March 27, 2018
How to Monitor and Manage BGP Peering Relationships
Network operators, service providers and enterprises use BGP peering to deliver their content across the globe. While some BGP peering relationships a...
READ ARTICLE
March 21, 2018
Explorer Suite Version 17.3 – BGP Peering Traffic Analysis and More!
Supporting our goal to deliver new features and enhancements to our users regularly and frequently, we are happy to announce the availability of the E...
READ ARTICLE
September 13, 2017
Optimizing BGP Peering with Routing and Traffic Analysis
The Need for Peering Analysis Peering in the Internet routing world is complex. Service providers use BGP to establish peering and in peer-to-peer rel...
READ ARTICLE
April 11, 2017
The Importance of Routing Alerts!
Sometimes, a single alert can prevent hundreds of thousands of failed internet transactions. If you’re a financial services organization, the moneta...
READ ARTICLE
March 30, 2016
en·tro·py or Network Entropy
Entropy: 2. lack of order or predictability; gradual decline into disorder. OK, so you need to add a new BGP peer and get it active quickly. You know...
READ ARTICLE
September 15, 2015
Guardians of the Galaxy, er, I Mean the Network
If you haven’t already heard, NetScout is sponsoring a documentary being created by director Werner Herzog called “The Connected World,...
READ ARTICLE
July 22, 2015
OpenDaylight Lithium First Look
The OpenDaylight Project last month released the third version of its network controller software, named “Lithium.” OpenDaylight says that by usin...
READ ARTICLE
July 7, 2015
Everyday BGP Peering Challenges
In a previous life I was a routing engineer at an Internet Service Provider. One of my responsibilities was peering analytics — making sure that...
READ ARTICLE
June 23, 2015
Final Thoughts: Will SIDR Succeed Where the IRR Model Failed?
This article is the last of a three-part series where I compare and contrast the IRR and SIDR security models as well as discuss how we can get closer...
READ ARTICLE
June 16, 2015
Will SIDR Succeed Where the IRR Model Failed? (Part 2)
This article is the second of a three-part series where I compare and contrast the IRR and SIDR security models as well as discuss how we can get clos...
READ ARTICLE