Network Operations

All articles

Anycast vs. DDoS - Evaluating the November 2015 Root DNS Event

Anycast vs. DDoS - Evaluating the November 2015 Root DNS Event

Giovane Moura

3 min read

IP anycast has been widely used to replicate services in multiple locations as a way to deliver better performance and resilience. It has been largely employed by CDNs and DNS operators, such as on the root server system. However, there is little evaluation of anycast under stress.

Article tags:

0 You have liked this article 0 times.
2
How are you Deploying IPv6? Take this Survey

How are you Deploying IPv6? Take this Survey

Jordi Palet Martinez

4 min read

After 15 years conducting training on IPv6 in over 110 countries, I’ve been asked all sorts of questions. “How do I use my IPv6 addressing space?” “What prefix size should I provide to customers?” Although I have answers to these and many other best practice related questions, the one question, whi…

Article tags:

0 You have liked this article 0 times.
0
Fragmenting IPv6

Fragmenting IPv6

Geoff Huston

26 min read

The design of IPv6 represented a relatively conservative evolutionary step of the Internet protocol. Mostly, it's just IPv4 with significantly larger address fields. Mostly, but not completely, as there were some changes. IPv6 changed the boot process to use auto-configuration and multicast to perf…

Article tags:

0 You have liked this article 0 times.
3
Pinpointing Delay and Forwarding Anomalies Using RIPE Atlas Built-in Measurements - Or How I Learned to Stop Worrying and Love the Built-Ins

Pinpointing Delay and Forwarding Anomalies Using RIPE Atlas Built-in Measurements - Or How I Learned to Stop Worrying and Love the Built-Ins

Romain Fontugne

8 min read

Detecting network disruptions is a recurring problem. Clearly locating performance degradation is an important step in debugging and subsequently fixing connectivity issues.

Article tags:

6 You have liked this article 0 times.
0
The Internet for Things

The Internet for Things

Mirjam Kühne

5 min read

Please read this guest post by Byron Ellacott, Senior Software Architect at APNIC: The Internet of Things without the Internet is just things, and we’ve had things since the first caveman used a pointy stick to draw on a wall. What then does the Internet bring to things to justify a capital T?

Article tags:

0 You have liked this article 0 times.
0
Using RIPE Atlas to Look at IXPs in Berlin

Using RIPE Atlas to Look at IXPs in Berlin

Mirjam Kühne

4 min read

The IXP country jedi tool described in earlier RIPE Labs articles, can also be used to analyse the situation in a specific city. This time we look at Berlin.

Article tags:

0 You have liked this article 0 times.
2
How Pingable are the Pingables?

How Pingable are the Pingables?

Rene Wilhelm

15 min read

In February 2011 the RIPE NCC implemented the "pingable:" and "ping-hdl:" attributes in the RIPE Database. These attributes were added to the Routing Policy Specification Language by RFC 5943 to allow networks to advertise IP addresses that are reachable and can be used as a target for diagnostic…

Article tags:

0 You have liked this article 0 times.
1
RIPE Atlas Update: DNSMON Code Available, LatencyMON Comparisons, New Credit Sharing and More

RIPE Atlas Update: DNSMON Code Available, LatencyMON Comparisons, New Credit Sharing and More

Suzanne Taylor

4 min read

In the past few months, we've added some new features and functionality to RIPE Atlas, including making the DNSMON code available on GitHub for personal use, displaying IPv4 vs IPv6 comparisons in LatencyMON, new credit sharing options, and new limits on probes per measurement and results per day.…

Article tags:

0 You have liked this article 0 times.
0
Support for Elliptic Curve Cryptography (ECC) in DNS Resolvers as Seen by RIPE Atlas

Support for Elliptic Curve Cryptography (ECC) in DNS Resolvers as Seen by RIPE Atlas

Maciej Andzinski

6 min read

The Elliptic Curve Cryptography (ECC) is becoming increasingly popular in DNSSEC. While it is sometimes considered to be a remedy for the low DNSSEC adoption rate, there is also a lot of controversy around it. One of the main concerns is that DNSSEC-validating resolvers don't always make use of ECC…

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)