Understanding BGP states is essential to grasp how BGP operates. Similar to interior gateway protocols (IGPs) like EIGRP, OSPF, or ISIS, BGP establishes peering with other routers before exchanging routing information. However, unlike IGPs, BGP...


Understanding BGP states is essential to grasp how BGP operates. Similar to interior gateway protocols (IGPs) like EIGRP, OSPF, or ISIS, BGP establishes peering with other routers before exchanging routing information. However, unlike IGPs, BGP...
Network Address Translation (NAT) was originally described in RFC 1631. Although initially presented as a short term solution for preventing the IPv4...
The BGP advertisement of a prefix with new attributes replaces the previous announcement of that prefix. This behavior is known as an Implicit Withdraw, which...
In this blog post, we will take a look at Kevin Myers's presentation where he discusses deployment of both OSPF and BGP routing protocols in order to select...
What is BGP Hijacking? BGP hijacking is an illicit process of taking control of a group of IP prefixes assigned to a potential victim. Either intentionally or...
In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit Replication or simply BIER. However, we’ll need...
A distributed denial-of-service (DDoS) attack is an attack in which the multiple compromised devices attack a target and cause the denial of service for users...
In our previous blog article we’ve discussed the benefits and the fundamental principles of BGP/MPLS L3 VPNs. We have covered the definition of the basic...
What is VPN? Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over a shared infrastructure. They connect...
IPv6 Addressing The Internet Protocol version 6 (IPv6) adoption is growing at pace. According to Google statistics, 22% of the users reach Google over IPv6...
Network congestion may occur when a sender overflows the network with too many packets. At the time of congestion, the network cannot handle this traffic...
The Intent-based Networking (IBN) concept is actively being discussed by IT professionals over the last few months. It represents a new approach to...
Internet traffic has a wide range of variability at all times. However, the fourth quarter of the year typically remains the busiest for a lot of businesses...
The recently published AT&T white paper "Towards an Open, Disaggregated Network Operating System" shows the company’s willingness to discuss and actively...
The Internet of Things (IoT) attracts huge public attention nowadays. It is a network of interconnected physical devices (things) which sense and interact...
What is Cryptocurrency? Cryptocurrency is a digital asset that works as a medium of exchange. It uses cryptography to secure transactions and to control the...
Recently, a new Internet draft - Internet Protocol Version 10 (IPv10) attracted attention of network enthusiasts. People on the Internet forums often ask if...
Large-scale data centers (DCs) connect hundreds of thousands or even more servers, having millions of users. Generally, every DC runs two kinds of...
Just like with the other routing protocols such as OSPF or EIGRP, BGP speaking routers first need to become neighbors prior to exchanging routing information....
