Banner image

Network Operations

All articles

babel-fish

On Internet Centrality and Fragmentation

Author image
Geoff Huston

21 min read

Centrality and fragmentation appear to be two completely opposite problems - and yet today's Internet seems to be in danger of both at the same time. In this guest post, Geoff Huston shares his views on this apparently contradictory state of affairs.

Article tags:

22 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Louis Pétiniaud: Mapping the Geopolitical Internet

Author image
Alun Davies

2 min read

Mapping the dialectical relationship between the Internet and rivalries of power and influence across territories calls on expertise from a variety of disciplines. On the RIPE Labs Podcast, Louis Pétiniaud discusses how he and colleagues at GEODE are investigating the geopolitical Internet.

Article tags:

68 Likes are disabled for this article.
0
beacon

RIS Beaconing - Shining a Light on BGP Dynamics

Author image
Emile Aben

21 min read

RIS is a widely used public route collector project that provides a better view of Internet routing. One thing that makes RIS unique is that it inserts observable patterns of activity into BGP through a process called beaconing. We take a look at RIS beacons and ask how to make space for more.

Article tags:

25 Likes are disabled for this article.
0
Netnod-Hackathon-Banner-1-1200x580

Connected to Port 53 - A Report from the DNS Hackathon 2023

Author image
Vesna Manojlovic

4 min read

DNS Hackathon took place during the weekend before RIPE 86 in Rotterdam. Co-hosted by DNS-OARC, Netnod and the RIPE NCC, it included 46 "hackers" who worked on 6 projects, had a lot of fun and many stroopwafels. Read about the results, and join us next time!

Article tags:

11 Likes are disabled for this article.
0
bgp-napkin

BGP Path Attribute Filtering - A Powerful Tool to Mitigate Alien Attributes

Author image
Berislav Todorovic

11 min read

On 2 June 2023, there was a disruption in the global Internet routing, caused by the inability of BGP border routers to process an "alien" BGP Attribute. A nice RIPE Labs article about this event was published back then. Well, the alien turned out to be a "legal alien" - a known attribute, introduc…

Article tags:

76 Likes are disabled for this article.
1
iot-sec

Embedded IoT Security: Helping Vendors in the Design Process

Author image
Kathleen Moriarty

5 min read

With the number of IoT devices on track to exceed 30 billion within the next couple of years, CIS has created a resource that will help IoT vendors ease the process of building in security by design and by default.

Article tags:

18 Likes are disabled for this article.
0
swedish_icelandic_blue

Insights from the World’s Largest Cyber Defence Exercise

Author image
Robert Allen

6 min read

On 22 April 2023, the Sweden-Iceland team led by Patrik Fältström, together with Brynja Huld Óskarsdóttir from Iceland, emerged victorious ahead of 23 other national teams in the prestigious cyber defence exercise Locked Shields (18-21 April 2023).

Article tags:

16 Likes are disabled for this article.
0
egov

E-gov DNS: Are They Redundant Enough?

Author image
Giovane Moura

7 min read

Electronic government (e-gov) lets citizens interact with their government via the Internet. The DNS, which maps e-gov domain names to Internet addresses, underpins e-gov. Working with the University of Twente and NCSC-NL, SIDN Labs compare the resiliency and redundancy of e-gov domains for the Net…

Article tags:

15 Likes are disabled for this article.
0
CE_country_report_cover

RIPE NCC Internet Country Report: Central Europe

Author image
Suzanne Taylor

3 min read

We take a comprehensive look at four countries in Central Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

51 Likes are disabled for this article.
0
quantum_fud

Separating FUD from Practical for Post-Quantum Cryptography

Author image
Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 Likes are disabled for this article.
0

Showing 904 article(s)