Blog>>Networks

BLOG / Networks

details

The networks category covers networking protocols, data transmission methods, network addressing, and network security. Understanding network fundamentals is crucial for designing, implementing, and managing reliable and secure communication systems.

Thumbnail of an article about Service mesh vs. Kubernetes Ingress — what is the difference?
NETWORKS
CLOUD

Service mesh vs. Kubernetes Ingress — what is the difference?

Service mesh and Ingress are two solutions used in the area of ​​application networking in Kubernetes. In this article you will see what characterizes each of them and understand where the real difference between them is. A service mesh is a kind of special “system” for communication between applications, different components of an application based on microservices architecture, or between various other workloads running in virtual environments, such as Kubernetes. The solution provides a rich set of features in the fields of traffic management, reliability, resilience, security, and observability.
Thumbnail of an article about What is a service mesh — everything you need to know
NETWORKS
CLOUD

What is a service mesh — everything you need to know

A service mesh is an increasingly popular solution in the area of ​​application networking, in Kubernetes and other environments. If you are still not familiar with the concept, in this article you will find everything you need to know before taking a deeper dive. Over the past few years, we have seen a shift away from approaches based on monolithic code when designing software applications. Instead, modern design is based on microservices architecture. At the end of the day, it is about delivering basically the same business logic, not in the form of a large monolith but as a collection of loosely coupled and independently deployable services.
Thumbnail of an article about Network ACL processing algorithms — optimizing firewall's performance
NETWORKS
SOFTWARE DEVELOPMENT

Network ACL processing algorithms — optimizing firewall's performance

A firewall is an important component in protecting a network from attacks. It allows configuration of what kind of traffic is allowed inside the network. So in a sense, a firewall is a barrier that can reject all suspicious connections at the very entrance to the network, making potential attacks significantly more difficult. There are many types of firewalls. In this article, we will focus only on simple stateless firewalls that work in the 3rd and 4th layer of the OSI model (L3 + L4 firewalls). Typically, a firewall uses a user-specified access control list (ACL) to decide which packets to let through and which to block.
Thumbnail of an article about Software-Defined Networking (SDN) — a gentle introduction
NETWORKS

Software-Defined Networking (SDN) — a gentle introduction

The SDN approach to network architecture has been steadily gaining ground. More and more companies are designing their network infrastructure with this approach in mind. According to Statista, the traffic from SDNs and virtualized network functions in data centers from around the world in 2021 was estimated to have achieved 7.4 zettabytes. The increasing popularity of software-defined networking across a variety of industries shows how important this technology has become for global businesses. This article provides you with the classic definition of software-defined networking technology, then covers a few typical use cases and explains why software-defined networking technology is worth your time.
Thumbnail of an article about Example use case of network troubleshooting during the VNF lifecycle
NETWORKS

Example use case of network troubleshooting during the VNF lifecycle

This article will guide you through a proposition of an implementation of network monitoring and troubleshooting during the Virtual Network Function (VNF) lifecycle, based on a combination of data gathered from SDN - in our case Tungsten Fabric (TF) - and OpenStack. This article is a promised follow up to our article Network traffic troubleshooting during the VNF lifecycle - aspects of Tungsten Fabric flows. In the case presented in this article, the main challenge with network monitoring and proactive troubleshooting is to identify the root cause of potential flow-related errors before they cause a service outage.
Thumbnail of an article about IPSec — what is it and how does it work?
NETWORKS

IPSec — what is it and how does it work?

The Internet has expanded more and faster than anyone expected. The rate of development has been so rapid that the Internet Protocol standards (IPv4) cannot meet the current expectations and requirements, especially regarding security and supporting the growing number of IP addresses. As the network expanded, the amount of sensitive data grew. Information, like financial transactions or internal company communications, needs to be secure. IPSec was introduced as one of the solutions protecting this kind of data by encryption and authentication between endpoints.
Thumbnail of an article about The Catalyst 9300 platform by Cisco — what it is and how you can use it
NETWORKS

The Catalyst 9300 platform by Cisco — what it is and how you can use it

Network infrastructure has to handle ever-increasing amounts of data. It enables data exchange between employees’ devices as well as communication with the internet. However, companies should be aware of possible external and internal attacks that can infiltrate a network infrastructure and cause security breaches. Therefore, the creation of network infrastructure has to be both efficient and secure. In this article you will learn how you can use Cisco’s Catalyst 9300 platform to mitigate these risks.
arrow
12...789...1112

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix