A solution to the concerns about the current RPKI Trust Anchor configuration
Guest Post: Join the discussion on the proposed ‘RPKI Trust Anchor Constraints’ specification and share your feedback to benefit the community.
Guest Post: Join the discussion on the proposed ‘RPKI Trust Anchor Constraints’ specification and share your feedback to benefit the community.
Shumon Huque discusses how greasing — testing unused protocol values — can keep extensible protocols flexible and prevents future extensions from breaking.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part two of this three-part deep dive series, we compare rate-based and credit-based approaches to flow control.
Marc Blanchet’s presentation about deep space networking imagines a future where the Internet works well for people on the moon, and those they are connected to back on Earth.
Guest Post: The NRO has published a new reference page to help network operators and other members of the Internet technical community learn how to create ROAs through each of the five RIRs.
Guest Post: Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements show broad collateral damage to legitimate services.
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Geoff Huston discusses the problem of Geolocation and Starlink, with mis-attribution of traffic to economies an increasing concern.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part one of this three-part deep dive series, we look at the principles of flow control.
Guest Post: How ccTLDs handle global traffic and DDoS risks.