Networks

Networks / Most Viewed

Mega Hacks and the Employees That Lost

When a business gets hacked and its corporate information is dumped on the Internet for all and sundry to see (albeit illegally), the effects of that breach are obviously devastating for all concerned. In many ways it's like the day after a fierce storm has driven a super-cargo container ship aground and beachcombers from far and wide have descended upon the ruptured carcass of metal to cart away anything they think has value or can be sold by the side of road. more

CE Router Certification Opens Up the Last Mile to IPv6 Fixed-Line

With reference to IPv6, probably most end users do not have any sense of it. The mainstream condition in the industry is that network carriers and content/service providers stick to their own arguments. Carriers consider lack of IPv6 content and service as the reason demand for IPv6 from the users is very low. The content and service providers believe that users cannot have access to content and service through IPv6 and thus carriers should provide the service in the background. more

Government-Industry Collaboration Is Better than Developing a Surveillance State

President Obama, in March 2016, again stressed the need for better collaboration between the tech industry and the government. He referred to his own White House initiative - this has resulted in the newly-formed US Digital Service, which is trying to recruit the tech industry to work with and for government. One of the key reasons it is so difficult to establish trustworthy, good working relationships is the extreme lack of tech understanding among most politicians and government bureaucrats. more

The Cyberthreats and Trends Enterprises Should Watch in 2016

Every year, Verisign iDefense Security Intelligence Services produces its Cyberthreats and Trends Report, which provides an overview of the key cybersecurity trends of the previous year and insight into how Verisign believes those trends will evolve. This report is designed to assist in informing cybersecurity and business operations teams of the critical cyberthreats and trends impacting their enterprises, helping them to anticipate key developments and more effectively triage attacks and allocate their limited resources. more

The Rise and Rise of Broadband in China

While there are plenty of articles continuously updating us on the incredible social and economic developments that are taking place in China it is still sometimes good to stand still and have a look at some of these developments. It was 15 years ago that the Chinese Government - in its 5-year plan - stated that it wanted to connect all of its half million villages to the telecommunications network. At that point the plan simply called for narrowband telephone connections. more

Hot Architectural Issues for the Internet

The Internet Architecture Board's (IAB) chair, Olaf Kolkman, asked the members of the IAB to provide a statement paper each on what they believe the current most pressing issues in terms of Internet architecture are... I have thought about this for the past few days, and realised that it's hard to come up with overarching issues and even harder to come up with issues, where the IAB actually could make a difference. But I came with up with two issues. more

BGP Hijacks: Two More Papers Consider the Problem

The security of the global Default Free Zone (DFZ) has been a topic of much debate and concern for the last twenty years (or more). Two recent papers have brought this issue to the surface once again - it is worth looking at what these two papers add to the mix of what is known, and what solutions might be available. The first of these traces the impact of Chinese "state actor" effects on BGP routing in recent years. more

7 Reasons Why R&E Networks and Universities Are Critical to Future of Broadband

There has been considerable discussion about the future of broadband in terms of infrastructure i.e. fiber, wireless, community owned etc. However, there has been little discussion, to borrow a phrase from Internet 2, on Net+ broadband services. It is in the Net+ services where I think R&E networks can play a critical in helping communities and small commercial ISPs deploy advanced services and applications that will provide new business models to underwrite the costs of next generation broadband. more

Life Outside IPv6 (Poll)

Within every organization a chosen few are tasked with introducing IPv6 into their networks, outward facing services or applications. But who are they? We know them as Network Engineers, System Administrators and Software Developers but are they one trick ponies spending all their time in layer 3? more

Mobile Broadband Boom: The Killer App for FttH

It still amazes us that respected industry commentators join liberal politicians in questioning the need for FttH in the wake of the enormous success of mobile broadband. They refer to this phenomenon as proof that people are bypassing their fixed broadband and are now using the smartphones and tablets to obtain most of their broadband access. However, after several years of mobile boom the majority of households are still using the fixed-line networks for calls... more

Security and Reliability: A Closer Look at Vulnerability Assessments

Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more

In Network Security Design, It’s About the Users

One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more

If Slate Comes in Standard Sizes, Why Not Broadband?

Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more

The Impacts of Hurricanes Harvey, Irma, and Maria on the Internet

The devastation caused by several storms during the 2017 Atlantic hurricane season has destroyed neighborhoods and taken lives across a number of Caribbean island nations including Texas and Florida in the United States. Senior Director of Internet Research & Analysis at Oracle Dyn Global Business Unit has posted a blog that takes a look at the impacts. more

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more