Banner image

Network Operations

All articles

nro_rirs

The NRO RPKI Program - 2024 in Review

Author image
Sofía Silva Berenguer

2 min read

The NRO RPKI program is working to improve alignment in the RPKI space. Here's a quick update on what they've achieved since the program launched back in January this year.

Article tags:

2 Please read the article before liking.
0
ipv6_cat

Schrödinger’s IPv6 Cat

Author image
Hisham Ibrahim

13 min read

IPv6, a protocol developed in the late 1990s to address the anticipated Internet address exhaustion crisis, exists in a paradoxical state. For some, while its adoption might have taken longer than expected, it represents a success story - steadily expanding in deployment and enabling more users and…

Article tags:

43 Please read the article before liking.
4
hero_zero

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

Author image
Cordian Daniluk

7 min read

Hashed authenticated denial of existence appeared back in 2008 to prevent DNS zone walking. Since then, best practices have changed and were updated in RFC 9276. This article examines how the current landscape of authoritative name servers and resolvers complies with these recommendations.

Article tags:

15 Please read the article before liking.
2
yolocolo

Navigating Network Measurements - Research, Risks and Reliability

Author image
Tobias Fiebig

10 min read

Measuring the Internet is a delicate process and without the proper setup, things can get pretty out of hand pretty quickly. The measurement.network is a RIPE NCC Community Projects Fund supported project that helps researchers run network measurements without breaking things.

Article tags:

26 Please read the article before liking.
0
zoomed authdns view

Reaching AuthDNS - A RIPE Atlas Analysis by Region

10 min read

The RIPE NCC operates two independent anycast DNS services. One is K-root, a well-known service essential to DNS resolution. The other is the less well-known service, AuthDNS. We examine how queries reach AuthDNS from several regions and call for new hosts to help shorten the journey.

Article tags:

31 Please read the article before liking.
0
MENOG 24 Article Cover

The Internet Landscape in the Middle East

Author image
Qasim Lone

18 min read

The Middle East’s Internet landscape is diverse and complex, with big variations between the GCC countries and areas such as the Levant and North Africa. Ahead of MENOG 24, we look at the development of Internet technologies in the Arabic-speaking countries of the region that have the potential to …

Article tags:

38 Please read the article before liking.
3
baltic sea cable cuts

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Author image
Emile Aben

10 min read

This week's Internet cable cuts in the Baltic Sea have been widely reported, even as attempts to understand their cause and impact continue. We turn to RIPE Atlas to provide a preliminary analysis of these events and ask to what extent the Internet in the region has been resilient to them.

Article tags:

231 Please read the article before liking.
2
internet not web

Distinguishing the Internet’s Core From What Is Built on Top

Author image
Hisham Ibrahim

5 min read

The Internet is not social media, nor the web, nor your favourite app. In fact, it’s not even the digital economy or the communication tools we’ve all come to rely on. The Internet is something deeper, a foundational network of networks that has quietly powered the digital age for over 40 years.

Article tags:

59 Please read the article before liking.
1
tortoise

The DNS Server That Lagged Behind

Author image
Stéphane Bortzmeyer

3 min read

Around the end of October and beginning of November 2024, twenty six African TLDs had a technical problem - one of their authoritative name servers served stale data. This is a tale of monitoring, anycast, and debugging.

Article tags:

57 Please read the article before liking.
0
Internet Map by The Opte Project - Originally from the English Wikipedia, CC BY 2.5

War Story: RPKI is Working as Intended

Author image
Job Snijders

8 min read

Three weeks ago, Fastly was the target of a BGP hijack similar to a far more widely-reported incident that happened back in 2008. But this time, barely anyone noticed. Why is that?

Article tags:

53 Please read the article before liking.
0

Showing 913 article(s)