Banner image

Network Operations

All articles

Implementing 2012-07 in the RIPE Database

Implementing 2012-07 in the RIPE Database

Author image
Xavier Le Bris

4 min read

This article describes the implementation of policy 2012-07 as it relates to the RIPE Database.

Article tags:

0 Please read the article before liking.
0
Proposed Implementation for 2012-07, "RIPE NCC Services to Legacy Internet Resource Holders"

Proposed Implementation for 2012-07, "RIPE NCC Services to Legacy Internet Resource Holders"

7 min read

The recently accepted RIPE Policy Proposal 2012-07, “RIPE NCC Services to Legacy Internet Resource Holders” defines a framework for the RIPE NCC to offer registry services to legacy Internet resource holders. This article details how we propose to implement this framework.

Article tags:

0 Please read the article before liking.
0
Network Anomaly Detection – Survey Evaluation

Network Anomaly Detection – Survey Evaluation

Author image
Jan Rejchrt

5 min read

We wanted to find out what network security experts think about network anomalies. We created a short web survey in order to map opinions of network professionals. In this article we describe the results.

Article tags:

0 Please read the article before liking.
0
RPKI Routing Policy Decision-Making - a SURFnet Perspective

RPKI Routing Policy Decision-Making - a SURFnet Perspective

Author image
Jac Kloots

11 min read

Before we decide to implement a stricter operational practices, we needed to find out how many routes with invalid origins are actually being used and how much traffic is exchanged using those routes. Please find the results below.

Article tags:

0 Please read the article before liking.
0
NTP Reflections

NTP Reflections

Author image
Mirjam Kühne

13 min read

After the recent amplification attacks involving NTP servers, John Kristoff, a researcher with Team Cymru, kindly agreed to publish an analysis of the history and timeline leading up to the attacks. Please find his contribution below.

Article tags:

0 Please read the article before liking.
0
The Many Instances of the L-root Name Server

The Many Instances of the L-root Name Server

Author image
Stéphane Bortzmeyer

7 min read

The techniques used by the L-root DNS server are documented in RFC 7108 "A Summary of Various Mechanisms Deployed at L-Root for the Identification of Anycast Nodes". These techniques can be used by the RIPE Atlas probes to find the instance of L-root they are talking to.

Article tags:

0 Please read the article before liking.
3
How Many RIPE Atlas Probes Can Resolve IPv6-only Domain Names?

How Many RIPE Atlas Probes Can Resolve IPv6-only Domain Names?

Author image
Stéphane Bortzmeyer

6 min read

Each RIPE Atlas probe has at least one DNS resolver, indicated by a DHCP reply on the local network of the probe. Irrespective of the IP address of the resolver, this server may have IPv4 and IPv6 connectivity or only IPv4 connectivity. What is the percentage among RIPE Atlas probes?

Article tags:

0 Please read the article before liking.
4
Infrastructure Geolocation - Plan of Action

Infrastructure Geolocation - Plan of Action

Author image
Emile Aben

7 min read

At RIPE 67 we presented our ideas on infrastructure geolocation. We received positive feedback for developing this idea. This article shows the current thinking on how to develop router geolocation further. Any feedback will be appreciated.

Article tags:

7 Please read the article before liking.
3
Are We Ready to Switch Off IPv4?

Are We Ready to Switch Off IPv4?

Author image
Marco Hogewoning

5 min read

At the RIPE 67 meeting in Athens, Greece, the RIPE IPv6 Working Group ran a little experiment to test the feasibility of an IPv6-only network and to identify challenges in user experience. While the results were highly encouraging, they indicated that there is still work to be done before IPv4 can …

Article tags:

0 Please read the article before liking.
0
Network Anomaly Detection – Do We Know What to Detect?

Network Anomaly Detection – Do We Know What to Detect?

Author image
Jan Rejchrt

3 min read

Network anomalies are not understood the same way among the network experts. However, establishing a unified view is important for the development of anomaly detection tools. The survey described below will help to develop such a unified view.

Article tags:

0 Please read the article before liking.
0

Showing 885 article(s)