Banner image

Network Operations

All articles

IPv4-Only-NAT-LB.jpeg

IPv6 for Governments and Enterprises – a Case Study

Author image
Jordi Palet Martinez

6 min read

In this article I will look at corporate networks, which include cases for governments, enterprises and other organisations.

Article tags:

0 Likes are disabled for this article.
0
10 Years of IPv6 Stakeout!

10 Years of IPv6 Stakeout!

Author image
Torbjorn Eklov

6 min read

In October 2008 I registered kommunermedipv6.se. My main motivation was to encourage the municipalities in Sweden to enable IPv6 and to publicly show once it's done. Now, ten years later, I think my idea was a big mistake....

Article tags:

0 Likes are disabled for this article.
0
How EU Regulation Affects You

How EU Regulation Affects You

Author image
Suzanne Taylor

7 min read

In recent years, there’s been a trend towards increased EU regulation with the potential to impact more actors across the Internet landscape. Here, we give a brief overview of the most pertinent policies currently being proposed, debated and implemented in the European Union.

Article tags:

0 Likes are disabled for this article.
3
Consolidation, Centralisation, and the Internet Architecture

Consolidation, Centralisation, and the Internet Architecture

Author image
Jari Arkko

6 min read

Many of us have held a vision of the Internet as the ultimate distributed platform that allows communication, the provision of services, and competition from any corner of the world. But as the Internet has matured, it seems to have fed the creation of large, centralised entities that provide most …

Article tags:

1 Likes are disabled for this article.
0
Routing Security is Hot!

Routing Security is Hot!

Author image
Melchior Aelmans

3 min read

Routing security is important and it is great to see that it is now on the agenda of many network operators. We're going to organise an RPKI signing party to further increase deployment.

Article tags:

0 Likes are disabled for this article.
2
The RPKI Observatory: A New Website Aiming to Help Reduce RPKI Misconfigurations

The RPKI Observatory: A New Website Aiming to Help Reduce RPKI Misconfigurations

Author image
nusenu nusenu

7 min read

In this post I'll cover why it is important to take care of RPKI misconfigurations, what the impact of ignoring them is, how network operators can easily determine whether they are affected by a specific RPKI misconfiguration and how significantly the amount of RPKI unreachable IP space changed ove…

Article tags:

0 Likes are disabled for this article.
2
iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

Author image
Ahmad Alsadeh

3 min read

IPv6 SEcure Neighbor Discovery (SEND) is an extension to countermeasure the security threats in IPv6 Neighbor Discovery Protocol (NDP). SEND provides address ownership proof, message protection, and router authorisation capabilities. The current lack of robust implementations of SEND at the end use…

Article tags:

0 Likes are disabled for this article.
0
DOH! DNS over HTTPS explained

DOH! DNS over HTTPS explained

Author image
Geoff Huston

14 min read

If you had the opportunity to re-imagine the DNS, what might it look like? Normally this would be an idle topic of speculation over a beer or two, but maybe there’s a little more to the question these days. We are walking into an entirely new world of the DNS when we start to think about what exact…

Article tags:

0 Likes are disabled for this article.
1
Figure2-MPLS.png

Gunfight at OK Corral: MPLS vs. Probing

Author image
Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 Likes are disabled for this article.
0
Implementation timeline 2.0.png

How We Will Be Validating abuse-c

Author image
Angela Dall'Ara

6 min read

At the RIPE NCC we’re busy working out a process so we can start validating approximately 70,000 abuse contact email addresses in the RIPE Database. Read on to see how we will approach this.

Article tags:

0 Likes are disabled for this article.
0

Showing 889 article(s)