<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Piril Kavlak</title>
    <description>The latest articles on Forem by Piril Kavlak (@enginpiril).</description>
    <link>https://forem.com/enginpiril</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F955709%2Fe4743c89-1983-4dff-8887-0a64d66c232d.jpg</url>
      <title>Forem: Piril Kavlak</title>
      <link>https://forem.com/enginpiril</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/enginpiril"/>
    <language>en</language>
    <item>
      <title>API Monitoring Best Practices</title>
      <dc:creator>Piril Kavlak</dc:creator>
      <pubDate>Mon, 05 Aug 2024 09:03:03 +0000</pubDate>
      <link>https://forem.com/enginpiril/api-monitoring-best-practices-4i4f</link>
      <guid>https://forem.com/enginpiril/api-monitoring-best-practices-4i4f</guid>
      <description>&lt;p&gt;Application Programming Interfaces (APIs) are the foundation of modern inter-application communication. Their performance and availability directly impact end-user experience. Like other components of the application infrastructure, they must be monitored for availability, speed, error, and consistency.&lt;/p&gt;

&lt;p&gt;This article covers the top best practices for effective API monitoring.&lt;/p&gt;

&lt;h2&gt;
  
  
  Best Practices for Effective API Monitoring
&lt;/h2&gt;

&lt;p&gt;There are several key best practices for effective API monitoring that provide significant benefits:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Set Appropriate Key Performance Indicators
&lt;/h3&gt;

&lt;p&gt;Clearly defining Key Performance Indicators (KPIs) or Service Level Objectives provides a benchmark to measure and understand API performance. Some common API performance metrics used as KPIs include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Latency - the time to process a request&lt;/li&gt;
&lt;li&gt;Response Time - the time to respond to a user request&lt;/li&gt;
&lt;li&gt;Error Rate - the percentage of requests resulting in errors&lt;/li&gt;
&lt;li&gt;Consistency/Accuracy - the predictability of system behavior&lt;/li&gt;
&lt;li&gt;Availability - the uptime without disruptions&lt;/li&gt;
&lt;li&gt;Throughput - the number of requests processed in a time frame&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;KPIs can also be customized to fit specific business needs. Once defined, KPIs enable creating Service Level Objectives (SLOs) which are performance targets for aspects of a system. SLOs facilitate Service Level Agreements (SLAs) between systems, especially with third-party vendors. SLAs can define compensation when agreements are not met.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs44nocuhhw0kjvydto9u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs44nocuhhw0kjvydto9u.png" alt=" " width="800" height="447"&gt;&lt;/a&gt;&lt;em&gt;Visualization of how a metric (KPI) can be used in conjunction with SLOs and SLAs&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Continuous Real-Time Monitoring
&lt;/h3&gt;

&lt;p&gt;APIs should be monitored 24/7 in real-time to detect anomalies and errors swiftly. Real-time monitoring enables a shorter mean time to recovery and reduces impact. Detecting issues early allows them to be addressed before evolving into larger problems affecting user experience, system performance, or data continuity.&lt;br&gt;
Real-time monitoring is enabled by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Services emitting logs and metrics while processing requests&lt;/li&gt;
&lt;li&gt;Distributed tracing to track requests end-to-end&lt;/li&gt;
&lt;li&gt;Emitting metrics and logs for 100% of traffic rather than samples&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Endpoint level monitoring provides clearer understanding of bottlenecks or other issues. Solutions like Catchpoint gather metrics directly from user devices, tracing their internet journey for greater insight.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Set Up Alerts and Reporting
&lt;/h3&gt;

&lt;p&gt;Alerts ensure teams are notified of problems needing attention. Metric and log-based alerts can trigger when values exceed thresholds. Alert configuration should balance avoiding noise fatigue and timely notifications. Reports help identify improvement opportunities and prove optimization successes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Florb0lnszgsf2gwx3o6h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Florb0lnszgsf2gwx3o6h.png" alt=" " width="800" height="455"&gt;&lt;/a&gt;&lt;em&gt;Alert threshold chart&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Integrate Monitoring with CI/CD Pipelines
&lt;/h3&gt;

&lt;p&gt;Incorporating monitoring into continuous integration/continuous delivery (CI/CD) pipelines shifts monitoring left in the development process and bakes it in from the start. Pipelines can automatically generate and update dashboards so new metrics are covered when code reaches production.&lt;br&gt;
Key aspects of pipeline integration include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Validating data and SLOs by running pipeline tests against API endpoints using synthetic traffic to collect performance data&lt;/li&gt;
&lt;li&gt;Identifying changes introduced across iterations&lt;/li&gt;
&lt;li&gt;Enabling quick rollbacks when issues emerge&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Understand the User Perspective
&lt;/h3&gt;

