Networks

Networks / Most Commented

The Lean and Antifragile Data Centre

Cloud is a new technology domain, and data centre engineering is still a developing discipline. I have interviewed a top expert in cloud infrastructure, Pete Cladingbowl. He has a vision of the 'lean' data centre and a better kind of Internet for users to reach it. He also has a roadmap for how these can be practically realised. The key is to apply established theories of value flow from more mature industries. more

What’s Holding Back NFV Deployments?

Back in early 2012, the media was all over stack wars that reportedly were taking place between Cisco and VMware. This culminated in VMware's Nicira acquisition in July 2012, paving the way for the coming of software-based networking. Four years later, the market still remains in development mode. Many service providers and enterprises are trying to come to grips with Network Function Virtualization (NFV) and Software-Defined Networking (SDN). more

Russian Central Bank Announces Mandatory Cyber-Security Regulations for Domestic Banks

"Russian banks will be faced with a whole range of new regulations, and penalties for non-compliance, when it comes to cyber-security, according to the country's Central Bank," Eugene Gerden reported today in SC Magazine UK more

IPv6 Now Dominant Protocol for Traffic Among Major US Mobile Providers

"Major Mobile US Networks Pass 50% IPv6 Threshold," reports Mat Ford, Technology Program Manager at the Internet Society (ISOC). more

Massive Cyberattack Aimed at Flooding .Gov Email Inboxes With Subscription Requests

"Massive Email Bombs Target .Gov Addresses," Brian Krebs writes in Krebs on Security: "Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists." more

China’s QUESS and Quantum Communications

In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more

Code Released by ‘Shadow Brokers’ Raises Alarming Concerns on Whether NSA Was Hacked

The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. more

Complexity and Crashes

It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem. more

WiFi QoE Assurance with TR-069 - Part 2: Optimizing a Single Access Point

As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more

Pro-Trump Russians Accused for Democratic National Committee Email Hack, FBI Investigating

"DNC Hack Prompts Allegations of Russian Involvement," Damian Paletta and Devlin Barrett reported in the Wall Street Journal today: "U.S. authorities said they are still investigating who perpetrated the hack, but cybersecurity experts said the email release resembled past examples of political interference that other countries have tied to Russia." more

Hyperconvergence, Disaggregation, and Cloud: The Foggy Future of Network Engineering

The world of networking tends to be bistable: we either centralize everything, or we decentralize everything. We started with mainframes, passed through Lotus 123 hidden in corners, then to mini's and middleware, then to laptops, and now to the cloud, to be followed by fog. This particular cycle of centralization/decentralization, however, has produced a series of overlapping changes that are difficult to decipher. You can somehow hear someone arguing about disaggregation and hyperconvergence through the fog -- but just barely. more

The Next Development in Wireless Broadband

In the USA the FCC has started the discussion on the next level of telecoms in the wireless market, aimed at making spectrum in bands above 24GHz available for flexible-use of wireless services, including next-generation, or 5G networks and technologies. New technologies such as massive-MIMO are going to make it possible to deliver 'fibre-like' speeds over short distance wireless networks operating in the 24+GHz bands. This will make the technology especially useful for high-speed broadband services in densely populated areas. more

Fibre Optic Technologies for the Next 50 Years

It might be hard to imagine but we were already talking about fibre to the home networks back in the 1970s and 1980s. This was in the early days of interactive TV and pay TV and fibre optics were already at that time seen as the next level of telecoms infrastructure needed for such services. The first residential fibre pilot networks were built in Berlin and Nagasaki. One of the most ambitious projects was in Columbus Ohio, but in the end they decided to continue with their HFC network. more

Average DDoS Attacks Now Large Enough to Take Most Organizations Completely Offline

Arbor Networks today released its Global DDoS Attack Data for the first half of 2016 affirming continued escalation in both the size and frequency of denial-of-service (DDoS) attacks. more

China Nearing Full Mobile Broadband Coverage

China’s mission to put its entire population on the internet is almost complete, as analysts predict full mobile broadband network coverage in the world’s second-largest economy within the next few years. more