I have a theory that technology has a mind of its own. I have Fiber to the Home (FTTH) and I recently noticed that my network connectivity is intermittent. I get about 2-3 hours of uninterrupted Internet connection but will randomly get 5-10 minutes of downtime. Whenever a technician from …
Read More »ManageEngine OpManager Review: Network Monitoring Solution
Introduction I remember when I started my career in the IT industry and I visited the network operations centers of some banks. There were usually these big screens hung up on the wall for everyone to see showing several red and green icons. I came to understand that those screens …
Read More »Being A Network Engineer in Nigeria: Professional Journey of Adeolu Owokade
Having been involved in the Network and Security industry for over 10 years, I’ll be telling the story of how it all started, what I did to date, where I am currently, and what the future possibly holds for me.
Read More »BGP Route Security
Whenever there is a new attack that has anything to do with BGP, you hear that “BGP is based on the inherent trust model with no inbuilt security”. OK, but what technology of the early Internet days was built with security in mind?
Read More »Multi-Cloud Network Environments
In this article, we will discuss the Multi-Cloud strategy and look into why organizations are considering this approach, the challenges, and some helpful tools for a successful implementation.
Read More »How VoIP apps like Skype, WhatsApp, and Facebook Messenger work
I went on holiday recently and visited another country 3000 miles from mine. Of course, this means I had long left the reach of my mobile network operator. Due to roaming and partnerships between mobile network operators in different countries, I had the option of making and receiving voip calls …
Read More »What is Internet of Things (IoT) and how is it changing our lives?
Networks, as we know them, have changed over the past few years and there is no slowing down. When I got into the Networking field in 2007, any network was fairly the same: access, distribution, and Core layers. At the access layer, you typically have either computers (desktops) or laptops …
Read More »Traffic Policing vs. Traffic Shaping
One of the ‘hot’ topics when studying about Quality of Service (QoS) is Traffic Policing versus Traffic Shaping. In this article, we will look at these QoS features individually, compare them, and also see how they are used in the real world. Network Quality There are four major factors that …
Read More »Routing for Bitcoin and Cryptocurrency: how it works and its security threats
As long as you have not been in a bunker for the past 9 years, then you have probably heard of “Bitcoin” and probably other forms of cryptocurrency like Ethereum (ETH), Litecoin (LTC), and Bitcoin Cash (BCH). But what is bitcoin and why is there so much noise about it? …
Read More »AAA on the Cisco ASA
From my experience as a Network Security Engineer, I have worked on many Cisco projects involving AAA on the routers but not so many that involve AAA on the Cisco ASA. I find that a bit weird considering that the Cisco ASA is the real security device. I wonder if …
Read More »