Network Operations

All articles

Cybersecurity Due Diligence - an ISP Perspective

Cybersecurity Due Diligence - an ISP Perspective

Joanna Kulesza

8 min read

Cybersecurity is no longer a corporate or private affair. What once was simply good business practice is now a legal obligation for ISPs, large and small. What does this mean for you?

Article tags:

0 You have liked this article 0 times.
0
Results of the IPv6 Deployment Survey

Results of the IPv6 Deployment Survey

Jordi Palet Martinez

12 min read

Over the past year, I have been conducting a public survey to better understand how ISPs deploy IPv6. In this post, I will summarise some of the key findings thus far.

Article tags:

4 You have liked this article 0 times.
6
Large BGP Communities - Largely Accepted Now?

Large BGP Communities - Largely Accepted Now?

Emile Aben

11 min read

Large BGP Communities are an addition to BGP that solves a communication problem between networks that want to use 32-bit AS Numbers. We measured how Large BGP Communities behave "in the wild" and if they create any problems.

Article tags:

0 You have liked this article 0 times.
0
Routing Detours: Can We Avoid Nation-State Surveillance?

Routing Detours: Can We Avoid Nation-State Surveillance?

Annie Edmundson

6 min read

An increasing number of countries are passing laws that facilitate the mass surveillance of their citizens. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as bui…

Article tags:

0 You have liked this article 0 times.
0
IXP Tools Hackathon Results

IXP Tools Hackathon Results

Vesna Manojlovic

6 min read

The fourth RIPE NCC Hackathon was as fun and productive as the previous three, with even more supporting organisations and participants. This short article aims to express our gratitude to everyone involved and to give a summary of our experiences, while several projects will be described in more d…

Article tags:

0 You have liked this article 0 times.
8
The Death of Transit?

The Death of Transit?

Geoff Huston

17 min read

Geoff Huston discusses the possible demise of transit services and the rise of content networking.

Article tags:

0 You have liked this article 0 times.
0
Speculating on DNS DDoS

Speculating on DNS DDoS

Geoff Huston

16 min read

The recent attacks on the DNS infrastructure operated by Dyn have generated a lot of comment in recent days. Indeed, it’s not often that the DNS itself has been prominent in the mainstream of news commentary and, in some ways, this DNS DDoS prominence is for all the wrong reasons! I’d like to specu…

Article tags:

4 You have liked this article 0 times.
4
The Trouble with NAT - Part 3

The Trouble with NAT - Part 3

Mirjam Kühne

6 min read

This is the final post in a series on Network Address Translation (NAT), provided by Mark Smith. In this post, Mark discusses the fundamental constraints of NAT and addresses some FAQs about IPv6 without NAT.

Article tags:

0 You have liked this article 0 times.
1
The Trouble with NAT - Part 2

The Trouble with NAT - Part 2

Mirjam Kühne

12 min read

This is the second post in a series on NATs contributed by Mark Smith, based on a presentation given at AusNOG 2016. In the first post, Mark discussed Network Critical Success Factors (NCSFs). In this post, he is going into details about the trouble with Network Address Translation (NAT).

Article tags:

0 You have liked this article 0 times.
0
The Trouble with NAT - Part 1

The Trouble with NAT - Part 1

Mirjam Kühne

7 min read

This is a guest post by Mark Smith, based on a presentation he gave at the AusNOG 2016 conference on this topic. This is the first post of three, and in this article Mark will discuss the concept of Network Critical Success Factors (NCSFs) before getting into ‘the trouble’.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)