Networks

Networks / Most Viewed

Mobile Infrastructure Running Out of Steam

The enormous growth in mobile usage, doubling each year, is set to continue for several years in a row. According to Ericsson, by 2020 mobile operators will need to provide one thousand times the capacity that was required in 2010. Our assessment at BuddeComm is that the mobile industry has already fallen behind in delivering the capacity needed today, let alone coping with the enormous growth ahead; and that this situation will deteriorate before it improves. more

Bypassing Geo-Locked BYOD Applications

In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more

Better Protection of Essential Power and Communication Grids From Storm Damage

After every major hurricane, like the category 4 Ida that recently hit Louisiana, there is talk in the telecom and power industries about better protecting our essential power and communication grids. There was major damage to grids and networks in Louisiana from hurricane winds and storm surges and massive flooding in the mid-Atlantic from Western Maryland to New York City. One thing that we've learned over time is that there is no way to stop storm damage. more

Spam from Mobile Networks? Who Woulda Thought…

Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Caidagram: Visualising Geographically Annotated Internet Measurements

With measurement networks rapidly evolving up to hundreds of nodes, it becomes more and more challenging to extract useful visualisations from tons of collected data. At the same time, geographical information related to Internet measurements (either known or inferred with state-of-the-art techniques) can be exploited to build tools based on geography as a common knowledge base. We wanted to develop a tool to visualise different classes of geographically annotated Internet data, e.g., topology, address allocation, DNS and economical data. more

What’s Holding Back NFV Deployments?

Back in early 2012, the media was all over stack wars that reportedly were taking place between Cisco and VMware. This culminated in VMware's Nicira acquisition in July 2012, paving the way for the coming of software-based networking. Four years later, the market still remains in development mode. Many service providers and enterprises are trying to come to grips with Network Function Virtualization (NFV) and Software-Defined Networking (SDN). more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

Resources for Cleaning Your Network

The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

US Smart Grid Networks Exploiting Infrastructure to Provide Wireless Broadband

The USDA Rural Development's Rural Utilities Service (RUS) has now spent the $250 million committed for smart grid technologies. To this has been added an additional $201 million in funding approved by the Agriculture Secretary to electricity utilities in eight states to install smart grid technologies and improve their generation and transmission facilities. The beneficiaries are spread among a large number of states. more

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

Global Technical Internet Related Issues That Need Fixing

Given its engineering background, many positive contributions can be made by the engineering community in the broader ICT world to assist in addressing some of the broader internet issues, often addressed within the more limited telecoms environment.. Of course some of this is already happening; however much more work would be needed to strengthen the technical foundations of the internet. Just as an example, the type of issues that could be addressed by a broader ICT engineering foundation could include... more

The Appeal Against Broadband Reclassification

A British perspective on a very American process... As a new member of the the "Tech Elders", I was invited to join yesterday's hearing in Washington, DC on the reclassification of broadband Internet access services. The US Federal Communications Commission (FCC) has decreed that Internet access should switch from being lightly regulated as an 'information service' (Title I) to a more heavily regulated as 'telecommunications service' (Title II). I'd first like to say that the process and content was a credit to the rule of law in the United States. more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more