RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

54 items matching your search terms
41
On-path load balancing can send traffic across many potential paths, which typical traceroute usage will not fully capture. We are working on algorithms for a ...
42
BGP routing table growth is one of the major Internet scaling issues, and prefix deaggregation is thought to be a major contributor to table growth. In this ...
43
Statistical characterisation of Round Trip Times (RTT) series is useful for network management. For example, if several paths are available between a source ...
44
This is the first of two articles in which we present a new attack vector on the routing infrastructure of the Internet using BGP communities.
45
How does the largest cloud provider worldwide perform Traffic-Engineering? What are the implications for the geo-distributed applications running in the cloud? ...
46
One of the most noble narratives about the Internet is that it is built on trust. This article sets out to check if that saying still holds true.
47
Page - On RIPE Labs
There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.
48
In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate ...
49
Page - On RIPE Labs
The Internet was built using an architectural principle of a simple network and agile edges. The basic approach was to assume that the network is a simple ...
50
BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the ...
54 items matching your search terms