Featured article

Noisy Routers: Investigating the Make-Up of Route Collector Data

Featured article lead image
Author image
Ebrima Jaw

Based in University of Twente

11 min read

Analysis of 80B+ BGP updates shows repeated "noise" is highly concentrated in a small set of peers, sessions, and prefixes, inflating datasets. Researchers from Twente, CAIDA, SIDN Labs, and IIJ examine impacts on measurement and operations.

Read article
8 Please read the article before liking.
0

Latest articles

countrymesh

Introducing Region Meshes: Visualising Intra-Region Routing Paths

Author image
Stephen Suess

7 min read

Region Meshes is a new RIPE Atlas tool that visualises intra-region routing paths, showing where traffic stays local, where it leaves, and how IXPs are being used.

Article tags:

0 Please read the article before liking.
0
trust

The Internet’s Trust Architecture

Author image
Hisham Ibrahim

7 min read

The Internet’s core, rooted in open standards and unique identifiers, has always depended on trust. That trust is part of what makes coordination possible across distributed actors, shared systems, and diverse institutions. Looking at the Internet in these terms may help explain why similar technic…

Article tags:

16 Please read the article before liking.
0
Server racks in a data center

Operating a Data Center with a Small Team: Engineering Lessons from Central Asia

Author image
Furug Rasuli

10 min read

Managing ~600 infrastructure devices with a three-person team demands careful design choices. Based on experience in Central Asia, this article examines how standardisation, observability, and operational discipline support reliability at scale.

Article tags:

20 Please read the article before liking.
0
ott-apps

Beyond the Network View: DNS-Driven Application Visibility

Author image
Danny Lachos

6 min read

Network operators often lack visibility into which applications drive their traffic. We present an open-source DNS-based correlation method that enriches NetFlow and BGP data with application and CDN information. This enables a shift from a network-centric to an application-oriented view of traffic.

Article tags:

45 Please read the article before liking.
0
keys

Extending API Keys Beyond the RIPE Database

Author image
Fallon Albrecht

3 min read

We are extending the API key model introduced for the RIPE Database to create a more consistent, secure, and flexible approach across RIPE NCC services.

Article tags:

41 Please read the article before liking.
0
internal bgp

When iBGP Full Mesh Is Actually Unnecessary

Author image
José Mª Rivadeneyra

9 min read

A common misconception is that iBGP requires a full mesh or alternatives such as route reflectors. In reality, full mesh is not a protocol requirement, but a design choice that may be unnecessary and even undesirable in stub ASes and small ISPs.

Article tags:

27 Please read the article before liking.
4
break_loop_cover

Make This One Change to Prevent Routing Loops in Your Network

Author image
Maynard Koch

5 min read

Routing loops can trap packets between routers, preventing them from reaching their destination. In some cases, routers even duplicate looping packets, amplifying traffic and threatening Internet stability. We look at how this happens and how operators can prevent it.

Article tags:

127 Please read the article before liking.
0
View all articles
ripe92-banner

The RIPE Labs Article Competition - RIPE 92

Competition closed

The RIPE Labs article competition is open! Have something interesting to say about the past, present, or future state of the Internet? Tell your story on RIPE Labs and win a chance to join us at RIPE 92 this May in Edinburgh.

Latest Podcasts

From the Archives

  • irr cover

    The IRR Landscape: Where Do ASes Keep Their Routes?

    Author image
    Stavros Konstantaras

    18 min read

    We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

    Article tags:

    126 Please read the article before liking.
    0
  • insidethebox

    Keeping Network Sites Online During Blackouts

    Author image
    Yuriy Vykhnevych

    8 min read

    When blackouts become a frequent reality, keeping network sites online requires more than ad-hoc fixes. This article outlines a power management system, tested in practice, with design notes and an operator playbook.

    Article tags:

    426 Please read the article before liking.
    0