We use cookies to make interactions with our websites easy and meaningful, to better understand how they are used and to tailor advertising. By clicking the accept button or continuing to browse, you indicate your agreement. To learn more about the cookies we use see our Privacy and Cookie Policy
In TCP, flags indicate a particular connection state, provide some additional helpful information for troubleshooting purposes, or handle control of a specific connection.
Flags are...
Modern networks are getting increasingly complex. So many things can go wrong with them. Business can suffer, and that is something we definitely want...
Simple Network Management Protocol (SNMP) is a network application layer protocol, initially developed for network management but is now mainly used for network monitoring.
SNMP...
The Internet is for everyone, yet not everyone accepts that. In light of the news about Cogent Communications and Lumen Technologies disconnecting clients in...
YANG Data Modeling Language
Yet Another Next Generation (YANG) RFC 6020 is standard-based data modeling language for the NETCONF management protocol. YANG is used to...
This article highlights the importance of the Source ID and Observation Domain ID fields when several metering processes are running on the exporter observation...
BGP Flowspec technology provides a more granular approach to Denial of Service (DoS) attacks mitigation when compared to old-school methods, such as Remotely Triggered...
Have you ever found that a network usage reported by your commercial NetFlow analyzer does not match the actual values or that software contains bugs? ...
In general, oversubscription is a subscription for more than what is available. Oversubscription represents an intentional business model and is a widespread practice in...
There is a lot of confusion around the 95th percentile bandwidth metering. Therefore this blog posting is intended to provide you with detailed information...
Network professionals count on NFA when monitoring and analyzing traffic, controlling bandwidth utilization, gaining insights into potential security issues, and reviewing BGP peering relationships....
Noction Flow Analyzer is a flow-based monitoring and reporting software tool that collects, stores, and presents traffic data across an entire network. NFA enables...
Update: Tier 1 carriers performance March 3rd - April 6th
Update: Noction Intelligent Routing Platform performance results
This is yet another COVID-19 related blog post. We...
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...
Previously, we’ve already looked at traffic engineering in general and AS path prepending in particular. Traffic engineering is distributing the traffic load over available...
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic patterns to performing threat analysis and providing...
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and more important. When it comes to NetFlow, it...
In traditional methods for DDoS mitigation, such as RTBH (remotely triggered blackhole), a BGP route is injected, advertising the IP address of the server...
Network visibility is crucial because we cannot manage and secure what we cannot see. NetFlow plays a critical role in traffic visibility by helping...
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of WAN by decoupling control plane from...
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper, Huawei, VyOS. We have collected layer 3...
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan, brute-force and compromise phases that can be...
Simple Network Management Protocol (SNMP) is a well-known standardized application layer protocol, originally developed for network management but mostly used for network monitoring. SNMP...
One of our recent blog posts dedicated to NetFlow technology provides the necessary knowledge needed to understand NetFlow principles and what it is used...
Flow-based (NetFlow, IPFIX, NetStream) and packet-based (sFlow) network monitoring technologies enable network administrators to gain insight into traffic traversing a network. They provide various...
Network monitoring is a systematic effort to monitor parameters of a computer network in order to detect issues that degrade network performance. Network Traffic...
Nowadays, the very abstract ideas underlying the quantum physics are being translated into reality thanks to new technological capabilities in the field of nanotechnology...
This blog post discusses BGP Labeled Unicast (BGP-LU) which is used in multi-regional networks to carry the label information. While the RFC3107 “Carrying Label...
RFC 7311 defines an optional non-transitive BGP attribute called the Accumulated IGP Metric Attribute (AIGP).
As we know, IGP stands for Interior Gateway Protocol...
Quality of Service (QoS) refers to a collection of technologies that networking devices use to apply different treatment to packets as they pass through...
We have recently posted the BGP Route Aggregation eBook that discusses the benefits of route aggregation and explains the various optional parameters associated with...
Network Address Translation (NAT) was originally described in RFC 1631. Although initially presented as a short term solution for preventing the IPv4 addresses depletion,...
The BGP advertisement of a prefix with new attributes replaces the previous announcement of that prefix. This behavior is known as an Implicit Withdraw,...
In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit Replication or simply BIER. However, we’ll...
A distributed denial-of-service (DDoS) attack is an attack in which the multiple compromised devices attack a target and cause the denial of service for...
The report is presented in a slightly different form from the previous ones. Besides the general analysis we have complemented it with data reflecting...
What is VPN?
Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over a shared infrastructure. They connect remote sites...
