The fragility of transient identifiers
Let’s talk about the ‘Unfortunate History of Transient Numeric Identifiers’.
Let’s talk about the ‘Unfortunate History of Transient Numeric Identifiers’.
Guest Post: What are the fundamental limits of end-to-end congestion control in 5G networks?
Guest Post: CDN shares how it detects cases where BBR provides improved performance enabling them to provide more custom congestion control.
Geoff Huston on currently active IETF routing security, IPv6, and transport discussions.
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.
Guest Post: Eleven-year study characterizes the rise of heavy hitters and big-fast TCP flows.
What happens when two people correctly read the same RFC yet their implementations of that protocol still differ?
Geoff Huston discusses currently active IETF areas that are not DNS related.
Guest Post: Secure your routers and upgrade to TCP Authentication Option.
Guest Post: As TCP becomes more important to DNS, overhead is becoming an issue.