Securing IoT wireless sensor networks
Guest Post: How can a wireless sensor network be secured without impairing the performance and behaviour of the network?
Guest Post: How can a wireless sensor network be secured without impairing the performance and behaviour of the network?
Guest Post: Dr Di Ma briefly describes the implementation of open source RPKI Relying Party software, RPSTIR.
Jon Brewer and Ulrich Speidel present two informative and futuristic talks about satellite communication at APNIC 44.
Opinion: Rather than being condemned, perhaps we should appreciate the role that NATs play in the evolution of the architecture of the Internet?
APNIC is supporting ISC to incorporate code changes to BIND, its open source DNS software, to help reduce the load on DNS root servers.
In part two of his IPv6 fragmentation research posts, Geoff Huston turns his attention to measuring the packet drop rate when sending fragmented packets to IPv6 end hosts.
Guest Post: A new community service tool allows Internet users to see if their IP address has been seen to be misbehaving or in use by an infected host.
Guest Post: After years of being used sparsely for UDP-based services such as DNS, anycasting IP space has become quite a meme in the networking world.
Managing the remaining IPv4 /8, leasing address space, and IPv6 allocation procedures are among the proposals to be discussed at the three-session Open Policy Meeting at APNIC 44 next month.
Guest Post: NAT64check can be used to easily check whether sites are reachable and work correctly over IPv6 and NAT64.