ON THE NET
BGP Peering (1)

Why does BGP use TCP for peering? What happens if two BGP speakers begin the peering process at the same time? In this video, recorded for Packet Pushers, I start looking at the BGP peering process.
https://packetpushers.net/learning-bgp-module-2-lesson-1-peering-part-1-video/
Privacy for Providers
While this talk is titled privacy for providers, it really applies to just about every network operator. This is meant to open a conversation on the topic, rather than providing definitive answers. I start by looking at some of the kinds of information network operators work with, and whether this information can or should be considered “private.” In the second part of the talk, I work through some of the various ways network operators might want to consider when handling private information.
How BGP Really Converges

This lesson in Russ White’s BGP course gets into withdrawing a route, MRAI time, implicit withdraws, BGP Hunt, graceful restart, and other topics.
OT’N: BGP Loop Free Paths
Is an IP Address Protected Information?
My third article on privacy and networking is up over at Packet Pushers—
Legal and Ethical Aspects of Privacy
My second post on privacy for network engineers is up over at Packet Pushers—
Providers and Privacy at NANOG 84
I’m speaking (in person) at NANOG84 on providers and privacy—
