SK Telecom & KPN Deploy Nationwide LoRa IoT Networks
LoRa networks will likely co-exist, not compete, with cellular IoT.
LoRa networks will likely co-exist, not compete, with cellular IoT.
Last night I was going through some CCIE Routing and Switching VOD’s and found a statement I found interesting. Beyond the fact that I thought the content was far below the expert level (which is fine because a refresher or level-set is typically helpful), I believed it to be incorrect. The statement that was made is as follows:
“A neighbor meets the feasibility condition if the reported distance by the neighbor is the same as or smaller than the feasible distance of the router”
So what are my issues with this statement? First, I thought “feasible distance of the router” is ambiguous and could be assumed to be the advertised distance or the reported distance which is basically the feasible distance of the neighboring router. However, that was not my main problem with the statement. My main concern with this statement is that I have always learned that the feasibility condition is only met if the reported distance (RD) is strictly less than the feasible distance of the local route. So I set out to determine if I had a correct understanding or if the Feasibility Condition (FC) could really be met with a RD equal to the FD.
To test my theory, Continue reading
Cisco’s orchestrator uses YANG modeling from Tail-f.
The post Worth Reading: Little bits of security appeared first on 'net work.
Weren’t able to attend DockerCon 2016 last month? Don’t worry, there are several DockerCon recap meetups scheduled this month all over the world!
Have you signed up yet for the Docker 1.12 Hackathon? Teams of up to three individuals will hack the new features included in Docker 1.12 including Swarm Mode, cryptographic node identity, service API, and built-in routing mesh to win some awesome prizes. Submissions are due by July 25th so register your team today and start hacking!
Take a look at this month’s agenda including Docker trainings and meetups in your community.
Ericsson will be sole infrastructure provider for transcontinental 5G network.
Now that you have a copy of BGP in Go on your machine—it’s tempting to jump right in to asking the code questions, but it’s important to get a sense of how things are structured. In essence, you need to build a mental map of how the functionality of the protocol you already know is related to specific files and structure, so you can start in the right place when finding out how things work. Interacting with an implementation from the initial stages of process bringup, building data structures, and the like isn’t all that profitable. Rather, asking questions of the code is an iterative/interactive process.
Take what you know, form an impression of where you might look to find the answer to a particular question, and, in the process of finding the answer, learn more about the protocol, which will help you find answers more quickly in the future.
So let’s poke around the directory structure a little, think about how BGP works, and think about what might be where. To begin, what might we call the basic functions of BGP? Let me take a shot at a list (if you see things you think should be on here, Continue reading