BGP in the EVPN model
Guest Post: Using BGP to advertise MAC addresses, with the same operating model as Layer 3 VPNs.
Guest Post: Using BGP to advertise MAC addresses, with the same operating model as Layer 3 VPNs.
How Darwin’s Theory of Evolution might apply to networking.
Guest Post: Measuring HTTPS resource record adoption in the wild.
Is an alternative Trust Anchor structure for RPKI feasible?
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Is it time to abandon the OSI seven-layer model?
Measuring QUIC (performance, spin bit, and ECN), transparent forwarders, and invalid prefix dropping.
Guest Post: Exploring the intricacies of intra and inter-GPU server traffic patterns, network topologies for large clusters, the latest methods for handling network congestion, and more.
How ICANN manages data capture from the IMRS (L Root) systems worldwide.
Guest Post: Researchers used real-time data to annotate network connections with carbon intensity, allowing digital infrastructure providers to relocate their compute workloads to more environmentally sustainable regions.