Network Operations

All articles

10 Years of IPv6 Stakeout!

10 Years of IPv6 Stakeout!

Torbjorn Eklov

6 min read

In October 2008 I registered kommunermedipv6.se. My main motivation was to encourage the municipalities in Sweden to enable IPv6 and to publicly show once it's done. Now, ten years later, I think my idea was a big mistake....

Article tags:

0 You have liked this article 0 times.
0
How EU Regulation Affects You

How EU Regulation Affects You

Suzanne Taylor

7 min read

In recent years, there’s been a trend towards increased EU regulation with the potential to impact more actors across the Internet landscape. Here, we give a brief overview of the most pertinent policies currently being proposed, debated and implemented in the European Union.

Article tags:

0 You have liked this article 0 times.
3
Consolidation, Centralisation, and the Internet Architecture

Consolidation, Centralisation, and the Internet Architecture

Jari Arkko

6 min read

Many of us have held a vision of the Internet as the ultimate distributed platform that allows communication, the provision of services, and competition from any corner of the world. But as the Internet has matured, it seems to have fed the creation of large, centralised entities that provide most …

Article tags:

1 You have liked this article 0 times.
0
Routing Security is Hot!

Routing Security is Hot!

Melchior Aelmans

3 min read

Routing security is important and it is great to see that it is now on the agenda of many network operators. We're going to organise an RPKI signing party to further increase deployment.

Article tags:

0 You have liked this article 0 times.
2
The RPKI Observatory: A New Website Aiming to Help Reduce RPKI Misconfigurations

The RPKI Observatory: A New Website Aiming to Help Reduce RPKI Misconfigurations

nusenu nusenu

7 min read

In this post I'll cover why it is important to take care of RPKI misconfigurations, what the impact of ignoring them is, how network operators can easily determine whether they are affected by a specific RPKI misconfiguration and how significantly the amount of RPKI unreachable IP space changed ove…

Article tags:

0 You have liked this article 0 times.
2
iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

Ahmad Alsadeh

3 min read

IPv6 SEcure Neighbor Discovery (SEND) is an extension to countermeasure the security threats in IPv6 Neighbor Discovery Protocol (NDP). SEND provides address ownership proof, message protection, and router authorisation capabilities. The current lack of robust implementations of SEND at the end use…

Article tags:

0 You have liked this article 0 times.
0
DOH! DNS over HTTPS explained

DOH! DNS over HTTPS explained

Geoff Huston

14 min read

If you had the opportunity to re-imagine the DNS, what might it look like? Normally this would be an idle topic of speculation over a beer or two, but maybe there’s a little more to the question these days. We are walking into an entirely new world of the DNS when we start to think about what exact…

Article tags:

0 You have liked this article 0 times.
1
Gunfight at OK Corral: MPLS vs. Probing

Gunfight at OK Corral: MPLS vs. Probing

Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 You have liked this article 0 times.
0
How We Will Be Validating abuse-c

How We Will Be Validating abuse-c

Angela Dall'Ara

6 min read

At the RIPE NCC we’re busy working out a process so we can start validating approximately 70,000 abuse contact email addresses in the RIPE Database. Read on to see how we will approach this.

Article tags:

0 You have liked this article 0 times.
0
Internet Atlas - Tools for Digital Literacy

Internet Atlas - Tools for Digital Literacy

Andrej Petrovski

5 min read

Based on existing studies and research about the digital environment in Serbia, its legal and technical features, usage and habits among Internet users, the SHARE Foundation aims to produce tools and materials designed to inform, educate and encourage project target groups understand Internet infra…

Article tags:

2 You have liked this article 0 times.
0

Showing 868 article(s)