Network Operations

All articles

Dealing with the Undercurrent of Unwanted Traffic

Dealing with the Undercurrent of Unwanted Traffic

Leslie Daigle

6 min read

It’s common knowledge that there are “bad actors” on the Internet, poking and prodding open ports as they find them. But just how much of this “unwanted traffic” is out there, and how much is “too much” to allow out of a source network?

Article tags:

21 You have liked this article 0 times.
0
Unpacking RFC 9199: Considerations for Large Authoritative Server Operators

Unpacking RFC 9199: Considerations for Large Authoritative Server Operators

Giovane Moura

10 min read

RFC 9199 puts forward six considerations for large authoritative DNS server operators each derived from peer-reviewed research. Giovane Moura from SIDN Labs walks us through the list of considerations and the experience he and his co-authors had with the RFC process.

Article tags:

19 You have liked this article 0 times.
0
IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

Rene Wilhelm

12 min read

On 6 June 2012, the Internet Society organised the World IPv6 Launch. On that day, participants switched on IPv6 not just for testing, but to use permanently in production services. As ten years have passed since, we look at how IPv6 adoption and deployment has progressed, in terms of routing, end-…

Article tags:

49 You have liked this article 0 times.
1
Making Security Simple for Organisations Big and Small

Making Security Simple for Organisations Big and Small

Kathleen Moriarty

5 min read

Calls for security to be built-in and managed over time are growing. Kathleen Moriarty takes a looks back at a recent panel discussion on “Making Security Simpler” and the hopeful messages that came out of it for the transformation of Internet security for organisations in the coming years.

Article tags:

12 You have liked this article 0 times.
0
WTDC-22 - The Crossroad

WTDC-22 - The Crossroad

Chafic Chaya

5 min read

We stand at a crossroads between a fragmented geopolitical world and a digital one that is more inclusive and sustainable. A common agenda with agreed priorities on public policy issues for the use of technology and connectivity will help take us in the right direction.

Article tags:

25 You have liked this article 0 times.
0
What is Anycast DNS and Why is It Important?

What is Anycast DNS and Why is It Important?

Robert Allen

5 min read

Anycast DNS is used by the leading DNS providers to ensure DNS queries can always be answered as quickly as possible. But how does Anycast DNS actually work and why is it important for your domain?

Article tags:

28 You have liked this article 0 times.
0
Security by Diversity: Designing Secure, Reliable and Robust Systems

Security by Diversity: Designing Secure, Reliable and Robust Systems

Fredrik Lindeberg

9 min read

A chain is not as strong as its weakest link, it can be much much stronger. In cybersecurity, the art of building secure systems from insecure but diverse components is an important but often neglected topic. Instead, processes, rigidity and structure are generally seen as the only way to attain se…

Article tags:

143 You have liked this article 0 times.
0
RPKI Training for Ukrainian Network Operators

RPKI Training for Ukrainian Network Operators

3 min read

The RIPE NCC held online BGP Security training for Ukrainian telecom operators on 6 April. The training was delivered in English with translation into Ukrainian. In this article, we talk about the motivation for providing this particular kind of training and share the full recording.

Article tags:

56 You have liked this article 0 times.
0
Yugoslavia and the Internet That Never Was

Yugoslavia and the Internet That Never Was

Jelena Cosic

2 min read

At the SEE 10 meeting, a panel of Internet pioneers came together to share their experiences as some of the people responsible for the development of the Internet in Yugoslavia. In order to properly record this event, we bring you the full video of that session.

Article tags:

31 You have liked this article 0 times.
1
An Introduction to IRR Explorer

An Introduction to IRR Explorer

Teun Vink

9 min read

In this article we take a look at how IRR explorer can be used to analyse and improve routing, IRR registrations, and RPKI configurations by looking at a number of real world examples.

Article tags:

17 You have liked this article 0 times.
0

Showing 868 article(s)