Banner image

Network Operations

Latest articles

ADoX Deployment in the Wild cover

ADoX Deployment in the Wild

Author image
Yevheniya Nosyk

11 min read

Encryption between DNS resolvers and users is growing - but what about the next hop? We measure the real-world deployment of encrypted resolver-to-authoritative DNS (ADoX), finding limited, highly concentrated adoption and little support among resolvers.

Article tags:

24 Please read the article before liking.
0
scrubbing cover

Understanding DDoS Scrubbing in BGP: Five Leading Scrubbers

Author image
Shyam Krishna Khadka

9 min read

DDoS mitigation often relies on BGP for "scrubbing", but how this appears in routing data is not well understood. We analyse five major providers to distinguish between always-on and on-demand protection, showing how mitigation manifests in practice and what it means for routing visibility and RPKI.

Article tags:

19 Please read the article before liking.
0
geolocation

Towards Understanding City-Level Routing Using BGP Location Communities

Author image
Thomas Krenc

5 min read

BGP location communities offer a rare glimpse into where networks actually interconnect, but most remain undocumented and opaque. This work shows that, by exploiting a measurable spatial signal in routing data, it is possible to infer their city-level meaning at scale using only passive observation…

Article tags:

9 Please read the article before liking.
0
see14

SEE 14: Advancing Internet Technologies in South East Europe

Author image
Anastasiya Pak

14 min read

Ahead of SEE 14, we examine how Internet technologies are evolving across South East Europe. Drawing on registry data and routing measurements, we highlight trends in routing security, interconnection, and IPv6 deployment.

Article tags:

62 Please read the article before liking.
0

All articles

noise

Noisy Routers: Investigating the Make-Up of Route Collector Data

Author image
Ebrima Jaw

11 min read

Analysis of 80B+ BGP updates shows repeated "noise" is highly concentrated in a small set of peers, sessions, and prefixes, inflating datasets. Researchers from Twente, CAIDA, SIDN Labs, and IIJ examine impacts on measurement and operations.

Article tags:

34 Please read the article before liking.
0
trust

The Internet’s Trust Architecture

Author image
Hisham Ibrahim

7 min read

The Internet’s core, rooted in open standards and unique identifiers, has always depended on trust. That trust is part of what makes coordination possible across distributed actors, shared systems, and diverse institutions. Looking at the Internet in these terms may help explain why similar technic…

Article tags:

27 Please read the article before liking.
0
Server racks in a data center

Operating a Data Center with a Small Team: Engineering Lessons from Central Asia

Author image
Furug Rasuli

10 min read

Managing ~600 infrastructure devices with a three-person team demands careful design choices. Based on experience in Central Asia, this article examines how standardisation, observability, and operational discipline support reliability at scale.

Article tags:

20 Please read the article before liking.
0
ott-apps

Beyond the Network View: DNS-Driven Application Visibility

Author image
Danny Lachos

6 min read

Network operators often lack visibility into which applications drive their traffic. We present an open-source DNS-based correlation method that enriches NetFlow and BGP data with application and CDN information. This enables a shift from a network-centric to an application-oriented view of traffic.

Article tags:

45 Please read the article before liking.
0
internal bgp

When iBGP Full Mesh Is Actually Unnecessary

Author image
José Mª Rivadeneyra

9 min read

A common misconception is that iBGP requires a full mesh or alternatives such as route reflectors. In reality, full mesh is not a protocol requirement, but a design choice that may be unnecessary and even undesirable in stub ASes and small ISPs.

Article tags:

47 Please read the article before liking.
4
break_loop_cover

Make This One Change to Prevent Routing Loops in Your Network

Author image
Maynard Koch

5 min read

Routing loops can trap packets between routers, preventing them from reaching their destination. In some cases, routers even duplicate looping packets, amplifying traffic and threatening Internet stability. We look at how this happens and how operators can prevent it.

Article tags:

138 Please read the article before liking.
0

Showing 947 article(s)

Previous
1 2 3 ... 95
Next