IS-IS vs. OSPF Part I: First steps in understanding IS-IS

The theme question is actually quite a good one, because it may seem like the fight has already been won by IS-IS in the Service Provider segment, and by OSPF on the enterprise market. So why ask it then? Well, because I got the following answer one too many times: “IS-IS is awesome, OSPF not so much. I have no idea how IS-IS works but it’s great. OSPF is so complicated and offers so little flexibility…”.

Well, that’s really wrong from my point of view. No protocol can be neither awesome nor despicable. They both offer you advantages and disadvantages, and knowing how they both work will help you make the best decision based on the needs of the network, not just because people say one is “great” and the other is not.

So, I am going to follow the steps I took to come to terms with IS-IS, and then we’ll see together, even though you’ll probably figure it out for yourselves by then, the comparative analysis of the two IGPs.

 

Step 1: Understanding CLNS & CLNP

Often network engineers freak out when they hear about the OSI stack, CLNP (Connectionless Network Protocol) and CLNS (Connectionless Network Service). Continue reading

ZigBee and Thread act to make their IoT smarts stack up

Two pieces in the complicated puzzle of smart-home options will snap together later this year when the ZigBee Alliance starts certifying devices that use the Thread protocol for networking. The industry groups behind these two systems have agreed to work out how they can both be integrated into the same product: Thread for exchanging data packets with other devices and ZigBee for defining how applications work on the device. This should lead to ZigBee products that can talk to many more devices in the Internet of Things. As the latest edition of the International CES trade show begins on Tuesday, consumers are faced with a slew of new standards, protocols and frameworks to tie home IoT products together as an easily managed system. On Monday, the Wi-Fi Alliance announced it's finished a new specification it calls Wi-Fi HaLow, which uses less power so it can work in small battery-powered devices.To read this article in full or to leave a comment, please click here

Lowe’s to add emergency dispatch service for Iris DIY smart-home systems

Smart-home gadgets look cool, but the services connected to them may be more valuable to many owners in the long run. Home-improvement chain Lowe's plans to make more of those services available to do-it-yourselfers.By the middle of this year, owners of Lowe's Iris home gadgets will be able to buy professional monitoring, including dispatching of first responders in case of emergency. It will cost US$19.99 per month and will become available in select markets as licensing allows.Security and life safety are two of the big reasons consumers are buying into the Internet of Things. Broadband providers like AT&T and Comcast install smart-home systems built around things like connected burglar alarms. For example, AT&T's website advertises professionally monitored home security and automation systems starting at $39.99 per month with a two-year contract.To read this article in full or to leave a comment, please click here

Moving target defense vs. moving target attacks: The two faces of deception

The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.To read this article in full or to leave a comment, please click here

Moving target defense vs. moving target attacks: The two faces of deception

The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.

Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.

To read this article in full or to leave a comment, please click here

Fibre Channel: What Is It Good For?

In my last article, I talked about how Fibre Channel, as a technology, has probably peaked. It’s not dead, but I think we’re seeing the beginning of a slow decline. Fibre Channel’s long goodbye is caused by a number of factors (that mostly aren’t related to Fibre Channel itself), including explosive growth in non-block storage, scale-out storage, and interopability issues.

But rather than diss Fibre Channel, in this article I’m going to talk about the advantages of Fibre Channel has over IP/Ethernet storage (and talk about why the often-talked about advantages aren’t really advantages).

Fibre Channel’s benefits have nothing to do with buffer to buffer credits, the larger MTU (2048 bytes), its speed, or even its lossless nature. Instead, Fibre Channel’s (very legitimate) advantages are mostly non-technical in nature.

It’s Optimized Out of the Box

When you build a Fibre Channel-based SAN, there’s no optimization that needs to be done: Fibre Channel comes out of the box optimized for storage (SCSI) traffic. There are settings you can tweak, but most of the time there’s nothing that needs to be done other than set port modes and setup zoning. The same is true for the host HBAs. While there are some Continue reading

Top 10 breaches of personal data in 2015

It was a bountiful year for hackers who gained unauthorized access to countless corporate and government databases. Here are the online breaches that hauled in the largest amount of personal data -- most of them tallying into the millions.No. 10: U.S. Internal Revenue ServiceNumber of people affected: About 334,000Security experts said it technically wasn’t “hacking” when thieves stole the tax information of 100,000 people through the IRS site. It was a case of weak security: They entered through the IRS’ “Get Transcript” service by answering security questions correctly, using personal information on their victims that had been obtained elsewhere, or simply guessing.To read this article in full or to leave a comment, please click here(Insider Story)

34,000 gamers affected by Christmas attack on Steam

Steam set a new record on Jan. 3 when over 12 million gamers were all gaming at the same time. Gamasutra reported that there were 12,332,504 concurrent users. The Steam stats showed Dota 2 as the most played game which peaked at 940,373 concurrent gamers. Counter-Strike had 643,402 concurrent players and Fallout 4 came in third at the peak with 116,599 gamers. That being said, today is the last day of the Steam winter sale.To read this article in full or to leave a comment, please click here