Measurements and Statistics

All articles

PeeringDB 2022 Product Report

PeeringDB 2022 Product Report

Leo Vegoda

3 min read

Data quality and search were ranked most important by respondents to our last three user surveys. This update looks at improvements we have made to keep data quality high by improving automation, giving users better tools, and making it easier to find and export data in PeeringDB.

Article tags:

10 You have liked this article 0 times.
0
Five Proposals for a Better RIPE Atlas

Five Proposals for a Better RIPE Atlas

Robert Kisteleki

10 min read

RIPE Atlas is constantly evolving, with the development team changing implementation on a regular basis. When proposed changes relate to behaviour, community input can be very helpful in choosing the best way forward. In this article, we look at proposals we have lined up and invite your feedback.

Article tags:

22 You have liked this article 0 times.
2
Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Alun Davies

2 min read

Geolocation providers usually focus on locating end user devices at the edge of the Internet. But what about the machines that make up the infrastructure in the middle? In this episode, Chris Amin talks about RIPE IPmap - an API developed by the RIPE NCC to geolocate core Internet infrastructure.

Article tags:

85 You have liked this article 0 times.
2
RIPE NCC Internet Country Report: The Nordic Region

RIPE NCC Internet Country Report: The Nordic Region

Suzanne Taylor

5 min read

We take a comprehensive look at the five countries and three autonomous regions that make up the Nordic Region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

37 You have liked this article 0 times.
0
Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Vincentas Grinius

7 min read

Since the exhaustion of the IPv4 address pool, companies across the globe heavily rely on IPv4 transfer and lease markets. Unfortunately, transferred IP address blocks are far more likely to be blocklisted due to IP address abuse. But while abuse negatively affects IP address reputation, the risks …

Article tags:

27 You have liked this article 0 times.
0
Log4Shell Through the Scope of a Reactive Network Telescope

Log4Shell Through the Scope of a Reactive Network Telescope

Raphael Hiesgen

6 min read

The omnipresence of software introduces a constant threat of new vulnerabilities that affect widely-deployed implementations. At the end of 2021, the Log4Shell vulnerability (CVE-2021-44228) made headlines. In this article, read more about Log4Shell as seen from a reactive network telescope.

Article tags:

19 You have liked this article 0 times.
0
A Brief History of Network Time

A Brief History of Network Time

Robert Allen

8 min read

In this post we will look at how network time works today and the technology that keeps it accurate and secure. Most of the digital tools that society relies on–across sectors such as finance, telecommunication, security and energy–only work with precise and reliable time synchronisation. But what …

Article tags:

33 You have liked this article 0 times.
0
Minimising RIS Live Delays

Minimising RIS Live Delays

Oleg Muravskiy

7 min read

It has been almost 3 years since we promoted RIS Live to a full production service. Its biggest advantage is that it delivers RIS data in real time, with minimal delays from the RIS collectors to our users. We had received a lot of positive feedback about the service, however, we were still wonderi…

Article tags:

8 You have liked this article 0 times.
0
Staying Alive - What Is TTL and Why Is It Important for Your DNS Setup?

Staying Alive - What Is TTL and Why Is It Important for Your DNS Setup?

Lars-Johan Liman

6 min read

If you know about DNS, you've probably heard of the Time-to-Live (TTL) field. But mistakes with TTL are more common than you might think. Here we look at the quirks of DNS record sets, parent/child domains and how to avoid TTL problems.

Article tags:

20 You have liked this article 0 times.
0
Production Deployment of TCP Authentication Option

Production Deployment of TCP Authentication Option

Andrew Gallo

3 min read

The George Washington University recently deployed Transmission Control Protocol Authentication Option (TCP-AO) after a recent code upgrade on its border routers. This further enhances BGP security features already in place on our network.

Article tags:

22 You have liked this article 0 times.
0

Showing 815 article(s)

Previous
1 ... 5 6 7 8 9 ... 82
Next