DESIGN Stories

Preparing mobile backhaul for 5G

Published on: 2019-09-25

One of the more significant aspects of the transition to 5G communications is the aggregate network that will backhaul traffic to centralized processing resources. 5G traffic is expected to be substantial, after all, which means it will be necessary to upgrade network infrastructure from the ...

What is Project BroadWay?

Published on: 2019-09-24

About a decade ago, the European Commission started having formal conversations around TETRA and the future of public safety communications networks. This led to the formation of Public Safety Communications – Europe, and subsequently to research validating what public safety users would require ...

Entering a new era of openness and disaggregation

Published on: 2019-09-12

Networking has long relied on proprietary architecture, particularly on the transport layer. The thinking behind this is that while single-vendor solutions tend to be more expensive, they are also more reliable and easier to manage than a collection of interoperable boxes. But this attitude is ...

Eradicate Wi-Fi dead spots with this $20 Netgear range extender

Published on: 2019-09-10

Dropping out of Wi-Fi range is the worst, and when it happens in dead spots in your own home, it’s doubly so. Today, though, you can battle those dead spots with the Netgear EX2700 range extender for $20 on Amazon, down from the $31.49 list price it’s been sitting at for over a year. Amazon has ...

Q&A: HPE's networking chief opens up about intelligent edge, Cisco and micro data centers

Published on: 2019-09-05

Since founding Aruba Networks in 2002 and then staying on when Hewlett Packard bought the firm in 2015, Keerti Melkote has seen firsthand the evolution of the wireless industry. From the initial rush to bring laptops using Wi-Fi to the enterprise and the advent of Apple iPad – which Melkote says ...

IDG Contributor Network: Software-defined perimeter – the essence of trust

Published on: 2019-08-26

Actions speak louder than words. Reliable actions build lasting trust in contrast to unreliable words. Imagine that you had a house with a guarded wall. You would feel safe in the house, correct? Now, what if that wall is dismantled? You might start to feel your security is under threat. Anyone ...

Cisco & NTT Ltd. Named to Fortune's Change the World List

Published on: 2019-08-21

SAN JOSE & LONDON, Aug. 21, 2019 – Cisco and NTT Ltd. were recently selected for Fortune’s fifth annual Change the World list, recognizing both companies, and their partnership, as leaders among the Fortune Global 500 in addressing the world’s biggest challenges and for their efforts to “do well ...

Cisco Reports Fourth Quarter and Fiscal Year 2019 Earnings

Published on: 2019-08-14

SAN JOSE, Calif., Aug. 14, 2019 -- Cisco today reported fourth quarter and fiscal year results for the period ended July 27, 2019. Cisco reported fourth quarter revenue of $13.4 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.2 billion or $0.51 per share, and ...

CoreDNS joins Kubernetes, Prometheus, and Envoy

Published on: 2019-01-24

CoreDNS, the DNS server created to serve as support infrastructure for Kubernetes, has been “graduated” by the Cloud Native Computing Foundation, sustainers of Kubernetes and other open source technology for building modern clouds. The graduated status is a green light to anyone deciding whether ...

Review: 6 slick open source routers

Published on: 2018-02-01

Hackers of the world, unite! You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones, routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer devices. In many cases the benefits are major and concrete: a ...

Does TCP keep pace with QUIC?

Published on: 2019-09-25

QUIC is a new Internet transport protocol and the foundation of HTTP/3, which promises to enhance the historically grown TCP+TLS+HTTP web stack. By combining these functionalities on top of UDP, QUIC can, by design, overcome irresolvable issues like head-of-line blocking. Moreover, features that ...

5 Considerations Before Building Your Own Cloud Security Tool

Published on: 2019-09-24

Engineers love to build, and when it comes to cloud security, some DevOps teams try to cobble together their own solution from a combination of cloud-provided and disparate open source products. Before you invest too much time and too many resources into a DIY security project, here are some ...

Securing BGP on the host with origin validation

Published on: 2019-09-24

An increasingly popular design for a data centre network is BGP on the host: each host ships with a BGP daemon to advertise the IP addresses it handles and receives the routes to its fellow servers. Compared to a Layer 2-based design, it is very scalable, resilient, cross-vendor and safe (due to ...

What is Huawei Atlas AI Computing Platforms?

Published on: 2019-09-24

At the Huawei Connect Live 2019, Huawei announced the launch of its overall computing strategy for the first time. This means that computing strategy will become one of Huawei‘s core strategies in the future when the computing industry is turning to the turning point and computing architecture ...

