Networks

Networks / Most Commented

Is Secured Routing a Market Failure?

The Internet represents a threshold moment for the communications realm in many ways. It altered the immediate end client of the network service from humans to computers. It changed the communications model from synchronized end-to-end service to asynchronous and from virtual circuits to packet switching. At the same time, there were a set of sweeping changes in the public communications framework... more

Webcast May 23: Finnish Internet Forum – ‘Internet and War’ Panel

On Monday May 23 2022 at 3 -- 5pm EEST (12:00 -- 14:00 UTC) the Finnish Internet Forum will convene a panel at the University of Helsinki with the topic 'Internet and War'. A panel of experts will address the question of how the war has affected the Internet and how the Internet has been used to influence Finland and elsewhere during the war. The event will be conducted in English. more

Minding Your IP Address Reputation

Network operators rely on guidance from IP address experts because not all IP addresses used on the Internet are the same. The "reputation" of email senders is especially important because some are malicious users of the system. But identifying "senders" based on their email addresses or the individual IP address of a user presents issues that are unnecessarily complex. more

Network Requirements for the Metaverse

I've often joked that I don't play computer games because I'm holding out for a holodeck. While that may sound ridiculously far-future, we're on the verge of seeing the web-based virtual reality that will be a major step towards a holodeck. There is already some awesome virtual reality software and games where a person can get immersed in another world using a headset. more

Why Over Compliance With Sanctions at Internet Infrastructure Level Can Have Devastating Effects on Ordinary People

On Friday, Mykhailo Fedorov, Ukraine's digital transformation minister, asked Cloudflare and Amazon to stop serving Russian web resources and protecting Russian services. He said in a tweet that Ukraine was "calling on Amazon to stop providing cloud services in Russia." He also said that "Cloudflare should not protect Russian web resources while their tanks and missiles attack our kindergartens." more

Notes from NANOG 83

The network operations community is cautiously heading back into a mode of in-person meetings, and the NANOG meeting at the start of November was a hybrid affair with a mix of in-person and virtual participation, both by the presenters and the attendees. I was one of the virtual mob, and these are my notes from the presentations I found to be of personal interest. I hope you might also find them to be of interest as well... The year 2021 has not been a good year for Internet outages. more

Transparency Meets Sustainability: Announcing the SDIA Open Data Hub

Last month, the Sustainable Digital Infrastructure Alliance (SDIA) announced our Open Data Hub, a resource that's meant to boost transparency, trust, and data availability to help researchers, industry, and society realize a sustainable digital economy. It is essentially our answer to the challenge recognized across the sector: that the lack of reliable data is one of the most foundational issues we face in creating a sustainable ICT ecosystem. more

New Innovations in Free Space Optics

I read an article on the Finley Engineering blog that talks about new research with free-space optics. For those not familiar with the term, this means communication gear that communicates directly using light without any wires. The article talks about a Chinese team of scientists who have used light to transmit ultrahigh-definition video signals between high-rise buildings. more

A Look Back at the World of IP Addressing in 2020: What Changed and What It Means

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back around 1992, the IETF gazed into their crystal ball and tried to understand how the Internet was going to evolve and what demands would be placed on the addressing system as part of the "IP Next Generation" study.  more

A Look at DNS Trends and What the Future May Hold

We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses. more

The Evolution of 5G

Technology always evolves, and I've been reading about where scientists envision the evolution of 5G. The first generation of 5G, which will be rolled out over the next 3-5 years, is mostly aimed at increasing the throughput of cellular networks. According to Cisco, North American cellular data volumes are growing at a torrid 36% per year, and even faster than that in some urban markets where the volumes of data are doubling every two years. The main goal of the first-generation 5G is to increase network capacity to handle that growth. more

The Early History of Usenet, Part IX: Retrospective Thoughts

Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more

Gall’s Law and the Network

In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... more

Five Inconvenient Facts about the Migration to 5G Wireless

An unprecedented disinformation campaign purposefully distorts what consumers and governments understand about the upcoming fifth generation of wireless broadband technology. A variety of company executives and their sponsored advocates want us to believe that the United States already has lost the race to 5G global market supremacy and that it can regain it only with the assistance of a compliant government and a gullible public. more

Securing the Routing System at NANOG 74

The level of interest in the general topic of routing security seems to come in waves in our community. At times it seems like the interest from network operators, researchers, security folk and vendors climbs to an intense level, while at other times the topic appears to be moribund. If the attention on this topic at NANOG 74 is anything to go by we seem to be experiencing a local peak. more