Banner image

Network Operations

All articles

krill-logo

Running Krill Under RIPE NCC

Author image
Alex Band

12 min read

Krill is a free, open source RPKI Certificate Authority from NLnet Labs that lets you run delegated RPKI under one or multiple RIRs. In this article, we provide a comprehensive, step-by-step guide on how you can run Krill under the RIPE NCC.

Article tags:

32 Likes are disabled for this article.
0
RoVISTA_survey

Help Validate ROV Adoption Measurements from RoVista

Author image
Tijay Chung

5 min read

Measuring adoption of ROV is challenging without direct access to routers in the wild. My colleagues and I at Virginia Tech, IIJ, RIPE NCC, and MANRS have developed a new measurement platform (RoVISTA) to measure the current deployment status of ROV. You can help by taking our survey!

Article tags:

35 Likes are disabled for this article.
0
massimo_ripe_84

NTT’s RPKI Deployment - Monitoring, Awareness, and Community

Author image
Dan Fidler

6 min read

Massimo Candela - Senior Software Engineer for NTT’s Global IP Network (GIN) - has been busy sharing his experience of deploying RPKI with the community. In this guest post, Dan Fidler takes a closer look at the message Massimo has been getting across.

Article tags:

38 Likes are disabled for this article.
0
peeringdb

PeeringDB 2022 Product Report

Author image
Leo Vegoda

3 min read

Data quality and search were ranked most important by respondents to our last three user surveys. This update looks at improvements we have made to keep data quality high by improving automation, giving users better tools, and making it easier to find and export data in PeeringDB.

Article tags:

10 Likes are disabled for this article.
0
msp security

Tracing the Evolving Levels of Support for WebAuthn

Author image
Kathleen Moriarty

26 min read

You've likely been hearing about the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) and wondering if you're ready to implement it in your environment. Here's everything you need to know!

Article tags:

13 Likes are disabled for this article.
0
security_diversity_2

Security by Diversity: The Business of Security Through Diversity

Author image
Fredrik Lindeberg

10 min read

With information security such a complex and fast-moving field, how can companies gather enough information to make informed decisions about what is right for their networks? What criteria should you look for, how do you evaluate systems, and how can you determine which methods will scale most effe…

Article tags:

16 Likes are disabled for this article.
0
chris_amin

Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Author image
Alun Davies

2 min read

Geolocation providers usually focus on locating end user devices at the edge of the Internet. But what about the machines that make up the infrastructure in the middle? In this episode, Chris Amin talks about RIPE IPmap - an API developed by the RIPE NCC to geolocate core Internet infrastructure.

Article tags:

85 Likes are disabled for this article.
2
nordic_region

RIPE NCC Internet Country Report: The Nordic Region

Author image
Suzanne Taylor

5 min read

We take a comprehensive look at the five countries and three autonomous regions that make up the Nordic Region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

37 Likes are disabled for this article.
0
Top three abuse types featured

Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Author image
Vincentas Grinius

7 min read

Since the exhaustion of the IPv4 address pool, companies across the globe heavily rely on IPv4 transfer and lease markets. Unfortunately, transferred IP address blocks are far more likely to be blocklisted due to IP address abuse. But while abuse negatively affects IP address reputation, the risks …

Article tags:

27 Likes are disabled for this article.
0
iStock-479790100

CAPIF 1 - Peering and Interconnection in Central Asia

Author image
Vahan Hovsepyan

5 min read

Central Asia is a landlocked region that could one day become a centre of interconnection for other regions and countries, including China, Iran, Russia, and the Caucasus. But to get there, networks in the region will need to cross a number of hurdles. CAPIF 1 will bring together local communities …

Article tags:

59 Likes are disabled for this article.
0

Showing 892 article(s)