Network edge design checklist: Part 2 — Network edge design
Guest Post: A comprehensive checklist of considerations you can use as a starting point when designing your network edge.
Guest Post: A comprehensive checklist of considerations you can use as a starting point when designing your network edge.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part three of this three-part deep dive series, we explore how flow control is implemented in switch ASICs.
Guest Post: A first global look at how many networks use BGP-based DDoS scrubbing — revealing who’s protected, how adoption has grown, and what it means for Internet resilience.
Guest Post: Path diversity, ASN filtering, and resiliance are all important condsiderations when designing your network edge. What else should you be thinking about?
Guest Post: In the past two decades, Bangladesh’s Internet has surged from 0.1% to over 75% penetration, shedding its reliance on costly satellite links. But the real work lies ahead — strengthening local peering, reaching rural areas, and building infrastructure that serves everyone.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part two of this three-part deep dive series, we compare rate-based and credit-based approaches to flow control.
Guest Post: The NRO has published a new reference page to help network operators and other members of the Internet technical community learn how to create ROAs through each of the five RIRs.
Guest Post: Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements show broad collateral damage to legitimate services.
At APNIC 60, the Cooperation SIG session “Bridging the Gap: Technical Voices in Global Internet Policy” brought together stakeholders from across the Asia Pacific to explore how technical expertise can more effectively inform global policy discussions.
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.