Banner image

Community and Events

All articles

Figure2-MPLS.png

Gunfight at OK Corral: MPLS vs. Probing

Author image
Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 Likes are disabled for this article.
0
Implementation timeline 2.0.png

How We Will Be Validating abuse-c

Author image
Angela Dall'Ara

6 min read

At the RIPE NCC we’re busy working out a process so we can start validating approximately 70,000 abuse contact email addresses in the RIPE Database. Read on to see how we will approach this.

Article tags:

0 Likes are disabled for this article.
0
Internet Atlas - Tools for Digital Literacy

Internet Atlas - Tools for Digital Literacy

Author image
Andrej Petrovski

5 min read

Based on existing studies and research about the digital environment in Serbia, its legal and technical features, usage and habits among Internet users, the SHARE Foundation aims to produce tools and materials designed to inform, educate and encourage project target groups understand Internet infra…

Article tags:

2 Likes are disabled for this article.
0
RIPE Chair Selection Process

RIPE Chair Selection Process

Author image
Mirjam Kühne

3 min read

Based on community input, including a plenary session at RIPE 76 and a discussion on a dedicated mailing list, here is the final version of the RIPE Chair selection process.

Article tags:

0 Likes are disabled for this article.
0
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Author image
Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 Likes are disabled for this article.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Author image
Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 Likes are disabled for this article.
0
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Author image
Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 Likes are disabled for this article.
0
Network Operators Groups - What, Why and How?

Network Operators Groups - What, Why and How?

Author image
Jan Zorz

1 min read

There is a slide set I use when I want to explain what needs to be considered when setting up a local NOG. It uses the Slovenian SINOG as a use case and should prove useful if you are setting up a NOG.

Article tags:

1 Likes are disabled for this article.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Author image
Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 Likes are disabled for this article.
11
Join the Quantum Internet Hackathon 2018

Join the Quantum Internet Hackathon 2018

Author image
Vesna Manojlovic

11 min read

The eighth RIPE NCC hackathon takes on the Quantum Internet! The hackathon will be held during the weekend before RIPE 77 in Amsterdam, and is co-organised by QuTech and TU Delft, along with the RIPE NCC. We're bringing together network operators, quantum networking researchers, students, hackers, …

Article tags:

8 Likes are disabled for this article.
0

Showing 483 article(s)