Banner image

Network Operations

All articles

CAPIF 3 Cover v2

CAPIF 3 Report: Strengthening Peering and Internet Growth in Central Asia

Author image
Anastasiya Pak

5 min read

The Central Asian Internet community met on 24-25 September at CAPIF 3 in Bishkek, Kyrgyzstan, to discuss peering, interconnectivity, Internet traffic exchange, IPv6 adoption, and challenges for digital transformation. The event brought together over 200 people from 18 countries - proving the need …

Article tags:

30 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Tim Bruijnzeels: Patching Internet Vulnerabilities with RPKI

Author image
Alun Davies

3 min read

The White House recently announced plans to boost Internet routing security in the US through improved RPKI coverage. So how does RPKI help secure BGP? How easy is it to boost coverage on a national level? And what's the future potential of the infrastructure? Our guest Tim Bruijnzeels shares his v…

Article tags:

44 Please read the article before liking.
0
gill

The Next Generation of BGP Data Collection Platforms

Author image
Thomas Holterbach

12 min read

Existing BGP data collection platforms face challenges that threaten their long-term sustainability: their data comes with enormous redundancy and significant visibility gaps. We explore a new BGP data collection paradigm, already implemented in a prototype called GILL, that could stir change for o…

Article tags:

48 Please read the article before liking.
0
Lead Image IfS #03

IXP-from-Scratch: The Peering LAN

Author image
Thomas Liske

13 min read

In the third of our “IXP from Scratch” series, we discuss our setup of the peering switches and route servers at DD-IX, an Internet Exchange located in Dresden, Germany. We explain how we connect our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable oper…

Article tags:

91 Please read the article before liking.
2
cctlds_cover

ccTLD Phishing Characterisation

Author image
Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 Please read the article before liking.
0
CAPIF 3 Cover Image

Securing Internet Infrastructure in Central Asia

Author image
Anastasiya Pak

16 min read

The third Central Asia Peering and Interconnection Forum (CAPIF 3) takes place next week in Bishkek, Kyrgyzstan. Experts from Central Asia and neighbouring regions will come together to strengthen regional Internet connectivity and promote digital growth. Ahead of the event, we examine the adoption…

Article tags:

15 Please read the article before liking.
0
iStock-2072837998

An Introspective Analysis: RPKI Deployment Under Scrutiny

Author image
Donika Mirdita

8 min read

When it comes to protecting the Achilles' heel of the Internet, the effectiveness of RPKI hinges on the vigilance and cooperation of the entire Internet community.

Article tags:

5 Please read the article before liking.
0
Screenshot of TLDtest

A Dive Into TLD Performance

Author image
Arnold Dechamps

8 min read

DNS is a complex set of protocols with a long history. Some TLD's go as far back as 1985 - but not all of them are built equal. And not all of them have the same performance depending on where the end user is situated in the world. So just how different are they?

Article tags:

123 Please read the article before liking.
5
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Mikhail Anisimov: Developing the DNS Under Pressure

Author image
Anastasiya Pak

3 min read

Being at the core of the Internet places the DNS under a lot of pressure. New forms of DNS abuse emerge each year, disputes over domain names persist, and all the while, the Internet just keeps getting bigger. Mikhail Anisimov from ICANN talks about the coordinated effort involved in meeting these …

Article tags:

9 Please read the article before liking.
0
roughtime

Roughtime: Securing Time for IoT Devices

Author image
Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 Please read the article before liking.
0

Showing 889 article(s)