Banner image

Technology and Innovation

All articles

IPv6 Adoption Statistics: a Comparison of Different Metrics

IPv6 Adoption Statistics: a Comparison of Different Metrics

Author image
Rene Wilhelm

13 min read

Following up on earlier research, we're looking at IPv6 adoption statistics provided by various organisations once again. How far do they match, and if not, why not?

Article tags:

1 Likes are disabled for this article.
6
RIPE 80: Setting up a Zoom Alternative with AWS

RIPE 80: Setting up a Zoom Alternative with AWS

Author image
Oliver Payne

9 min read

Not all of the RIPE 80 attendees were able to use Zoom to participate in the remote meeting for different reasons. We therefore provided an alternative way, which did not rely on Zoom, for people to join in the meeting.

Article tags:

42 Likes are disabled for this article.
6
k-root locations on map.png

RIPE NCC Country Report: Southeast Europe

Author image
Suzanne Taylor

3 min read

We examine the Internet landscape in eight different countries in Southeast Europe as the next in our series of RIPE NCC Country Reports.

Article tags:

0 Likes are disabled for this article.
0
Visualisations of Periodic IoT Traffic

Visualisations of Periodic IoT Traffic

Author image
Thymen Wabeke

8 min read

This is a case study to measure periodic network traffic from smart light bulbs.

Article tags:

0 Likes are disabled for this article.
0
Evaluating the Performance of NRENs in Deploying IoT in Africa: the Case for TTN

Evaluating the Performance of NRENs in Deploying IoT in Africa: the Case for TTN

7 min read

We analysed the readiness of African National Research and Education Networks (NRENs) to be part of “The Things Network” (TTN). We used RIPE Atlas to measure delay and packet loss from NREN networks to TTN.

Article tags:

0 Likes are disabled for this article.
0
Ware-Fig1.png

Modelling BBR’s Interactions with Loss-based Congestion Control

Author image
Ranysha Ware

8 min read

BBR has rapidly become a major player in Internet congestion control. BBR’s fairness or friendliness to other connections has recently come under scrutiny as measurements from multiple research groups have shown undesirable outcomes when BBR competes with traditional congestion control algorithms (…

Article tags:

1 Likes are disabled for this article.
2
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs

Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs

Author image
Marcin Nawrocki

8 min read

Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but also to the Internet infrastructure as a whole. Remote Triggered Black Hole filtering (RTBH) has been established as a tool to mitigate inter-domain DDoS attacks. The idea is simple: Signal special BG…

Article tags:

10 Likes are disabled for this article.
0
Our Approach to the Cloud

Our Approach to the Cloud

Author image
Kaveh Ranjbar

3 min read

We have plans to move some of our technical infrastructure to the cloud in order to achieve greater agility in our technical setup. Here's an overview of our approach.

Article tags:

2 Likes are disabled for this article.
5
How Consumer IoT Devices Expose Information

How Consumer IoT Devices Expose Information

Author image
Anna Maria Mandalari

11 min read

Do our Internet-of-Things (IoT) devices at home expose private information unexpectedly? Do leaks of sensitive user data depend on the location and jurisdiction of the IoT device? Through a total of 34,586 rigorous automated and manual controlled experiments, we characterised information exposure f…

Article tags:

0 Likes are disabled for this article.
0
Results of the First IoT Hackathon

Results of the First IoT Hackathon

Author image
Vesna Manojlovic

10 min read

The tenth RIPE NCC hackathon took on the Internet of Things (IoT). Over two days, community members experimented with possible IoT solutions.

Article tags:

0 Likes are disabled for this article.
0

Showing 214 article(s)