Cyber Canon Book Review: Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity

Published on: 2019-09-23

Cyber Canon Book Review: “Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity” (2008), by Byron Acohido and Jon Swartz Bottom Line: I don’t recommend this book for the Cybersecurity Canon Hall of Fame, but if you are interested in ...

DNS resolver centrality

Published on: 2019-09-23

At various times the Internet has been touted as a triumph of the power of open markets and competition. This line of argument says that, unfettered by the often regressive and stultifying hand of government regulation, open markets can react to the needs of consumers. The rigours of a ...

Opinionated Automation: Packaged, Extensible & Closed Systems

Published on: 2019-09-20

Network engineers for the last twenty years have created networks from composable logical constructs, which result in a network of some structure. We call these constructs “OSPF” and “MPLS”, but they all inter-work to some degree to give us a desired outcome. Network vendors have contributed to ...

Palo Alto Networks an Eight-Time Gartner Magic Quadrant Leader

Published on: 2019-09-19

In any high tech industry, it’s not often that a company gets to define a new market, and then continue to expand and reshape it for more than a decade. It’s even less common in our highly competitive cybersecurity space. Maybe that’s why this year’s Gartner Magic Quadrant for Network Firewalls ...

Formalisation of Automation: WIP

Published on: 2019-09-17

For the last five or six years, I’ve not really done any networking and have focussed on software, automation and the mechanisation of processes so that they may be manifested as network driving workflows. I try to keep up with networking technology and working for Juniper has really made me ...

One Article to Understand the Cloud Computing, Virtualization, and Containers

Published on: 2019-09-17

The word “cloud computing” is believed to be very familiar to everyone. As a mainstream trend in the development of information technology, it frequently appears in front of us. Along with it, there are also these conceptual terms – OpenStack, Hypervisor, KVM, Docker, K8S, etc. These concepts ...

Cyber Canon Book Review: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Published on: 2019-09-16

Cyber Canon Book Review: “Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time,” 2018, by O. Sami Saydjari Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. Imagine a 100-story building designed with a few clicks and plug-ins, with no ...

Keynote Hate – Celebrity Edition

Published on: 2019-09-13

We all know by now that I’m not a huge fan of keynotes. While I’ve pulled back in recent years from the all out snark during industry keynotes, it’s nice to see that friends like Justin Warren (@JPWarren) and Corey Quinn (@QuinnyPig) have stepped up their game. Instead, I try to pull nuggets of ...

A Review of Huawei 5G CPE Pro

Published on: 2019-09-10

Recently, Huawei 5G CPE Pro is very hot in the 3C market. This 5G WiFi router said it can help us enjoy 21 times speed than 4G. Is it real? Today I am going to share you a Use evaluation from a Chinese article. The body of Huawei 5G CPE Pro is a 107mm × 100mm × 215mm square tower. The top and ...

What is AIGP – Accumulated IGP Metric Attribute? Where AIGP is used?

Published on: 2019-09-05

What is AIGP – Accumulated IGP Metric Attribute? Where AIGP is used? AIGP stands for Accumulated IGP Metric Attribute which is specified in RFC 7311. IGPs (Interior Gateway Protocols) are designed to run within a single administrative domain and they make path-selection decision based on metric ...

The TOGAF ADM – Part II

Published on: 2019-09-02

Continuing right off from my last post, we going to continue our run-though of the ADM wrapping the last few phases. Phase E: opportunities & Solution: Now, it’s time for us to review the outputs from our previous phases and to start defining the beginning of our implementation details. We do ...

Positioning Policy Properly

Published on: 2019-08-30

Who owns the network policy for your organization? How about the security policy?Identity policy? Sound like easy questions, don’t they? The first two are pretty standard. The last generally comes down to one or two different teams depending upon how much Active Directory you have deployed. But ...

Code, Heal Thyself: Mist Systems Brings Something Badly Needed to WLAN Market

Published on: 2019-08-15

If you do any profession long enough, you’ll experience all sorts off good and bad along the way. For me, “good” has been the honor of providing reliable Wi-Fi to hundreds of thousands of client devices through the years, and “bad” has been fending off downtime and damage to organizational ...

The TOGAF ADM – Part I

Published on: 2019-08-10

In my last post we briefly looked at the TOGAF ADM. We won’t be able to fit it all into a single blog post but we will start to explore the ADM from a high level. ADM stands for Architecture Development Method and it organized in 10x different phases. These different phases are designed to ...

3 Tools for Getting VMs From Your Datacenter to the AWS Cloud

Published on: 2019-07-23

Here’s a simple scenario: you have some Virtual Machines (VMs) in your on-premises environment, likely in VMware vSphere or Microsoft Hyper-V. You want to either fully migrate some or all of those VMs to the AWS Cloud or you want to copy a gold image to the AWS Cloud so you can launch compute ...

