781.897.1727
NFI Logo - blog featured image
21
Mar

The Lost Battles of Network Security

While these products and strategies that we discussed in the first post of this three-part blog series might seem comprehensive (when taken as a whole), successful attacks are still common. Security experts point out that certain basic vulnerabilities are still not addressed. In...
NFI Logo - blog featured image
03
Mar

How Attackers of Network Security Craft their Attack

While a network security attack will typically operate on the three phases (before, during, & after) discussed in the last blog post, the successful attacker will coordinate actions across all three phases to maximize the likelihood of success. The “before” will consist of...
Northforge Innovations
04
Feb

Network Security from the Perspective of Security Vendors

It seems that nearly every day there are reports of a new type of security attack or some major security breach. Many more go unreported. Overall the complexity of information technology architectures and their widely distributed nature encourage novel attack schemes which gives...
16
Dec

Control Plane Protocols for Streaming Video Services

The explosion of streaming video happening across all networks is forcing changes to the infrastructure that governs and controls the delivery of the video. Traditional video delivery control infrastructure was an isolated island of specialized servers delivering specific video...
NFI Logo - blog featured image
02
Dec

How to Reduce Latency and Improve Audio Fidelity

More and more businesses and residential telephone subscribers are moving to Internet-based service providers. According to the Canadian Radio-television and Telecommunications Commission (CRTC), there were 5.5 million retail “Voice Over Internet Protocol” (VoIP)...
Northforge Innovations
10
Nov

How “Dynamic Pathing” Provides Benefits Not Achievable with Static Physical Device Chains

In our last blog post we explored how Service Function Chaining (SFC) differs from the traditional model of creating a sequence of functions. Another key difference is that the path through the SFC can be “dynamic”, as noted in this Intel white paper. The dynamic qualities of the...
26
Oct

How Automatic Scaling and Optimal Pathing Benefits Service Function Chaining

One of the obvious questions relating to Service Function Chaining (SFC) is how does it differ from the traditional model of creating a sequence of functions (FW/IPS, ADC, vWAN, Router), whether in specialized hardware or dedicated VMs, and passing traffic between those functions...
25
Aug

OPNET Modeler (currently, Riverbed Modeler)

Network Simulation Wikipedia describes network simulation as “a technique where a program models the behavior of a network by calculating the interaction between the different network entities (hosts/routers, data links, packets, etc.) using mathematical formulas.” But beyond the...
06
Jul

Looking at OpenWrt as an option for Enterprise Routers

With the Internet of Things gaining in popularity, embedded devices are getting more attention. An operating system that’s also getting its share of attention is OpenWrt, an OS that’s primarily for embedded networking devices. It’s based on the Linux kernel and primarily used on...
NFI Logo - blog featured image
10
Jun

Taking IP PBX to the next level with Network Functions Virtualization

The latest telephone technology isn’t limited to fancier smart phones. Today, telecom companies are also advancing their communications and networking technologies to add a wealth of flexible and advance business calling features. They’re taking advantage of a variety of...