Banner image

Network Operations

All articles

TLS2-Fig1.png

They Are Looking At WHAT? Service Provider Monitoring

Author image
Kathleen Moriarty

5 min read

This is the second in a series of articles related to network and security management. This post digs deeper into the types of monitoring performed on internal and external networks to better understand considerations for your deployment plans.

Article tags:

0 Likes are disabled for this article.
0
IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

Author image
Rene Wilhelm

4 min read

Both APNIC and Facebook publish statistics on IPv6 adoption per country. Next to the visualisations, these organisations also provide the numerical data. We take a look at these to see how the two methodologies compare.

Article tags:

0 Likes are disabled for this article.
1
TLS-Fig1.png

Network Monitoring is Dead… What Now? TLS, QUIC and Beyond

Author image
Kathleen Moriarty

9 min read

This is the first in a series of articles related to network and security management and monitoring changes as the Internet moves toward session encryption protocols with forward secrecy that are more difficult to intercept.

Article tags:

0 Likes are disabled for this article.
0
Blockers to IPv6 Adoption

Blockers to IPv6 Adoption

Author image
David Holder

11 min read

On a recent flight from the UK to the USA I sat next to the IT director for a global corporation. He asked me why I was travelling, to which I answered that I was giving the keynote presentation at an IPv6 conference held by the US Federal government. Without hesitation, his response was “IPv6 is n…

Article tags:

0 Likes are disabled for this article.
15
IPv6 Launchiversary: the View from RIPE Atlas and K-root

IPv6 Launchiversary: the View from RIPE Atlas and K-root

Author image
Stephen Strowes

10 min read

IPv6 growth continues apace; content networks regularly measure more than 20% of their requests as taking place over IPv6 today. However, deployment has not been uniform. In this article, we review growth from the perspective of RIPE Atlas data since the launch event.

Article tags:

0 Likes are disabled for this article.
0
ipv61.png

RIPE NCC::EDUCA IPv6 Day

Author image
Ulka Athale

5 min read

The RIPE NCC is marking the sixth anniversary of the World IPv6 Launch with RIPE NCC::Educa IPv6 Day, an all-day webinar on the state of IPv6 and its future. Here is a quick overview of where IPv6 currently stands from the RIPE NCC perspective.

Article tags:

0 Likes are disabled for this article.
0
Dissecting DNS Defenses During  DDoS Attacks

Dissecting DNS Defenses During DDoS Attacks

Author image
Giovane Moura

3 min read

New technical report evaluates DNS defenses in the wild against DDoS attacks and shows some interesting results.

Article tags:

0 Likes are disabled for this article.
0
example-arch.png

Could Blockchain Help in Interdomain Routing Security?

Author image
Jordi Paillissé Vilanova

9 min read

Blockchain technology is attracting a lot of attention among the security community since it provides a way to exchange information among a set of distrusting entities without the use of digital certificates and centralised control. Blockchain provides means for distrusting parties to reach consens…

Article tags:

0 Likes are disabled for this article.
0
AS Hegemony: Measuring AS Interdependence

AS Hegemony: Measuring AS Interdependence

Author image
Romain Fontugne

5 min read

How does your network depend on other networks? In this article we present a new tool that helps you measure AS dependencies.

Article tags:

5 Likes are disabled for this article.
0

Showing 892 article(s)