Contact
Contact Xantaro UK:

T: +44 20 3795 2348
E: info@xantaro.net Contact Form
__________________________

As a XCare customer, please find here how to report an issue.

XTAC Support
Xantaro UK - EN

Tech-Blogs & Media

Learn more about current technologies, services and innovations that our Xperts are critical about.

From Ethernet Layer 2 to an EVPN-VXLAN Overlay Fabric Architecture with pre-tested standards

Data centre networks based on Ethernet Layer 2 domains are reaching their performance limits due to the increasing bandwidth requirements and availability requirements. Ethernet VPN Virtual Extensible LAN – in short EVPN-VXLAN – provides a solution for transforming the data center architecture without requiring a complete conversion.

Read more

Advantages of software update automation in high-end networks

Software updates in today's high-end networks come with time and resource challenges. At the same time, the cycles in which software releases appear are getting shorter and shorter. In this blog post, we explain our experience with testing software for modern networks and the advantages of test automation giving practical examples.

Read more

Stability and availability through testing and qualification of hardware and software in the modern data centre network

In the digital transformation, the mapping of bandwidth, performance, comprehensive access with low latency times and security of the infrastructure play an important role for growth, innovation and customer satisfaction. The implementation of innovative technologies in the data centre network, however, also comes with challenges such as technological complexity, network management, etc. Thus, testing is one of the decisive points in the further development of an infrastructure. In this blog, you will learn more about our approach to ensuring the stability and availability of the data centre network by integrating our tools and solution concepts.

Read more

Network Management & Performance Monitoring – Receiving and evaluating multi-vendor network telemetry data with XNTI

Performance data today can be transmitted via telemetry streaming by many network components. But hardly any management tool can receive these data from different vendors or rather process it adequately. XNTI, the "Xantaro Network Telemetry Interface", collects cross-technology telemetry data in real time and normalizes the information from the various vendors and systems so it can be evaluated and correlated according to individual requirements.

Read more

NAT64 and DNS64 with A10 Networks Thunder CGN

Since the arrival of the RIPE NCC last phase of the IPv4 address run out, network deployments using only IPv6 addresses have become more necessary and common. However, some significant IPv4 only services still exist. In order to avoid any delay in the deployment of IPv6 only servers and clients, mechanisms such as NAT64 in combination with DNS64 can be used. In this blog, we have a look at two different scenarios and traffic flows of IPv6 only clients utilising A10 Networks Thunder CGN.

Read more

XFAST: Fully Automated Software Testing

Network operators must continuously improve their infrastructure: On the one hand, rapid technological development requires the implementation of ever new services and applications with an increasing complexity of the functions to be mapped. On the other hand, the systems must be regularly updated to the latest and most secure versions of the various operating software – also to protect the network. To meet the ever shorter innovation cycles and testing times, Xantaro offers with XFAST a service that significantly reduces testing efforts, increases the quality of the results and reduces risks when introducing new operating systems into the productive network environment to a minimum.

Read more

Juniper Networks Contrail SD-WAN

Within our SD-WAN tech blog, we have generally introduced the benefits of the software-defined wide-area network (SD-WAN) technology, which enables service providers to evolve their WAN connectivity offerings through a high degree of flexibility, visibility and control. But how can we implement this approach to gain these benefits? Which solutions exist on the market that can meet these expectations? In this tech blog, we take a closer look at the details of the Contrail SD-WAN from Juniper Networks.

Read more

Overview of Juniper Networks Contrail

Service providers need to use the industry's best innovative business enhancement solutions in order to react with more agility to the needs of the market and also to become more efficient and secure. It is in this context that Juniper Networks offers their Contrail products, SDN-enabled management and control software for simplified service delivery. This tech blog gives an overview of the history of Contrail and the different Contrail products which can help to boost your business.

Read more

SD-WAN has the flexibility, visibility and control to compete in today’s market

For years, software-defined networking (SDN) and network functions virtualisation (NFV) have symbolised innovative change in the network industry, using software to turn classic network business upside down. New, innovative approaches offering tremendous agility and savings have come to the market, changing the way we deploy, operate and maintain networks. In the area of WAN connectivity, new software-based solutions offer significant improvements to areas such as automation, visibility and defence. In this tech blog, we would like to introduce you to the benefits of software-defined wide-area network (SD-WAN) technology, which helps service providers to evolve their WAN connectivity offerings.

