Networks

Networks / Most Viewed

Canadian Telcos Fast Tracking FttH to Combat Cable Operators

There are a number of stimuli which are pushing Canada's burgeoning FttH market, and the government and telcos alike have made significant steps to improve the reach and capacity of broadband infrastructure. These measures will show real benefits for consumers in recent years. From the government's side, its Economic Action Plan, launched in 2009 as a response to the global financial crisis, included a pledge to provide $225 million over three years towards its Broadband Canada Program, geared to extending broadband coverage to underserved communities. more

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. more

UN Broadband Commission 2.0

Back in late 2009 I had the honour of explaining my views on how broadband can deliver social and economic benefits to countries and their people to Dr Hamadoun Touré the Secretary-General (SG) of the ITU, the UN body looking after global telecoms. He showed a particular interest in the initiative Australia had taken in developing the NBN. This discussion with the SG led to the establishment in 2010 of the UN Broadband Commission, co-sponsored by UNESCO and the ITU. Dr Touré invited 50 Commissioners from around the world to participate in this initiative, half of them from private industry. more

Can We Really Blame DNSSEC for Larger-Volume DDoS attacks?

In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more

Threat Intelligence in Latter 2019: Overcoming the Same and New Challenges

Does threat intelligence (TI) work? I looked into that question last year, exploring the reasons why it actually doesn't and what can be done to remediate the situation. Since then, more companies have incorporated TI into their security processes, and many are still not getting the benefits they expect. What's causing the dissatisfaction? Interestingly, pretty much the same aspects... more

Some Observations on Reachability of Egyptian Networks and Providers

Different media are reporting that Internet and other forms of electronic communications are being disrupted in Egypt. Presumably after a government order in response to the protests. Looking at BGP data we can confirm that according to our analysis 88% of the ‘Egyptian Internet’ has fallen of the Internet. In this post I’ll share some observations I made with regards to the reachability of Egyptian networks and providers. more

Pentagon Reveals Largest Ever Loss of Defense Data in Cyberattack

The Associated Press published an article today that the Pentagon revealed that earlier this year, they suffered one of its largest ever loss of sensitive data to a foreign government by a cyberattack. ... It's hard to say what's right and what's wrong. On the one hand, the Secretary of Defense says that the cyberwar is very real. On the other hand, the cyberczar Howard Schmidt said that there is no cyberwar and instead government needs to focus its efforts to fight online crime and espionage... more

The Internet and My 53 Years Online

With the upcoming celebration of the 50 years of the Internet, I'm trying to figure out how the traditional story misses the powerful idea that has made the Internet what it is -- the ability to focus on solutions without having to think about the network or providers. It's not the web -- thought that is one way to use the opportunity. The danger in a web-centric view is that it leads one to make the Internet better for the web while closing the frontier of innovation. more

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more

Transparency Meets Sustainability: Announcing the SDIA Open Data Hub

Last month, the Sustainable Digital Infrastructure Alliance (SDIA) announced our Open Data Hub, a resource that's meant to boost transparency, trust, and data availability to help researchers, industry, and society realize a sustainable digital economy. It is essentially our answer to the challenge recognized across the sector: that the lack of reliable data is one of the most foundational issues we face in creating a sustainable ICT ecosystem. more

Cutting Through the Twitter DDoS Hype

There are a lot of theories flying around about why Twitter and other social media services got knocked offline yesterday. I've heard rumors about it being linked to political tension between Georgia and Russia. Others blame Iran for the outages. I'm not a political commentator, therefore I cannot comment on anyone's political views -- but I have some logic and common sense, and I can draw some objective conclusions. more

ICANN, NTIA, Verisign and ANA Weighing In on ‘Name Collisions’ and the Readiness of New gTLD Program

Gregory S. Shatan of Reed Smith writes: "Last week, ICANN (the organization that oversees the domain name system of the Internet) was busy with nothing less than the security and stability of the Internet. At ICANN's recent meeting in Durban, those of us attending heard a drumbeat of studies, presentations and concerns regarding "name collisions": the conflicts that will arise when new gTLDs go live and conflict with existing top-level extensions in private networks..." more

Don’t Blame Open Recursives For DDoS Attacks and Why You Should Implement BCP38

There has been plenty of buzz and chatter on the Internet recently concerning a very large DDoS attack against CloudFlare, with coverage on their blog, the New York Times, and the BBC, among many others. While attacks of this nature are certainly nothing new, the scale of this attack was surprising, reported to hit 120Gbps. For a sense of scale, your average cable modem is only about 20Mbps, or about 0.016% of that bandwidth. more

Mobile Broadband Penetration in Asia

The advent of mobile broadband triggered a huge change in broadband access across Asia. Following more than a decade of strong growth in almost all mobile markets in the region, an amazing transition to new generation mobile networks and services took place. By end 2014 there were a total of 1.2 billion mobile subscribers and with annual growth running at over 40% coming into 2015 the numbers were expected to hit 1.7 billion by end-2015. more

DNS Complexity Lessons

Recently, Bert Hubert wrote of a growing problem in the networking world: the complexity of DNS. We have two systems we all use in the Internet, DNS and BGP. Both of these systems appear to be able to handle anything we can throw at them and "keep on ticking." But how far can we drive the complexity of these systems before they ultimately fail? Bert posted a chart on the APNIC blog to illustrate the problem. more