[Podcast] BGP in review for 2025
Geoff Huston discusses BGP trends in 2025 and how they may reshape our understanding of BGP’s place in the Internet’s technology adoption curve.
Geoff Huston discusses BGP trends in 2025 and how they may reshape our understanding of BGP’s place in the Internet’s technology adoption curve.
Guest Post: This post explores how different economies approach LEO satellite regulation, why these choices matter, and what a balanced, future-proof framework should look like.
Guest Post: How distributed forwarding and modern data plane architectures enable routers and AI fabrics to scale reliably and handle massive workloads without single points of failure.
Guest Post: An inference method that exploits the spatial correlation between a network prefix’s origin, and the location of the router that attaches a location community.
Mapping Internet number resources from IP addresses to organizations is straightforward using whois or RDAP, but listing all resources held by a given organization is far more challenging. This post explores a simpler, data-driven approach using RIR extended statistics and reg-id identifiers.
MyAPNIC now supports RPKI Signed Checklists (RSCs), providing Members with a new way to cryptographically sign and verify documents using their RPKI resources. Your feedback is welcome.
Two groups of students from NITK discuss the work they did at the IETF 122 Bangkok hackathon, and afterwards in their WG. Professor Mohit Taliani is seeking to encourage new entrants to join IETF protocol and standards development.
What IPv4 and IPv6 addressing in 2025 tells us about the changing nature of the network.
Guest Post: New collectors and tools, improved data access, and ongoing behind-the-scenes work to make the platform more stable, sustainable, and useful.
Guest Post: In modern network architecture, we often assume that perimeter defences are robust enough to keep internal traffic secure. However, vulnerabilities inherent in the trust mechanisms of fundamental network protocols reveal that unencrypted tunnels can become fatal backdoors in enterprise intranets.