Banner image

Network Operations

All articles

Visualising IPv4 and IPv6 Tweets

Visualising IPv4 and IPv6 Tweets

Author image
Emile Aben

3 min read

This time we explored Twitter feed visualisation with CartoDB, a map visualisation tool.

Article tags:

0 Likes are disabled for this article.
0
Year in Review and Looking Ahead to 2015

Year in Review and Looking Ahead to 2015

Author image
Axel Pawlik

5 min read

RIPE NCC Managing Director Axel Pawlik recently gave an interview about what he sees as the most important developments of 2014 and looks ahead to the big issues in 2015.

Article tags:

2 Likes are disabled for this article.
1
Survey on Internet Routing Security

Survey on Internet Routing Security

Author image
Sebastian Abt

2 min read

This is a call for participation in a survey on Internet Routing Security. The survey runs until 9 January 2015 and will only take a few minutes.

Article tags:

0 Likes are disabled for this article.
2
Call for Input: RPKI Browser

Call for Input: RPKI Browser

Author image
Matthias Wählisch

3 min read

The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. The development is at very early stage. In this article, we ask for external input in terms of use cases, features etc.

Article tags:

1 Likes are disabled for this article.
0
Resolvers Fig.2

The Resolvers We Use

Author image
Geoff Huston

23 min read

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted e…

Article tags:

0 Likes are disabled for this article.
0
Who's Watching fig.2

Who's Watching

Author image
Geoff Huston

28 min read

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic e…

Article tags:

0 Likes are disabled for this article.
1
ECDSA and DNSSEC

ECDSA and DNSSEC

Author image
Geoff Huston

23 min read

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-valid…

Article tags:

0 Likes are disabled for this article.
0
Privacy and Security - Five Objectives

Privacy and Security - Five Objectives

Author image
Geoff Huston

7 min read

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. W…

Article tags:

0 Likes are disabled for this article.
2
Secure Internet Routing with RPKI

Secure Internet Routing with RPKI

Author image
Remy de Boer

6 min read

Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use th…

Article tags:

0 Likes are disabled for this article.
2
K-root map

Experiment Proposal to Improve K-root

Author image
Suzanne Taylor

4 min read

We used RIPE Atlas to measure latency times to K-root, and we believe we can improve those times by adding new nodes to K-root in strategic locations. Here, we propose the idea of developing an experiment that would let us measure this potential improvement.

Article tags:

0 Likes are disabled for this article.
0

Showing 896 article(s)