The state of traffic engineering – an ISP’s perspective
Guest Post: As networks grow in size and complexity, operators find themselves needing an increasing array of tools to manage the flow of traffic.
Guest Post: As networks grow in size and complexity, operators find themselves needing an increasing array of tools to manage the flow of traffic.
Guest Post: There are many common sources for BGP anomalies of which network operators should be aware.
Geoff Huston analyses the current state of BGP security mechanisms based on his observations at the IETF 102 meeting.
Guest Post: ARTEMIS is a new defence system for network operators that can reduce BGP hijack detection and mitigation times from hours/days to a few seconds or minutes.
Guest Post: Read how one email to a NOG mailing list led to a concerted effort to kick a notorious BGP hijacker off the Internet.
Guest Post: Learn how SADR can be simply configured to assist with multihoming.
Guest Post: Study seeks to determine the scale of BGP hijacking threats by measuring the number of ingress filters bypassed by routing anomalies.
The recent hackathon at iNOG provided a great environment to develop a prototype AS interdependence visualization (and eat stroopwaffles).
The designers of RTBADT (Real Time BGP Anomaly Detection Tool) used a new technique to detect BGP anomalies in a matter of seconds.
What’s new, what’s old and what’s been forgotten in the past ten years of the Internet’s evolution?