24 Feb 2021

THE INTERNET AND ITS USAGE.

THE INTERNET.

The internet is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices. The internet provides networking, as it links computers to allow them operate interactively. It is a network of networks that share each other. It is inter-working as it can connect to different networks using intermediary devices. On the internet every device has its own unique IP address. Principles of an IP address:

  • It identifies the host,specifically its network interface
  • It provides the location of the host in the network.

Principles of an IP address is characterized as follows:

  • A name indicates what we seek.
  • An address indicates where it is.
  • A route indicates how to get there.
  • The header of each IP packet contains the IP address of the sending host, and that of the destination host.

PEERING ON THE INTERNET.

Peering is a process by which two internet networks connect and exchange traffic. This allows direct hand of traffic between customers without having to pay a third party to carry that traffic across the Internet for them. This could involve running a circuit across town from one network’s facility to the other’s. Network operators may peer for reasons such as:

  • They have control over their traffic, in that it goes across the Internet via whatever path the transit provider decides to use.
  • It’s cheaper to hand off traffic themselves rather than paying somebody else to do it.
  • It gives greater control over their traffic flows, or allows them to better serve local populations.

 

PEERING

Peering is typically settlements free.

We have two main types of peering, public and private peering.

Public peering, done through an Internet exchange, is more common and more efficient. An Internet exchange is an Ethernet switch in a data center, which all the networks peering in the facility connect to. A network can peer with many other networks through a single connection using an Internet exchange. Peering arrangements needs to be negotiated with each peer, but no new cabling needs to be done.
Private peering within a data center combines the two approaches. Two networks put routers in the same building, and run a direct cable between them rather, than connecting through the exchange point switch. This is most useful when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point. This is sometimes done when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point.

Check out our packages and feel free to contact us here.

 

 

Share this
22 Nov 2017

Cloud security tools and vendor perspectives

Cloud Security

CLOUD SECURITY TOOLS

Amazon, Google and Microsoft continue to bring out features that reinforce their varying perspectives on public cloud security. Although they still don’t solve one of the biggest threats to cloud workloads.

The so-called Big Three cloud vendors have added a host of features  to help users protect their workloads against threats, with slightly different approaches that highlight their products maturity and their own technological and cultural pedigrees. But one of the biggest obstacles to lock down workloads on these platforms persists: the customers themselves.

Security remains a top priority as enterprises evaluate a move to the public cloud. There are still scenarios where the cloud is unacceptable,particularly at corporations where data residency and other governmental restrictions are paramount. A large security is no longer a reason to reject a move to the cloud. The security practices and staffing behind these platforms are superior to what enterprises have built internally,according to most industry observers.

VENDOR PERSPECTIVE

According toTim Prendergast, CEO and co-founder, Evident.io, “[Cloud] providers are innovating piece by piece, as they learn more about what attackers are doing to compromise workloads.”

THE AMAZON

Amazon has progressed the farthest to improve security. Simply because it was first to market and lacked many of the tools to track and manage resources that are layered on the platform today. Once found mainly in startups, AWS is now a common place at large enterprises. Due to no small part to upgrades of its cloud security tools,in the 11 years since it began selling storage and compute resources.

Over the years,AWS has added identity and access management, configuration rules and other policy controls that have become common practice in the cloud. Many of its latest security upgrades reflect the platform’s maturity,with incremental improvements such as tighter integration with other AWS tools. Now, Amazon’s latest steps aim to protect customers from their own mistakes.  To have more insight on our cloud hosting networks, its a click away.

Share this

© Kemnet Technologies. All rights reserved.

Click Me