NFI Logo - blog featured image

The Lost Battles of Network Security

While these products and strategies that we discussed in the first post of this three-part blog series might seem comprehensive (when taken as a whole), successful attacks are still common. Security experts point out that certain basic vulnerabilities are still not addressed. In...
NFI Logo - blog featured image

How Attackers of Network Security Craft their Attack

While a network security attack will typically operate on the three phases (before, during, & after) discussed in the last blog post, the successful attacker will coordinate actions across all three phases to maximize the likelihood of success. The “before” will consist of...
Northforge Innovations

Network Security from the Perspective of Security Vendors

It seems that nearly every day there are reports of a new type of security attack or some major security breach. Many more go unreported. Overall the complexity of information technology architectures and their widely distributed nature encourage novel attack schemes which gives...

Control Plane Protocols for Streaming Video Services

The explosion of streaming video happening across all networks is forcing changes to the infrastructure that governs and controls the delivery of the video. Traditional video delivery control infrastructure was an isolated island of specialized servers delivering specific video...
NFI Logo - blog featured image

How to Reduce Latency and Improve Audio Fidelity

More and more businesses and residential telephone subscribers are moving to Internet-based service providers. According to the Canadian Radio-television and Telecommunications Commission (CRTC), there were 5.5 million retail “Voice Over Internet Protocol” (VoIP)...
Northforge Innovations

How “Dynamic Pathing” Provides Benefits Not Achievable with Static Physical Device Chains

In our last blog post we explored how Service Function Chaining (SFC) differs from the traditional model of creating a sequence of functions. Another key difference is that the path through the SFC can be “dynamic”, as noted in this Intel white paper. The dynamic qualities of the...

How Automatic Scaling and Optimal Pathing Benefits Service Function Chaining

One of the obvious questions relating to Service Function Chaining (SFC) is how does it differ from the traditional model of creating a sequence of functions (FW/IPS, ADC, vWAN, Router), whether in specialized hardware or dedicated VMs, and passing traffic between those functions...

OPNET Modeler (currently, Riverbed Modeler)

Network Simulation Wikipedia describes network simulation as “a technique where a program models the behavior of a network by calculating the interaction between the different network entities (hosts/routers, data links, packets, etc.) using mathematical formulas.” But beyond the...

Looking at OpenWrt as an option for Enterprise Routers

With the Internet of Things gaining in popularity, embedded devices are getting more attention. An operating system that’s also getting its share of attention is OpenWrt, an OS that’s primarily for embedded networking devices. It’s based on the Linux kernel and primarily used on...
NFI Logo - blog featured image

Taking IP PBX to the next level with Network Functions Virtualization

The latest telephone technology isn’t limited to fancier smart phones. Today, telecom companies are also advancing their communications and networking technologies to add a wealth of flexible and advance business calling features. They’re taking advantage of a variety of...