
Geoff Huston
Articles
-
Jan 12, 2025 |
blog.apnic.net | Geoff Huston
Time for another annual roundup from the world of IP addresses. Let’s see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Around 1992, the IETF gazed into its crystal ball and tried to understand how the Internet would evolve and what demands it would place on the addressing system as part of the ‘IP Next Generation’ study.
-
Jan 6, 2025 |
blog.apnic.net | Geoff Huston
The first part of this annual report on BGP for 2024 looked at the routing table size and some projections of table growth for IPv4 and IPv6. However, the scalability of BGP as the Internet’s routing protocol is not just dependent on the number of prefixes carried in the routing table. BGP protocol behaviour in the form of dynamic routing updates is also part of this story.
-
Jan 5, 2025 |
blog.apnic.net | Geoff Huston
At the start of each year, it’s been my habit to report on the behaviour of the Internet’s inter-domain routing system during the previous 12 months, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet. The strong growth numbers that were a constant feature of the past thirty years of the Internet’s story are simply not present in recent data.
-
Dec 19, 2024 |
blog.apnic.net | Geoff Huston
By L.G. Liao - http://www.airliners.net/photo/Air-China/Airbus-A321-213/2740681, CC BY-SA 3.0, Link Common folklore in the Domain Name System (DNS) is that a delegated domain name must be served by two or more nameservers. The logic for this is based on a desire for service resilience. If one server is unreachable, then hopefully, the other is not.
-
Nov 28, 2024 |
blog.apnic.net | Geoff Huston
It may be useful to start this article by defining what I am talking about. No, ‘Post-Quantum Cryptography’ is not about using the next generation of computer processors that may come after quantum computing, whatever that may be, to perform cryptography. It’s not even about ‘Quantum Cryptography’, which is all about devising cryptographic algorithms based on quantum mechanics.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →