Making the Internet Scale Through NAT
(just want to dump this here for future reference) It’s widely acknowledged that the internet has a scaling problem ahead of it, and an even more imminent addressing problem. The core of internet...
View ArticleNetwork Activity Visualisations
I’m tinkering on a network protocol simulator at the moment. For debug purposes, it can provide some basic visualisation of what’s going on, e.g. highlighting links which are transmitting messages....
View ArticleWhy don’t we just reclaim unused IPv4 addresses?
With IANA recently allocating its last 2 /8s from the IPv4 free pool to APNIC, and about to announce automatic allocation of each of the last 5 /8s to the RIRs, the end of IPv4 is truly nigh. The RIRs’...
View ArticleCerf and Kahn on why you want to keep IP fragmentation
In “A Protocol for Packet Network Intercommunication“, Vint Cerf and Bob Kahn explain the basic, core design decisions in TCP/IP, which they created. They describe the end-to-end principle. What...
View ArticleAre IPv6 addresses too small?
IPv4 addresses are running out. IPv6 seems to offer the promise of a vast, effectively limitless address space. However, is that true? Could it be that even IPv6 addresses are too limited in size to...
View ArticleBarabási – Albert preferential attachment and the Internet
The Barabási – Albert paper “Emergence of Scaling in Random Networks” helped popularise the preferential-attachment model of graphs, and its relevance to a number of real-world graphs. There’s a small,...
View ArticleThe surprising centres of the Internet
A previous post, on “Barabási – Albert preferential attachment and the Internet“, gave a plot of the Internet, as a sparsity map of its regular adjacency matrix, with the axes ordered by each ASes...
View ArticleSRAMs’ wireless bicycle gear shifting: Protocol analysis
It’s pretty rare that I get to blog about both cycling and networking. Hard to see how those two topics share any common ground. That’s about to change as SRAM, the American bicycle component maker,...
View ArticleBGP Multi-Exit-Discriminator
The following is an extract from a recently submitted update of mine to the Quagga documentation. Republished here under the licence of the Quagga documentation1: The BGP MED (Multi_Exit_Discriminator)...
View ArticleBGP Path Hunting
(originally published Aug 25, 2008 on blogs.sun.com – republishing here as Oracle nuked it all, but it’s been referenced in places). Path-hunting is the tendency of BGP, when a path is withdrawn by a...
View Article
More Pages to Explore .....