Interdomain BGP policies — where traffic should enter a network
Guest Post: Examine the various techniques used to control traffic entry points.
Guest Post: Examine the various techniques used to control traffic entry points.
Guest Post: How to select which neighboring AS to send traffic through.
Guest Post: The success of open-source projects like FRR is determined by their community of contributors.
Guest Post: Exploiting routing decisions made in BGP when networks cannot retrieve RPKI information from publication points.
IPv6 extension headers, BGPsec crypto, RPKI beacons, and more.
Guest Post: First of its kind study shows relationship between ASN allocations and BGP announcements.
Guest Post: Study of Japanese event network shows 77% of prefixes have alternate paths of shorter latency than best paths.
Guest Post: Study finds tagging and forwarding behaviour is prevalent among large ISPs.
This round of ISIF Asia grantees is the biggest ever, with 22 projects covering 18 economies. Projects range from BGP and cybersecurity through to Internet development.
Will either affect current addressing models?