Networks

Networks / Most Viewed

Cable in China

I'm writing this piece on the plane on my way back to Vancouver after a 12-day trip in China. I've written about China before, and every time I go, I understand and appreciate this complex country and culture a little more. If you think China is "up and coming," well, you might want to go and take a look for yourself. To be honest, I think they are already here. more

More Cracks Appearing in Mobile Market

When I wrote the BuddeComm analysis on the introduction of Apple's iPhone I commented that the most significant element of this event was that it would begin to create cracks in the flawed business models of the mobile operators, who are desperately hanging on to their closed networks very much like the fixed operators were fighting tooth and nail against opening up their networks. We have seen that the fixed operators have largely lost this battle and we predict that the future of the mobile networks will be no different... more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

A Note to PhDs Transferring From Academia to the ML Industry

Congratulations. You have successfully defended your PhD dissertation, and it was a defining moment in your life. Your professorial experience and teaching assistant credentials are finally going to pay off. Further, you might have hundreds of citations, and PhDs are sought after because of their subject matter expertise. Well, that is OK. All that hard work and discipline allows you to use your newly earned moniker and seek out additional opportunities, either within the scope of academia or corporate options. Wait, Wait, Wait, not so fast. If you are thinking of just strolling into the industry and immediately begin earning a six-figure salary, think again, my friend. more

Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic

As IPv6 adoption accelerates, a new study warns that the disappearance of NAT in home networks is exposing millions of devices to online threats -- potentially fueling a new wave of powerful IoT botnets. more

Substantial Majority of Americans Say Local Governments Should Be Able to Build Their Own Broadband

A recent study conducted Pew Research Center in March 13-27, has found a substantial majority of the American public (70%) believes local governments should be able to build their own broadband networks if existing services in the area are either too expensive or not good enough. more

How to Evaluate Performance of a DNS Resolver

Ten years ago everyone evaluating DNS solutions was always concerned about performance. Broadband networks were getting faster, providers were serving more users, and web pages and applications increasingly stressed the DNS. Viruses were a factor too as they could rapidly become the straw that broke the camel's back of a large ISP's DNS servers. The last thing a provider needed was a bottleneck, so DNS resolution speed became more and more visible, and performance was everything. more

Holding Times – A Phenomenon Happening With ISP Networks That No One Seems to Talk About

During the last year, we saw a big change in the nature of our broadband usage in that many of us are connecting to remote work or school servers, or we are connecting to long Zoom calls. We already can see that these changes have accelerated the average home usage of broadband. OpenSignal reports that the average broadband usage per home grew from 274 gigabytes per month just before the pandemic up to 462 gigabytes per month measured at the end of the first quarter of this year. more

The Magical Ampersand: Hope Is Not an Integration Plan

In a software-defined and virtualised world, who will integrate the complex dynamic systems, and take responsibility for the result? It is unclear if telcos have the skills, but someone else likely does... The included image caught my eye whilst I was reviewing presentations from last October's Metro Ethernet Forum gathering in Florida on behalf of a consulting client. At first glance, it's just a marketing pseudo-Venn diagram peppered with telco tech buzzword bingo. But... more

Businesses Are Ready for the Metaverse

The latest technology on the horizon is the metaverse, which, stated simply, is the creation of online environments. While the primary focus of the metaverse is to create alternate realities, an application with a possible immediate big uptake is vertical presence for business meetings. Ciena, a manufacturer of fiber optic transmission equipment, recently did a survey worldwide of 15,000 business people to understand the interests and expectations of the metaverse. more

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

Cisco has launched an intent-based networking solution designed to be intuitive and adapt; a new approach claimed to be one of the most significant breakthroughs in enterprise networking. more

Building a More Secure Routing System: Verisign’s Path to RPKI

At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more

Keep Your Pants On: Governments Want Suspenders for Secure Routing

The difficulty of applying a hierarchically organized PKI to the decentralized world of Internet routing is being fully exposed in a new Internet-draft. The document represents a rational response to an RPKI that closely ties address resources to a handful of Internet governance institutions, nicely illustrates how governments and national security policy are influencing Internet security, and portends substantial costs for network operators and beyond if adopted widely more

Major New Funding Opportunities for Internet Researchers and R&E Networks

Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more