Banner image

Network Operations

All articles

IPv6 Address Planning in GavleNet

IPv6 Address Planning in GavleNet

Author image
Torbjorn Eklov

5 min read

About a year ago I started to discuss with GavleNet in Sweden about how they can best deploy native IPv6 for their fibre-to-the-home (FTTH) customers. GavleNet is a city network that operates in the municipalities of Gävle and Ockelbo. In this article, I discuss how we designed GavleNet's FTTH IPv6…

Article tags:

2 Likes are disabled for this article.
3
Transit and Peering: How Your Requests Reach GitHub

Transit and Peering: How Your Requests Reach GitHub

Author image
Ross McFarland

7 min read

Please find in this article insights into solutions that mid-size organisations need to deploy on the DNS and BGP level. We are monitoring success using, among other tools, RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
3
cms-grid-1.png

A Software-based Approach to Identify Heavy Hitters in DNS Traffic

Author image
Santiago Ruano Rincón

12 min read

This article presents a software-based prototype able to estimate the most queried domain names in a stream of DNS traffic at 12Mpps (wire-rate 10GbE). The goal is to identify domains involved in random qname attacks. This prototype is a proof-of-concept of our research on software and commodity-ha…

Article tags:

0 Likes are disabled for this article.
0
Power Prefixes Prioritisation for Smarter BGP Reconvergence

Power Prefixes Prioritisation for Smarter BGP Reconvergence

Author image
Juan Brenes

7 min read

Every day the Internet experiences failures that affect the reachability of certain zones (i.e prefixes), such as cities, countries, etc. Whenever such events happen, the routing information, which is the path that information must follow in order to get from one place to another, must be upda…

Article tags:

0 Likes are disabled for this article.
0
KMoriarty_Image1.jpg

TLS Security and Data Centre Monitoring: Searching for a Path Forward

Author image
Mirjam Kühne

8 min read

Please read this guest post by Kathleen Moriarty, Security Area Director at the Internet Engineering Task Force (IETF): Protocols are evolving to meet the demands of the future. As such, we must continue to strengthen the security of these protocols to keep pace with the threat landscape.

Article tags:

0 Likes are disabled for this article.
1
RIPE Atlas Probes as IoT Devices

RIPE Atlas Probes as IoT Devices

Author image
Robert Kisteleki

7 min read

It's possible to look at RIPE Atlas probes from the perspective of IoT - a key element of the service is the physical devices deployed all over the world. Read on to find some interesting insights from this perspective.

Article tags:

0 Likes are disabled for this article.
0
When a Vague Idea Becomes a Hackathon Challenge

When a Vague Idea Becomes a Hackathon Challenge

Author image
Sofía Silva Berenguer

4 min read

A few weeks ago, I had the chance to participate in a hackathon organised by LACNIC. The event was held in Montevideo, Uruguay, which also happens to be my home town.

Article tags:

0 Likes are disabled for this article.
0
Interconnection Agreements at Scale: Secret or Simple?

Interconnection Agreements at Scale: Secret or Simple?

Author image
Martin Hannigan

23 min read

Are settlement free interconnection agreements at scale, or otherwise, really a secret? They can be. This article provides a peep hole into the world of codified private interconnections. Did you learn something? Let us know.

Article tags:

0 Likes are disabled for this article.
0
IPv6 Deployment Survey Update

IPv6 Deployment Survey Update

Author image
Jordi Palet Martinez

3 min read

Last year, I initiated a small survey to understand what approaches ISPs in Europe are taking to deploy IPv6, eventually expanding it to a global survey.

Article tags:

0 Likes are disabled for this article.
0

Showing 927 article(s)