Networks

Networks / Most Viewed

How Much Longer Is This IPv6 Transition Going to Take?

The saga of the IPv6 transition continues to surprise us all. RFC 2460, the first complete effort at a specification of the IPv6 protocol, was published in December 1998, more than twenty years ago. The entire point of IPv6 was to specify a successor protocol to IPv4 due to the prospect of running out of IPv4 addresses. Yet we ran out of IPv4 addresses more than a decade ago. more

Russian Hackers Have Penetrated U.S. Electric Utilities

U.S. federal government officials have revealed Russian hackers have been able to gain access to the networks of electric utilities in the country, according to a report by The Wall Street Journal. more

The Internet and OpenStand: The Internet Didn’t Happen by Accident

On the World Standards Day of 2013 it seems appropriate to recognize that on the Internet and throughout the Web, nothing goes anywhere without standards. These technical standards - communication protocols, data exchange formats, and interfaces - allow different computers and networks to talk to each other. They are the lifeblood around the world for multibillion dollar industries that didn't exist 20 years ago. They are born of a collaborative, open process that prides itself on technical expertise and measures success by the depth and breadth of their acceptance across a hodgepodge of vastly different technologies all interconnected to what we euphemistically call "the Global Internet." more

Addressing 2013 - That Was the Year That Was

Time for another annual roundup from the world of IP addresses. What happened in 2013 and what is likely to happen in 2014? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more

One Year Later: Who’s Doing What With IPv6?

One year on from the World IPv6 Launch in June 2012, we wanted to see how much progress has been made towards the goal of global IPv6 deployment. Both APNIC and Google are carrying out measurements at the end user level, which show that around 1.29% (APNIC) and 1.48% (Google) of end users are capable of accessing the IPv6 Internet. Measurements taken from this time last year show 0.49% (APNIC) and 0.72% (Google), which means the amount of IPv6-enabled end users has more than doubled in the past 12 months. more

Open DNS Resolvers - Coming to an IP Address Near You!

Three vectors were exploited in the recent DDoS attack against Spamhaus: 1) Amplification of DNS queries through the use of DNSSEC signed data; 2) Spoofed source addresses due to lack of ingress filtering (BCP-38) on originating networks; 3) Utilisation of multiple open DNS resolvers While. 1) is unavoidable simply due to the additional data that DNSSEC produces, and 2) "should" be practised as part of any provider's network configuration, it is 3) that requires "you and I" ensure that systems are adequately configured.  more

The Changing Role of IP Addresses in the Architectural Evolution of the Internet

I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

With the increasing popularity of IoT devices and the added interest of transition to IPv6, a whole new range of threat vectors are evolving that allow attackers to set up undetectable communications channels across networks. more

IPv6: Childhood’s End?

A few weeks ago, when I was lurking around IPv6, I found that my own www.ipv6.tk was my first ever IPv6 domain. A "whois" on the domain says that it was registered in 2005, but something told me that I actually started this earlier. ?I therefore logged in at www.nic.tk and could see that my first feeling was correct; the first invoice for ipv6.tk was actually paid in the year of 2002. Here are some of the key things that I have experienced and learned over my first ten years. more

Business Case for IPv6 - Part 1

When discussing IPv6, it is easy to forget that we are ultimately talking about an enhanced version of an existing network protocol. Sure, it brings about a number of technical advantages. But when viewed in isolation - without a business case - there really are not that many drivers that would place IPv6 on the agenda of the top decision makers looking after budgets. For IPv6 to gain serious momentum, this has to be changed. more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

The Top 3 Emerging Threats on the Internet

Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals. Here are my notes. more

New Hair-Like Plastic Polymer Cable Can Transmit Data Ten Times Faster Than Copper

Scientists and engineers are always looking for ways to speed up and more efficiently configure computing devices to maximize data flow. There are a lot of applications today that require the exchange of huge volumes of data in real-time. MIT scientists have created a hair-like plastic polymer cable that can transmit data ten times faster than copper USB cables. more

The IPTV Growth in South Korea

At the beginning of 2008, the South Korean government passed a law that allowed telecoms operators to broadcast programmes in real-time over their broadband networks. The KCC awarded IPTV licences to KT Corp, Hanaro Telecom and LG Dacom. KT was banking on real-time Internet TV services because growth in the traditional broadband and telephone markets had slowed. The company planned to invest more than KRW1.7 trillion (US$1.5 billion) in IPTV services by 2012 as part of efforts to cultivate new sources of revenue. more