Networks

Networks / Most Viewed

Network Complexity: Three Trends That are Contributing to a “Perfect Storm”

Most everyone who visits CircleID is familiar with Moore's Law, which stated simply holds that computing power doubles every 18 months. This has been going on since the 1960s and shows no sign of slowing. Moore's Law drives faster and faster computing, which produces more and more data and network complexity. This inexorable trend is putting immense pressure on corporate networks, and the strain is too much for many of them to handle on their own. more

Securing the Core

BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don't think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust... The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part. more

Innovation Today is IN the Network

The largest and most important global information infrastructure today by any measure is clearly the global mobile network and all of its gateways, services, and connected devices. That network is standardized, managed, and energized by a combination of the 3GPP and GSMA. The level of 3GPP industry involvement and collaboration today probably exceeds all other telecom, internet, and assorted other bodies put together... and then some. more

What Your ISP (Probably) Knows About You

Earlier this week, I came across a working paper from Professor Peter Swire - a highly respected attorney, professor, and policy expert. Swire's paper, entitled "Online Privacy and ISPs", argues that ISPs have limited capability to monitor users' online activity. The paper argues that ISPs have limited visibility into users' online activity for three reasons: (1) users are increasingly using many devices and connections, so any single ISP is the conduit of only a fraction of a typical user's activity; (2) end-to-end encryption is becoming more pervasive, which limits ISPs' ability to glean information about user activity; and (3) users are increasingly shifting to VPNs to send traffic. more

Protecting an Enterprise from Cyber Catastrophe

We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise can quickly recover in the case of successful cyber-attack or other disaster. University of Vermont Medical Center (UVMMC) is an excellent hospital. I owe my life to treatment there and am grateful for both the skill and the kindness of UVMMC staff. They have been devastated by a cyber-attack. more

Superstorm Sandy and the Global Internet

The Internet has managed to collect its fair share of mythology, and one of the more persistent myths is that from its genesis in a cold war US think tank in the 1960's the Internet was designed with remarkable ability to "route around damage." Whether the story of this cold war think tank is true or not, the adoption of a stateless forwarding architecture, coupled with a dynamic routing system, does allow the network to "self-heal" under certain circumstances. Can we see this self-healing in today's network? more

NORDUnet’s Brilliant Internet Peering Strategy

NORDUnet, the R&E network connecting the Nordic countries has recently undertaken a brilliant Internet peering strategy that will have global significant ramifications for supporting research and education around the world. NORDUnet is now emerging as one of the world's first "GREN"s -- Global Research and Education Network. NORDUnet is extending their network infrastructure to multiple points of presence throughout the USA and Europe to interconnect to major Internet Exchange Points (IXPs). more

What Does the Future Hold for the Internet?

This is the fundamental question that the Internet Society is posing through the report just launched today, our 2017 Global Internet Report: Paths to Our Digital Future. The report is a window into the diverse views and perspectives of a global community that cares deeply about how the Internet will evolve and impact humanity over the next 5-7 years. We couldn't know what we would find when we embarked on the journey to map what stakeholders believe could shape the future of the Internet... more

Do We Need IPv4 at Home/SOHO Any More?

CLAT/NAT64 is utilized across many mobile networks globally, and I am only talking about Ethernet and Wi-Fi in home and small office/home office (SOHO) environments. I experimented by completely disabling IPv4 at home and established a SSID where my MacBook Pro operates without an actual IPv4 address. The MacBook supports CLAT (RFC 6877), and by implementing PREF64 (RFC 8781) and DHCP Option 108 (RFC 8925) in my network, I was able to achieve a 100% IPv6 environment. more

Over 190 Internet Engineers, Pioneers, Technologists File Comments with FCC on Net Neutrality

A group of over 190 Internet engineers, pioneers, and technologists today filed joint comments with the Federal Communications Commission (FCC) explaining "Technical Flaws in the FCC's Notice of Proposed Rule-making and the Need for the Light-Touch, Bright-Line Rules from the Open Internet Order." more

Deploying DNSSEC: Lessons from Domain Registrar Implementation

As a registrar at the front end of the DNSSEC deployment effort, our technical team has made a sustained investment in DNSSEC deployment so that our customers don't get overwhelmed by this wave of changes to the core infrastructure of the Domain Name System. Along the way, we've learnt a lot about how to implement DNSSEC which might hold useful lessons for other organizations that plan to deploy DNSSEC in their networks. more

How to Move Cybersecurity Forward in a More Positive Way

In 2013 I wrote a blog Telecoms as a spying tool, in which I mentioned that those who use the internet to spy indiscriminately will have to face the reality that such activities will only start a cat-and-mouse game -- the technology will always be able to stay one step ahead of those who are using the internet for criminal purposes. Since that time some very significant developments have taken place that have confirmed our prediction. more

A Look at Why We Need Fibre-to-the-Farm

One of the discussions I am currently having with my international colleagues is about the global trend towards urbanisation and the resulting shift of political, economic and financial powers from centralised states and federal structures to mega-city or mega-urban region centres. Some of my American colleagues expressed the fear that this would further marginalise rural communication. more

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more

Why CDNs Are Critical to Future of R&E Networks, Big Data and the Internet

Netflix has announced that they are deploying their own Content Delivery Network (CDN) for delivery of their video streams to Internet Exchange Points (IXPs) around the world. More importantly they are making the hardware and software design of their CDN servers freely available. That means any network can deploy Netflix CDN boxes deep into their network to significantly reduce traffic volumes and improve performance for users. more