Banner image

Network Operations

Latest articles

see_ixp_cover

Unlocking Digital Growth: The Role of IXPs in South East Europe

Author image
Jelena Cosic

4 min read

How do we know when an IXP is working well? What goals should it achieve, and can success be measured in the same way everywhere? A new RIPE NCC report takes a closer look at these questions in the context of the SEE region.

Article tags:

666 Please read the article before liking.
0
digital leaks

How IGP Leaks Put IXP Route Servers in the DDoS Shooting Range

Author image
Matthias Wichtlhuber

9 min read

Route server exposure at IXPs leaves peering LANs vulnerable to routing leaks and real-world DDoS attacks. In this article, we talk about how and why it matters.

Article tags:

24 Please read the article before liking.
0
irr cover

The IRR Landscape: Where Do ASes Keep Their Routes?

Author image
Stavros Konstantaras

18 min read

We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

Article tags:

68 Please read the article before liking.
0
CAPIF 4 Cover

CAPIF 4: Grounded in IPv6, Looking to Orbit

Author image
Anastasiya Pak

5 min read

With record-breaking participation in Almaty, CAPIF 4 rallied network operators, IXPs, policymakers, and researchers to map Central Asia’s next steps. The message was clear: accelerate IPv6, deepen interconnection and measurement for resilience, and diversify paths to keep traffic closer to home.

Article tags:

45 Please read the article before liking.
0

All articles

autocast cover

Autocast: Automatic Anycast Site Optimisation

Author image
Thijs van den Hout

16 min read

Autocast turns one round of unicast latency measurements into millisecond-accurate predictions, automatically selecting the optimal anycast locations for fast .nl response times worldwide. Pairing simulated annealing with real resolver telemetry, it delivers lean, cost-aware PoP sets - often around…

Article tags:

18 Please read the article before liking.
0
Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

39 Please read the article before liking.
3
edge_cases_dnssec_pqc

Edge Cases in DNSSEC Validation with Multiple Algorithms

Author image
Arlin Kokkelmans

17 min read

As part of our research into post-quantum cryptography (PQC) for DNSSEC, we test PQC as a drop-in replacement for classical algorithms. We explore a transition where both run simultaneously, analysing how resolvers validate records, edge cases, and the feasibility and impact of such a period.

Article tags:

14 Please read the article before liking.
0
muse_cyberattack_cover

Cyber Risk Is Business Risk: Lessons from the MUSE Cyberattack

Author image
Kathleen Moriarty

5 min read

Recent disruption linked to the MUSE cyberattack shows how dependent airports are on shared IT services. This article looks at governance and network design choices that limit blast radius and keep operations running.

Article tags:

28 Please read the article before liking.
0
bgp_mrt_clickhouse_cover

Working with BGP Data

14 min read

Have you heard about MRT dumps, but never tried to use them because the bar seems too high? Or are you tired of doing “parse -> grep -> process” every time you touch BGP MRT dumps? This hands-on guide shows how to load RIS/RouteViews data into ClickHouse - covering tools, schema, and example querie…

Article tags:

21 Please read the article before liking.
0
CA 2025 cover

CAPIF 4: Advancing Internet Technologies in Central Asia

Author image
Qasim Lone

13 min read

Ahead of CAPIF 4, we once again pause to examine the latest in Central Asia’s digital transformation. Against a backdrop of deepening regional cooperation, we chart improvements in routing security and IPv6 adoption, while also probing interconnection patterns as seen in K-root data.

Article tags:

59 Please read the article before liking.
0

Showing 922 article(s)

Previous
1 2 3 ... 93
Next