Read more

Virtualisation Technologies and Hypervisor-based concepts

Since decoupling networking hardware from its software was identified as an enabler for the move from traditionally rigid, cost-intensive network components and related network functions to agile, flexible resource deployment, the virtualisation of network functions has become a prominent way to cope with the demands of both the near and distant future in the field of networking. On the whole, virtualisation techniques can be classified into two main categories, resulting in a division between Hypervisor-based and Non-Hypervisor-based techniques. In this tech blog, we focus on the basics of Hypervisor-based concepts.

Read more

Use cases of Artificial Intelligence in Cybersecurity

In this tech blog, we explain selected Artificial Intelligence (AI) use cases in cybersecurity, like a sandboxing solution to identify malware or malicious domains or the analysis of characteristics in HTTP headers to identify unique patterns of command-and-control behaviour. In addition to this, we also mention some prerequisites and impacts for security architectures.

Read more

Artificial Intelligence, Machine Learning and Deep Learning?

As we wrote in our first part of the tech blog series “AI in Cybersecurity”, the term Artificial Intelligence is currently ubiquitous. But many do not know the difference or the delimitations between Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL). Therefore, it is beneficial to define some terms and concepts as strictly speaking they are often used as the same although their meaning is different.

Read more

Artificial Intelligence (AI) in Cybersecurity

Artificial Intelligence (AI) is already a hot topic in public discourse, but the fact remains that almost all experts see a great deal of potential for AI to solve issues in the Cybersecurity space. On the other hand, hackers are also taking advantage of new approaches that AI affords and at this point, the key question is how significant the potential and impact of this new technology is.

Read more

Cost and risk reduction through fully automated testing and qualification of network systems

With the help of test automation and load simulations, network operators can perform the vast majority of necessary tests entirely automatically. This can reduce the risks associated with, for example, the introduction of a new operating system into production environments to an unavoidable minimum. Xantaro uses its many years of expertise in this environment and has developed a solution to perform such tests, without being limited to specific vendors and technologies.

Read more

MX204: performance beast in a compact one-rack unit with a throughput of up to 400 Gbps full-duplex

With the introduction of the new MX204 at the end of 2017, Juniper Networks added a new device to their Universal Routing Platform which filled the gap for the small form factor needs without reducing the full feature set of the “big-boxes”. Within this tech blog, we would like to highlight the details and benefits of the brand-new full-featured Edge-Router MX204 from Juniper Networks. The MX204 platform offers ultra-high density and throughput in a compact one-rack unit form factor.

Read more

Protect your IT services against multi-vector DDoS threats on-premise with Arbor APS

We would like to deepen a combined on-premise and cloud solution provided by NETSCOUT Arbor. The Arbor Availability Protection System (APS) is a dedicated, on-premise inline device which provides continuous monitoring of in- and outbound traffic at the WAN edge. The device can detect and mitigate complex, state-exhausting and application-layer DDoS attacks and is feed with the newest threats.

Read more

Tame your network – with Infosim®’s StableNet®

We would like to introduce StableNet® – a single-platform, unified management solution designed to address today’s numerous operational and technical challenges of managing distributed and mission-critical IT infrastructures. The platform offers a highly automated Network Management System (NMS) with a focus on configuration, fault, and performance management and enables you to tame the complexity of your service infrastructure through a single platform.

Read more

Defending services against DDoS attacks is about understanding the complexity of multi-vector threats

DDoS is not a new phenomenon, and it became widely known through the volumetric attacks of the early 2000s. Due to the armament of attackers and diversity of threats, much more needs to be considered when protecting businesses against these attacks today. Even Next-Generation Firewalls (NGFW) do not provide adequate protection at this point, and they are often themselves the target.

Read more

Simulating realistic network environments for scalability testing with IXIA’s IxNetwork

Testing of new systems has become a crucial element in scalable and complex network architectures. This is why we at Xantaro have always invested in the testing capabilities of our famous XT3Lab located in Frankfurt. Our lab allows us to simulate our customers’ complex network scenarios or to test latest technologies before they implement them in their production networks.

