BGP Security and SPAM

24 May 2016 | Comments Off on BGP Security and SPAM

Spam might seem like an annoyance in the US and other areas where bandwidth is paid for by the access rateā€”and what does spam have to do with BGP security? In many areas of the world, however, spam makes email practically unusable. When you’re paying for Internet access by the byte transmitted or received, spam…

Universal Scaling and Complexity

18 May 2016 | Comments Off on Universal Scaling and Complexity

The universal scaling law is a model designed to help engineers understand transaction based systems, particularly databases and applications. What could a transaction based system have to do with network design? After all, networks aren’t really transaction based, are they? Or maybe they are… Let’s ignore the data flowing through the network for a moment…

The CORD Architecture

30 March 2016 | Comments Off on The CORD Architecture

Edge provider networks, supporting DSL, voice, and other services to consumers and small businesses, tend to be more heavily bound by vendor specific equipment and hardware centric standards. These networks are built around the more closed telephone standards, rather than the more open internetworking standards, and hence they tend to be more expensive to operate…

Research ‘net: Decoding Firepath

24 February 2016 | Comments Off on Research ‘net: Decoding Firepath

While it is true that huge scale is a different mindset, and not just “more of the same only bigger,” there are also a lot of lessons to learn by looking at how truly large scale networks are built. In this vein, Google released a paper explaining the evolution of their network. While the hardware…