Firewalls

Firewalls
Firewalls are the primary defense mechanisms against network security threats. A firewall is a system that can be positioned between any two networks to control the passage of data traffic in and out of these networks. Typically, the two networks are the internal, trusted, network and the Internet [1]. Firewalls have evolved since their inception ...

POpCORN for document collection management

POpCORN for document collection management
Do you have a large collection of PDF documents and you find that managing the collection is a challenge? I looked into several Document Management solutions, such as these  and these , but I found they are generally too complicated for my requirements. All I needed was a way to organize my documents into topics ...

Wireless will become the primary LAN technology

Wireless will become the primary LAN technology
The mainstream consumer market started seeing Wi-Fi products based on IEEE 802.11ac standard in 2013. The standard is the fifth generation of Wi-Fi networking technology that promises more bandwidth to users at home and the office. The new Wi-Fi brings new improvements to wireless networks including offering 1.3Gbps of bandwidth (in the so-called Wave 1) ...

For safety’s sake let cars talk

For safety’s sake let cars talk
Earlier this year, the U.S. National Highway Traffic Safety Administration announced it would begin working on enabling vehicle-to-vehicle (V2V) communication technology for light vehicles [1]. This step is part of the agency’s effort to improve transportation safety and it is a signal to the transportation-related industries to begin the deployment phase of this cutting edge ...

Graph Layout – Part 1

Graph Layout - Part 1
Many applications, especially those that require visualizing complex information, rely on manipulating and presenting data as graphs composed of nodes and links. A graph, in the mathematical context, is a set of objects represented as vertices, or nodes, and a set of links connecting some pairs of objects. The graph may be used in social ...

Graph Animation

Graph Animation
This is another example of using Processing to create animations. The GraphAnimation program demonstrates packet forwarding by flooding. A packet sent by node A is replicated by every node (router) it reaches and sent in all connected links until it reaches the destination node N. Knowing the shortest route, node N replies with a unicast ...

Network Availability: the quest for the five nines

Network Availability: the quest for the five nines
Any organization that relies on data networks for its core operations needs to ensure the continued availability of its network infrastructure, which includes LAN devices (switches, routers, firewalls, etc.), WAN links, Internet and cloud connections, and the support facilities (power, air conditioning, etc.). The network operator may achieve the desired level of LAN availability using ...

Vehicles communication and the mysterious traffic jams

Vehicles communication and the mysterious traffic jams
Have you been stuck in traffic driving a car at the speed of a few meters per hour only to emerge from the traffic jam a while later not certain what caused it in the first place? Traffic experts are likely to attribute the cause to a road construction, a vehicle collision, or any other ...

Connectivity with Dark Fibre and Carrier Ethernet Services

Connectivity with Dark Fibre and Carrier Ethernet Services
Network service providers (a.k.a communication carriers) are offering multiple services suitable for MAN (metropolitan area network) and WAN (wide area network) connectivity. This article introduces two of these services that offer unique benefits to organizations seeking this type of network connectivity. Dark Fibre Service Dark fibre refers to optical fibre cables that have been installed ...

What is SDN?

What is SDN?
Software Defined Networks (SDN) is a new technology with a lot of potential and a healthy dose of hype. The main premise of SDN is moving the intelligence of the network from distributed network nodes to a centralized location to enable programmability and flexibility of configuration through software applications. Each router in today’s communication networks ...