&lt;p&gt;Monitoring user experience is critical for customer satisfaction, business performance, and product/service success. Synthetic monitoring emulates user transactions to measure workflow performance and detect issues proactively before users are impacted.&lt;br&gt;
User perspective monitoring approaches include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Simulating user requests from different regions and user types&lt;/li&gt;
&lt;li&gt;Synthetic monitoring using scripts and real browsers to validate availability, performance, and functionality from an end user point of view&lt;/li&gt;
&lt;li&gt;Promoting collaboration between technical and business teams to align monitoring priorities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As API endpoints serve end users, improving user experience based on monitoring data is key for positive outcomes. Frequently testing response data also builds perception of reliability and accuracy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Effective API monitoring requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Customized KPIs tailored to business needs&lt;/li&gt;
&lt;li&gt;Real-time monitoring to swiftly address issues&lt;/li&gt;
&lt;li&gt;Actionable alerts balanced to notification needs&lt;/li&gt;
&lt;li&gt;Integration with CI/CD pipelines for rapid iteration&lt;/li&gt;
&lt;li&gt;Insights into user experience to guide improvements&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By emphasizing these best practices, organizations can optimize API performance, and deliver a seamless and reliable user experience.&lt;/p&gt;

&lt;p&gt;Read more at &lt;a href="https://www.catchpoint.com/api-monitoring-tools/api-monitoring-best-practices" rel="noopener noreferrer"&gt;https://www.catchpoint.com/api-monitoring-tools/api-monitoring-best-practices&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>api</category>
      <category>monitoring</category>
    </item>
    <item>
      <title>How to Read a Traceroute</title>
      <dc:creator>Piril Kavlak</dc:creator>
      <pubDate>Mon, 03 Jun 2024 07:47:01 +0000</pubDate>
      <link>https://forem.com/enginpiril/how-to-read-a-traceroute-586h</link>
      <guid>https://forem.com/enginpiril/how-to-read-a-traceroute-586h</guid>
      <description>&lt;h2&gt;
  
  
  How to Run the Traceroute Command
&lt;/h2&gt;

&lt;p&gt;Running a traceroute is very simple. The first step is to bring up a command prompt on your computer. The specific method will depend on your operating system. For Windows 10, for example, you can simply click on the start button and type CMD to bring up the options below.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsbv18yddox1yjdrrmoal.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsbv18yddox1yjdrrmoal.png" alt=" " width="756" height="630"&gt;&lt;/a&gt;&lt;br&gt;
Figure 1: Command Prompt options in Windows 10.&lt;/p&gt;

&lt;p&gt;From here, simply click on the Command Prompt app to open it. When your command prompt has loaded, just type the command &lt;strong&gt;tracert&lt;/strong&gt; followed by the destination you want to use to run the test. For example, to run a test to catchpoint.com, you would type &lt;strong&gt;tracert catchpoint.com&lt;/strong&gt; and hit enter. (For Linux and macOS devices, you would type &lt;strong&gt;traceroute catchpoint.com&lt;/strong&gt; instead.)&lt;/p&gt;
&lt;h3&gt;
  
  
  Available Options for the Traceroute Command
&lt;/h3&gt;

&lt;p&gt;In most cases, the default traceroute command will give you the information you need. However, there are some additional options that you can use to get more details or change how the command runs. Accessing these options is done by adding one or more option flags after the traceroute command and before the destination.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to Read the Results from a Traceroute
&lt;/h2&gt;

&lt;p&gt;One of the best things about the traceroute tool is that once you learn how to read the results, you can understand the information it provides with just a quick glance. When you look at the example results of the traceroute listed above, you will see several key pieces of information.&lt;/p&gt;

&lt;p&gt;The following table breaks down the key information you will see:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqu4lvcipa6l5fxcmjh70.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqu4lvcipa6l5fxcmjh70.png" alt=" " width="714" height="207"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  Hop Number
&lt;/h3&gt;

&lt;p&gt;The first column just tells you which hop the trace is on. Whenever you access the Internet (or even data on an internal network), the data travels from one piece of hardware to another. These will typically be routers, but could also be switches, servers, or even computers. Each of these pieces of hardware that the data goes through is considered a hop.&lt;/p&gt;
&lt;h3&gt;
  
  
  Round Trip Time (RTT) Results
&lt;/h3&gt;

&lt;p&gt;The next three columns show the amount of time it took data to go from the source (typically your computer) to that hop and back. This is measured in milliseconds.&lt;/p&gt;
&lt;h2&gt;
  
  
  Common Problems Discovered with Traceroute
&lt;/h2&gt;

