
MTU size issues, fragmentation, and jumbo frames
The maximum transmission unit (MTU) is the largest number of bytes an individual datagram can have without either being fragmented into smaller datagrams or being dropped along the path between its source and its destination.
For...

6 network and security trends you can expect in 2017
Security and network trends for 2017 include the evolution of malware, IoT will contribute to security concerns, and AI and machine learning will be applied to security.

Resources abound to make cloud services more secure
Cloud security training and certification are easily available from many trusted sources.

Is an SDN Switch A New Form of a Firewall?
Many people anticipated that enterprise organizations would adopt Software Defined Network (SDN) technologies later than service providers or multi-tenant data centers and cloud service providers. We are now seeing more use of...

Annual Security Reports Predict What We Can Expect in 2015
Recent security reports give insight into security best practices often missed.

SDN Security Attack Vectors and SDN Hardening
As enterprises look to adopt Software Defined Networking (SDN), the top of mind issue is the concern for security. With the introduction of SDN, new strategies for securing the control plane traffic are needed. This article will...


Promise Theory
The way we have created IT systems over the years has been very linear with each individual component being statically configured. If a human makes an error in any one of the many configurations, then the whole system breaks down. ...
Software Containers: Used More Frequently than Most Realize
Whether you have considered trying to secure an application by putting it into a “sandbox” or wondered how a Software as a Service (SaaS) provider keeps your application and data isolated from other customers, you have been...
ARIN Enters Phase 4 of IPv4 Exhaustion
After IANA allocated the final IPv4 addresses to the five Regional Internet Registries (RIRs) on February 3, 2011, the RIRs have been running out of IPv4 addresses over the past three years. APNIC ran out on April 15, 2011; RIPE NCC...
Windows XP: Goodbye and Good Riddance
There has been much written recently about the end of support for Windows XP on April 8, 2014. There are concerns about security vulnerabilities that will be used after Microsoft stops patching the operating system. However, if...
Not your Father’s Flow Export Protocol (Part 2)
In the previous article we covered how NetFlow, IPFIX and the variety of other flow export protocols can be used to give us some application traffic visibility. However, nothing gives as much detail as raw packet decode. A new...
Your Father’s Flow Export Protocol (Part 1)
You may be familiar with NetFlow, IPFIX and other similar protocols like J-Flow and sFlow. These protocols provide useful insight into traffic mix and communities of interest. However, these protocols do not contain the...
The erosion of IT's middle class
As new technologies continue to emerge in the network, the need for highly skilled IT administration resources will grow just as well.However, the advent of Software Defined Networking (SDN), cloud systems, and orchestration software...
Clos Networks: What's Old Is New Again
Clos networks were first created in the mid-1950s as a method to switch telephone calls. Clos networks evolved into crossbar topologies and eventually into chassis-based Ethernet switches using a crossbar switching fabric. Now...
Using SDN to Create a Packet Monitoring System
Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches. These solutions can be expensive which has lead companies to look for alternatives. Establishing...
gogoNET LIVE 4! IPv6 Conference Recap
There have been many IPv6-related conferences, seminars, and events over the past decade. These events have aimed to educate the attendees about IPv6 and the potential of the maturing Internet protocol. This year’s gogoNET IPv6...
Dual-Protocol Routing with Raspberry Pi
Network Engineers are always looking for new ways to gain some low-cost network testing capabilities. Few companies sufficiently fund networking labs for their networking teams to learn on prior to deployment. Many have use Cisco...

Raspberry Pi as a network monitoring node
The Raspberry Pi is an amazing little inexpensive Linux-based computer. It has been remarkably successful and there have been over Raspberry Pi systems sold. The Raspberry Pi can also be a useful tool in conventional IT...