Blog

Blog

In many online games, very good network performance is a prerequisite for satisfactory gameplay. However, there are many kinds of games, and their networking...

We've talked about network latency several times in previous blog posts. Today, let's drill a bit deeper on that topic, and especially how it...

Video is an interesting network application. Many users consume hours of video per day, and an hour of HD video is easily more than...

When flying, it's important to choose the right airline. Obviously, a direct connection is usually best, but if a layover is necessary, it helps...

The network that never needs any maintenance, along with the associated downtime, hasn't been built yet. You can plan your own downtime such that...

In our last post, we took a look at RPKI. With RPKI, it's possible to reject prefixes that are originated by the wrong AS,...

The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...

BGP security

In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...

MD5 password

Back in the late 1980s and the early 1990s when BGP was developed, security was still an afterthought for protocols used on the internet....

Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are “more specific” prefixes—subsets...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL