Banner image

Network Operations

All articles

LISPmob: a Flexible LISP Implementation

LISPmob: a Flexible LISP Implementation

Author image
Alberto Rodriguez-Natal

12 min read

The Locator/ID Separation Protocol (LISP) decouples identity from location on the current IP addresses by creating two separate namespaces. The LISPmob project aims to bring a full-featured LISP open-source implementation to Linux-flavoured systems.

Article tags:

0 Likes are disabled for this article.
4
Overview with ExaBGP

Building The Next Generation RIS Route Collectors

Author image
Wouter Miltenburg

7 min read

This is the second part of a research project investigating the possible replacement of the current Remote Route Collectors (RRC) used for the Routing Information Services (RIS). In the second phase we developed a prototype based on the requirements determined in the first phase. Both parts of …

Article tags:

0 Likes are disabled for this article.
2
Propagation of Longer-than-/24 IPv4 Prefixes

Propagation of Longer-than-/24 IPv4 Prefixes

Author image
Emile Aben

8 min read

Under ARIN's Number Resource Policy Manual (NRPM) Section 4.10, the IPv4 address block 23.128/10 is reserved for allocations and assignments dedicated to facilitate IPv6 deployment. The maximum allocation size is a /24; the minimum allocation size is a /28. There has been much discussion on the NAN…

Article tags:

1 Likes are disabled for this article.
7
k-root IPv6 measurements

Time Warner Cable Outage

Author image
Emile Aben

8 min read

The Time Warner Cable network suffered an outage on 27 August 2014 between approximately 9:40 and 10:55 UTC. We looked at some interesting details of this outage using RIS and RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
0
512K-mageddon?

512K-mageddon?

Author image
Emile Aben

6 min read

A week after the 512K-routes problem started making waves, we took a look at the global effects to see what impact it had. Spoiler: Not much.

Article tags:

0 Likes are disabled for this article.
2
Researching Next Generation RIS Route Collectors

Researching Next Generation RIS Route Collectors

Author image
Wouter Miltenburg

12 min read

This project was initiated to research, develop and deploy a prototype that could potentially replace the current Remote Route Collectors (RRCs) and which invokes less delay. It was a graduation project for my bachelor thesis at the HvA (Hogeschool van Amsterdam). This article outlines the possible…

Article tags:

0 Likes are disabled for this article.
7
How RIPE Atlas Helped Wikipedia Users

How RIPE Atlas Helped Wikipedia Users

Author image
Emile Aben

6 min read

Engineers from the Wikimedia Foundation and the RIPE NCC recently collaborated on a project to measure the latency of Wikimedia sites for users worldwide. Together, we identified ways to decrease latency and improve performance for users around the world.

Article tags:

0 Likes are disabled for this article.
0
IPv6 to Secure Business Continuity

IPv6 to Secure Business Continuity

Author image
Marco Hogewoning

9 min read

Every few months somewhere somebody will tell you that the sky is falling and the end of the Internet is close. The reasons brought up vary through a broad spectrum from superior technology to the lack of capacity. To a large extent people in the industry have become immune to these messages, for t…

Article tags:

0 Likes are disabled for this article.
0
IPv6 Analyser Main Overview

The IPv6 Analyser

Author image
Alex Band

4 min read

The IPv6 Analyser is a toolset that offers our members a visual insight into all the allocations, aggregations and assignments they have made. It was announced a few weeks ago and we're seeing LIRs starting to use it. Please find below some more details about this tool.

Article tags:

0 Likes are disabled for this article.
0
SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

Author image
Luuk Hendriks

4 min read

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backb…

Article tags:

4 Likes are disabled for this article.
2

Showing 896 article(s)