IXP from scratch: Part 2 — Network and security design
Guest Post: In principle, an IXP consists of a single broadcast domain, but in practice it has to operate several services securely to provide reliable peering services to its members.
Guest Post: In principle, an IXP consists of a single broadcast domain, but in practice it has to operate several services securely to provide reliable peering services to its members.
Guest Post: Do authoritative nameservers and resolvers follow best practices for NSEC3 settings?
Geoff Huston discusses Post-Quantum Cryptography in Internet protocols and the DNS in particular.
Guest Post: How to calculate theoretical optical power estimates at various ingress/egress points of a DWDM system before field validation.
Guest Post: How to build an IPv6-only IXP from grassroots including technical design decisions.
Guest Post: MPLS has become unnecessarily complex. Here’s how to make it simpler.
A friendly how to guide for network operators.
Guest Post: A walkthrough of an issue involving NTP interactions that resulted in severely incorrect dates.
APNIC extends its IPv6 resources with a second /12 allocation from IANA.
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.