{"version":"1.0","provider_name":"irgNET","provider_url":"https:\/\/irg-net.com","author_name":"vExpert","author_url":"https:\/\/irg-net.com\/index.php\/author\/vexpert\/","title":"Introducing Network Virtualization [part 2] -... - irgNET","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xfOI9nvUPp\"><a href=\"https:\/\/irg-net.com\/index.php\/introducing-network-virtualization-part-2\/\">Introducing Network Virtualization [part 2] -&#8230;<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/irg-net.com\/index.php\/introducing-network-virtualization-part-2\/embed\/#?secret=xfOI9nvUPp\" width=\"600\" height=\"338\" title=\"&#8220;Introducing Network Virtualization [part 2] -&#8230;&#8221; &#8212; irgNET\" data-secret=\"xfOI9nvUPp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/irg-net.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Introducing Network Virtualization [part 2] &#8211; fdlsistemi.com Introducing Network Virtualization [part 2] -&#8230; Encapsulation protocols implement the tunnels that act as a backplane to carry the logical segments traffic across the physical infrastructure. In this article, we will dive into overlay network protocol advancements from VXLAN to GENEVE. We\u2019ll then discuss the current state of [&hellip;]","thumbnail_url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/27c10a10-3417-471e-bcdc-d5b7671b78ee\/?size=Box320"}