Video over Internet


Couple days ago I made an interesting talk about Video Traffic over Internet. Sales engineer goes to company and he claims … [Read more...]

HTIRW: The Business Side of DNS (2)

</a>continued from part 1 The top level server is either paid for by the domain owner (if they are managing the TLD … [Read more...]

HTIRW: The Business Side of DNS (1)


So your host queries a DNS server to map the name to a location (an IP address), which sets off a chain of queries across a … [Read more...]

Secret CEF Attributes Part 6, The BGP Connection

In the first five parts of this series we covered all the steps necessary to distribute QoS and monitoring to a large … [Read more...]

Using Next Generation MVPN to optimize your MPLS core – Part 1


Like many network engineers I have had difficulties with multicast, the logic is all messed up right!? The only … [Read more...]

Secret CEF Attributes, Part 5

So far we've explored some very cool features of CEF and the attributes we can push into the FIB to identify certain kinds of … [Read more...]

Secret CEF Attributes, Part 4

In Parts 1, Part 2 and Part 3 we saw we can use the CEF table to express all sorts of different QoS policies. In Part 4 we … [Read more...]

CEF Secret Attributes, Part 3

In Part 1 we saw we can mark prefixes in CEF with certain attributes that might give us interesting things to play with. In … [Read more...]

FAT or Entropy Label?

FAT Label

In this article we are going to see two features that improve the load-balancing in the MLPS Core. Why? In the networking … [Read more...]

The Secret Sauce for Network Services


Tunneling is the Duct Tape of Networking..It is interesting to realize that a big chunk of network features in Data Center, … [Read more...]

BGP Path Hunting/Exploration


 Only one change or link flap can cause one hour or more traffic drop.  It is weird, right? But this is true. In this … [Read more...]

Network Topologies


Resiliency of the networks is almost the most important design criterion which needs to be considered. Packets need to be … [Read more...]

The NSA, surveillance, and Call Records

First off, let me be very clear. I do *not* condone placing backdoors into critical infrastructure such as firewalls and … [Read more...]

Fast Reroute Mechanisms


Network reliability is an important measure for deployability of sensitive applications. When a link, node or SRLG failure … [Read more...]

Introduction to Segment Routing


When I read the latest posts about Fast ReRoute from Russ White and as I had an introduction from a coworker contributing to … [Read more...]