Banner image

Network Operations

All articles

DNS1-GIH.png

The Uncertainty of Measuring the DNS

Author image
Geoff Huston

22 min read

The period around the end of the nineteenth century and the start of the twentieth century saw a number of phenomenal advances in the physical sciences.

Article tags:

4 Likes are disabled for this article.
0
BGP Flexibility and its Consequences

BGP Flexibility and its Consequences

Author image
Alexander Azimov

5 min read

Border Gateway Protocol (BGP) is the only exterior gateway protocol created to control traffic between Internet Service Providers (ISPs) all over the world. The initial protocol design was so flexible that after 20 years, it has become a de facto standard mechanism for MPLS/VPN and even Interior Ga…

Article tags:

0 Likes are disabled for this article.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Author image
Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 Likes are disabled for this article.
1
Looking Back at the Internet’s Past Decade

Looking Back at the Internet’s Past Decade

Author image
Geoff Huston

32 min read

In this article I am looking a some fundamental developments on the Internet over the last decade. Nothing much has changed - or has it?

Article tags:

0 Likes are disabled for this article.
0
BGP Large Communities - Uptake by the Community at Large?

BGP Large Communities - Uptake by the Community at Large?

Author image
Emile Aben

9 min read

In this article we look into the uptake of BGP Large Communities using the RIPE Routing Information Service (RIS).

Article tags:

0 Likes are disabled for this article.
0
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Author image
Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 Likes are disabled for this article.
0
Spam Over IPv6 - Eight Years Later

Spam Over IPv6 - Eight Years Later

Author image
Ivo Dijkhuis

3 min read

A long time ago we published an article on the amount of spam we receive over IPv6. Now, eight years later, we were curious to see if the spam landscape has changed.

Article tags:

0 Likes are disabled for this article.
2
What Are My Options? Session Encryption Protocols Looking Forward

What Are My Options? Session Encryption Protocols Looking Forward

Author image
Kathleen Moriarty

8 min read

This is the third and last piece in our mini series on network and security management. With TLSv1.3 approved and in the Internet Engineering Task Force (IETF) publication queue it’s time to think about deployment options and obstacles, and planning for changes inherent in this revision. Regardles…

Article tags:

0 Likes are disabled for this article.
0

Showing 892 article(s)