RIPE held its 75th meeting in Dubai in mid-October. As usual, there was a diverse set of presentations covering a broad range of activities that are taking place on today's Internet. The topics include issues relating to network operations, regulatory policies, peering and interconnection, communications practices within data centers, IPv6, the DNS, routing and network measurement. If that's not enough, the topic of the Internet of Things has been added as a Working Group in the RIPE pantheon. If you add address policy, database and RIPE services to the mix, you get a pretty packed five days with topics that would appeal to most Internet folks. more
IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more
The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more
Network experts monitoring North Korea have detected activation of a new internet path out of North Korea. Doug Madory, Director of Internet Analysis at Dyn, along with North Korea expert Martyn Williams, report that at 09:07:51 UTC on 1 October 2017, the country's single internet provider, Star JV (AS131269), gained a new connection to the global internet through Russian fixed-line provider Transtelecom (AS20485), often referred to as TTK. more
The devastation caused by several storms during the 2017 Atlantic hurricane season has destroyed neighborhoods and taken lives across a number of Caribbean island nations including Texas and Florida in the United States. Senior Director of Internet Research & Analysis at Oracle Dyn Global Business Unit has posted a blog that takes a look at the impacts. more
This is the fundamental question that the Internet Society is posing through the report just launched today, our 2017 Global Internet Report: Paths to Our Digital Future. The report is a window into the diverse views and perspectives of a global community that cares deeply about how the Internet will evolve and impact humanity over the next 5-7 years. We couldn't know what we would find when we embarked on the journey to map what stakeholders believe could shape the future of the Internet... more
The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more
I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more
With reference to IPv6, probably most end users do not have any sense of it. The mainstream condition in the industry is that network carriers and content/service providers stick to their own arguments. Carriers consider lack of IPv6 content and service as the reason demand for IPv6 from the users is very low. The content and service providers believe that users cannot have access to content and service through IPv6 and thus carriers should provide the service in the background. more
Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more
Last week, I had the honor of moderating an engaging panel discussion at Mozilla on the need for community networks and the important role they can play in bridging the digital divide. The panel highlighted the success stories of some of the existing California-based initiatives that are actively working toward building solutions to get under-served communities online. more
As I spend a lot of time on Oak Island (not the one on television, the other one), I tend to notice some of those trivial things in life. For instance, when the tide is pretty close to all the way in, it probably is not going to come in much longer; rather, it is likely to start going back out soon. If you spend any time around clocks with pendulums, you might have noticed the same thing; the maximum point at which the pendulum swings is the point where it also begins swinging back. more
A group of over 190 Internet engineers, pioneers, and technologists today filed joint comments with the Federal Communications Commission (FCC) explaining "Technical Flaws in the FCC's Notice of Proposed Rule-making and the Need for the Light-Touch, Bright-Line Rules from the Open Internet Order." more
Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more
While Syria's Internet disruptions in the recent past have been linked to Government's efforts to prevent cheating during national high school exams, today's complete Internet shutdown reported by Dyn Research is unknown and does not appear to be exam-related. more