BGP in the EVPN model
Guest Post: Using BGP to advertise MAC addresses, with the same operating model as Layer 3 VPNs.
Guest Post: Using BGP to advertise MAC addresses, with the same operating model as Layer 3 VPNs.
Guest Post: Measuring HTTPS resource record adoption in the wild.
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Guest Post: Exploring the intricacies of intra and inter-GPU server traffic patterns, network topologies for large clusters, the latest methods for handling network congestion, and more.
Guest Post: Researchers used real-time data to annotate network connections with carbon intensity, allowing digital infrastructure providers to relocate their compute workloads to more environmentally sustainable regions.
Guest Post: We’re running out of /24. Is now is the time to change this norm?
Guest Post: A trick to help reduce bandwidth and CPU cycles for both RPKI Publication Point servers and RPKI validators when switching between RRDP and RSYNC transports.
Guest Post: Making the case for sensible defaults.
Guest Post: Measuring DNS abuse is difficult. What are the obstacles?
Guest Post: Powerful human and machine-readable network fingerprints for multiple protocols that improve threat-hunting and analysis.