We use cookies to make interactions with our websites easy and meaningful, to better understand how they are used and to tailor advertising. By clicking the accept button or continuing to browse, you indicate your agreement. To learn more about the cookies we use see our Privacy and Cookie Policy
Modern networks are getting increasingly complex. So many things can go wrong with them. Business can suffer, and that is something we definitely want...
Simple Network Management Protocol (SNMP) is a network application layer protocol, initially developed for network management but is now mainly used for network monitoring.
SNMP...
The Internet is for everyone, yet not everyone accepts that. In light of the news about Cogent Communications and Lumen Technologies disconnecting clients in...
YANG Data Modeling Language
Yet Another Next Generation (YANG) RFC 6020 is standard-based data modeling language for the NETCONF management protocol. YANG is used to...
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...
This blog post discusses BGP Labeled Unicast (BGP-LU) which is used in multi-regional networks to carry the label information. While the RFC3107 “Carrying Label...
RFC 7311 defines an optional non-transitive BGP attribute called the Accumulated IGP Metric Attribute (AIGP).
As we know, IGP stands for Interior Gateway Protocol...
Quality of Service (QoS) refers to a collection of technologies that networking devices use to apply different treatment to packets as they pass through...
We have recently posted the BGP Route Aggregation eBook that discusses the benefits of route aggregation and explains the various optional parameters associated with...
Network Address Translation (NAT) was originally described in RFC 1631. Although initially presented as a short term solution for preventing the IPv4 addresses depletion,...
The BGP advertisement of a prefix with new attributes replaces the previous announcement of that prefix. This behavior is known as an Implicit Withdraw,...
In this article we’ll take a look at the architecture for multicast forwarding called the Bit Indexed Explicit Replication or simply BIER. However, we’ll...
What is VPN?
Virtual Private Networks (VPN) are designed to provide users with the private networks capabilities over a shared infrastructure. They connect remote sites...
The Internet of Things (IoT) attracts huge public attention nowadays. It is a network of interconnected physical devices (things) which sense and interact with...
What is Cryptocurrency?
Cryptocurrency is a digital asset that works as a medium of exchange. It uses cryptography to secure transactions and to control the...
Large-scale data centers (DCs) connect hundreds of thousands or even more servers, having millions of users. Generally, every DC runs two kinds of applications....
Whether you are an experienced network administrator or you have just started to learn Border Gateway Protocol (BGP), Looking Glass (LG) is definitely a...
In many online games, very good network performance is a prerequisite for satisfactory gameplay. However, there are many kinds of games, and their networking...
In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...
Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are "more specific" prefixes—subsets...
As discussed in earlier posts, as networks grow larger it starts making sense to exchange traffic with other networks directly (peering) rather than pay...
Business people often believe that in order to have a reliable system, you need reliable components. Using reliable components to build your network certainly...
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected cities where BGP-minded people live together,...
It’s common knowledge that Border Gateway Protocol has no ability to make performance-based routing decisions and often routes traffic through paths that are congested...
The typical fully-meshed iBGP configuration of routers can become very difficult to manage in large networks. Because of the increasing numbers of iBGP sessions...
Nowadays, the Internet is made-up of more than 45,000 active Autonomous Systems (ASes), each with a different complexity level and specific configurations. To accomplish...
Inter-domain traffic engineering aims to optimize traffic performance, originating and terminating in different administrative domains. At the moment, Autonomous Systems exchange traffic via exterior...
All organizations that depend on Internet for sales revenue or business continuity require internet redundancy. Downtime lowers productivity, yields losses and painfully affects the...