Understanding CSPF and the TED
In our last post, we talked about one of the major differences between LDP and RSVP – the ability to define EROs or explicit route objects. We demonstrated how we could configure LSP paths through our network by providing a set of loose or strict next hops for the LSP to take. This was a rather huge paradigm shift because it meant we could define paths that didn’t align with what the IGP thought to be the best path through the network. What we didn’t talk about was how the ingress router determined if these paths were feasible. In this post, we’ll deep dive on the traffic engineering database (TED) and how it works in conjunction with the constrained shortest path first (CSPF) algorithm to build RSVP LSPs through a network.
It’s important to remember that the ingress label switching router (LSR) is really the thing doing most of the work in regards to setting up RSVP LSPs. Well – to be fair – the egress LSR is the one that actally sends the RESV message back toward the ingress LSR with the label information which is what’s required for the LSP to work. However – the ingress LSR Continue reading
This was one of several announcements Microsoft made today to boost its cloud and edge capabilities for its U.S. government customers.
The Swedish vendor will focus its O-RAN Alliance efforts on the open connections between the RAN and network orchestration and automation.

Nicolas Noviello joined Symantec following its $4.65 billion acquisition of his old firm Blue Coat in 2016.
Nutanix CEO calls VMware a bully; AT&T touts successes while it plots layoffs; demand for Kubernetes surges.
The report, which was sourced by ZTE, does admit that its findings aren’t likely to change the minds of many operators.
The initial botnet actor sold the proxy botnet as a service to other attackers who then used it for credential brute forcing, video advertisement fraud, and general traffic obfuscation.