Networks

Networks / Most Commented

CIDR in Networking: Improved IP Routing Efficiency

CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more

May 13 Deadline to Nominate People for 2022 Jonathan B. Postel Service Award

Do you know someone who has made outstanding contributions in service to the Internet community? Someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or served in some capacity behind the scenes in Internet services? more

Using LEOs and GEOs

Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more

How Is Russia Connected to the Wider Internet?

Speculation about Russia disconnecting or being disconnected from the wider Internet abounds. In this article, we look at the connectivity of the Russian Internet to the wider Internet and how this evolved around the Russian invasion of Ukraine and the related sanctions. more

Routing Without Rumor: Securing the Internet’s Routing System

The Domain Name System has provided the fundamental service of mapping internet names to addresses from almost the earliest days of the internet’s history. Billions of internet-connected devices use DNS continuously to look up Internet Protocol addresses of the named resources they want to connect to - for instance, a website such as blog.verisign.com. Once a device has the resource’s address, it can then communicate with the resource using the internet’s routing system. more

The Changing Role of IP Addresses in the Architectural Evolution of the Internet

I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more

The State of RPKI as We Enter 2022

Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more

The Year 2038 Computer Problem – a Repeat of Y2K?

The Year 2038 Problem relates to representing time in many digital systems as the number of seconds passed since 00:00:00 UTC on 1 January 1970 and storing it as a signed 32-bit integer. Such implementations cannot encode times after 03:14:07 UTC on 19 January 2038. At that time, systems might crash and be unable to restart when the time is changed to that date. It is like the Y2K problem caused by the widespread use of two decimal digits to store the year. While that problem was overhyped... more

Big Internet Outages - There Is No Such Thing as a Routine Software Upgrade

Last year I wrote about big disruptive outages on the T-Mobile and the CenturyLink networks. Those outages demonstrate how a single circuit failure on a transport route or a single software error in a data center can spread quickly and cause big outages. I join a lot of the industry in blaming the spread of these outages on the concentration and centralization of networks where the nationwide routing of big networks is now controlled by only a handful of technicians in a few locations. In early October, we saw the granddaddy of all network outages... more

Why the Cloud Is the Solution for Telecom Upgrades

With so much "cloud-talk" across every industry -- many presume that every company with serious telecom operations has already moved there -- but they haven't. In fact, 20 to 25% of global companies are still using legacy PBX systems and MPLS networks and waiting to replace them and move over to SD-Wan/mesh solutions. These advancements can be done successfully after an infrastructure audit has been conducted to identify operational weaknesses and threat vulnerabilities and measuring efficiencies of each feature for usage optimization and increased productivity. more

A Note to PhDs Transferring From Academia to the ML Industry

Congratulations. You have successfully defended your PhD dissertation, and it was a defining moment in your life. Your professorial experience and teaching assistant credentials are finally going to pay off. Further, you might have hundreds of citations, and PhDs are sought after because of their subject matter expertise. Well, that is OK. All that hard work and discipline allows you to use your newly earned moniker and seek out additional opportunities, either within the scope of academia or corporate options. Wait, Wait, Wait, not so fast. If you are thinking of just strolling into the industry and immediately begin earning a six-figure salary, think again, my friend. more

Fifty Years On – What to Expect in the Next 50 Years of the Internet

When did the Internet begin? It all gets a bit hazy after so many years, but by the early 1970s, research work in packet-switched networks was well underway, and while it wasn't running TCP at the time (the flag day when the ARPANET switched over to use TCP was not until 1 January 1983) but there was the base datagram internet protocol running in the early research ARPA network in the US. Given that this is now around 50 years ago, and given that so much has happened in the last 50 years, what does the next 50 years have in store? more

Want to Help Guide the Future of the MANRS Routing Security Initiative?

Would you like to help guide the future of the Mutually Agreed Norms for Routing Security (MANRS) initiative? As the MANRS community continues to develop new efforts to make the routing layer of the Internet more secure (ex. the equipment vendor program), would you like to help lead the work? The MANRS community is seeking volunteers for its new Steering Committee. The committee will lead the community as it evolves its governance model.  more

Endpoint Rollbacks & Data Shadow Copies

Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more

Our New Infrastructure

Today, there is demand for more broadband as people realize the importance of being connected to the Internet, whether to access websites, stream entertainment, attend school, attend family events, work remotely, and so much more. This demand has been driven by the success of today's Internet. It is now time to recognize the Internet as infrastructure. The Internet's best-effort approach has allowed us to share the abundant capacity latent in the existing facilities by converting all traffic into packets. more