Network Operations

Latest articles

From Megabits to Terabits: Ethernet Celebrates Its Birthday

Ondřej Caletka

Exactly fifty years ago, the first concept of the computer networks we know today as Ethernet was designed. It has evolved from a thick coaxial cable connecting computers in a single location to the most common way of connecting networks of all sizes via twisted pair and optical fibre.

Article tags:

15 You have liked this article 0 times.

In Defence of BGP

Alun Davies

BGP is the Internet's de facto routing protocol - but relatively few have a deep understanding of its vulnerabilities. Delving into threats posed by misconfigurations and hijacks, Lefteris Manassakis discusses BGP and the importance of mitigation, monitoring, and detection with ARTEMIS and Code BGP.

Article tags:

23 You have liked this article 0 times.

How to Ensure Robust DNS Services for the Public Sector

Robert Allen

What do public sector organisations need to know to ensure they are protected and that their DNS services are as secure and robust as possible? The team from Netnod poses the questions all such organisations should be asking their DNS providers.

Article tags:

17 You have liked this article 0 times.

All We Saw at SEE 11

Anastasiya Pak

On 4-5 April, the South East Europe (SEE) Internet community gathered in the coastal town of Split, Croatia - the same country where we held the first SEE meeting over a decade ago. Over 100 participants from 19 countries joined to discuss developments in IPv6, BGP security, DNS, peering, IXPs, and…

Article tags:

26 You have liked this article 0 times.

All articles

The Joy of TXT

Peter Lowe

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

34 You have liked this article 0 times.

More Next Steps in IPv6 Policy Work

Leo Vegoda

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 You have liked this article 0 times.

The Resilience of the Internet in Ukraine - One Year On

Emile Aben

In our earlier analysis of Ukraine back in March 2022, we looked at factors that contributed to the resilience of the country's Internet since the outbreak of the war. A little over a year on, we draw on data from RIPE Atlas and RIPE RIS to investigate what has changed.

Article tags:

28 You have liked this article 0 times.

SAV: Why Is Source Address Validation Still a Problem?

Qasim Lone

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

31 You have liked this article 0 times.

The Human Factor in the Geopolitics of the Internet


The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

37 You have liked this article 0 times.

Intercept and Inject: DNS Response Manipulation in the Wild

Yevheniya Nosyk

In November 2021, Internet users from Mexico lost access to and By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

33 You have liked this article 0 times.

Showing 772 article(s)

1 2 3 ... 78