Banner image

Network Operations

All articles

1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Mikhail Anisimov: Developing the DNS Under Pressure

Author image
Anastasiya Pak

3 min read

Being at the core of the Internet places the DNS under a lot of pressure. New forms of DNS abuse emerge each year, disputes over domain names persist, and all the while, the Internet just keeps getting bigger. Mikhail Anisimov from ICANN talks about the coordinated effort involved in meeting these …

Article tags:

9 Please read the article before liking.
0
roughtime

Roughtime: Securing Time for IoT Devices

Author image
Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 Please read the article before liking.
0
nro_rirs

Are Differences in RIR RPKI Implementations Hindering RPKI Adoption?

Author image
Sofía Silva Berenguer

2 min read

The NRO RPKI Program Team is calling on network operators to share what stage of the RPKI adoption journey they are at and what barriers they might have encountered along the way.

Article tags:

6 Please read the article before liking.
0
Lead Image IfS #02

IXP-from-Scratch: Network and Security Design

Author image
Thomas Liske

11 min read

In the second of our “IXP from Scratch” series, we introduce network and security design decisions as well as implementations we made at DD-IX, an Internet Exchange in Dresden, Germany. In principle, an IX consists of a single broadcast domain, but in practice it has to operate several services sec…

Article tags:

121 Please read the article before liking.
5
abuse-handling-featured

Innovative Approaches to Combating SPAM: Lessons from IP Leasing

Author image
Jolita Puzakova

4 min read

SPAM and abuse remain persistent challenges across various digital platforms, threatening user trust and operational integrity. Jolita Puzakova and colleagues explore how they tackle this persistent threat with a three-fold approach.

Article tags:

36 Please read the article before liking.
0
Lead Image IfS #1

IXP-from-Scratch: Building a New IX

Author image
Thomas Liske

5 min read

In this new series "IXP from Scratch", we report about our endeavor of building DD-IX, an Internet Exchange located in the city of Dresden, Germany. DD-IX is driven by a grassroots community that loves contributing to a resilient and efficient Internet. We start with some basic background and will …

Article tags:

172 Please read the article before liking.
0
meowmeow

Putting the MAU Into meowmeow: On Personal ASNs

Author image
Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

62 Please read the article before liking.
0
asn_truck

Driving the ASN Truck Without a Licence

Author image
Radu Anghel

16 min read

Natural persons have been registering ASNs for a long time, and for many reasons, from running small businesses to keeping up a hobby. This isn't something wrong that needs to be fixed. ASNs should be assigned based on need. But 'need' should not be defined as “my friends have one so I need one too…

Article tags:

68 Please read the article before liking.
12
internet_in_space

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Author image
Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

64 Please read the article before liking.
0

Showing 891 article(s)