MTU size issues, fragmentation, and jumbo frames

MTU size issues, fragmentation, and jumbo frames

The maximum transmission unit (MTU) is the largest number of bytes an individual datagram can have without either being fragmented into smaller datagrams or being dropped along the path between its source and its destination. For...

6 network and security trends you can expect in 2017

6 network and security trends you can expect in 2017

Security and network trends for 2017 include the evolution of malware, IoT will contribute to security concerns, and AI and machine learning will be applied to security.

Resources abound to make cloud services more secure

Resources abound to make cloud services more secure

Cloud security training and certification are easily available from many trusted sources.

ARIN Finally Runs Out of IPv4 Addresses

ARIN Finally Runs Out of IPv4 Addresses

IPv4 Address Cupboards are Bare in North America

Is an SDN Switch A New Form of a Firewall?

Is an SDN Switch A New Form of a Firewall?

Many people anticipated that enterprise organizations would adopt Software Defined Network (SDN) technologies later than service providers or multi-tenant data centers and cloud service providers.  We are now seeing more use of...

Annual Security Reports Predict What We Can Expect in 2015

Annual Security Reports Predict What We Can Expect in 2015

Recent security reports give insight into security best practices often missed.

SDN Security Attack Vectors and SDN Hardening

SDN Security Attack Vectors and SDN Hardening

As enterprises look to adopt Software Defined Networking (SDN), the top of mind issue is the concern for security. With the introduction of SDN, new strategies for securing the control plane traffic are needed. This article will...

OpenFlow Supports IPv6 Flows

OpenFlow Supports IPv6 Flows

Software Defined Networking systems are gaining IPv6 capabilities

Promise Theory

Promise Theory

The way we have created IT systems over the years has been very linear with each individual component being statically configured. If a human makes an error in any one of the many configurations, then the whole system breaks down. ...

Software Containers: Used More Frequently than Most Realize

Whether you have considered trying to secure an application by putting it into a “sandbox” or wondered how a Software as a Service (SaaS) provider keeps your application and data isolated from other customers, you have been...

ARIN Enters Phase 4 of IPv4 Exhaustion

After IANA allocated the final IPv4 addresses to the five Regional Internet Registries (RIRs) on February 3, 2011, the RIRs have been running out of IPv4 addresses over the past three years. APNIC ran out on April 15, 2011; RIPE NCC...

Windows XP: Goodbye and Good Riddance

There has been much written recently about the end of support for Windows XP on April 8, 2014.  There are concerns about security vulnerabilities that will be used after Microsoft stops patching the operating system.  However, if...

Not your Father’s Flow Export Protocol (Part 2)

In the previous article we covered how NetFlow, IPFIX and the variety of other flow export protocols can be used to give us some application traffic visibility.  However, nothing gives as much detail as raw packet decode.  A new...

Your Father’s Flow Export Protocol (Part 1)

You may be familiar with NetFlow, IPFIX and other similar protocols like J-Flow and sFlow.  These protocols provide useful insight into traffic mix and communities of interest.  However, these protocols do not contain the...

The erosion of IT's middle class

As new technologies continue to emerge in the network, the need for highly skilled IT administration resources will grow just as well.However, the advent of Software Defined Networking (SDN), cloud systems, and orchestration software...

Clos Networks: What's Old Is New Again

Clos networks were first created in the mid-1950s as a method to switch telephone calls. Clos networks evolved into crossbar topologies and eventually into chassis-based Ethernet switches using a crossbar switching fabric. Now...

Using SDN to Create a Packet Monitoring System

Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches.  These solutions can be expensive which has lead companies to look for alternatives.  Establishing...

gogoNET LIVE 4! IPv6 Conference Recap

There have been many IPv6-related conferences, seminars, and events over the past decade. These events have aimed to educate the attendees about IPv6 and the potential of the maturing Internet protocol. This year’s gogoNET IPv6...

Dual-Protocol Routing with Raspberry Pi

Network Engineers are always looking for new ways to gain some low-cost network testing capabilities.  Few companies sufficiently fund networking labs for their networking teams to learn on prior to deployment.  Many have use Cisco...

Raspberry Pi as a network monitoring node

Raspberry Pi as a network monitoring node

The Raspberry Pi is an amazing little inexpensive Linux-based computer. It has been remarkably successful and there have been over Raspberry Pi systems sold. The Raspberry Pi can also be a useful tool in conventional IT...

Load More