Africa DNS Forum: Taking Stock and Planning Ahead

The 5th Africa Domain Names System (DNS) Forum was successfully closed on 28 July after three days of insightful reflections on the Africa DNS Industry and the business opportunities it can provide. This forum follows on the success of previous fora that have taken place in Africa over the past few years – namely South Africa in 2013, Nigeria in 2014, Kenya in 2015, and Morocco in 2016. 
 

Betel Hailu

IP Infusion powering the world from behind the scenes

Founded by Kunihiro Ishiguro and Yoshinari Yoshikawa the founders of GNU Zebra, came together to form IP Infusion back in 1999 as a commercial-grade, hardware-independent networking software company. If you’re not familiar with Zebra, you probably know it’s little brother Quagga which powers everything from Cumulus Linux to Vyatta and even my old digs.. Imagestream routers. Ishiguro and Yoshikawa took Zebra, and built ZebOS, which has been working behind the scenes in products we all use every day for years. IP Infusion’s ZebOS powers everything from F5 LTM’s and Citrix Netscaler’s to Plexxi, SK Telecom, and Huawei networking products.

Today IP Infusion is selling two variants of ZebOS to OEMs, OcNOS and VirNOS. OcNOS is a full featured network OS built specifically for White Box OEMs looking for switching, routing, MPLS, and SDN support. It can support a hybrid, centralized, or distributed network framework which provides a scalable, modular, and robust framework that can be deployed on merchant silicon. VirNOS is their NFV solution that can be used for distributed or cloud based vCPE, vPE, or vRouters in your data center.

Whitebox networking is a really exciting market that I have been looking into since the SDN craze started. Continue reading

JUNIPER NORTHSTAR 3.0 – SIGNAL TRAFFIC ENGINEERED MPLS LSPs BETWEEN TE DOMAINS

In this post, I’m going to explain how we can use an SDN controller to provision traffic-engineered MPLS LSPs between PE nodes situated in different traffic-engineering domains.

The SDN controller that we’re going to use is NorthStar from Juniper Networks running version 3.0. For more information regarding NorthStar check here. There is also a great Day One book available: NorthStar Controller Up and Running.

Overview

Typically, in order to provision traffic-engineered MPLS LSPs between PE nodes, it is necessary for the PEs to be situated in a common TE domain. There are some exceptions to this such as inter-domain LSP or LSP stitching. However, these options are limited and do not support end-to-end traffic-engineering as the ingress PE does not have a complete traffic-engineering view. I personally haven’t seen many deployments utilising these features.

So, what’s the use case? Many service providers and network operators are using RSVP to signal traffic-engineered LSPs in order to control how traffic flows through their environments. There are many reasons for doing this, such as steering certain types of traffic via optimal paths or achieving better utilisation of network bandwidth. With many RSVP deployments, you will see RSVP used in the core of Continue reading

What is Layer 0 in the OSI Layers ?

What is Layer 0 in the OSI layers ? Isn’t OSI (Open Systems Interconnection) seven layers?    Yes it is. In the standard, seven layers have been defined. Just let’s remember the seven layers of OSI.   Layer 7: The application layer. Layer 6: The presentation layer. Layer 5: The session layer. Layer 4: The […]

The post What is Layer 0 in the OSI Layers ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: AMP and ThreatGrid Integration into Meraki UTMs

Lately, I have been spending a lot of time on integrating security systems together, and specifically focusing a lot of my energy on Cisco’s Advanced Threat Security product family. (Disclosure: I am employed by Cisco.)Which is what brings me to Cisco’s Advanced Malware Protection (AMP), which is a solution to enable malware detection, blocking, continuous analysis and retrospective actions and alerting.In fact, when the Talos cyber-vigilantes parachute into an environment and performs their forensics analysis and active defense against attacks—AMP is one of the primary tools that they use.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How immersive technologies will reshape networks

In the late 1990s and early 2000s when it became too difficult for large companies to manage their own WAN footprints, they adopted managed multiprotocol label switching (MPLS) services. These offered a simple connection at every location and offloaded the complexities of building large-scale routed networks from enterprises to the service provider.The advent of cloud computing, however, changed the dynamics of MPLS forever. Enterprises not only needed ubiquitous site-to-site connectivity, but also required better performance from the network to support Software as a Service-based business applications hosted in third-party data centers. In addition, video was becoming a standard mode of communication for corporate meeting and training applications, boosting the need for more bandwidth across the network.To read this article in full or to leave a comment, please click here

IDG Contributor Network: AMP and ThreatGrid Integration into Meraki UTMs

Lately, I have been spending a lot of time on integrating security systems together, and specifically focusing a lot of my energy on Cisco’s Advanced Threat Security product family. (Disclosure: I am employed by Cisco.)Which is what brings me to Cisco’s Advanced Malware Protection (AMP), which is a solution to enable malware detection, blocking, continuous analysis and retrospective actions and alerting.In fact, when the Talos cyber-vigilantes parachute into an environment and performs their forensics analysis and active defense against attacks—AMP is one of the primary tools that they use.To read this article in full or to leave a comment, please click here

