What is a Light Virtual Access Point (LVAP)?
Wireless networks are widely used in areas such as business centres, airports, university campuses or even in many city areas. For this scenarios there are solutions for coordinating Wi-Fi access points, usually known as Enterprise Wi-Fi. Although commercial solutions exist, these are proprietary, closed and costly, which in most of the cases make them infeasible for many organizations.
General architecture for Software Defined Networking (SDN)
La terminología y arquitectura de capas para los sistemas SDN ha sido definida por el Software-Defined Networking Research Group (SDNRG) del Internet Research Task Force (IRTF) en . Aunque no tiene como objetivo estandarizar ninguna capa o interfaz, proporciona una referencia de los enfoques que se pueden seguir al definir arquitecturas SDN. La Open Networking Foundation (ONF) propuso una arquitectura diferente en , que está más orientada a servicios, mientras que la propuesta por el IRTF tiene una visión más funcional . La Figura 1 describe la arquitectura propuesta por el IRTF que consta de: Application Plane: en ésta capa…
How to setup a Kubernetes cluster
The initial setup consists of a remote server running KVM in which three virtual machines were installed using Ubuntu 16.04. Each virtual machine has one network interface bridged to a physical network interface on the remote server, so that each VM is using a different interface of the server and IP addresses were assigned accordingly. At the end of this tutorial, you will have a kubernetes cluster that consist of one Kubernetes master and two Kubernetes nodes.
Kerberos protocol operation
Written by Luis Sequeira
The authentication protocol Kerberos allows a number of computers to prove their identity among them safely over an insecure network. The operation of the protocol is based on the Needham-Schroeder protocol, which defines a ''trusted third party'' called Key Distribution Center (KDC). William Stallings in his book Fundamentals of Network Security: Applications and Standards, Second Edition (p.394) defines a KDC as follows: Authorized system to transmit temporary session key for users. Each session key is transmitted encrypted using a master key that the Key Distribution Center shares with the target user. The KDC can be seen as a set of…
Femtocell's access methods
Written by Luis Sequeira
Femtocells are low-power and low-cost base stations that provide residential cellular services, providing a coverage of roughly 10 m . They can integrate with mobile operator through a broadband connection, typically ADSL. In General, femtocell makes that the traffic from the home cellular system, deviates through the broadband connection, releasing the resource consumption of the macrocell. The 3GPP has introduced the concept of Closed Subscriber Group (CSG), which essentially identifies a group of subscribers who have access permission to one or more cells. Femtocells basically have three different operating modes: open access, closed access and a combination of both named…