Measuring IPv6 by Networks and End Users

by George Michaleson This article is looking at different measurements at the network level and at the end user level and examines the results seen by these measurements and some discussion of the variations between the two approaches.


Bemused Eyeballs: Tailoring Dual Stack Applications for a CGN Environment

How do you create a really robust service on the Internet? How can we maximise speed, responsiveness, and resiliency? How can we set up an application service environment in today’s network that can still deliver service quality and performance, even in the most adverse of conditions? And how can we…


A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts…


Some Further Thoughts on Securing Routing

It seems that the discussion about route leaks and securing BGP continues. Here, I’d like to quickly explore the issues related to the distinction between routing protocols, routing policies, routing and packet forwarding, and look at why securing the routing protocol does not necessarily ensure that you have secured packet…


It’s just not Cricket: Number Misuse, WCIT and ITRs

Another twenty five years has just zoomed by, and before you know it, it’s all on again. The last time the global communications sector did this was at the WATTC in 1988, when “the Internet” was just a relatively obscure experiment in protocol engineering for data communications. At that time…


Leaking Routes

Its happened again. We’ve just had yet another major routing leak, this time bringing down the Internet for most of an entire country. Maybe twenty years ago no one would’ve noticed, let alone comment, but now of course its headline material in the media. What happened? And how could this…


Hunting the Bogon Filter

Until recently IP network operators were encouraged to set up so-called “bogon address filters” at the edge of their networks. These filters were intended to discard all incoming traffic where the source address in the IP header was from a block of addresses that was known to be unallocated. The…


NZ nogging

The NZNOG meeting continues to be one of the more interesting NOG meetings these days. Now I have to say that in some sense the NZNOG meeting was not highly polished in terms of logistics: some of the time the overhead projector was either bouncing around or projecting in green,…


Measuring the Internet for fun and profit

Measuring the Internet for fun and profit Since March 2010 APNIC Research has been engaged in a web based data collection, as part of an ongoing, wide ranging measurement of the Internet, to try and understand how IPv6 deployment is taking shape. This article discusses how we’ve been doing this…


Addressing 2011 – One Down, Four to Go!

It’s January again, and being the start of another year, it’s as good a time as any to look at the last 12 months and see what the Internet was up to in 2011. So lets see what has changed in the past 12 months in addressing the Internet, and…