Network Operations

Latest articles

A Deep Dive Into the Baltic Sea Cable Cuts

A Deep Dive Into the Baltic Sea Cable Cuts

Emile Aben

25 min read

With last month’s cuts in two major Baltic Sea Internet cables now successfully repaired, and another cut having occurred in the meantime, we analyse these events and delve deeper into the question of how exactly the Internet has remained resilient.

Article tags:

22 You have liked this article 0 times.
0
Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

Anastasiya Pak

2 min read

It is no longer unusual for Operational Technology systems to be connected to IT systems and the Internet, but this leaves them increasingly open to cyber threats. Daniel Kapellmann, Security Engineering Manager at Google Threat Intelligence, talks about how convergence of OT with IT systems amplif…

Article tags:

11 You have liked this article 0 times.
0
The NRO RPKI Program - 2024 in Review

The NRO RPKI Program - 2024 in Review

Sofía Silva Berenguer

2 min read

The NRO RPKI program is working to improve alignment in the RPKI space. Here's a quick update on what they've achieved since the program launched back in January this year.

Article tags:

2 You have liked this article 0 times.
0
Schrödinger’s IPv6 Cat

Schrödinger’s IPv6 Cat

Hisham Ibrahim

13 min read

IPv6, a protocol developed in the late 1990s to address the anticipated Internet address exhaustion crisis, exists in a paradoxical state. For some, while its adoption might have taken longer than expected, it represents a success story - steadily expanding in deployment and enabling more users and…

Article tags:

35 You have liked this article 0 times.
4

All articles

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

Cordian Daniluk

7 min read

Hashed authenticated denial of existence appeared back in 2008 to prevent DNS zone walking. Since then, best practices have changed and were updated in RFC 9276. This article examines how the current landscape of authoritative name servers and resolvers complies with these recommendations.

Article tags:

15 You have liked this article 0 times.
2
Navigating Network Measurements - Research, Risks and Reliability

Navigating Network Measurements - Research, Risks and Reliability

Tobias Fiebig

10 min read

Measuring the Internet is a delicate process and without the proper setup, things can get pretty out of hand pretty quickly. The measurement.network is a RIPE NCC Community Projects Fund supported project that helps researchers run network measurements without breaking things.

Article tags:

21 You have liked this article 0 times.
0
Reaching AuthDNS - A RIPE Atlas Analysis by Region

Reaching AuthDNS - A RIPE Atlas Analysis by Region

10 min read

The RIPE NCC operates two independent anycast DNS services. One is K-root, a well-known service essential to DNS resolution. The other is the less well-known service, AuthDNS. We examine how queries reach AuthDNS from several regions and call for new hosts to help shorten the journey.

Article tags:

22 You have liked this article 0 times.
0
The Internet Landscape in the Middle East

The Internet Landscape in the Middle East

Qasim Lone

18 min read

The Middle East’s Internet landscape is diverse and complex, with big variations between the GCC countries and areas such as the Levant and North Africa. Ahead of MENOG 24, we look at the development of Internet technologies in the Arabic-speaking countries of the region that have the potential to …

Article tags:

26 You have liked this article 0 times.
3
Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Emile Aben

10 min read

This week's Internet cable cuts in the Baltic Sea have been widely reported, even as attempts to understand their cause and impact continue. We turn to RIPE Atlas to provide a preliminary analysis of these events and ask to what extent the Internet in the region has been resilient to them.

Article tags:

198 You have liked this article 0 times.
2
Distinguishing the Internet’s Core From What Is Built on Top

Distinguishing the Internet’s Core From What Is Built on Top

Hisham Ibrahim

5 min read

The Internet is not social media, nor the web, nor your favourite app. In fact, it’s not even the digital economy or the communication tools we’ve all come to rely on. The Internet is something deeper, a foundational network of networks that has quietly powered the digital age for over 40 years.

Article tags:

49 You have liked this article 0 times.
1

Showing 877 article(s)

Previous
1 2 3 ... 88
Next