Banner image

Network Operations

All articles

Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Author image
Emile Aben

6 min read

In this post we introduce a wiki to document RIPE Atlas measurements better. We use the measurements we created to track RPKI Repository Performance to show how this is useful.

Article tags:

2 Likes are disabled for this article.
0
Address Assignment Practices in IPv4 and IPv6

Address Assignment Practices in IPv4 and IPv6

Author image
Stephen Strowes

11 min read

In prior work, we've studied IPv4 allocation patterns in domestic ISPs. Time has passed, and IPv6 adoption has continued, so in this article we review our current observations on IPv4 and IPv6 assignment practices.

Article tags:

30 Likes are disabled for this article.
0
Our First Glance at the Uganda Internet Shutdown

Our First Glance at the Uganda Internet Shutdown

Author image
Vesna Manojlovic

3 min read

Reports indicate that the Ugandan government initiated a shutdown of the country's Internet yesterday evening. Here's a look at what we're seeing based on data available from our Routing Information Service (RIS) and RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
1
Moving RPKI Beyond Routing Security

Moving RPKI Beyond Routing Security

Author image
Tim Bruijnzeels

6 min read

Resource Tagged Attestations, or RTAs, are a new type of RPKI object that is being proposed by authors from APNIC and NLnet Labs in the IETF. They allow any arbitrary file to be signed ‘with resources’ by one or more parties.

Article tags:

2 Likes are disabled for this article.
0
Face of Cybersecurity (Ripe Lab)

The Human Face of Cybersecurity

Author image
Youth IGF

4 min read

The Youth IGF is a global movement of young activists, up to the age of 35, who operate as a multi-stakeholder network to lead projects aimed at tackling a wide range of Internet governance issues. In this article, Yuliya Morenets gives an overview of the Youth IGF's recent report on the human face…

Article tags:

2 Likes are disabled for this article.
0
gulf.png

RIPE NCC Internet Country Report: Gulf Region

Author image
Suzanne Taylor

4 min read

We examine the Internet landscape in eight different countries in the Gulf region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

4 Likes are disabled for this article.
1
Mapping Concentrations of Device Vendors in IXPs

Mapping Concentrations of Device Vendors in IXPs

Author image
Joao M. Ceron

7 min read

Internet exchange points (IXPs) are among the most popular ways for Internet service providers (ISPs) and content distribution networks (CDNs) to exchange traffic. This article gives an analysis of the distribution of vendors chosen by IXP members to connect to IXPs.

Article tags:

3 Likes are disabled for this article.
1
DNSSEC: The Long and Bumpy Road of Algorithm Deployment

DNSSEC: The Long and Bumpy Road of Algorithm Deployment

Author image
Moritz Müller

7 min read

As cryptographic analysis and related technologies advance, the signing algorithms at the heart of DNSSEC have to keep up. Moritz Müller and colleagues take a look at barriers on the road to more secure algorithms and discuss ways to make the journey faster.

Article tags:

0 Likes are disabled for this article.
0
Introducing JDR: Explore, Inspect and Troubleshoot the RPKI

Introducing JDR: Explore, Inspect and Troubleshoot the RPKI

Author image
Luuk Hendriks

6 min read

NLnet Labs recently launched their first version of JDR, a tool for checking anything in the RPKI. While not yet 100% feature complete, JDR offers useful insights to operators and implementors. In this article, Luuk Hendriks talks about the mechanics and goals of the tool and calls for feedback to …

Article tags:

4 Likes are disabled for this article.
0
RPKI ROV: About Stale RTR Servers and How to Monitor Them

RPKI ROV: About Stale RTR Servers and How to Monitor Them

Author image
Lukas Tribus

5 min read

Many network operators have completed the rollout of RPKI Route Origin Validation and others are in the process of doing so. In this post I want to shed some light on a common misconception, the problem it causes, and how to remedy it.

Article tags:

7 Likes are disabled for this article.
1

Showing 889 article(s)