by APNIC
PING is a podcast for people who want to look behind the scenes into the workings of the Internet. Each fortnight we will chat with people who have built and are improving the health of the Internet. The views expressed by the featured speakers are their own and do not necessarily reflect the views of APNIC.
Language
🇺🇲
Publishing Since
2/16/2022
Email Addresses
1 available
Phone Numbers
0 available
April 30, 2025
In this episode of PING, APNIC’s Chief Scientist, Geoff Huston (https://blog.apnic.net/author/geoff-huston/), discusses the history and emerging future of how Internet protocols get more than the apparent link bandwidth by using multiple links and multiple paths.Initially, the model was quite simple, capable of handling up to four links of equal cost and delay reasonably well, typically to connect two points together. At the time, the Internet was built on telecommunications services originally designed for voice networks, with cabling laid between exchanges, from exchanges to customers, or across continents. This straightforward technique allowed the Internet to expand along available cable or fibre paths between two points. However, as the system became more complex, new path options emerged, and bandwidth demands grew beyond the capacity of individual or even equal-cost links, increasingly sophisticated methods for managing these connections had to be developed.An interesting development at the end of this process is the impact of a fully encrypted transport layer on the intervening infrastructure’s ability to manage traffic distribution across multiple links. With encryption obscuring the contents of the dataflow, traditional methods for intelligently splitting traffic become less effective. Randomly distributing data can often worsen performance, as modern techniques rely on protocols like TCP to sustain high-speed flows by avoiding data misordering and packet loss.This episode of PING explores how Internet protocols boost bandwidth by using multiple links and paths, and how secure transport layers affect this process.Read more about multipath network protocols on the web:* IETF Draft on Multipath for QUIC (https://quicwg.org/multipath/draft-ietf-quic-multipath.html) (IETF, April 2025)* Multipath TCP: Revolutionising connectivity one path at a time (https://blog.cloudflare.com/multi-path-tcp-revolutionizing-connectivity-one-path-at-a-time/)(Cloudflare Blog, January 2025)* RFC 8684 (https://www.rfc-editor.org/rfc/rfc8684) (IETF, 2020)*
April 16, 2025
Internet Society's Amreesh Phokeer and Robbie Mitchell recap the Pulse Internet Measurement Forum, interviewing industry experts Beau Gieskens, Doug Madory, and Lia Hestina on Internet measurement advancements in this interview
April 2, 2025
Geoff Huston, Chief Scientist at APNIC, explores the complexities of indicating 'no' in the DNS and the implications of NSEC3 records in this interview
Russ White
Jack Rhysider
Patrick Gray
Malicious Life
Jupiter Broadcasting
Changelog Media
Hacked
The Late Night Linux Family
The Late Night Linux Family
N2K Networks
The Verge
N2K Networks
Michael Kennedy
Packet Pushers
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.