Network Operations

All articles

IPv6-only? IPv4-as-a-service?

IPv6-only? IPv4-as-a-service?

Jordi Palet Martinez

6 min read

We are starting to hear “IPv6-only” more often. However, it doesn't seem to be clear what exactly this means. I will attempt to explain it in this article.

Article tags:

0 You have liked this article 0 times.
9
IPv6 Address Planning in GavleNet

IPv6 Address Planning in GavleNet

Torbjorn Eklov

5 min read

About a year ago I started to discuss with GavleNet in Sweden about how they can best deploy native IPv6 for their fibre-to-the-home (FTTH) customers. GavleNet is a city network that operates in the municipalities of Gävle and Ockelbo. In this article, I discuss how we designed GavleNet's FTTH IPv6…

Article tags:

2 You have liked this article 0 times.
3
Transit and Peering: How Your Requests Reach GitHub

Transit and Peering: How Your Requests Reach GitHub

Ross McFarland

7 min read

Please find in this article insights into solutions that mid-size organisations need to deploy on the DNS and BGP level. We are monitoring success using, among other tools, RIPE Atlas.

Article tags:

0 You have liked this article 0 times.
3
A Software-based Approach to Identify Heavy Hitters in DNS Traffic

A Software-based Approach to Identify Heavy Hitters in DNS Traffic

Santiago Ruano Rincón

12 min read

This article presents a software-based prototype able to estimate the most queried domain names in a stream of DNS traffic at 12Mpps (wire-rate 10GbE). The goal is to identify domains involved in random qname attacks. This prototype is a proof-of-concept of our research on software and commodity-ha…

Article tags:

0 You have liked this article 0 times.
0
Power Prefixes Prioritisation for Smarter BGP Reconvergence

Power Prefixes Prioritisation for Smarter BGP Reconvergence

Juan Brenes

7 min read

Every day the Internet experiences failures that affect the reachability of certain zones (i.e prefixes), such as cities, countries, etc. Whenever such events happen, the routing information, which is the path that information must follow in order to get from one place to another, must be upda…

Article tags:

0 You have liked this article 0 times.
0
TLS Security and Data Centre Monitoring: Searching for a Path Forward

TLS Security and Data Centre Monitoring: Searching for a Path Forward

Mirjam Kühne

8 min read

Please read this guest post by Kathleen Moriarty, Security Area Director at the Internet Engineering Task Force (IETF): Protocols are evolving to meet the demands of the future. As such, we must continue to strengthen the security of these protocols to keep pace with the threat landscape.

Article tags:

0 You have liked this article 0 times.
1
RIPE Atlas Probes as IoT Devices

RIPE Atlas Probes as IoT Devices

Robert Kisteleki

7 min read

It's possible to look at RIPE Atlas probes from the perspective of IoT - a key element of the service is the physical devices deployed all over the world. Read on to find some interesting insights from this perspective.

Article tags:

0 You have liked this article 0 times.
0
When a Vague Idea Becomes a Hackathon Challenge

When a Vague Idea Becomes a Hackathon Challenge

Sofía Silva Berenguer

4 min read

A few weeks ago, I had the chance to participate in a hackathon organised by LACNIC. The event was held in Montevideo, Uruguay, which also happens to be my home town.

Article tags:

0 You have liked this article 0 times.
0
Interconnection Agreements at Scale: Secret or Simple?

Interconnection Agreements at Scale: Secret or Simple?

Martin Hannigan

23 min read

Are settlement free interconnection agreements at scale, or otherwise, really a secret? They can be. This article provides a peep hole into the world of codified private interconnections. Did you learn something? Let us know.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)