Networks

Networks / Most Viewed

Reexamining Internet Fragmentation

One of the discussion topics at the recent ICANN 75 meeting was an old favorite of mine, namely the topic of Internet Fragmentation. Here, I'd like to explore this topic in a little more detail and look behind the knee-jerk response of declaiming fragmentation as bad under any and all circumstances. Perhaps there are more subtleties in this topic than simple judgments of good or bad. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

The Early History of Usenet, Part IX: Retrospective Thoughts

Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more

Performance Test White Paper for SDN Controller Issued

Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more

The Myth of Infinite Bandwidth

Back in the late 1990s I was often asked what I thought would happen if Internet bandwidth was infinite -- what would that change about the Internet itself? Level 3's (LVLT) recent decision to slash prices on its content distribution network and rumors of new multi-terabit cables across the Pacific have me wondering if we are actually getting closer to having infinite bandwidth. But when replying to the infinite bandwidth question I was prone to posing a return question -- what does infinite bandwidth actually mean? more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

Internet Cut Off Across Syria Amidst Tense Fighting

Internet monitoring companies say Syria's Internet connectivity has been shutdown nationwide. Renesys, a U.S.-based network security firm that studies Internet disruptions, reports that about 6 hours ago (12:26pm in Damascus) Syria's international Internet connectivity was shut down. "In the global routing table, all 84 of Syria's IP address blocks have become unreachable, effectively removing the country from the Internet." Akamai Technologies Inc. has also confirmed the complete outage in Syria. more

Caribbean Infrastructure Investment Must Keep Pace With Global Digital Trends

Caribbean islands are known for white-sand getaways, but one of the region's best-kept secrets remains buried under its picturesque beaches. That hidden treasure is the Caribbean's complex network of subsea Internet cables, worth their weight in gold because they connect these small-island nations to each other and to the global Internet. With that Internet connectivity comes the hope of a better life for millions of Caribbean citizens, and regional ambitions of global competitiveness. more

Italy’s Earthquake Rescuers Ask Locals to Unlock Their Wi-fi to Assit in Search and Rescue

The Italian Red Cross says residents' home networks can assist with communications during the search for survivors following Wednesday's 6.2 magnitude earthquake which struck central Italy killing over 240 people. more

Networking Firm Loses $46.7 Million to Fraudulent Wire Transfer

Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation." more

Facebook Outage Possibly Global

Craig Labovitz reporting from Arbor Networks: "We use ATLAS data to graph Facebook (AS32934) traffic with 80 ISPs around the world between 5pm September 22 and 5pm EDT today. You can see Facebook traffic plummet around 1:30pm and return shortly after 4pm. From a quick glance at the data, the outage appears to be global (impacting most of the 80 ISPs)." more

US Government Networks Thoroughly Penetrated by Foreign Spies, Experts Tell Senate

Network security experts from across the U.S. government told a U.S. Senate Armed Services Subcommittee on Tuesday that federal networks have been thoroughly penetrated by foreign spies, and that current perimeter-based defenses that attempt to curb intrusions are outdated and futile. more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more