Networks

Networks / Most Commented

Is Bandwidth Infinite? It All Depends…

On August 23 ( while I was in China) a list member Lee S. Drybrugh wrote in jest: I happened to bump into Peter Cochrane stating, "The good news is -- bandwidth is free -- and we have an infinite supply." Next by sheer accident I bumped into this in relation to Gilder, "Telecosm argues that the world is beginning to realise that bandwidth is not a scarce resource (as was once thought) but is in factinfinite." Can anyone explain this infinite bandwidth as I think I am getting ripped off by my ISP if this is true? Craig Partridge then offered what I think is a very good commentary of a difficult question where the answer depends very much on context... more

First Square Mile is not the Last or First Mile: Discovery not Just Choices!

The term "last mile" highlights the fact that we are the consumers at the end of a broadband "pipe". Saying "first mile" is a little better but the Internet is not a pipe to or from somewhere else. It's about what we can do locally and then what we can do when we interconnect with other neighborhoods. It's better to describe our neighborhood as the first square mile. Telecom is about selling us services; the Internet is about what we can do ourselves locally and then interconnecting with others everywhere. In writing the First Square Mile - Our Neighborhood essay which I just posted I came to better understand the fundamental difference between the world of telecom which is about giving you choices and the Internet which provides opportunity to discover what we can't anticipate... more

Treating Different Types of Communications Differently

A friend who read my Creating Sustainable Network Neutrality paper wrote to say, "Help me understand what is so bad about treating different types of communications differently." That's a really good question! If you want to offer vertically integrated services on special purpose networks, such as video entertainment or pager service or telephony, I do not have a problem with that, provided you don't use your market power to impede Internet applications that offer competing services... more

More on Broadband Router Insecurity and Being Proactive

Fergie replied on NANOG to my recent post on the subject of broadband routers insecurity: "I'll even go a step further, and say that if ISPs keep punting on the whole botnet issue, and continue to think of themselves as 'common carriers' in some sense -- and continue to disengage on the issue -- then you may eventually forced to address those issues at some point in the not-so-distant future..." He is right, but I have a comment I felt it was important - to me - to make. Not just on this particular vulnerability, but on the "war"... more

Broadband Routers and Botnets: Being Proactive

In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more

Examining Two Well-Known Attacks on VoIP

VoIP is here to stay. In fact many incumbent telecommunication carriers have started offering VoIP service for sometime and several new VoIP service providers have emerged. Aside from issues such as quality of service, the aspect of security, or lack thereof, is misunderstood by some of the VoIP service providers. This purpose of this article is to discuss two of the most well known attacks that can be carried out in current VoIP deployments. more

ENUM: Mapping the E.164 Number Space into the DNS

Many communications networks are constructed for a single form of communication, and are ill suited to being used for any other form. Although the Internet is also a specialized network in terms of supporting digital communications, its relatively unique flexibility lies in its ability to digitally encode a very diverse set of communications formats, and then support their interaction over the Internet. In this way many communications networks can be mapped into an Internet application and in so doing become just another distributed application overlayed on the Internet. From this admittedly Internet-centric perspective, voice is just another Internet application. And for the growing population of Voice over IP (VoIP) users, this is indeed the case... more

What If They Simply Made Communications Technology Better?

Rob Hyndman has a pointer to Mark Cuban's latest: Think the Internet Will Replace TV? Think Again. Cuban's post can be summarized as: Today's broadband networks are too slow. The insatiable appetite for on-demand rich media content will soon overwhelm them. Telco's aren't putting in upgraded networks quickly enough to meet that demand. Cuban also provides some facts and figures to back up that claim. In the comments, readers have a number of viewpoints, including the view that Mark has ignored cable, and that cable can provide the required speeds and feeds... more

Today’s Carrier Networks as Trollways?

As I keep pointing out -- there is indeed a viable alternative of a real marketplace not a fake one. Today's system is a fake because it depends on capturing the value of the application - communications - in the transport and that is no longer possible because with the Internet the value is created OUTSIDE the network. One example of the collateral damage caused by today's approach is the utter lack of simple wireless connectivity. Another is that we have redundant capital intensive bit paths whose only purpose is to contain bits within billing paths. more

Examining the Reality of Convergence

If there is one word in the telecommunications that has suffered from over-abuse for many years now, it's convergence. The term has been liberally applied to each successive generation of communications technology for their supposed ability to solve a myriad of service delivery problems within a single unifying converged carriage and service delivery solution. Unfortunately, the underlying reality has always been markedly different from these wondrous promises, and we continue to see an industry that deploys a plethora of service delivery platforms and an equally diverse collection of associated switching and service delivery technologies. One can't help but wonder at the collective gullibility of an industry that continues to herald the convergent attributes of each new generation of communications technology, while at the same time being forced to admit that previous convergent promises have never been realized. more

Survey Predicts Attacks on the Network Infrastructure Within 10 Years

Pew Internet Project has released a report called "The Future of the Internet" based on a recently conducted survey where 1,286 internet experts are said to have looked at the future impact of the internet and assessed predictions about how technology and society will unfold. The following is and excerpt from the report predicting at least one devastating attack will occur in the next 10 years on the networked information infrastructure or the United States power grid. more

U.S. Moving Forward with ENUM

One of the pieces of infrastructure that makes all kinds of networks work and yet gets very little attention is the directory. Directories are big business. For example, there's directory of telephone numbers run by NeuStar, Inc. NeuStar has annual revenues of $92 million. Now, according to Light Reading, AT&T Corp. and MCI Inc., together with unidentified cable companies, telephone companies, and ISPs are preparing to form a Limited Liability Corporation (LLC) that will run a process to define a new company that will run ENUM. more

UK’s DNS Open to Prying Eyes

Network Penetration conducted a survey at the start of 2003 to check the status of the UK's DNS infrastructure. The second scan of the year has just been completed and the results are much more positive. There are however still some serious holes in major areas...Here is a look at what was tested, the results, some sample zone transfers and recommendations.  more

Exposing 9 Myths About IPv6

This is a special two-part series article providing a distinct and critical perspective on Internet Protocol Version 6 (IPv6) and the underlying realities of its deployment. The first part gives a closer look at how IPv6 came about. This part exposes the myths.

Good as all this is, these attributes alone have not been enough so far to propel IPv6 into broad-scale deployment, and consequently there has been considerable enthusiasm to discover additional reasons to deploy IPv6. Unfortunately, most of these reasons fall into the category of myth, and in looking at IPv6 it is probably a good idea, as well as fair sport, to expose some of these myths as well. more

How Did IPv6 Come About, Anyway?

This is a special two-part series article providing a distinct and critical perspective on Internet Protocol Version 6 (IPv6) and the underlying realities of its deployment. The first part gives a closer look at how IPv6 came about and the second part exposes the myths.

In January 1983, the Advanced Research Projects Agency Network (ARPANET) experienced a "flag day," and the Network Control Protocol, NCP, was turned off, and TCP/IP was turned on. Although there are, no doubt, some who would like to see a similar flag day where the world turns off its use of IPv4 and switches over to IPv6, such a scenario is a wild-eyed fantasy. Obviously, the Internet is now way too big for coordinated flag days. The transition of IPv6 into a mainstream deployed technology for the global Internet will take some years, and for many there is still a lingering doubt that it will happen at all. more