Network protocols News
January 14, 2015
January saw a light Patch Tuesday, but Microsoft's move to discontinue its advance notification service has rankled security researchers.
October 03, 2014
The 2014 North American IPv6 Summit showcased the growth of the protocol and shed some light on what enterprises are doing to (finally) adopt it.
September 29, 2014
This week, SDN bloggers review the Cisco, Tail-F acquisition, how SDN can be used for content filtering, the software-defined data center and the OpFlex protocol.
September 25, 2014
Cisco Modeling Labs is a network simulator that uses real IOS images. Engineers can design, test and troubleshoot networks in software.
Network protocols Get Started
Bring yourself up to speed with our introductory content
Attackers are targeting the SSDP protocol to amplify the effects of DDoS attacks. Learn what this protocol does and how to secure it. Continue Reading
OpenFlow SDN is promising but vendors are now contemplating alternatives to the protocol Continue Reading
IT pros need to consider new developments in technology like software-defined networking and the Internet of Things when choosing the best Ethernet switch for their current and future network. Continue Reading
Evaluate Network protocols Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SDN network management means tools are transforming from listening mode to active mode. Continue Reading
SDN engineer Darien Hirotsu explains what it will take for SDN to become the industry standard, with software-driven networks outnumbering their traditional counterparts. Continue Reading
The future is now. SDN technologies are quickly becoming central to vendors' next-generation Wi-Fi products and services -- and their role will only increase. Continue Reading
Manage Network protocols
Learn to apply best practices and optimize your operations.
The growing threat of the Internet of Things is quickly becoming a reality as new attack methods emerge. Expert Nick Lewis explains how to address and prevent IoT security threats. Continue Reading
The QUIC protocol may or may not become a standard, but either way, use of the protocol could provide a performance boost for Web and mobile apps. Continue Reading
Network Address Translation - Port Mapping Protocol implementations may cause vulnerabilities on networking devices. Expert Kevin Beaver offers pointers for testing and mitigating such risks. Continue Reading
Problem Solve Network protocols Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Container networking can cause issues at scale. Networking expert Jeff Loughridge suggests ways network engineers can work around such challenges. Continue Reading
Even though virtualization has become commonplace in today's data centers, provisioning storage for applications on virtual machines (VMs) often remains a pain point for IT professionals. Random I/O processes unique to virtual environments often put a strain on storage hardware and it's common for one, or even several, VMs to eat up bandwidth, leaving others without the power they need. In addition, configuring logical unit numbers and volumes when provisioning storage for virtual environments can be extremely complicated.
Today, vendors of emerging storage technologies are attempting to pave a smoother path toward better performance and capacity in virtual environments. Technologies such as hyper-converged storage aim to create a simpler configuration by shipping the hypervisor and storage in one box. Other products, deemed "software-defined storage," often pool storage to better utilize capacity and performance. But that doesn't mean managers don't still need to understand the unique set of challenges VMs place on storage. In this e-book, readers will learn how to cope with these challenges by understanding how virtualization changes the way storage should be provisioned and monitored. They will also learn how new technologies in the storage for virtual environment space can help and what types of applications they are most beneficial for, and how once murky technologies such as software-defined storage have grown to be more clearly defined as viable options for storing VMs.Continue Reading
Hierarchical networks cause undue latency as well as bandwidth and port loss. MLAG removes potential STP problems and gives you a flatter pre-fabric network. Continue Reading