Banner image

Network Operations

All articles

wtdc22

WTDC-22 - The Crossroad

Author image
Chafic Chaya

5 min read

We stand at a crossroads between a fragmented geopolitical world and a digital one that is more inclusive and sustainable. A common agenda with agreed priorities on public policy issues for the use of technology and connectivity will help take us in the right direction.

Article tags:

25 Likes are disabled for this article.
0
anycastdns

What is Anycast DNS and Why is It Important?

Author image
Robert Allen

5 min read

Anycast DNS is used by the leading DNS providers to ensure DNS queries can always be answered as quickly as possible. But how does Anycast DNS actually work and why is it important for your domain?

Article tags:

28 Likes are disabled for this article.
0
digital_chain

Security by Diversity: Designing Secure, Reliable and Robust Systems

Author image
Fredrik Lindeberg

9 min read

A chain is not as strong as its weakest link, it can be much much stronger. In cybersecurity, the art of building secure systems from insecure but diverse components is an important but often neglected topic. Instead, processes, rigidity and structure are generally seen as the only way to attain se…

Article tags:

143 Likes are disabled for this article.
0
Is BGP Secure?

RPKI Training for Ukrainian Network Operators

3 min read

The RIPE NCC held online BGP Security training for Ukrainian telecom operators on 6 April. The training was delivered in English with translation into Ukrainian. In this article, we talk about the motivation for providing this particular kind of training and share the full recording.

Article tags:

56 Likes are disabled for this article.
0
yumap

Yugoslavia and the Internet That Never Was

Author image
Jelena Cosic

2 min read

At the SEE 10 meeting, a panel of Internet pioneers came together to share their experiences as some of the people responsible for the development of the Internet in Yugoslavia. In order to properly record this event, we bring you the full video of that session.

Article tags:

31 Likes are disabled for this article.
1
irr_explorer

An Introduction to IRR Explorer

Author image
Teun Vink

9 min read

In this article we take a look at how IRR explorer can be used to analyse and improve routing, IRR registrations, and RPKI configurations by looking at a number of real world examples.

Article tags:

17 Likes are disabled for this article.
0
::

The Curious Case of Packets From ::

Author image
Robert Kisteleki

10 min read

RIPE Atlas has a large enough footprint all over the world to observe various kinds of network behaviour. Recently we've been notified about a case where the IPv6 source address ::/128 appeared in some of our traceroutes. We set out to discover why this happens.

Article tags:

39 Likes are disabled for this article.
4
Sweden traffic paths

A Special RIPE NCC Country Report: IPv6 in Sweden

Author image
Suzanne Taylor

3 min read

We investigate the state of IPv6 in Sweden in this special RIPE NCC Internet Country Report.

Article tags:

17 Likes are disabled for this article.
0
key_3

Securing the RIPE NCC Trust Anchor

10 min read

At the RIPE NCC, we recently migrated one of the Hardware Security Modules (HSMs) we use to handle keys in RPKI. In this article, we give a detailed overview of the role HSMs play in the broader RPKI system and talk through the steps we took to carry out the migration process.

Article tags:

39 Likes are disabled for this article.
0
Moldova networks

RIPE NCC Internet Country Report: Bulgaria, Moldova and Romania

Author image
Suzanne Taylor

4 min read

We take a comprehensive look at three different countries in southeastern Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

40 Likes are disabled for this article.
0

Showing 904 article(s)