Banner image

Technology and Innovation

Latest articles

Head Image

Navigating Network Measurements - Routers, Switches, Servers

Author image
Tobias Fiebig

5 min read

If you want to run network measurements, you need to run them off of something. For a whole measurement.network, that means building a whole network. In this article, we will go into the infrastructure behind measurement.network, how it was built, and what it can do.

Article tags:

11 You have liked this article 0 times.
0
europe_connectivity

How Cloud Edge Infrastructure Improves Round-Trip Time

Author image
Katerina Lionta

10 min read

In this work, we investigate the improvements in network latency across six European countries - Germany, Finland, Poland, Bulgaria, Greece, and Czechia - when leveraging cloud edge infrastructure. Using ping measurements from RIPE Atlas, we analyse the impact of cloud edge solutions provided by th…

Article tags:

24 You have liked this article 0 times.
0
Head Image

Navigating Network Measurements - A Review of Results and Services

Author image
Tobias Fiebig

6 min read

Following up on our previous article looking into the goals and infrastructure behind measurement.network, this time we're going over the services that were made available last year and the research done so far.

Article tags:

13 You have liked this article 0 times.
2
ddos attacks

Observing the DDoS Landscape Requires Collaboration

Author image
Raphael Hiesgen

9 min read

Gaining a clear view of the DDoS landscape is vital for developing effective countermeasures against this prolific form of attack. A new study, carried out through collaboration between researchers from several institutions, helps bring DDoS into perspective.

25 You have liked this article 0 times.
0

All articles

levels of resiliency

A Deep Dive Into the Baltic Sea Cable Cuts

Author image
Emile Aben

25 min read

With last month’s cuts in two major Baltic Sea Internet cables now successfully repaired, and another cut having occurred in the meantime, we analyse these events and delve deeper into the question of how exactly the Internet has remained resilient.

Article tags:

62 You have liked this article 0 times.
0
hero_zero

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

Author image
Cordian Daniluk

7 min read

Hashed authenticated denial of existence appeared back in 2008 to prevent DNS zone walking. Since then, best practices have changed and were updated in RFC 9276. This article examines how the current landscape of authoritative name servers and resolvers complies with these recommendations.

Article tags:

15 You have liked this article 0 times.
2
yolocolo

Navigating Network Measurements - Research, Risks and Reliability

Author image
Tobias Fiebig

10 min read

Measuring the Internet is a delicate process and without the proper setup, things can get pretty out of hand pretty quickly. The measurement.network is a RIPE NCC Community Projects Fund supported project that helps researchers run network measurements without breaking things.

Article tags:

21 You have liked this article 0 times.
0
MENOG 24 Article Cover

The Internet Landscape in the Middle East

Author image
Qasim Lone

18 min read

The Middle East’s Internet landscape is diverse and complex, with big variations between the GCC countries and areas such as the Levant and North Africa. Ahead of MENOG 24, we look at the development of Internet technologies in the Arabic-speaking countries of the region that have the potential to …

Article tags:

38 You have liked this article 0 times.
3
baltic sea cable cuts

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Author image
Emile Aben

10 min read

This week's Internet cable cuts in the Baltic Sea have been widely reported, even as attempts to understand their cause and impact continue. We turn to RIPE Atlas to provide a preliminary analysis of these events and ask to what extent the Internet in the region has been resilient to them.

Article tags:

210 You have liked this article 0 times.
2
serial hijackers cover

Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Author image
Ebrima Jaw

9 min read

Serial hijackers are malicious actors that repeatedly carry out prefix hijacks on various networks, some lasting for months or years. A new study assesses the evolution of serial hijacking events since 2019 and determines what actions the technical community is taking to protect the Internet agains…

Article tags:

52 You have liked this article 0 times.
1

Showing 212 article(s)

Previous
1 2 3 ... 22
Next