Network protocols News
January 14, 2015
January saw a light Patch Tuesday, but Microsoft's move to discontinue its advance notification service has rankled security researchers.
October 03, 2014
The 2014 North American IPv6 Summit showcased the growth of the protocol and shed some light on what enterprises are doing to (finally) adopt it.
September 29, 2014
This week, SDN bloggers review the Cisco, Tail-F acquisition, how SDN can be used for content filtering, the software-defined data center and the OpFlex protocol.
September 25, 2014
Cisco Modeling Labs is a network simulator that uses real IOS images. Engineers can design, test and troubleshoot networks in software.
Network protocols Get Started
Bring yourself up to speed with our introductory content
Server virtualization increases the complexity of storage management and forces administrators to pay even closer attention to issues such as available bandwidth and overprovisioning. Approaching management and provisioning in the same way as in a traditional environment could be an invitation for poor performance, wasted capacity and risky data protection techniques. Each of the major server virtualization vendors takes a slightly different approach to storage management and configuration, which might dictate aspects such as recommended protocols, feature sets and data protection schemes. But in addition to this, storage administrators must be sure to construct storage architectures based on different requirements than what they might architect in a traditional, non-virtualized environment. They need to provide an increased level of performance because virtualization multiplexes data that was once sequential together, making it more difficult to read and write. Providing fault tolerance against hardware failures is also essential to keeping virtual machines (VMs) and their applications up and running. The VM storage also must commonly support either multi-path connectivity or storage replication so that running VMs can be moved between host servers on an as-needed basis with little to no downtime. This e-book will help storage administrators plan for these requirements before architecting storage for their virtual environments. Continue Reading
Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications. Continue Reading
Spotlight article: Shon Harris outlines the main topics in the CISSP domain on cryptography -- background information, cryptography components, digital authentication, protocols and more. Continue Reading
Evaluate Network protocols Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Even though virtualization has become commonplace in today's data centers, provisioning storage for applications on virtual machines (VMs) often remains a pain point for IT professionals. Random I/O processes unique to virtual environments often put a strain on storage hardware and it's common for one, or even several, VMs to eat up bandwidth, leaving others without the power they need. In addition, configuring logical unit numbers and volumes when provisioning storage for virtual environments can be extremely complicated.
Today, vendors of emerging storage technologies are attempting to pave a smoother path toward better performance and capacity in virtual environments. Technologies such as hyper-converged storage aim to create a simpler configuration by shipping the hypervisor and storage in one box. Other products, deemed "software-defined storage," often pool storage to better utilize capacity and performance. But that doesn't mean managers don't still need to understand the unique set of challenges VMs place on storage. In this e-book, readers will learn how to cope with these challenges by understanding how virtualization changes the way storage should be provisioned and monitored. They will also learn how new technologies in the storage for virtual environment space can help and what types of applications they are most beneficial for, and how once murky technologies such as software-defined storage have grown to be more clearly defined as viable options for storing VMs.Continue Reading
A jump in multi-vector attacks highlights the threat of distributed reflection denial-of-service attacks. Enterprise threats expert Nick Lewis explains how these threats differ from traditional DoS attacks and offers prevention techniques. Continue Reading
Hierarchical networks cause undue latency as well as bandwidth and port loss. MLAG removes potential STP problems and gives you a flatter pre-fabric network. Continue Reading
Manage Network protocols
Learn to apply best practices and optimize your operations.
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively. Continue Reading
As applications such as automobile Ethernet and audio video bridging gain traction, the need for new timing protocols beyond NTP takes root. Continue Reading
Basic SMB doesn't require much more than a compatible OS. Advanced features in SMB 3.0 like Multichannel or Direct have a few more requirements. Continue Reading
Problem Solve Network protocols Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
WebRTC promises easy communication between browsers for video conferencing and voice, but the need for WebRTC gateways is clear. Continue Reading
Find out why UC could become SDN's killer app and what triple-threat vendors must deliver to make it so. Continue Reading
A bridged network interface is often absent from KVM hosts, but a few simple commands will help you create one in your RHEL infrastructure. Continue Reading