Like other very successful protocols such as HTTP and DNS, over the years BGP has been given more and more additional jobs to do. In this blog post, we’ll look at the new functionality and new use cases that have been added to BGP over the years. These include various...
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures, described in RFC 6480. IP prefixes and AS numbers are the resources; the public key infrastructure is run by...
Previously, we’ve already looked at traffic engineering in general and AS path prepending in particular. Traffic engineering is distributing the traffic load over available lines in order to utilize those lines most efficiently. For instance, if you have two 1 Gbps...
On the 25th of November 2019, RIPE NCC made the final /22 IPv4 allocation from the last remaining addresses in the available pool and has officially run out of IPv4 addresses. Some of the other registrars ran out of IPv4 address blocks a few years ago: APNIC –...
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic patterns to performing threat analysis and providing timely response to network-related issues. Today, we’re announcing an Open Beta for Noction Flow...
NFA is a flow-based monitoring and reporting software which collects, stores and presents traffic data across the entire network and protocols to network professionals for future analysis. The product enables engineers to optimize their networks and applications...
Usage-based billing enables customers to pay only for data that they have used. In order to charge customers based on data usage, a company must have a good metering system in place. The system must be able to provide accurate information on the volume of traffic...
When it comes to major security concerns, one of the most serious ones are the data breaches and security exploits caused by insider incidents. According to the “2018 Cost of Insider Threats: Global Study” benchmark study produced by Ponemon Institute LLC,...
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and more important. When it comes to NetFlow, it has been supporting unicast and multicast traffic as well, since the legacy version 5. However, as NetFlow...
Role of RTT and OWD for TCP RTT stands for Round Trip Time and it is a length of time that a packet takes from point A to point B plus the length of the time that acknowledgment of the packet takes from B to A. The performance of TCP flow is affected by RTT. The...