Blogs
Characteristics of Destination Address Locality in Computer Networks: A Comparison of Caching Schemes
Thu, 02/05/2009 - 00:40 by Damien Saucez • Categories:
“Characteristics of Destination Address Locality in Computer Networks: A Compar-
ison of Caching Schemes,” R. Jain, Computer Networks and ISDN, vol. 18, pp. 243–254, 1989/1990.
This paper is probably the first to think about locality in network traffic. At that time, most of the networks were built on pure proprietary architectures, however, some of the conclusions are still applicable today. However, as the analysis was performed on non IP networks, we'll not discuss the experimental part in this summary.
Power failure at AMS-IX, one of the largest IX in Europe
Tue, 10/28/2008 - 12:00 by Olivier Bonaventure • Categories:
In Europe, a large fraction of the Internet traffic is exchanged at interconnection points such as LINX in London, BNIX in Belgium, SFINX, in Paris. AMS-IX, based in Amsterdam is one of the oldest and the largest interconnection points in Europe.
New sources of BGP data
Tue, 10/28/2008 - 00:22 by Olivier Bonaventure • Categories:
Researchers who are working on improving BGP are familar with popular sources of BGP updates and tables including :
Sample configuration files for hostapd and wpa_supplicant to make them work on a wired connection
Wed, 10/01/2008 - 14:28 by Damien Leroy • Categories:
In order to add new EAP methods to the linux implementation of IEEE802.1X, I had to make the protocol work on a wire. Since I had some difficulties to succeed and to find sample examples for wired connection, I publish these sample configuration here. I hope it will help.
It is based on hostapd and wpa_supplicant 0.6.4. To compile them, go in the hostapd/wpa_supplicant directory, copy "defconfig" to ".config", for hostapd uncomment the line "CONFIG_DRIVER_WIRED=y" and "make".
Hostapd (the authenticator)
Will this help improving the security of BGP ?
Sat, 08/30/2008 - 01:28 by Olivier Bonaventure • Categories:
During the Defcon conference, two security researchers have shown by a live exploit that interdomain routing with today's BGP is not secure. Additional details about the exploit may be found in :
Moving to IPv6 - interesting slides from IETF
Mon, 08/25/2008 - 19:50 by Olivier Bonaventure • Categories:
The IETF is becoming more and more concerned about the need to migrate to IPv6 and the difficulty of migrating the Internet to something else than the current IPv4. During the Dublin meeting, there were several interesting presentations about IPv6 :
- Google's IPv6 deployment started as a 20% project like gmail, but it is progressing quickly and we can expect more and more IPv6 content from google : http://www3.ietf.org/proceedings/08jul/slides/plenaryw-4.pdf
Principles of Protocol Design
Wed, 07/16/2008 - 01:50 by Olivier Bonaventure • Categories:
This book written by Robin Sharp and published by Springer Verlag takes an unusual path to describe computer network protocols. While most standard networking texts mainly focus on a textual description of the different protocols and mechanisms, Robin Sharp starts from formal description techniques. More precisely, he chooses the Communicating Sequential Processes (CSP) notation proposed by Hoare. CSP is a process algebra that allows to model the interactions among communicating processes.