What is NFV – Network Function Virtualization
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
Network Functions Virtualization (NFV) was founded by the European Telecommunication Standard Institute (ETSI) with Industry Specification Group (ISG) which contains seven of the world’s leading telecom network operators. A challenge of large-scale telecom networks is increasing the variety of proprietary hardware and launching new services that may demand the installation of new hardware. This challenge requires additional floor space, power, cooling, and more maintenance. With evolving virtualization technologies in this decade, NFV focuses on addressing the telecom problems by implementing ..read more
Visit website
Multicast PIM Dense Mode vs PIM Sparse Mode
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
Multicast PIM Dense mode vs PIM Sparse mode is one of the most important things for every Network Engineer who deploys IP Multicast on their networks. Because these two design option is completely different and the resulting impact can be very high. In this post, we will look at, which situation, which one should be used, and why. Although we will not explain PIM Dense or PIM Sparse mode in detail in this post, very briefly we will look at them and then compare them for clarity. First of all, you should just know both PIM Dense and PIM Sparse are the PIM Deployment models.   PIM Dense M ..read more
Visit website
How Does Satellite Internet Work?
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
The orbiting satellite transmits and receives its information to a location on Earth called the Network Operations Center (NOC). NOC is connected to the Internet so all communications made from the customer location (satellite dish) to the orbiting satellite will flow through the NOC before they reached the Internet and the return traffic from the Internet to the user will follow the same path.     How does Satellite Internet work? Data over satellite travels at the speed of light and Light speed is 186,300 miles per second. The orbiting satellite is 22,300 miles above ea ..read more
Visit website
BGP RTBH – Remotely Triggered Blackholing
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
BGP RTBH – Remotely triggered blackholing is used for DDOS prevention for a long time by many companies. DDOS – Distributed Denial of Service Attacks have an economic impact. According to an NBC News article, More than 40% of DDOS Attacks cost $1 million per day. Remote Triggered Blackhole is a technique that is used to mitigate DDOS attacks dynamically. Before RTBH, customers used to call the Operator when there is an attack, Operator NOC engineers used to connect to the attacked network, trace the source of the attack, place the filters accordingly and the attack goes away. •Manual ope ..read more
Visit website
BGP-LS BGP Link State – What is it? Why BGP LS is used?
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
BGP LS, BGP Link-State is used to distribute Link state information and traffic engineering attributes from the network nodes to the Centralized TE controller. RSVP-TE has been providing resource allocation and providing an LSP with the distributed path computation algorithm (CSPF) for decades. It requires topology information from the network and only link-state IGP protocols such as OSPF and IS-IS can carry the topology information required for the controller to set up a shortest from each node to each destination prefix.  In order to overcome Bin Packing, Dead Lock, or Network-wi ..read more
Visit website
CCIE Service Provider v5.0 What, Why, When?
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
In this post, we will look at what is CCIE Service Provider v5.0, what comes with it, which technologies we need to learn, what is the difference between CCIE SP v4 and CCIE SP v5, why you should study for CCIE Service Provider v5, when you should study for CCIE SP exam, after which certificate you should aim it for, we will look at all of these questions. What is the Cisco CCIE Service Provider v5 Exam? The CCIE Service Provider  v5 lab exam is testing skillsets related to the service Provider solutions integration, interoperation, configuration, and troubleshooting in complex networks ..read more
Visit website
Orhan Ergun CCIE Enterprise Infrastructure Course Review 1
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
I see some people have been asking what other people are thinking about Orhan Ergun’s CCIE Enterprise course, thus starting today to share what other people share about us on their blog posts as well. Not just on social media, but with these blog posts, because they are able to share more thoughts about us, I think it is very valuable feedback for everyone. I would like to start with the website ‘ samovergre.com ‘. He is our CCIE Enterprise student and you can find his CCIE study plan on this page. He is sharing feedback about our CCIE Enterprise training and other study materials he uses for ..read more
Visit website
Why Core or Backbone is used in Networking?
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
Why Core or Backbone is used in Networking?. Before we start explaining this question, let’s note that these two terms are used interchangeably. Usually, Service Providers use Backbone, and Enterprise Networks use Core terminology but they are the same thing. Why Network Core is Necessary? The Key Characteristics of the Core, the Backbone part of the networks are: High-Speed Connectivity. Today it is 100s of Gigabit networks and is usually used as a bundle to increase the capacity. Bringing Internet Gateway, Access, Aggregation, and Datacenter networks together. It connects many different pa ..read more
Visit website
Multicast BIER – Bit Indexed Explicit Replication
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
Multicast BIER – RFC8279 Bit Index Explicit Replication – BIER is an architecture that provides optimal multicast forwarding through a “BIER domain” without requiring intermediate routers to maintain any multicast-related per-flow state. BIER also does not require any explicit tree-building protocol for its operation. So, it removes the need for PIM, MLDP, P2MP LSPs RSVP, etc. A multicast data packet enters a BIER domain at a “Bit-Forwarding Ingress Router” (BFIR), and leaves the BIER domain at one or more “Bit-Forwarding Egress Routers” (BFERs). The BFIR router adds a BIER header to the pack ..read more
Visit website
Bilateral Peering and Multilateral Peering
Orhan Ergun Training Blog
by Orhan Ergun
2y ago
Bilateral Peering is when two networks negotiate with each other and establish a direct BGP peering session. In one of the previous posts, Settlement Free Peering was explained, in this post, both Bilateral and Multilateral Peering will be explained and both are deployment modes of Settlement Free Peering.  This is generally done when there is a large amount of traffic between two networks. Tier 1 Operators just do Bilateral Peering as they don’t want to peer with anyone, other than other Tier 1 Operators. The rest of the companies are their potential customers, not their peers. Multil ..read more
Visit website

Follow Orhan Ergun Training Blog on FeedSpot

Continue with Google
Continue with Apple
OR