Banner image

Network Operations

All articles

Future of RIPE NCC Technical Services

Future of RIPE NCC Technical Services

Author image
Kaveh Ranjbar

12 min read

As the new Chief Information Officer at the RIPE NCC, I’d like to take this opportunity to share with you some of my ideas about the future direction of the technical services we offer to the community. This includes focusing on RIPE Atlas as the RIPE NCC’s data collection system, RIPEstat as the R…

Article tags:

0 Likes are disabled for this article.
3
IPv6 ASNs - Network Size Matters

IPv6 ASNs - Network Size Matters

Author image
Emile Aben

5 min read

This article provides statistics about how much IPv4 address space is being announced by networks (ASNs) that are also announcing IPv6 address space. Currently this is about 70% of IPv4 address space.

Article tags:

0 Likes are disabled for this article.
0
GIH-Table1

Here’s looking at you …

Author image
Geoff Huston

29 min read

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States’ NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination…

Article tags:

0 Likes are disabled for this article.
4
All IP Addresses Are Equal? "dot-zero" Addresses Are Less Equal

All IP Addresses Are Equal? "dot-zero" Addresses Are Less Equal

Author image
Stéphane Bortzmeyer

4 min read

In theory, all IP addresses are the same, and you can allocate them at random without a problem. 192.168.1.2 is certainly not better or worse than 192.168.1.15, right? But, in practice, certain IP addresses are regarded as "special" by some implementations and do not yield the same user experience.…

Article tags:

0 Likes are disabled for this article.
11
IPv6 Security - An Overview

IPv6 Security - An Overview

Author image
Johannes Weber

7 min read

The advent of IPv6 changes not only the network components, but also the security field shifts. We see new types of attacks or at least variations of the attacks we know from IPv4. This article provides an overview of the IPv6 security vulnerabilities that arise with the launch of IPv6.

Article tags:

14 Likes are disabled for this article.
3
Evaluating the Effectiveness of Happy Eyeballs

Evaluating the Effectiveness of Happy Eyeballs

Author image
Vaibhav Bajpai

4 min read

The IETF has developed solutions that promote a healthy IPv4 and IPv6 co-existence. The happy eyeballs algorithm for instance, provides recommendations to application developers to help prevent bad user experience in situations where IPv6 connectivity is broken. We study the effectiveness of the ha…

Article tags:

0 Likes are disabled for this article.
0
How Many RIPE Atlas Probes Believe They Have IPv6 (But Are Wrong)?

How Many RIPE Atlas Probes Believe They Have IPv6 (But Are Wrong)?

Author image
Stéphane Bortzmeyer

4 min read

To check the connectivity of an IPv6 device with RIPE Atlas, one typically asks N probes to ping the target and deduces the reachability of the target from the percentage of failures. But RIPE Atlas probes, like many IPv6 devices, often believe they are IPv6-connected while they are not.

Article tags:

0 Likes are disabled for this article.
12
One Year Later: Who's Doing What With IPv6?

One Year Later: Who's Doing What With IPv6?

Author image
Antony Gollan

6 min read

On the anniversary of the World IPv6 Launch, this article takes a look at the readiness of networks to deploy IPv6, using statistics from the RIPE NCC service region and beyond.

Article tags:

0 Likes are disabled for this article.
4

Showing 912 article(s)