Networks

Networks / Most Viewed

Data on Cuba’s SNET and a Few Suggestions for ETECSA

I've written several posts on Cuba's user-deployed street networks (SNET), the largest of which is SNET in Havana. (SNET was originally built by the gaming community, but the range of services has grown substantially). My posts and journalist's accounts like this one describe SNET, but a new paper presents SNET measurement data as well as descriptive material. more

A Look Back at the World of IP Addressing in 2018: What Changed and What to Expect

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back in around 1992 the IETF gazed into the crystal ball and tried to understand how the internet was going to evolve and what demands that would place on the addressing system as part of the "IP Next Generation" study. more

The Internet of Things: Solving Security Challenges from the Fringe to the Core

News flash: to help fight California's drought, Samsung is offering a $100,000 prize to the innovator who creates "the most effective use of IoT and ARTIK [Samsung's IoT platform] technology for reducing water consumption by individuals or municipalities." When the average reader of this news headline needs no explanation of what "IoT" means or what this contest is about, we know IoT, or the Internet of Things, is for real. There are already an estimated 25 billion connected devices around the world, according to expert estimates. more

Understanding the Threat Landscape: Cyber-Attack Actors and Motivations

The threat landscape has rapidly expanded over the past few years, and shows no signs of contracting. With major establishments in both the public and private sectors falling victim to cyber-attacks, it is critical for organizations to identify the motivations, modus operandi (MO) and objectives of adversaries in order to adequately and effectively defend their networks. Understanding the taxonomy of cyber-attacks is the first step in preparing an organization against exposure to them. more

Policies to Promote Broadband Access in Developing Countries

In the 2014 Istanbul-Turkey IGF workshop on policies to promote broadband access in developing countries organised by Rui ZHONG of ISOC China, we realized that while technological solutions are advancing rapidly, policy and regulations remain a significant barrier to affordable internet especially in the developing world. According to a report by Alliance for Affordable Internet ( A4AI), the key to affordability is the policy and regulatory environment that shapes the different actors in the market. more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

Remembering Dave Taht

Dave Taht died on April 1st. I met him only recently, and never in person, but his passing saddens me. His technical work and evangelism have improved the Internet, and I will give some examples of his contributions to the Internet community and users, but I am sad because he was a good person -- idealistic, unselfish, open, and funny. I'll miss him. First, his contributions, then his values. more

The Slow Mainstreaming of IPv6

Slowly, we’re making progress mainstreaming IPv6. I wanted to post on a few interesting developments. Late last month, Netflix got an IPv6 allocation from ARIN, and they’re advertising it in BGP... I look forward to the day I can stream movies to my Netflix set-top box over IPv6. more

Internet Evolution: Another 10 Years Later

Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more

The Year IPv6 Made it to Major League

May 6th 2007: ARIN board of trustees passes a resolution advising the Internet community that migration to a new version of the internet protocol, IPv6, will be necessary to allow continued growth of the internet. June 29th 2007, Puerto Rico: ICANN Board resolution states that: The Board further resolves to work with the Regional Internet Registries and other stakeholders to promote education and outreach, with the goal of supporting the future growth of the Internet by encouraging the timely deployment of IPv6. Oct 26th 2007 at the RIPE 55 meeting in Amsterdam... Nov 15th 2007: IGF meeting, Rio de Janeiro... This is but a small sample of the fast growing visibility IPv6 acquired this year, 2007. more

What is Internet Protocol Address Management?”

The number of web-based devices is expanding at an exponential clip, virtualization is making a very static environment dynamic, and now with the exhaustion of IPv4 and the oncoming complexities of IPv6 network operators must reevaluate what IP Address Management (IPAM) really is. The goal of this post is to define the various functions that make up IP Address Management. more

How to Translate a Gov’t IPv6 Mandate Into an Action Plan: Guidance for National IPv6 Task Forces

Last year, I gave a short talk at the Commonwealth Telecommunications Organisation (CTO) Forum in (Abuja, Nigeria) on this topic and I thought I'd offer more details here. Let's say an African government has realised that IPv4 address exhaustion imposes limits its country's ICT development. Initial investigations indicate that deploying IPv6 is the only sustainable solution. Governments are however not very skilled in the bottom-up approach that is popular in the Internet world. more

Uptake of IPv6 in All Regions

Our recent cooperation with the OECD on IPv6 deployment inspired us to provide more IPv6 deployment statistics to a wider audience - from network operators to national governments. The result is an infographic that shows the percentage of networks or Autonomous Systems that announce one or more IPv6 prefixes in the global routing table. This metric shows how many networks have actually deployed IPv6 in a country or group of countries. more

Massive Cyberattack Aimed at Flooding .Gov Email Inboxes With Subscription Requests

"Massive Email Bombs Target .Gov Addresses," Brian Krebs writes in Krebs on Security: "Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists." more

Google’s Secret Strategy With the Kansas City Fiber Project

I have long been perplexed at how Google plans to make a profit with their Kansas City Fiber project. Originally the project was touted as an altruistic move by Google to really understand the underlying costs of deploying fiber in a large municipality. But as anyone who has been in the trenches can tell you, it is not the technology that determines the cost of a fiber deployment, but the tyranny of the take-up. more