&lt;p&gt;You can use this command to look for various network issues and, based on the results displayed, determine what types of problems may be present.&lt;/p&gt;
&lt;h3&gt;
  
  
  Asterisks (Timeouts) at Various Points
&lt;/h3&gt;

&lt;p&gt;The most common issue you will see with a traceroute is a timeout response, which is represented by an asterisk (*). These happen quite frequently and for a variety of different reasons. In the following example, you can see multiple hops have asterisks when attempting to run a traceroute to google.com.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;C:\Users&amp;gt;tracert google.com
Tracing route to google.com [2607:f8b0:4009:819::200e]
Over a maximum of 30 hops:
1              1ms        1ms        1ms        2601:404:cf00:75c0:e2db:d1ff:fe1d:23ad
2              8ms        *             *             2001:558:4020:30::1
3              9ms        11ms     13ms     2001:558:112:3c0a::1
4              12ms     9ms        10ms     2001:558:110:b02c::1
5              *             20ms     *             2001:558:110:f1::1
6              34ms     20ms     27ms     2001:558:110:71::2
7              *             21ms     21ms     be-32131-cs03.350cermak.il.ibone.comcast.net [2001:558:3:2ae::1]
8              21ms     *             *             be-2311-pe11.350cermak.il.ibone.comcast.net [2001:558:3:72::2]
9              20ms     20ms     21ms     2001:559::11b2
10           19ms     20ms     20ms     2607:f8b0:831d::1
11           22ms     23ms     23ms     ord38s30-in-x0e.1e100.net [2607:f8b0:4009:819::200e]
Trace Complete
C:\Users&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Figure 2: Example output of traceroute to Google.&lt;/p&gt;

&lt;p&gt;When you see an asterisk, it will mean one of the following things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Single Asterisk on a Hop: This means that the request timed out on just one of the three attempts. This can be a sign that there is an intermittent problem at that hop.&lt;/li&gt;
&lt;li&gt;Three Asterisks, Then Failure: If you see all three attempts at a hop have asterisks and then the traceroute errors out, it means that the hop is completely down.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Elevated Latency After One Hop
&lt;/h3&gt;

&lt;p&gt;If everything looks fine for several hops, but then the response times jump up significantly at one point, and each hop after that remains high, it likely means a problem either at that hop or on the connection between it and the previous one.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The traceroute command is an essential tool for understanding the path your data takes across a network and for identifying connectivity issues along that path. By running traceroute tests to various destinations and analyzing the output, you can gain visibility into latency, loss, and other problems that may exist.&lt;/p&gt;

&lt;p&gt;Key things to look for when interpreting traceroute results include asterisks indicating timed-out requests, sudden spikes in round-trip latency, and missing or unresponsive hops. These can help narrow down where an issue lies.&lt;/p&gt;

&lt;p&gt;While traceroute has some limitations in very large or complex networks, it remains one of the simplest first steps in network troubleshooting. Understanding how to properly run the command, configure options like setting the maximum hops, and read the output is critical for anyone working with networks.&lt;/p&gt;

&lt;p&gt;With a bit of practice reading traceroute results, the information it provides can save you substantial time getting to the root cause of connectivity and performance issues. It is a tool that should be in every network engineer's toolbox.&lt;/p&gt;

&lt;p&gt;Read more at &lt;a href="https://www.catchpoint.com/network-admin-guide/how-to-read-a-traceroute" rel="noopener noreferrer"&gt;https://www.catchpoint.com/network-admin-guide/how-to-read-a-traceroute&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>IP Multicast</title>
      <dc:creator>Piril Kavlak</dc:creator>
      <pubDate>Fri, 31 May 2024 14:44:40 +0000</pubDate>
      <link>https://forem.com/enginpiril/ip-multicast-244m</link>
      <guid>https://forem.com/enginpiril/ip-multicast-244m</guid>
      <description>&lt;p&gt;There are three different methods to deliver IP packets: unicast (one to one), broadcast (one to all), and multicast (one to many). Multicast sends packets only to destinations that have explicitly joined the multicast group. The routing devices replicate packets and forward copies to registered receivers while preventing routing loops. This article will cover multicast concepts like distribution trees, multicast addressing, forwarding, IGMP, and PIM.&lt;/p&gt;

&lt;h2&gt;
  
  
  IP Multicast Basics
&lt;/h2&gt;

&lt;p&gt;IP Multicast has its own set of terms and concepts centered around the idea of a multicast group, which is a set of receivers interested in particular data. Hosts join groups using IGMP. The router's job is to build a distribution tree connecting receivers to sources. The interface towards the source is the upstream interface. The interfaces towards the receivers are downstream interfaces.&lt;/p&gt;

