Authors

Geoff Huston

63

Articles

194

Likes on articles

About the author

Geoff Huston AM is the Chief Scientist at APNIC, where he undertakes research on topics associated with Internet infrastructure, IP technologies, and address distribution policies. From 1995 to 2005, Geoff was the Chief Internet Scientist at Telstra, where he provided a leading role in the construction and further development of Telstra's Internet service offerings, both in Australia and as part of Telstra's global operations. Prior to Telstra, Mr Huston worked at the Australian National University, where he led the initial construction of the Internet in Australia in the late 1980s as the Technical Manager of the Australian Academic and Research Network. He has authored a number of books dealing with IP technology, as well as numerous papers and columns. He was a member of the Internet Architecture Board from 1999 until 2005 and served as its Executive Director from 2001 to 2005. He is an active member of the Internet Engineering Task Force, where he currently chairs two Working Groups. He served on the Board of Trustees of the Internet Society from 1992 until 2001 and served a term as Chair of the Board in 1999. He has served on the Board of the Public Internet Registry and also on the Executive Council of APNIC. He chaired the Internet Engineering and Planning Group from 1992 until 2005.

Fragmenting IPv6

Fragmenting IPv6

26 min read

The design of IPv6 represented a relatively conservative evolutionary step of the Internet protocol. Mostly, it's just IPv4 with significantly larger address fields. Mostly, but not completely, as there were some changes. IPv6 changed the boot process to use auto-configuration and multicast to perf…

Article tags:

0 You have liked this article 0 times.
3
On the Internet, Everyone is Connected to Everyone Else. Right?

On the Internet, Everyone is Connected to Everyone Else. Right?

10 min read

We tend to make a number of assumptions about the Internet, and sometimes these assumptions don’t always stand up to critical analysis. We were perhaps ‘trained’ by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any tel…

Article tags:

0 You have liked this article 0 times.
2
Evaluating IPv4 and IPv6 Packet Fragmentation

Evaluating IPv4 and IPv6 Packet Fragmentation

24 min read

One of the more difficult design exercises in packet-switched network architectures is that of the design of packet fragmentation. In this article, I’d like to examine IP packet fragmentation in detail and look at the design choices made by IP version 4, and then compare that with the design choice…

Article tags:

0 You have liked this article 0 times.
2
Examining IPv6 Performance

Examining IPv6 Performance

17 min read

Every so often I hear the claim that some service or other does not support IPv6 not because of some technical issue, or some cost or business issue, but simply because the service operator is of the view that IPv6 offers an inferior level service as compared to IPv4, and by offering the service ov…

Article tags:

5 You have liked this article 0 times.
0
The Resolvers We Use

The Resolvers We Use

23 min read

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted e…

Article tags:

0 You have liked this article 0 times.
0
Who's Watching

Who's Watching

28 min read

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic e…

Article tags:

0 You have liked this article 0 times.
1
ECDSA and DNSSEC

ECDSA and DNSSEC

23 min read

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-valid…

Article tags:

0 You have liked this article 0 times.
0
Privacy and Security - Five Objectives

Privacy and Security - Five Objectives

7 min read

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. W…

Article tags:

0 You have liked this article 0 times.
2

Showing 63 article(s)