therefore become exceedingly complex and time-consuming, often requiring administrators to log into each device, one at a time, to make changes.
And all the while, the network is often not efficiently utilizing bandwidth due to the use of Spanning Tree Protocol (STP). While the network is likely built Continue reading