Read more

Arista and Internet-scale Routing? We have put the R-Series to the test

It's no secret that Arista has in the past focused on data centre switching. As of late, this constellation has changed with the release of the 7500R series in March 2016, because Arista is now also targeting the routing market. The most recent technological developments in the data centres mean that Arista also has to implement routing functionality which it does with its R-Series. In our XT³Lab we have checked the platform's routing features and interoperability.

Read more

Satisfying massive demand for Cloud-based services with Cloud Xpress 2 from Infinera

Within the Telco industry, we can see a massive demand for Cloud-based services. This forces cloud service providers (cloud SPs) to heavily invest in their data centre and network infrastructures to keep pace with this development. Evolving the capacity scaling within providers' data centre interconnections (DCI) leads to many challenges. One of these difficulties is to reduce costs while having enlarged equipment density. The Infinera Cloud Xpress 2 is designed to meet these challenges, enabling cloud service providers to build and efficiently scale their secure metro cloud fabrics.

Read more

A software-defined and secure corporate network with Juniper’s SDSN architecture

With its SDSN architecture and functionality, Juniper Networks provides a modern cybersecurity platform that centrally and automatically averts threats. Today's business networks typically span multiple locations and clouds. At the same time, networks are continually being developed to meet new requirements. On the other hand, cybercriminals are continuously developing new methods to penetrate the highly complex networks.

Read more

A new cost-effective 100G Metro DCI Option? PAM4 makes it happen!

So far, CFP or CFP2 optical transceivers have been the only way to implement a coherent digital transmission of 100 Gigabit Ethernet (100GbE) data traffic with optics and over long distances in the embedded DWDM approach. Using the PAM4 modulation method and the newly developed PAM4 optics we now have an alternative to operate 100G DWDM with the attractive QSFP28 form factor.

Read more

Traffic diversion with SDN – Part 3: The Brain

The last part of the blog series "Traffic diversion with SDN" covers how it happened that the OpenFlow switches have preprogramed flows and that the routing daemon on the injector knows what to announce.

Read more

Traffic diversion with SDN – Part 2: What happens in the OpenFlow Switches?

The second part of our tech blog series about "Traffic diversion with SDN" explains what happens in the OpenFlow Switches.

Read more

Traffic Diversion with SDN – Part 1: A Practical Approach

When customers need to implement DDoS Mitigation Solutions into their network, they often have to perform major changes to the existing network in terms of deploying new Protocols (roll out MPLS, implement MPLS L3VPN) or having to redesign the complete network.

This article shows how to implement DDoS Mitigation with only minor impact on the Rest of the network, whilst reducing deployment time.

Read more

Juniper QFX5100 OVSDB Integration with VMware NSX for vCenter – Part 3

The third part of our tech blog series "Juniper QFX5100 OVSDB Integration with VMware NSX" is about running OVSDB between Juniper QFX5100 and VMware NSX for vCenter.

Read more

Juniper QFX5100 OVSDB Integration with VMware NSX for vCenter – Part 2

The second part of our tech blog series "Juniper QFX5100 OVSDB Integration with VMware NSX" describes the use of hardware VTEPS to integrate physical devices.

Read more

Juniper QFX5100 OVSDB Integration with VMware NSX for vCenter – Part 1

Overlay technologies for providing network virtualization have a long history in the industry. The first part of our tech blog series "Juniper QFX5100 OVSDB Integration with VMware NSX" focusses on Overlay Networks in Data Centres.

Read more

SDN – Part 3: SDN in Wide Area Networks

BGP-LS is a promising approach for SDN in Wide Area Networks (WAN). This video gives an overview on how it works and what advantages service providers may benefit from.

Read more

SDN – Part 2: SDN in the Data Centre & Juniper Networks Contrail show case

Scalability, the physical network integration and functionalities of ToR switches are the challenges of today's data centres. In addition, the flexibility introduced by computing virtualization is somehow thwarted by "classical network". This video explains and demonstrates how these challenges can be mastered using Juniper Networks Contrail solution.

Read more

SDN – Part 1: A technical definition

There are many facets of SDN implementation. What exactly it means depends on the type of problem you try to solve. Sebastian Graf, Solutions Architect at Xantaro, explains the advantages of Software Defined Networking from a technical perspective and gives an idea of the layered approach within the SDN architecture.

Read more