IDG Contributor Network: AMP and ThreatGrid Integration into Meraki UTMs

Lately, I have been spending a lot of time on integrating security systems together, and specifically focusing a lot of my energy on Cisco’s Advanced Threat Security product family. (Disclosure: I am employed by Cisco.)Which is what brings me to Cisco’s Advanced Malware Protection (AMP), which is a solution to enable malware detection, blocking, continuous analysis and retrospective actions and alerting.In fact, when the Talos cyber-vigilantes parachute into an environment and performs their forensics analysis and active defense against attacks—AMP is one of the primary tools that they use.To read this article in full or to leave a comment, please click here

IDG Contributor Network: AMP and ThreatGrid Integration into Meraki UTMs

Lately, I have been spending a lot of time on integrating security systems together, and specifically focusing a lot of my energy on Cisco’s Advanced Threat Security product family. (Disclosure: I am employed by Cisco.)Which is what brings me to Cisco’s Advanced Malware Protection (AMP), which is a solution to enable malware detection, blocking, continuous analysis and retrospective actions and alerting.In fact, when the Talos cyber-vigilantes parachute into an environment and performs their forensics analysis and active defense against attacks—AMP is one of the primary tools that they use.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How immersive technologies will reshape networks

In the late 1990s and early 2000s when it became too difficult for large companies to manage their own WAN footprints, they adopted managed multiprotocol label switching (MPLS) services. These offered a simple connection at every location and offloaded the complexities of building large-scale routed networks from enterprises to the service provider.The advent of cloud computing, however, changed the dynamics of MPLS forever. Enterprises not only needed ubiquitous site-to-site connectivity, but also required better performance from the network to support Software as a Service-based business applications hosted in third-party data centers. In addition, video was becoming a standard mode of communication for corporate meeting and training applications, boosting the need for more bandwidth across the network.To read this article in full or to leave a comment, please click here

Is it really hard to spell ‘ Orhan Ergun ‘ ?

Is it really hard to spell ‘ Orhan Ergun ‘ ? I see a lot of different variations of my name, its funny though ? Below are some search keywords which people used to find something related with me.   I know my name is not very common. In fact, among English speaking people, one […]

The post Is it really hard to spell ‘ Orhan Ergun ‘ ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The IoT needs simulation to grow

Without simulation, complex systems would fail. Satellites would not reach an accurate orbit, semiconductor circuits would not function, and bridges would not carry the load. Businesses and governments would not invest in these projects without robust simulation software. And without a simulation proving value and functionality, IoT networks of hundreds of thousands or millions of inexpensive devices adding up to large capital investments will not be built.Researchers from the University of Bologna published an analysis of IoT simulation and a smart cities vehicular transportation system case study (pdf). They recommend a networked simulation of orchestrated simulators that model specific IoT features that fit the diversity of IoT devices and use cases.To read this article in full or to leave a comment, please click here

RFC8200: IPv6 Is an Internet Standard

You wouldn’t believe it – after almost 22 years (yeah, it’s been that long since RFC 1883 was published), IPv6 became an Internet standard (RFC8200/STD86). No wonder some people claim IETF moves at glacial speed ;)

Speaking of IPv6, IETF and glacial speeds – there’s been a hilarious thread before Prague IETF meeting heatedly arguing whether the default WLAN SSID should be IPv6-only (+NAT64). Definitely worth reading (for the entertainment value) over a beer or two.

All Of Ethan’s Podcasts And Articles For July 2017

Packet Pushers Weekly Podcast

Packet Pushers Network Break Podcast

Datanauts Podcast

Priority Queue Podcast

Citizens of Tech Podcast

  • Eric and I are having a long think about this show. Still. Not sure where we’re going to land. We like making it, but we also like having time in our lives without stress. Making this show is fun, but is also stressful.

Video

NetIntro Book

  • I finished a chapter on the Internet of Things and began a chapter on Cloud Computing. This project is wrapping up. Russ White has been writing up a storm. A couple of other contributors stepped up to the plate and Continue reading

All Of Ethan’s Podcasts And Articles For July 2017

Packet Pushers Weekly Podcast

Packet Pushers Network Break Podcast

Datanauts Podcast

Priority Queue Podcast

Citizens of Tech Podcast

  • Eric and I are having a long think about this show. Still. Not sure where we’re going to land. We like making it, but we also like having time in our lives without stress. Making this show is fun, but is also stressful.

Video

NetIntro Book

  • I finished a chapter on the Internet of Things and began a chapter on Cloud Computing. This project is wrapping up. Russ White has been writing up a storm. A couple of other contributors stepped up to the plate and Continue reading