Mesh networking

IEEE 802.1aq

Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of Ethernet networks while enabling multipath routing. It is the replacement for the older spanning tree protocols: IEEE 802.1D, IEEE 802.1w, IEEE 802.1s. These blocked any redundant paths that could result in a switching loop, whereas SPB allows all paths to be active with multiple equal cost paths, provides much larger layer-2 topologies, supports faster convergence times, and improves the efficiency by allowing traffic to load share across all paths of a mesh network. It is designed to preserve the plug-and-play nature that established Ethernet as the de facto protocol at layer 2. The technology provides VLANs on native Ethernet infrastructures using a link-state protocol to advertise both topology and VLAN membership. Packets are encapsulated at the edge either in MAC-in-MAC per IEEE 802.1ah or tagged per IEEE 802.1Q or IEEE 802.1ad and transported only to other members of VLAN. Unicast, multicast, and broadcast are supported and all routing is on symmetric shortest paths. The control plane is based on the Intermediate System to Intermediate System (IS-IS) routing protocol, leveraging a small number of extensions defined in RFC 6329. (Wikipedia).

IEEE 802.1aq
Video thumbnail

Wireless Network Security: Part 2

Fundamental concepts of IEEE 802.11 WLAN are discussed. IEEE 802.11i WLAN security is Reviewed. WAP is presented. Wireless transport layer security is analyzed. IEEE 802.11 Wireless LAN Overview Legacy 802.11 Security: WEP IEEE 802.11i Wireless LAN Security: WPA, WPA2 Wireless Application

From playlist Network Security

Video thumbnail

Wireless Network Security: Part 1

Fundamental concepts of IEEE 802.11 WLAN are discussed. IEEE 802.11i WLAN security is Reviewed. WAP is presented. Wireless transport layer security is analyzed. IEEE 802.11 Wireless LAN Overview Legacy 802.11 Security: WEP IEEE 802.11i Wireless LAN Security: WPA, WPA2 Wireless Application

From playlist Network Security

Video thumbnail

DEFCON 14: 802.1x Networking

Speaker: tommEE pickles, Security, Administrator, Moloch Industries Abstract: tommEE pickles (http://tommEE.net) presents an explanation of 802.1x networking. Exploring what 802.1x is and why we would use it. He explains how 802.1x might be used in a corporate environment, wireless or wir

From playlist DEFCON 14

Video thumbnail

Wireless Network Security: Part 3 - WAP

Fundamental concepts of IEEE 802.11 WLAN are discussed. IEEE 802.11i WLAN security is Reviewed. WAP is presented. Wireless transport layer security is analyzed. IEEE 802.11 Wireless LAN Overview Legacy 802.11 Security: WEP IEEE 802.11i Wireless LAN Security: WPA, WPA2 Wireless Application

From playlist Network Security

Video thumbnail

212336448592654

From playlist everything

Video thumbnail

IP Security: Part 2

Fundamental concepts of IPSec are discussed. Authentication Header is explained. Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE) are analyzed.

From playlist Network Security

Video thumbnail

Physics 50 E&M Radiation (2 of 33) Frequency and Wavelength

Visit http://ilectureonline.com for more math and science lectures! In this video I will explain electromagnetic radiation in terms of frequency and wavelength. Next video in series: http://youtu.be/t6EnTtkG4hA

From playlist PHYSICS 50 ELECTROMAGNETIC RADIATION

Video thumbnail

GRCon20 - Security Analysis of Zigbee Networks with Zigator and GNU Radio

Presented by Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber and Patrick Tague at GNU Radio Conference 2020 https://gnuradio.org/grcon20 Zigbee is a wireless communication protocol that is based on the IEEE 802.15.4 standard and is commonly used in smart homes. Numer

From playlist GRCon 2020

Video thumbnail

Understanding Modulation! | ICT #7

Modulation is one of the most frequently used technical words in communications technology. One good example is that of your FM radio, where FM stands for frequency modulation. In this video we are going to learn the basics of modulation techniques and see how they are applied in modern ce

From playlist Internet & Telecommunication Technology

Video thumbnail

25c3: FAIFA: A first open source PLC tool

Speakers: Florian, Xavier Carcelle PowerLineCommunications has now their open source tool PLC (PowerLineCommunications) had been widely used currently for the in-home LANs and for Internet access over PowerLineCommunications based on the market standard called HomePlug. Electricity is a

From playlist 25C3: Nothing to hide

Video thumbnail

Fast Inverse Square Root — A Quake III Algorithm

In this video we will take an in depth look at the fast inverse square root and see where the mysterious number 0x5f3759df comes from. This algorithm became famous after id Software open sourced the engine for Quake III. On the way we will also learn about floating point numbers and newton

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

My #MegaFavNumber – double precise!

The challenge: https://www.youtube.com/watch?v=R2eQVqdUQLI&list=PLar4u0v66vIodqt3KSZPsYyuULD5meoAo A fool's computations of astronomic proportions: https://youtu.be/P_R-CFRRsu4 More interesting things to devote your attention to: https://youtu.be/wOZosStBo40 https://youtu.be/31rMVDu0PKU

From playlist MegaFavNumbers

Video thumbnail

RubyConf 2022: 1.5 is the Midpoint Between 0 and Infinity by Peter Zhu

What’s the midpoint between 0 and infinity? Well, the answer differs depending on whether you are asking a mathematician, philosopher, or a Ruby developer. I’m not a mathematician or a philosopher, but I am a Ruby developer, so I can tell you that 1.5 is the midpoint between 0 and infinity

From playlist RubyConf 2022: Mini and Houston

Video thumbnail

DeepSec 2009: Key Management Death Match? Competing KM Standards Technical Deep Dive

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Marc Massar Key management is a cornerstone of managing and deploying cryptographic devices. Marc Massar discusses the problems connected to key management and standards

From playlist DeepSec 2009

Related pages

Spanning Tree Protocol | Spanning tree | Equal-cost multi-path routing | Multipath routing | Switching loop | QFabric | Dijkstra's algorithm | Connection-oriented Ethernet | Network topology | Network packet