IPv6 Addressing
The Internet Protocol version 6 (IPv6) adoption is growing at pace. According to Google statistics, 22% of the users reach Google over IPv6...
The Intent-based Networking (IBN) concept is actively being discussed by IT professionals over the last few months. It represents a new approach to networking,...
The recently published AT&T white paper "Towards an Open, Disaggregated Network Operating System" shows the company’s willingness to discuss and actively promote the creation...
The Internet of Things (IoT) attracts huge public attention nowadays. It is a network of interconnected physical devices (things) which sense and interact with...
What is Cryptocurrency?
Cryptocurrency is a digital asset that works as a medium of exchange. It uses cryptography to secure transactions and to control the...
Recently, a new Internet draft - Internet Protocol Version 10 (IPv10) attracted attention of network enthusiasts. People on the Internet forums often ask if...
Large-scale data centers (DCs) connect hundreds of thousands or even more servers, having millions of users. Generally, every DC runs two kinds of applications....
This article discusses BGP session culling techniques that mitigate a negative impact of maintenance of Internet Exchange Points (IXPs) on IP networks. IXP represents...
Whether you are an experienced network administrator or you have just started to learn Border Gateway Protocol (BGP), Looking Glass (LG) is definitely a...
Slack is a great communication platform that simplifies and streamlines day-to-day operations of various teams around the world.
Integrating the tools that engineers adopt in...
As Noction continues to intelligently optimize routing for more and more networks around the world, we find ourselves in the unique position of having...
In our previous post, we wrote about using PeeringDB to find information about potential peers, and then after peering has been arranged, using PeeringDB...
At Noction, collecting and analyzing petabytes of data across all IRP instances worldwide offers us valuable data regarding overall Internet performance as well as...
When networks exchange traffic without having a customer-provider relationship, this is called peering. We've talked about peering in previous Noction blog posts, such as...
Border Gateway Protocol is unique among routing protocols because it requires a number of parameters to be configured manually on each side before two...
In the previous blog post, we looked at the BGP NEXT_HOP attribute. Today we'll cover another attribute: the LOCAL_PREF or local preference.
What is LOCAL_PREF?
The...
Once a BGP session is established, routers will exchange two types of messages: KEEPALIVE and UPDATE. Keepalive messages are sent to let a neighboring...
In many online games, very good network performance is a prerequisite for satisfactory gameplay. However, there are many kinds of games, and their networking...
In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...
Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are "more specific" prefixes—subsets...
As discussed in earlier posts, as networks grow larger it starts making sense to exchange traffic with other networks directly (peering) rather than pay...
Business people often believe that in order to have a reliable system, you need reliable components. Using reliable components to build your network certainly...
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected cities where BGP-minded people live together,...
It’s common knowledge that Border Gateway Protocol has no ability to make performance-based routing decisions and often routes traffic through paths that are congested...
SNMP (Simple Network Management Protocol) is a standard protocol that network devices use to control each other and report critical information. The main advantage...
There are several route optimization techniques applied to networks distinguished by a single routing domain. The traditional approach requires network engineers to apply various...
Our customers ask repeatedly about the benefits IRP brings to their infrastructure. To address some of these questions we've compiled a few Overview Reports...
Conventional wisdom leads us to believe that interconnects between peering partners in an Exchange that is shorter will also be better than traditional links...
The typical fully-meshed iBGP configuration of routers can become very difficult to manage in large networks. Because of the increasing numbers of iBGP sessions...
There are various techniques for optimizing traffic routing across multiple transit providers available in a network. However, there are some additional challenges when there...
Nowadays, the Internet is made-up of more than 45,000 active Autonomous Systems (ASes), each with a different complexity level and specific configurations. To accomplish...
Inter-domain traffic engineering aims to optimize traffic performance, originating and terminating in different administrative domains. At the moment, Autonomous Systems exchange traffic via exterior...
All organizations that depend on Internet for sales revenue or business continuity require internet redundancy. Downtime lowers productivity, yields losses and painfully affects the...
An operational network is a strategic business resource. It carries everyday messages and mission-critical data, and facilitates communication between people and business processes. It...
Speed is highly prioritized in networking. Applications with high bandwidth consumption and mission-critical systems demand ever more throughput and capacity. While the main demand...
Most multi-homed networks need to engineer and control the traffic flow for both performance and economical reasons. This is commonly done by manually tweaking...
During the transfer of information in the Internet, there are various situations related to certain host or network inaccessibility, or channels of communication overload....