Networks

Networks / Most Viewed

Ferocious FttH Competition in China

Most of the discussions, analyses and comments regarding the strategic issues in telecommunication are still focussed on the mature markets in Europe and North America, where there are well-established policies and regulations with institutions that have been in existence for many decades. Occasionally one hears claims that we are reverting back to old telecoms policies and regulations, as, for example, was the case with the FCC proposal for its Title II legislation. more

The Rotten Roots - Summary of Issues and Sources on Net Neutrality

The timeline of the Net Neutrality issue has been detailed here. And quoting from Vox: 'Wheeler said that peering is "an issue that we are investigating, it's an issue we are very interested in, but it's not the issue here today."' more

Provoking National Boundaries on the Internet? A chilling thought…

The impact of the recently revealed US government data collection practices may go well beyond the privacy ramifications outlined in the Internet Society's statement: expect a chilling effect on global, resilient network architecture. As governments of other countries realize how much of their citizens' traffic flows through the US, whether or not it is destined for any user or service there, expect to see moves to curtail connections to and through the US. more

Two Approaches to Routers in Space: SpaceX and OneWeb

Two companies hope to revolutionize the Internet by providing global connectivity using constellations of low-earth orbit satellites -- Elon Musk's SpaceX and Greg Wyler's OneWeb. It seems that SpaceX gets a lot more publicity than OneWeb, but both are formidable... SpaceX is integrated -- building the rockets, satellites and ground stations themselves -- while OneWeb has a number of collaborators and investors, including Bharti Enterprises, Coca-Cola, Intelsat, Hughes, Totalplay Telecommunications, Virgin Galactic and Softbank. more

Caidagram: Visualising Geographically Annotated Internet Measurements

With measurement networks rapidly evolving up to hundreds of nodes, it becomes more and more challenging to extract useful visualisations from tons of collected data. At the same time, geographical information related to Internet measurements (either known or inferred with state-of-the-art techniques) can be exploited to build tools based on geography as a common knowledge base. We wanted to develop a tool to visualise different classes of geographically annotated Internet data, e.g., topology, address allocation, DNS and economical data. more

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

European Union Member States published a report on the 'EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks'. The report is based on the results of the national cybersecurity risk assessments by all EU Member States. It identifies the main threats and threats actors, the most sensitive assets, the main vulnerabilities, and several strategic risks. more

OARC-39: Notes on the Recent DNS Operations, Analysis, and Research Centre Workshop

OARC held its fall meeting in Belgrade on October 22 and 23. Here are my impressions of some of the presentations from that meeting... UI, UX, and the Registry/Registrar Landscape - One of the major reforms introduced by ICANN in the world of DNS name management was the separation of registry and registrar functions. The intent was to introduce competition into the landscape by allowing multiple registries to enter names into a common registry. more

Spam from Mobile Networks? Who Woulda Thought…

Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more

What’s Holding Back NFV Deployments?

Back in early 2012, the media was all over stack wars that reportedly were taking place between Cisco and VMware. This culminated in VMware's Nicira acquisition in July 2012, paving the way for the coming of software-based networking. Four years later, the market still remains in development mode. Many service providers and enterprises are trying to come to grips with Network Function Virtualization (NFV) and Software-Defined Networking (SDN). more

Bypassing Geo-Locked BYOD Applications

In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Resources for Cleaning Your Network

The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more

Better Protection of Essential Power and Communication Grids From Storm Damage

After every major hurricane, like the category 4 Ida that recently hit Louisiana, there is talk in the telecom and power industries about better protecting our essential power and communication grids. There was major damage to grids and networks in Louisiana from hurricane winds and storm surges and massive flooding in the mid-Atlantic from Western Maryland to New York City. One thing that we've learned over time is that there is no way to stop storm damage. more

US Smart Grid Networks Exploiting Infrastructure to Provide Wireless Broadband

The USDA Rural Development's Rural Utilities Service (RUS) has now spent the $250 million committed for smart grid technologies. To this has been added an additional $201 million in funding approved by the Agriculture Secretary to electricity utilities in eight states to install smart grid technologies and improve their generation and transmission facilities. The beneficiaries are spread among a large number of states. more

Beyond the Interweb

Today's Internet is a network of networks and seen through the lens of the web. We need to look beyond the engineering history to see the Internet in the context of the broader vision of JCR Licklider, an acoustic psychologist, and his vision of man/computer symbiosis... JCR Licklider would've been thrilled to see such a powerful man-machine symbiosis becoming so normal and having it work so well. Lick, as he was called, can be considered the grandfather of the Internet. more