Banner image

Technology and Innovation

All articles

Figure2-MPLS.png

Gunfight at OK Corral: MPLS vs. Probing

Author image
Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 Likes are disabled for this article.
0
Researchers' first Encounter with the IETF Community: Measuring TCP, HTTP/2 and QUIC

Researchers' first Encounter with the IETF Community: Measuring TCP, HTTP/2 and QUIC

Author image
Torsten Zimmermann

6 min read

As Ph.D. students, our typical encounter with the IETF community and their work is by stumbling over RFCs and Internet-Drafts that either relate to or are a fundamental basis for our research. Beyond that, for us, the Internet Engineering Task Force (IETF) has been a vague entity focused on standar…

Article tags:

0 Likes are disabled for this article.
0
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Author image
Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 Likes are disabled for this article.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Author image
Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 Likes are disabled for this article.
11
Join the Quantum Internet Hackathon 2018

Join the Quantum Internet Hackathon 2018

Author image
Vesna Manojlovic

11 min read

The eighth RIPE NCC hackathon takes on the Quantum Internet! The hackathon will be held during the weekend before RIPE 77 in Amsterdam, and is co-organised by QuTech and TU Delft, along with the RIPE NCC. We're bringing together network operators, quantum networking researchers, students, hackers, …

Article tags:

8 Likes are disabled for this article.
0
Results of the Network Operators Tools Hackathon

Results of the Network Operators Tools Hackathon

Author image
Vesna Manojlovic

7 min read

The RIPE NCC and iNOG organised a hackathon in June 2018, in Dublin. This review celebrates the achievements of the hackathon, invites you to use our results, and welcomes your contributions for future hackathons!

Article tags:

0 Likes are disabled for this article.
0
Big Data and Network Measurements at TMA 2018

Big Data and Network Measurements at TMA 2018

Author image
Massimo Candela

7 min read

The Network Traffic Measurement and Analysis Conference (TMA) took place in June in Vienna, Austria. A full week of events was scheduled - including a PhD school about Big Data on Monday and Tuesday, the TMA Experts Summit on Tuesday, and the main conference from Wednesday to Friday. Here's my summ…

Article tags:

0 Likes are disabled for this article.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Author image
Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 Likes are disabled for this article.
1
Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Author image
Antoine Saverimoutou

7 min read

This post introduces the MORIS (Measuring and Observing Representative Information of webSites) probe, a tool for measuring automated web browsing sessions, which allows to estimate end-users’ QoE (Quality of Experience) in various situations and to perform troubleshooting when it is degraded.

Article tags:

0 Likes are disabled for this article.
1
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5

Showing 214 article(s)