&lt;p&gt;Multicast uses the Class D IP address range 224.0.0.0 to 239.255.255.255. The source IP is a unicast address, while the destination IP is a multicast address. At layer 2, multicast MAC addresses have the 25th bit set to 1. Multiple IP multicast addresses can map to the same MAC address.&lt;br&gt;
The Class D range has reserved blocks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;224.0.0.0/24: Link Local&lt;/li&gt;
&lt;li&gt;224.0.1.0 - 238.255.255.255: Globally Scoped&lt;/li&gt;
&lt;li&gt;232.0.0.0/8: Source-Specific Multicast&lt;/li&gt;
&lt;li&gt;233.0.0.0/8: GLOP Addresses&lt;/li&gt;
&lt;li&gt;239.0.0.0/8: Limited Scope&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Link local addresses are used by routing protocols and are never forwarded. IPv6 uses the ff00::/8 range with specific allocations like IPv4.&lt;/p&gt;

&lt;h2&gt;
  
  
  Multicast Distribution Trees
&lt;/h2&gt;

&lt;p&gt;Distribution trees control the path multicast traffic takes through the network. The simplest is the Shortest Path Tree (SPT), which uses the shortest path between the source and receivers. The SPT is rooted at the source.&lt;br&gt;
The SPT uses (S,G) state, where S is the source IP and G is the group address. Each source for a group has its own SPT. Below is an example SPT:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flw53yzm6z58vxsus9qvf.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flw53yzm6z58vxsus9qvf.jpeg" alt=" " width="585" height="622"&gt;&lt;/a&gt;&lt;br&gt;
The second type of distribution tree is the shared tree, which uses a common root called the Rendezvous Point (RP). Source traffic goes to the RP over a source tree, then down the shared tree to receivers. The shared tree uses (*,G) state since all sources use the shared infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjykjddhwwu1nlj2bwxsz.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjykjddhwwu1nlj2bwxsz.jpeg" alt=" " width="774" height="622"&gt;&lt;/a&gt;&lt;br&gt;
The advantage of SPTs is optimal paths, while shared trees require less state. However, shared tree latency can be higher.&lt;/p&gt;

&lt;h2&gt;
  
  
  Multicast Forwarding
&lt;/h2&gt;

&lt;p&gt;In multicast forwarding, the source sends traffic to a group of hosts. Routers track incoming and outgoing interfaces. They use Reverse Path Forwarding (RPF) to forward traffic away from the source to prevent loops.&lt;br&gt;
RPF relies on the unicast routing table to determine upstream and downstream neighbors. A router forwards a multicast packet only if it arrives on the upstream interface. This check ensures delivery along a loop-free tree. Traffic passing the RPF check is forwarded, else it is dropped.&lt;br&gt;
The RPF check logic:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check if the source is reachable via the input interface per the routing table&lt;/li&gt;
&lt;li&gt;If yes, traffic passes the RPF check and is forwarded&lt;/li&gt;
&lt;li&gt;If no, traffic fails the RPF check and is dropped&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  IGMP
&lt;/h2&gt;

&lt;p&gt;The Internet Group Management Protocol (IGMP) handles hosts joining multicast groups on a LAN. Routers use IGMP to learn group membership:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Querier routers send queries to see if hosts want traffic&lt;/li&gt;
&lt;li&gt;Hosts send reports to confirm interest
IGMPv2 added a Leave Group message to reduce unwanted traffic. IGMPv3 supports source-specific groups and source filtering.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;IP multicast provides an efficient one-to-many transport model. Core concepts include multicast addressing, distribution trees, multicast forwarding with RPF checks, and IGMP for group management.&lt;br&gt;
Multicast routing protocols like PIM build distribution trees between senders and receivers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PIM Dense Mode floods traffic then prunes branches&lt;/li&gt;
&lt;li&gt;PIM Sparse Mode starts with no flow and then builds shared trees&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Multicast technologies enable scalable services like high-definition video streaming and software updates. Understanding the core concepts allows network engineers to effectively design, implement, and troubleshoot multicast networks.&lt;/p&gt;

&lt;p&gt;This concludes our overview of IP multicast. The article covered addressing, forwarding, IGMP, distribution trees, and routing protocols. With this foundation, you can now configure and manage multicast services on real-world networks.&lt;/p&gt;

&lt;p&gt;Read more at &lt;a href="https://www.catchpoint.com/network-admin-guide/ip-multicast" rel="noopener noreferrer"&gt;https://www.catchpoint.com/network-admin-guide/ip-multicast&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>internetprotocol</category>
      <category>ipmulticast</category>
      <category>cloud</category>
      <category>network</category>
    </item>
  </channel>
</rss>
