Remove DNS Remove IP Address Remove Protocol
article thumbnail

EP143: DNS Record Types You Should Know

ByteByteGo

This week’s system design refresher: 8 Most Important System Design Concepts You Should Know (Youtube Video) DNS Record Types You Should Know Polling Vs Webhooks API Vs SDK! Here are the 8 most commonly used DNS Record Types. It is one of the most essential records for translating human-readable domain names into IP addresses.

DNS 130
article thumbnail

How to find applications with NetFlow

Kentik

You can also learn about the protocols in use, the ports being used, the top interfaces, etc. Source IP address. Destination IP address. IP protocol. Source port for UDP or TCP, 0 for other protocols. Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to measure the performance of a website

Kentik

Domain lookup time : When a connection is made to a domain, the local operating system must first reach out to the DNS to resolve that hostname to an IP address. Where is the DNS? Is your PC using a DNS on the same local area network as your computer? This would cut time off the test.

article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

When companies started outsourcing the hosting of their websites to the likes of Akamai and AWS, network teams learned quickly that many work- and non-work related applications shared the same IP address. Getting all the DNS logs is often impractical. Is Google hijacking DNS with DoH? What is NPM? It’s encrypted HTTPS.

article thumbnail

Facebook’s historic outage, explained

Kentik

Included in the withdrawn prefixes were the IP addresses of Facebook’s authoritative DNS servers, rendering them unreachable. Below, Kentik’s versatile Data Explorer illustrates how traffic from Facebook’s platform changed over the course of the day when broken down by protocol.

TCP 145
article thumbnail

Resilience and Redundancy in Networking

Kentik

While redundancy is a significant contributor to network resilience, other mechanisms, protocols, and methods can also contribute to overall network resilience. Many network protocols have been designed to handle different aspects of this process. Many network protocols have been designed to handle different aspects of this process.

Network 52
article thumbnail

AWS Route 53 BGP Hijack: What Kentik Saw

Kentik

In simple terms, Border Gateway Protocol (BGP) is the protocol that routes traffic on the Internet. They can then announce the routes (groups of IP addresses) that they own from their ASN. During a BGP route hijack, an attacker advertises IP prefixes from an ASN that is not the normal originator.