Networks

Networks / Most Commented

Ferocious FttH Competition in China

Most of the discussions, analyses and comments regarding the strategic issues in telecommunication are still focussed on the mature markets in Europe and North America, where there are well-established policies and regulations with institutions that have been in existence for many decades. Occasionally one hears claims that we are reverting back to old telecoms policies and regulations, as, for example, was the case with the FCC proposal for its Title II legislation. more

Back from RightsCon Manila: Trading Freedoms for Security?

In Asia -- a region that at various points in its recent history has been a hotbed for civil unrest, secessionist movements and political instability -- the line between national security and public interest can be difficult to draw. A session organised by the Internet Society at the recently held RightsCon Southeast Asia in Manila shed some light on the perceived trade-offs between national security objectives and digital rights, in particular freedom of expression and privacy. more

From Connecting Computers to Connecting Stakeholders: Stanford Univ. Hosts NetMundial Initiative

1974, Bob Kahn and Vint Cerf checked in the Crown Plaza Hotel in Palo Alto, worked a couple of days and presented to the world the TCP/IP protocol. Stanford hosted one of the four computers connected on equal footing (ARPANET) in 1969... A framed document in the hotel lobby remembers the historic moment. On March 31, 2014 a crowd of about 30 people from all over the world checked in the same Crown Plaza hotel for the first working meeting of the new Coordination Council (CC) of the NetMundial Initiative (NMI). more

Deadline of April 10 to Apply For CARIS Workshop on Coordinating Response to Internet Attacks

You have just a couple of days to either complete a survey or submit a paper to join the "Coordinating Attack Response at Internet Scale (CARIS)" Workshop happening on June 19, 2015, in Berlin, Germany... If you are interested in helping improve the overall security and resilience of the Internet through increased communication between the groups responding to the large-scale attacks happening on the Internet every day, I would strongly encourage you to apply! more

The 4 Major Drivers for Investment in NFV

Communication Service Providers (CSPs) have been driving the industry to develop agile solutions that abstract physical hardware from their solution platforms. With this technology, they hope to commoditize service functions to increase service agility and reduce the capital required to achieve better and more efficient service. Over the years, we have seen solutions from TMForum and CableLabs that help standardize certain aspects of the CSP plant and similar initiatives in the CPE world with Reference Design Kit (RDK)... more

IPv6 Security Myth #10: Deploying IPv6 is Too Risky

After a quick break to catch our breath (and read all those IPv6 Security Resources), it's now time to look at our tenth and final IPv6 Security Myth. In many ways this myth is the most important myth to bust. Let's take a look at why... Myth: Deploying IPv6 Makes My Network Less Secure... I can hear you asking "But what about all those security challenges we identified in the other myths?" more

IPv6 Security Myth #9: There Aren’t Any IPv6 Security Resources

We are approaching the end of this 10 part series on the most common IPv6 security myths. Now it's time to turn our eyes away from security risks to focus a bit more on security resources. Today's myth is actually one of the most harmful to those who hold it. If you believe that there is no good information out there, it's nearly impossible to find that information. So let's get down to it and dispel our 9th myth. more

Coordinating Attack Response at Internet Scale

How do we help coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won't survive for long as the network of networks grows ever larger. But it's not just the technology, it's also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create. more

Moving from 4G to 5G

A great deal of hype is out there, as vendors talk up the next development in mobile technology, known as 5G. FCC Chairman Tom Wheeler made a good comparison. He said that one person looking at the paintings by the Master in the Picasso Museum in Barcelona sees a different picture to the person next to them. That's what 5G is all about at the moment -- a great picture with lots of different interpretations. more

IPv6 Security Myth #7: 96 More Bits, No Magic

This week's myth is interesting because if we weren't talking security it wouldn't be a myth. Say what? The phrase "96 more bits, no magic" is basically a way of saying that IPv6 is just like IPv4, with longer addresses. From a pure routing and switching perspective, this is quite accurate. OSPF, IS-IS, and BGP all work pretty much the same, regardless of address family. Nothing about finding best paths and forwarding packets changes all that much from IPv4 to IPv6. more

The Mobile Internet

It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more

IPv6 Security Myth #6: IPv6 is Too New to be Attacked

Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more

Internet-Native Policies

Policies such as network neutrality and minimum speeds for broadband seek to limit the ability of carriers to favor some applications over others. Well-intended though these initiatives are, they still leave users negotiating for passage while confined to the carriers' "pipes". In this scenario, end users remain limited by how the incumbents choose to build their broadband content delivery networks. more

Riding the Waves of the Future

Yes, that was the theme of this year's Caribbean Cable and Telecommunications Association (CCTA) conference. This annual event was held in sunny Montego Bay, Jamaica, over the first week of February... For that, one has to applaud the fine work that CCTA puts into the event, drawing together operators, vendors, programmers, solution providers, marketers, and technologists alike -- and this year, over 270 attendees and 80-some exhibitors. more

Notes from NANOG 63

The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more