Blog>>Networks

BLOG / Networks

details

The networks category covers networking protocols, data transmission methods, network addressing, and network security. Understanding network fundamentals is crucial for designing, implementing, and managing reliable and secure communication systems.

Thumbnail of an article about Ethernet VPN explained: benefits, use cases, and key concepts
NETWORKS

Ethernet VPN explained: benefits, use cases, and key concepts

The requirement of Layer 2 connectivity has driven Ethernet-based fabrics and Layer 2 virtual private networks (VPN) to be adopted by internet service providers, cloud operators, and enterprises in their converged networks. A new set of requirements, not initially considered in the design of existing technologies and protocols, has led to the deployment of solutions with certain shortcomings.
Thumbnail of an article about Getting started with vManage client: essential features and functions
NETWORKS

Getting started with vManage client: essential features and functions

Working with REST API on cutting-edge systems can be challenging at times. Rapid evolution and new features often lead to changes in the structure of REST API calls. These can be just cosmetic but still require an effort to adjust existing scripts. This problem can be easily handled by the SDKs dedicated to systems such as Cisco Meraki or Cisco DNA Center.
Thumbnail of an article about IPsec vs. OpenVPN — what are the differences?
NETWORKS

IPsec vs. OpenVPN — what are the differences?

Quick answer: IPsec is a suite of secure network protocols that are based on open IETF standards and OpenVPN is an open-source protocol that is used by an application with the same name. In other words, IPSec is a framework but OpenVPN is an end-user solution. It doesn’t follow that OpenVPN is worse than IPsec. If OpenVPN as a solution fulfills your requirements it could be the best choice for you. The strength of IPsec lies in three words: open IETF standards. By meeting these standards, two different implementations from different vendors can successfully operate together in the most secure way without having a single common line of code.
Thumbnail of an article about SmartNIC vs. NIC: what is the difference?
SOFTWARE DEVELOPMENT
NETWORKS

SmartNIC vs. NIC: what is the difference?

Our everyday life is full of networking devices and applications. When we video conference at work or watch a new movie on a streaming service at home, we barely even think about how much data needs to be transferred to ensure their correct function. We use our mobile devices with high-speed Internet access and take that for granted. But underneath the efficient work of online applications lies the stable functioning of enormous data centers and telecommunication infrastructure. Since the amount of data that needs to be processed grows every day, we keep demanding more and more processing capabilities from the networking infrastructure.
Thumbnail of an article about Tungsten Fabric is closing down — what next?
NETWORKS

Tungsten Fabric is closing down — what next?

Tungsten Fabric is an open-source project developed under the umbrella of the Linux Foundation. It serves as an important part of many network infrastructures. The project is, however, ending its development. Due to the community’s decision, active development and project services have ceased but the resources will remain accessible until August 1, 2024.
Thumbnail of an article about Network devices benchmarking methodology — RFC 2544 performance testing
QUALITY ASSURANCE
NETWORKS

Network devices benchmarking methodology — RFC 2544 performance testing

Networking devices are complex and characterizing their performance is not easy. One must not judge performance based only on the number and type of ports. On the other hand, the performance figures that can be found in marketing materials may not be conclusive. Therefore, some while ago, the effort was made to create a unified benchmarking methodology to produce reliable, repeatable and comparable results. In this short article we’ll describe the basic performance metrics of networking devices and the methodology used to measure them.
Thumbnail of an article about Python Nornir for simplifying network automation: code examples
NETWORKS

Python Nornir for simplifying network automation: code examples

Manual management and configuration can quickly become overwhelming and time-consuming. Whether we talk about deploying configurations, running commands across devices, or collecting and analysing traffic data, there is always a need to automate repetitive tasks, improve network scalability, and enhance overall efficiency. Let’s imagine someone is facing the daunting task of updating login banners on numerous Cisco devices or gathering essential data through a single show command. Many engineers can wonder about the most efficient methods to accomplish these objectives.
arrow

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix