We are excited to introduce Noction Flow Analyzer version 24.08, which features...
Noction Blog
The latest BGP network optimization and IP flow analysis trends.
Understanding BGP Communities
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected...
Navigating Undersea Cable Disruptions: Seacom’s Red Sea Connectivity Challenge and Strategic Solutions
Over the recent weekend, the digital world faced a stark reminder of its vulnerabilities when Seacom, a crucial link...
SUBSCRIBE TO OUR NEWSLETTER
BGP security: an overview of the RPKI framework
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system...
AS path prepending, AS path lengths and the AS path filtering
Previously, we’ve already looked at traffic engineering in general and AS path prepending in particular. Traffic...
Tier 1 Carriers Performance Report: January, 2020
The report offers specific insights into the performance of major Internet Carriers...
Tier 1 Carriers Performance Report: December, 2019
The report offers specific insights into the performance of major Internet Carriers...
Tier 1 Carriers Performance Report: November, 2019
The report offers specific insights into the performance of major Internet Carriers...
The IPv4 party is over
On the 25th of November 2019, RIPE NCC made the final /22 IPv4 allocation from the last remaining addresses in the...
Tier 1 Carriers Performance Report: October, 2019
The report offers specific insights into the performance of major Internet Carriers...
So, what exactly is NFA?
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic...
Usage-based billing with NetFlow and sFlow
Usage-based billing enables customers to pay only for data that they have used. In order to charge customers based on...
Tier 1 Carriers Performance Report: September, 2019
The report offers specific insights into the performance of major Internet Carriers...
Insider Threat Detection with NetFlow
When it comes to major security concerns, one of the most serious ones are the data breaches and security exploits...
Multicast Traffic Monitoring and NetFlow
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and...
One Way Delay Measurements and NetFlow
Role of RTT and OWD for TCP RTT stands for Round Trip Time and it is a length of time that a packet takes from point A...
DDoS Mitigation and BGP Flowspec
In traditional methods for DDoS mitigation, such as RTBH (remotely triggered blackhole), a BGP route is injected,...
Tier 1 Carriers Performance Report: July, 2019
The report offers specific insights into the performance of major Internet Carriers...
Tier 1 Carriers Performance Report: June, 2019
The report offers specific insights into the performance of major Internet Carriers...
Questions to ask a NetFlow Vendor Before you Buy
Network visibility is crucial because we cannot manage and secure what we cannot see. NetFlow plays a critical role in...
NetFlow and BGP
Border Gateway Protocol (BGP) is a core routing protocol used by most of the Internet Service Providers (ISPs). BGP’s...
Network Traffic Analysis and Alerting based on NetFlow
This article gives some insights on how to set up a network traffic analysis and alerting system based on NetFlow....
SD-WAN and NetFlow
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of...
The 768k or Another Internet Doomsday? Here’s how to deal with the TCAM overflow at the 768k boundary.
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which...