Blog

Blog

BGP hijacking

BGP hijacking is an illicit process of taking control of a group of IP prefixes assigned to a potential victim. Either intentionally or accidentally,...

Bit Indexed Explicit Replication BIER

In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit Replication or simply BIER. However, we’ll...

The report offers specific insights into the performance of major Internet Carriers for the month of March, 2018.

DDos attack

A distributed denial-of-service (DDoS) attack is an attack in which the multiple compromised devices attack a target and cause the denial of service for...

In our previous blog article we’ve discussed the benefits and the fundamental principles of BGP/MPLS L3 VPNs. We have covered the definition of the...

Tier1 report February 2018

The report is presented in a slightly different form from the previous ones. Besides the general analysis we have complemented it with data reflecting...

BGP VPN

What is VPN? Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over a shared infrastructure. They connect remote sites...

Segment Routing

IPv6 Addressing The Internet Protocol version 6 (IPv6) adoption is growing at pace. According to Google statistics, 22% of the users reach Google over IPv6...

Monthly snapshot January 2018

The report covers broadly used Tier 1 carriers performance results in the US and the general spread for the month of January 2018. For...

TCP Congestion

Network congestion may occur when a sender overflows the network with too many packets. At the time of congestion, the network cannot handle this...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL