In this blog, we are going to discuss SD-Access Wireless. You can also refer to the LISP understanding that is used in SD-Access as a control plane. The SD-Access Wireless architecture provides the following three things: Simplifying the Control & Management Plane Optimizing the Data Plane Integrating Policy & Segmentation E2E We will talk about […]
Ethernet is a part of wired computer networking technologies that are mostly used in LAN, MAN and WAN. It was industrially introduced in 1980 and firstly standardized in 1983 as IEEE 802.3. Ethernet DIX Header This Header is owned by DIX (Digital, Intel and Xerox) (Ethernet DIX) This header is used at layer 2 for […]
Earlier, we discussed the AAA framework and products available to provide AAA service. We know that protocols are essential to achieve communication between devices. So, today we are going to shed light on the protocols used between the device and the AAA server and how exactly they work. Several protocols can be used by the […]
A new protocol known as OMP (Overlay Management Protocol) is included in Cisco’s Viptela SDWAN and serves as the overlay network’s nerve centre. The TLS or DTLS tunnels that are created between the vEdge router and the vSmart controller are used by the OMP protocol. The vSmart controllers and vEdge routers in the overlay network […]
All switches that are a component of the ACI fabric are managed and automated provisioned through the APIC. Multiple ACI fabrics may exist within the same data center, and each ACI fabric may have its own APIC cluster and Cisco Nexus 9000 Series switches. Each switch must be registered with the individual APIC cluster that […]
Before moving forward to see how traffic flows in the ACI environment let’s have a look at a few terminologies which are required to understand the traffic flow. What Are Endpoints? Endpoints are the devices/host which is connected to the fabric. In ACI endpoint can be represented by MAC or IP with /32 masks. There […]
The power that multiple IT strategies gives to businesses results in great outcomes as businesses gain competitive advantages. By implementing new IT strategies given by IT Consulting Services providers, companies are seeing good profit and opportunities; as the strategies are designed in such a way by the top benefits are given to the companies for […]
Data management, simple access and sharing of the pool of resources have been transformed with the help of cloud computing solutions. As the data is being transferred to the cloud, disasters are prone to mishappenings and for that, a cloud disaster recovery plan or cloud DR plan is important to make sure that no data […]
Microsoft Azure is frequently linked to big businesses with an international presence. Although 95% of Fortune 500 firms employ Azure, many small and medium-sized enterprises in a variety of sectors, including manufacturing, government, healthcare, financial services, and retail, have already found that Azure can help them meet their goals. What Exactly Is Microsoft Azure? A […]
With the rise of the Wireless Technological domain in the world, Is it the sole purpose of the Access points (APs) to just connect the devices to the world of the Internet? With every technology breaking the shackles of being kept bound by wires and roaming around free by being wireless The roles and responsibilities […]