The Mail Analogy: Understanding TCP Headers and Reliable Delivery The internet...
Noction Blog
The latest BGP network optimization and IP flow analysis trends.
BGP Route Leak prevention and detection via roles in UPDATE and OPEN Messages – RFC 9234
RFC 9234 introduces a novel mechanism that leverages the BGP Role to prevent and detect route leaks. BGP leaks occur...
MPLS TE Deadlock
One of the characteristics of MPLS TE is that an established LSP (label Switched Path) is not torn down in the event...
SUBSCRIBE TO OUR NEWSLETTER
Tier 1 Carriers Performance Report: November, 2019
The report offers specific insights into the performance of major Internet Carriers...
The IPv4 party is over
On the 25th of November 2019, RIPE NCC made the final /22 IPv4 allocation from the last remaining addresses in the...
Tier 1 Carriers Performance Report: October, 2019
The report offers specific insights into the performance of major Internet Carriers...
So, what exactly is NFA?
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic...
Usage-based billing with NetFlow and sFlow
Usage-based billing enables customers to pay only for data that they have used. ...
Tier 1 Carriers Performance Report: September, 2019
The report offers specific insights into the performance of major Internet Carriers...
Insider Threat Detection with NetFlow
When it comes to major security concerns, one of the most serious ones are the data breaches and security exploits...
Multicast Traffic Monitoring and NetFlow
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and...
One Way Delay Measurements and NetFlow
Role of RTT and OWD for TCP RTT stands for Round Trip Time and it is a length of time that a packet takes from point A...
DDoS Mitigation and BGP Flowspec
In traditional methods for DDoS mitigation, such as RTBH (remotely triggered blackhole), a BGP route is injected,...
Tier 1 Carriers Performance Report: July, 2019
The report offers specific insights into the performance of major Internet Carriers...
Tier 1 Carriers Performance Report: June, 2019
The report offers specific insights into the performance of major Internet Carriers...
Questions to ask a NetFlow Vendor Before you Buy
Network visibility is crucial because we cannot manage and secure what we cannot see. NetFlow plays a critical role in...
NetFlow and BGP
Border Gateway Protocol (BGP) is a core routing protocol used by most of the Internet Service Providers (ISPs). BGP’s...
Network Traffic Analysis and Alerting based on NetFlow
This article gives some insights on how to set up a network traffic analysis and alerting system based on NetFlow....
SD-WAN and NetFlow
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of...
The 768k or Another Internet Doomsday? Here’s how to deal with the TCAM overflow at the 768k boundary.
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which...
Identifying, monitoring and securing BYOD traffic with NetFlow
Bring Your Own Device (BYOD) is a practice that allows users to bring their personal devices such as tablets or...
Tier 1 Carriers Performance Report: March, 2019
The report offers specific insights into the performance of major Internet Carriers...
Finding MAC addresses using Flexible NetFlow
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper,...
Web Applications compromise detection using Flow Data
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan,...