Border Gateway Protocol (BGP) is not merely a protocol—it’s the backbone of the...

Understanding BGP states is essential to grasp how BGP operates. Similar to interior gateway protocols (IGPs) like...
What is asymmetric routing? Asymmetric routing is a network communication scenario where the forward and reverse paths...
Last week, Africa faced yet again a significant setback in its connectivity infrastructure, with multiple undersea...
The Border Gateway Protocol (BGP) serves as the lifeblood of the internet, facilitating the exchange of routing...
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected...
Over the recent weekend, the digital world faced a stark reminder of its vulnerabilities when Seacom, a crucial link...
RFC 9234 introduces a novel mechanism that leverages the BGP Role to prevent and detect route leaks. BGP leaks occur...
Geo-blocking at the BGP level is an approach that allows network operators to restrict or control internet traffic by...
Distributed denial-of-service (DDoS) attacks can be a major threat to the availability and security of networks. These...
In the previous article, we described different DDoS attacks and their impact on network infrastructure. We focused on...
When it comes to distributed denial-of-service (DDoS) attacks, they are far from a downward trend. Although the...
When there is a change in the reachability of one or more prefixes, BGP needs to do some work to adapt to that change...
OSPF and BGP: Differences and Interactions When it comes to routing protocols, two of the most popular are OSPF (Open...
When it comes to IPv6, there are several categories of IPv6 addresses, each with its own use case. For example, IPv6...
BGP blackhole filtering is a routing technique used to drop unwanted traffic. Black holes are placed in the parts of a...
BGP community attribute is a transitive optional attribute that we use for tagging (marking) a set of prefixes sharing...
The Internet consists of Internet Service Providers (ISPs) of all shapes and sizes. ISPs have two options when it...
The Internet is for everyone, yet not everyone accepts that. In light of the news about Cogent Communications and...
What is Anycast? Anycast is not a new version of IP or the latest networking technology. The RFC 1546 describing...
YANG Data Modeling Language Yet Another Next Generation (YANG) RFC 6020 is standard-based data modeling language for...