TOGAF 9 Certified

Published on: 2019-07-19

After passing more technical certification tests than I care to count, the concept of studying for a non-technical exam seemed surreal. Studying for exam that was not going to teach or test me about protocols, signals, or configurations just sounded so foreign. I do have to admit that there were ...

Validating IP Address Entries in Excel

Published on: 2019-07-15

Problem: You are designing a spreadsheet where IP addresses are to be entered. Probably with subnet masks as well. You want to ensure that the IP addresses and subnet masks entered are valid. In this series I will explain how this is done, plus a few other IP address manipulating tricks in ...

Response to “Certifications Are Not A Big Deal. Stop Being a Princess About It.”

Published on: 2019-06-30

In a post which now appears to have been deleted, Greg Ferro got right to the point in his article Response: Certifications Are Not A Big Deal. Stop Being a Princess About It. The majority of this (my) response was written while Greg’s post was still active, but I had to come back and inject ...

CCDE Thoughts After Cisco Live 2019

Published on: 2019-06-18

My CCDE Thoughts After Cisco Live 2019The CCDE exam was conspicuously absent from the grand re-imagining of the CCNA/CCNP/CCIE certification programs. Here's a brief summary of the announcements (everything takes effect on February 24, 2020):CCIE Routing & Switching is being renamed to CCIE ...

Surveying for Catalyst 9120

Published on: 2019-06-12

Recently another blog post came up discussing the issues with surveying for a Cisco Catalyst 9120. I too had to go through the pain of trying to survey with it as I had to figure out how do I get a Catalyst 9120 online as well as a 3504 WLC. This setup was certainly not as alluring as the other ...

Seven things to know to make Hyperflex go – Cisco HyperFlex Best Practices

Published on: 2019-05-26

You have Cisco Hyperflex installed, but not quite sure if there is anything you need to do differently now that want to deploy VMs on the Hyperflex Data Platform (HXDP) Well, yes there are some things that you need to do differently, and some you should do differently, but most activities you’ve ...

Network Design and Validation: IT Matters

Published on: 2019-04-29

With the complexity of our industry, two things should be obviously necessary. These two things are Network Design and Validation Testing. Design requires identifying the requirements of the business and of dependent systems. This could include things like minimum bandwidth, maximum jitter, ...

Sharkfest 2018 EU

Published on: 2018-11-07

I’m back from Sharkfest EU 2018 and once again it was a great conference. This time, many core developers and instructors brought their families along, so it felt even more like a family gathering than ever before. I have written a number of Sharkfest Recaps before, and I felt I needed to do ...

Cisco WLC for Wired to Wireless mDNS and Bonjour

Published on: 2018-10-31

Bonjour and mDNS are discovery mechanisms that generally work effortlessly within a single VLAN. Those attempting to implement these protocols in a multi subnet environment often run into some significant challenges. The typical use of CAPWAP in an enterprise wireless network adds to the ...

“Thirteen hundred APs, no open support tickets” – achieving quality in wireless networks

Published on: 2018-10-08

“Thirteen hundred APs, no open support tickets,” Sudheer Matta, VP of Products for Mist Systems, boldly stated during his MFD3 presentation. At the time, he was referencing one of their largest customers specifically, but the company’s desire to prevent bugs, create high quality customer ...

Solving 802.11ad challenges

Published on: 2018-09-24

The 802.11ad (60GHz) market has been interesting to watch, especially now that products utilizing the technology are becoming more prevalent. Vendors leveraging 802.11 in a frequency band whose propagation properties differ significantly from the traditional 802.11 bands of 2.4 and 5GHz mean new ...

How to Differentiate Yourself in the Job Market

Published on: 2018-09-17

Most readers of this newsletter can safely be classified as experts in the field of networking. This article is intended to provide advice on how to differentiate yourself in the field, and perhaps leverage your unique experience into a more profitable career. This post was inspired by the Seth ...

Roam, If You Want to (As Long as Your Channels Are 20 Mhz Wide)

Published on: 2018-08-31

Wi-Fi has its own brand of roaming, and there is one aspect of Wi-Fi roaming that often gets overlooked: 40 MHz and 80 MHz wide channels can make Wi-Fi users feel like they've been bounced from the Love Shack. Using 40 MHz or 80 MHz wide channels could harm Wi-Fi roaming. the same amount of RF ...

Cisco OpFlex

Published on: 2018-06-13

Cisco ACI uses OpFlex to communicate with VMWare DVS/VDS. OpFlex is an extensible policy protocol designed to exchange abstract policy between a network controller and a set of smart devices capable of rendering policy. OpFlex relies on a separate information model understood by agents in both ...

