Remove DNS Remove Media Remove Protocol
article thumbnail

How to find applications with NetFlow

Kentik

You can also learn about the protocols in use, the ports being used, the top interfaces, etc. Perhaps you want to know if the traffic you are investigating is related to video streaming, voice or social media. IP protocol. Source port for UDP or TCP, 0 for other protocols. If it’s possible, wouldn’t you like to know?

article thumbnail

Facebook’s historic outage, explained

Kentik

Yesterday the world’s largest social media platform suffered a global outage of all of its services for nearly six hours. Included in the withdrawn prefixes were the IP addresses of Facebook’s authoritative DNS servers, rendering them unreachable. which is routed as 129.134.30.0/24 24 and 129.134.30.0/23.

TCP 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Resilience and Redundancy in Networking

Kentik

While redundancy is a significant contributor to network resilience, other mechanisms, protocols, and methods can also contribute to overall network resilience. Many network protocols have been designed to handle different aspects of this process. Many network protocols have been designed to handle different aspects of this process.

Network 52
article thumbnail

23 Good-To-Know Networking Acronyms and Abbreviations

CATO Networks

SD-WAN Software-Defined Wide Area Network (SD-WAN) is a virtual WAN architecture offering optimized traffic routing over multiple different media (broadband, MPLS, 5G/LTE, etc.). BGP The Border Gateway Protocol (BGP) is a protocol for exchanging routing information between different autonomous systems (ASes) on the Internet.

Network 52
article thumbnail

Why Application Awareness is Essential for Firewall Security 

CATO Networks

Different network protocols have different functions and present varying security risks. This is why firewalls and other network security solutions are commonly configured with rules that apply to specific ports and protocols, such as restricting external access to certain services or looking for protocol-specific threats.

article thumbnail

What is a TCP Port: Different Between TCP and UDP Ports

NW Kings

TCP ports operate at the transport layer of the Internet Protocol Suite. What is Transmission Control Protocol (TCP)? TCP is a connection-oriented protocol that ensures reliable transmission of data between devices. What is User Datagram Protocol (UDP)? How does the TCP port work? What are the top TCP ports?

article thumbnail

News in Networking: Advanced Analytics for an Oil Company & HCI for an NFL Team

Kentik

And a Google Cast protocol bug caused temporary Wi-Fi outages. Google Cast protocol bug causing temporary Wi-Fi outages on many routers (The Register) “Wi-Fi router vendors have started issuing patches to defend their products against Google Chromecast devices,” reported The Register earlier this week.

Network 40