The Internet routing security story of the past decade has largely been about fixing route origins. RPKI Route Origin Validation (ROV) gave operators a cryptographic way to verify that the AS announcing a prefix was actually authorized to do so....


The Internet routing security story of the past decade has largely been about fixing route origins. RPKI Route Origin Validation (ROV) gave operators a cryptographic way to verify that the AS announcing a prefix was actually authorized to do so....
For over three decades, BGP’s AS_SET path segment has been a legal, if problematic, feature of Internet routing. In May 2025, the IETF formally ended that...
If you've spent time supporting AI infrastructure, whether that's a GPU training cluster, a fleet of inference nodes, or a multi-tenant model serving...
Commit Control is a core safety mechanism in the Noction Intelligent Routing Platform (IRP). It governs how routing changes are applied by enforcing...
Modern IP networks operate at a scale where abnormal traffic patterns can emerge faster than operators can react. Sudden traffic spikes, protocol floods, or...
Border Gateway Protocol (BGP) is not merely a protocol—it’s the backbone of the internet. For service provider engineers and network architects, BGP is an...
In recent years, the concepts of Artificial Intelligence (AI) and Machine Learning (ML) have moved from the academic realm to the forefront of many...
Recent disruptions to two undersea internet cables in the Baltic Sea have yet again highlighted a pressing issue for businesses worldwide: the vulnerabilities...
Understanding BGP states is essential to grasp how BGP operates. Similar to interior gateway protocols (IGPs) like EIGRP, OSPF, or ISIS, BGP establishes...
In networking, communication between devices relies on the efficient exchange of data packets. Among the essential elements in this exchange are the ACK...
What is asymmetric routing? Asymmetric routing is a network communication scenario where the forward and reverse paths of network traffic take different...
The Mail Analogy: Understanding TCP Headers and Reliable Delivery The internet seamlessly transfers data, but how does it ensure everything arrives correctly?...
Last week, Africa faced yet again a significant setback in its connectivity infrastructure, with multiple undersea cable failures causing widespread...
The Border Gateway Protocol (BGP) serves as the lifeblood of the internet, facilitating the exchange of routing information between vast networks. However, a...
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected cities where BGP-minded people live together,...
Over the recent weekend, the digital world faced a stark reminder of its vulnerabilities when Seacom, a crucial link in Africa's connection to the global...
Effective network monitoring plays a crucial role in modern network management. To achieve this, protocols like NetFlow v9 and IPFIX utilize various key...
When it comes to keeping tabs on networks, we’ve got two heavy hitters: NetFlow and packet capture. They are both crucial for understanding what's going on in...
RFC 9234 introduces a novel mechanism that leverages the BGP Role to prevent and detect route leaks. BGP leaks occur when incorrect routing information is...