Why I Disabled Low Data Rates This One Time

Published on: 2018-05-21

Yes, yes, yes, and yes were the answers to the four questions on my checklist. If my checklist checks out and if there are still Wi-Fi problems, then the issue is almost certain to be one of two unusual things: multipath or device-specific issues. Multipath happens when radio waves reflect off ...

RSSI Conundrum

Published on: 2018-03-14

What’s the number one go to value for “design” a wireless network? If you ask most people they will say RSSI. Received Signal Strength Indicator, or RSSI, is the quickest way to see if you have coverage. It’s the “four bars” approach to wireless design, but it isn’t anywhere close to designing a ...

Wi-Fi Capacity Infographic

Published on: 2017-11-13

Learn tips and tricks for building a high-performance WLAN!I teamed up with the great staff at Ekahau to put together this infographic about how to design and deploy high capacity Wi-Fi. It's the second poster in the series, following the Wi-Fi Design Poster that focused on radio frequency (RF) ...

Capacity Planner Version 2.0 Released

Published on: 2017-06-01

Modern Wi-Fi networks are complex beasts. Despite all the fancy new features in products, the technology is only becoming more complex and the demands on the network are only growing. Wi-Fi is the most heavily used method to transport user data today, eclipsing cellular and LAN traffic volumes ...

L3 fabric DC -The underlay Network (BGP) -part2

Published on: 2017-01-17

In the previous post, we laid the foundation of L3 fabric DC In this post we will discuss the underlay network which mainly provide IP reachability plus ECMP capability, here BGP would play a role in your DC next to the 3 other that we discussed one of the previous posts. For the sake of ...

Three Months with Google Fiber

Published on: 2017-01-06

I'm one of the lucky few to benefit from Google Fiber's recent expansion into new regions (before they nixed the whole thing). I've had the service fire three months now and figured I should write up my experience with it thus far. Google Fiber announced that it would be expanding to the ...

L3 fabric DC -The underlay Network -Part1

Published on: 2016-12-07

In the previous posts we have discussed the classic DC designs and the M-LAG solution. In this post we will cover the basic L3 fabric DC, you might never heard of it or you think that’s a solution for massive scale DC, yes the massive DC in the world would be running L3 fabric but nowadays more ...

The Overlay Problem: Getting In and Out

Published on: 2016-09-30

I've been researching overlay network strategies recently. There are plenty of competing implementations available, employing various encapsulations and control plane designs. But every design I've encountered seems ultimately hampered by the same issue: scalability at the edge. Imagine a ...

Classic DC and M-LAG

Published on: 2016-08-29

In the pervious post we talked about BGP in Data Center and how it is a topic of discussion in between the DC and the SP arenas. In this post I will start explaining some classic DC design and laying its shortage which will engage the SP gurus with us, as well it will make sure that we all on ...

Download the New 'Wi-Fi Design Poster' Today!

Published on: 2016-06-09

Performing a proper Wi-Fi design is critical to success. Modern WLANs have grown ever more complex, having to provide high quality coverage, meet density and capacity requirements, facilitate user mobility and roaming, all while minimizing both Wi-Fi interference and external RF interference. ...

there are many ways

Published on: 2016-05-10

I was neglecting this blog for a while, more than 2 years actually. Well, things changed in my personal life, but this is out of scope for this whiteboard. Let me stick to networking stuff here. I worked for an ISP as a network engineer for many years. I thought I knew so much about the ...

GoBGP – A Control Plane Evolving Software Networking

Published on: 2016-03-29

If I have talked to you over the past year or two about networking, odds are I have mentioned a project to you called GoBGP. If we have spoken a lot, you are probably sick of me talking to you about GoBGP There is a reason, it’s because GoBGP is a missing link in networking that has been for a ...

Configuring Macvlan and Ipvlan Linux Networking

Published on: 2016-03-28

Macvlan and Ipvlan are both Linux type networking interfaces that are both supported by the Linux kernel. They are unique for a few different reasons. One thing that makes them both very attractive is they do not use bridges in their implementation and natively namespace aware. It solves some ...

Still Undecided About Cisco Live? Take a Sneak Peek!

Published on: 2015-04-15

If you still aren't convinced to go to Cisco Live! this year in San Diego, perhaps a sneak peek at two of the courses will help.BRKRST-2311P - IPv6 Planning, Deployment and Troubleshooting(1 Hour)  Presented by Jim Bailey - Technical Leader, CiscoApril 21st10:00am PDT / 12:00pm CDT/1:00pm ...

© 2016 www.fusioneer.net.All rights reserved.