IPv4 Markets |
Sponsored by |
Who would dare to predict the year the Internet will reach 50 billion addressable devices? Thomas Noren, head of LTE product development at Ericsson sees one day 50 billion devices shouldered by LTE. He sees LTE as the truly global standard putting to rest the long and acrimonious rivalry between CDMA and GSM protagonists and even sees the Chinese third way with their TD-SCDMA aligned on LTE. Mobile WiMax is, in his mind, already relegated to the dustbin of history... more
We know that the Internet is running out of IPv4 addresses and that some in our community check twice a day Mat Ford's doomsday clock or spend an hour once a week reading the tea leaves based on Geoff Huston's exhaustive data compiled at Potaroo. Like with global warming, there is still a school of thought out there arguing that this running out of IP addresses is just fear mongering and that we are not really running out of IPv4 addresses as a NATted world is more than adequate to run the Internet for the foreseeable future. We know that the Internet is running out of AS... more
There is a current ongoing Internet emergency: a critical 0day vulnerability currently exploited in the wild threatens numerous desktop systems which are being compromised and turned into bots, and the domain names hosting it are a significant part of the reason why this attack has not yet been mitigated. This incident is currently being handled by several operational groups. This past February, I sent an email to the Reg-Ops (Registrar Operations) mailing list. The email, which is quoted below, states how DNS abuse (not the DNS infrastructure) is the biggest unmitigated current vulnerability in day-to-day Internet security operations, not to mention abuse. more
We don't give enough credit to people who will sacrifice themselves trying to plug the IPv4 dam with some NAT-putty. They even dream of a NAT66 filled afterlife. The growing IPv6 traffic trickle was given evidence at the recent RIPE 57 meeting in Dubai in a number of presentations, including a most edifying Google presentation. Noteworthy to see France with a 0.65% IPv6 penetration... more
It is an open secret that the current state of IPv4 allocation contains many accidental historical imbalances and in particular developing countries who wish to use IPv4 are disadvantaged by the lack of addresses available through ordinary allocation and are forced into purchasing addresses on the open market. As most of the addresses for sale are held by organisations based in the developed world, this amounts to a transfer of wealth from the developing world to the developed world, on terms set by the developed world. more
Post Russia's April 4th blockage of Telegram, increasing number of users in the country are turning to VPNs and proxies to continue their access to the messaging platform. As a result, the government has gone a step further and started blocking every possible way of connecting to Telegram. more
Time for another annual roundup from the world of IP addresses. What happened in 2012 and what is likely to happen in 2013? This is an update to the reports prepared at the same time in previous years, so lets see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more
For the first time, a large-scale analysis of victims of internet denial-of-service (DoS) attacks worldwide has resulted in discovery of millions of network addresses subjeted to denial-of-service attacks over a two-year period. more
The Internet Society Deploy360 Programme issues a call for speakers for a series of upcoming global ION Conferences. ISOC welcomes submissions from IPv6 and DNSSEC experts to speak at any of the following ION conferences. more
Exponential growth of networks combined with the complexity introduced by IT initiatives e.g. VoIP, Cloud computing, server virtualization, desktop virtualization, IPv6 and service automation has required network teams to look for tools to automate IP address management (IPAM). Automated IPAM tools allow administrators to allocate subnets, allocate/track/reclaim IP addresses and provide visibility into the networks. Here are some examples of what a typical IPAM tool can do... more
Time for another annual roundup from the world of IP addresses. What happened in 2014 and what is likely to happen in 2015? This is an update to the reports prepared at the same time in previous years. So lets see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. more
We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses. more
The Regional Internet Registry for Europe, the Middle East and parts of Central Asia (RIPE NCC) together with Comcast and Danish Network Operator's Group (DKNOG), are organizing the sixth IPv6 focused hackathon. more
I have been attending the American Registry for Internet Numbers (ARIN) meeting in Toronto. ARIN is one of the RIRs, i.e., the Internet address registry and policy making authority for North America. Although I have observed and participated on RIR lists for some time and interacted with RIR representatives at ICANN, WSIS and IGF, this is the first time I have been able to attend a meeting. I'm glad I did. more
I've been looking into IP address filtering by content providers. I understand that IP addresses can be attached with confidence to geographical locations (at the country level, at least) about 80% of the time. You have to make up the rest with heuristics. So there are companies that are in the business of packaging those geolocation heuristics for sites. ...How widely are these services used? ...does it now make sense to put content sites to the burden of complying with the laws applicable to the people/machines they know are visiting them? more