Border Gateway Protocol (BGP) is not merely a protocol—it’s the backbone of the internet. For service provider engineers and network architects, BGP is an indispensable tool that enables global connectivity, supports MPLS VPNs, and underpins many...


Border Gateway Protocol (BGP) is not merely a protocol—it’s the backbone of the internet. For service provider engineers and network architects, BGP is an indispensable tool that enables global connectivity, supports MPLS VPNs, and underpins many...
The unstable route whose availability alters repeatedly is called a flap. When flaps occur, an excessive number of BGP UPDATE messages are sent to BGP peers...
The BGP Attribute Filter feature enables BGP speakers to take a certain action based on the presence of a specified path attribute inside the UPDATE message...
Full iBGP Mesh and Route Reflection To avoid loops in a Full iBGP Mesh, BGP routers are only allowed to learn prefixes over iBGP from the router that...
Network Address Translation (NAT) was originally described in RFC 1631. Although initially presented as a short term solution for preventing the IPv4...
The BGP advertisement of a prefix with new attributes replaces the previous announcement of that prefix. This behavior is known as an Implicit Withdraw, which...
In this blog post, we will take a look at Kevin Myers's presentation where he discusses deployment of both OSPF and BGP routing protocols in order to select...
What is BGP Hijacking? BGP hijacking is an illicit process of taking control of a group of IP prefixes assigned to a potential victim. Either intentionally or...
In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit Replication or simply BIER. However, we’ll need...
A distributed denial-of-service (DDoS) attack is an attack in which the multiple compromised devices attack a target and cause the denial of service for users...
In our previous blog article we’ve discussed the benefits and the fundamental principles of BGP/MPLS L3 VPNs. We have covered the definition of the basic...
What is VPN? Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over a shared infrastructure. They connect...
IPv6 Addressing The Internet Protocol version 6 (IPv6) adoption is growing at pace. According to Google statistics, 22% of the users reach Google over IPv6...
Network congestion may occur when a sender overflows the network with too many packets. At the time of congestion, the network cannot handle this traffic...
The Intent-based Networking (IBN) concept is actively being discussed by IT professionals over the last few months. It represents a new approach to...
Internet traffic has a wide range of variability at all times. However, the fourth quarter of the year typically remains the busiest for a lot of businesses...
The recently published AT&T white paper "Towards an Open, Disaggregated Network Operating System" shows the company’s willingness to discuss and actively...
The Internet of Things (IoT) attracts huge public attention nowadays. It is a network of interconnected physical devices (things) which sense and interact...
What is Cryptocurrency? Cryptocurrency is a digital asset that works as a medium of exchange. It uses cryptography to secure transactions and to control the...
