The Border Gateway Protocol (BGP) serves as the lifeblood of the internet, facilitating...
Noction Blog
The latest BGP network optimization and IP flow analysis trends.
Edge Computing in Networking
The growth of data worldwide is expected to continue at an unprecedented rate, and the increase of Internet of Things...
Diverting DDoS traffic using the FlowSpec redirect-to-IP next-hop capability (configuration example)
Distributed denial-of-service (DDoS) attacks can be a major threat to the availability and security of networks. These...
SUBSCRIBE TO OUR NEWSLETTER
Tier 1 Carriers Performance Report: July, 2018
The report offers specific insights into the performance of major Internet Carriers...
BGP Conditional Route Injection
We have recently posted the BGP Route Aggregation eBook that discusses the benefits of route aggregation and explains...
BGP Route Dampening: obsolete or still used in the industry?
The unstable route whose availability alters repeatedly is called a flap. When flaps occur, an excessive number of BGP...
BGP Attribute Filtering and Error Handling
The BGP Attribute Filter feature enables BGP speakers to take a certain action based on the presence of a specified...
BGP Optimal Route Reflection as an alternative to BGP Add Path
Full iBGP Mesh and Route Reflection To avoid loops in a Full iBGP Mesh, BGP routers are only allowed to learn prefixes...
Tier 1 Carriers Performance Report: June, 2018
The report offers specific insights into the performance of major Internet Carriers...
Network Address Translation (NAT) and BGP Explained
Network Address Translation (NAT) was originally described in RFC 1631. Although initially presented as a short term...
Tier 1 Carriers Performance Report: May, 2018
The report offers specific insights into the performance of major Internet Carriers...
Advertising Multiple Paths in BGP (BGP-Addpath)
The BGP advertisement of a prefix with new attributes replaces the previous announcement of that prefix. This behavior...
BGP and Traffic Engineering Mechanisms for WISPs
In this blog post, we will take a look at Kevin Myers's presentation where he discusses deployment of both OSPF and...
Tier 1 Carriers Performance Report: April, 2018
The report offers specific insights into the performance of major Internet Carriers...
BGP Hijacking overview. Routing incidents prevention and defense mechanisms. (Updated)
What is BGP Hijacking? BGP hijacking is an illicit process of taking control of a group of IP prefixes assigned to a...
Bit Indexed Explicit Replication and the BGP Extensions for BIER
In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit...
Tier 1 Carriers Performance Report: March, 2018
The report offers specific insights into the performance of major Internet Carriers...
DDoS Amplification Attacks
A distributed denial-of-service (DDoS) attack is an attack in which the multiple compromised devices attack a target...
BGP/MPLS Layer 3 VPNs Practical Configuration
In our previous blog article we’ve discussed the benefits and the fundamental principles of BGP/MPLS L3 VPNs. We have...
Tier 1 carrier performance report: February, 2018
The report is presented in a slightly different form from the previous ones....
BGP / MPLS Layer 3 VPNs
What is VPN? Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over...
Segment Routing and the SRv6 Network Programming
IPv6 Addressing The Internet Protocol version 6 (IPv6) adoption is growing at pace. According to Google statistics,...
Tier 1 carrier performance report: January, 2018
The report covers broadly used Tier 1 carriers performance results in the US and the general spread for the month of...
TCP (Transmission Control Protocol) Congestion Control
Network congestion may occur when a sender overflows the network with too many packets. At the time of congestion, the...