Networks

Networks / Recently Commented

Connecting the Next Billion. Is It Possible? (An African Perspective)

This year, the IGF Multistakeholder Advisory Group which provide assistance in the preparations for Global IGF meetings called for Intersessional work (activities that are pursued in the months between annual IGFs with the aim of helping the IGF produce more tangible outputs that can become robust resources). Previously, the IGF has used best Practice Forums and Dynamic coalitions to bring out key issues that affect the world as it relates to the Internet. This year's Intersessional activity is centred on "Policy Option for connecting the Next Billion". more

How to Tame Network Complexity

In a previous article, I discussed how telecoms is facing a growing complexity crisis. To resolve this crisis, a new approach is required. Here I explore how that complexity can be tamed... 'Invariants' are things that are meant to be 'true' and stay true over time. Some invariants are imposed upon us by the universe... Others are imposed by people. As engineers, we aim to establish these abstract 'truths' about the system. more

Zero-Rating vs. The Internet

Reading about the EU Neutrality vote, I'm reminded of the challenge faced by traditional telecommunications regulators in understanding the very concept of the Internet. To put it bluntly zero-rate is a policy framed in terms of Minitel and setting the price based on what phone number is dialed and not at all about the Internet where the value is determined by relationships entirely outside of a network. more

Future Network Forum to Be Held in Nanjing in December 2015

Between December 10th and 11th 2015, the China Future Network Development and Innovation Forum, jointly hosted by the Chinese Academy of Engineering and the Nanjing Municipal Government, is scheduled to be held in Nanjing, Jiangsu, China. The forum will be jointly organized by Jiangsu Future Networks Innovation Institute and Beijing Internet Institute, with the theme of "Building future network test facilities and promoting network development & innovation", and it will invite nearly a hundred industrial experts at home and abroad, to establish a platform marked by security, innovation, openness, cooperation where the policy, industry, academics, and application are integrated. more

Why IPv6 Deployment is Slow in Africa & What to Do About It

We (the global corps of IPv6 evangelists) have done the trainings (over 200 training sessions in about 45 countries in Africa alone and counting). We've done the conferences (several variations of IPv6 World, IPv6 Business Conferences, IPv6 Hours and Days at the Africa Internet Summits, etc). We've even done the global coordinated events -- IPv6 World Launch. Governments have found it trendy to launch IPv6 Task Forces and come up with National Action Plans for IPv6. Now, almost more than 2000 network engineers (across Africa), thousands of hours of speeches and presentations, hundreds of blog articles and webinars later, where are we? more

NANOG 65 Report

NANOG 65 was once again your typical NANOG meeting: a set of operators, vendors, researchers and others for 3 days, this time in Montreal in October. Here's my impressions of the meeting... The opening keynote was from Jack Waters from Level 3, which looked back over the past 25 years of the Internet, was interesting to me in its reference to the "Kingsbury Letter". more

Thoughts on the Open Internet - Part 5: Security

Any form of public communications network necessarily exposes some information about the identity and activity of the user's of its services. The extent to which such exposure of information can be subverted and used in ways that are in stark opposition to the users' individual interests forms part of the motivation on the part of many users to reduce such open exposure to an absolute minimum. The tensions between a desire to protect the user through increasing the level of opacity of network transactions to third party surveillance, and the need to expose some level of basic information to support the functions of a network lies at the heart of many of the security issues in today's Internet. more

Mobile Broadband Penetration in Asia

The advent of mobile broadband triggered a huge change in broadband access across Asia. Following more than a decade of strong growth in almost all mobile markets in the region, an amazing transition to new generation mobile networks and services took place. By end 2014 there were a total of 1.2 billion mobile subscribers and with annual growth running at over 40% coming into 2015 the numbers were expected to hit 1.7 billion by end-2015. more

Thoughts on the Open Internet - Part 4: Locality and Interdependence

The Internet was not originally designed as a single network that serviced much of the world's digital communications requirements. Its design was sufficiently flexible that it could be used in many contexts, including that of small network domains that were not connected to any other domain, through to large diverse systems with many tens of thousands of individual network elements. If that is indeed the case, then why is it that when networks wish to isolate themselves from the Internet, or when a natural calamity effectively isolates a network, the result is that the isolated network is often non-functional. more

Thoughts on the Open Internet - Part 2: The Where and How of “Internet Fragmentation”

In defining what is meant by "Internet Fragmentation" it is useful to briefly describe what is meant by its opposite, an "Open and Coherent Internet". As we've explored in the previous section, "coherence" implies that each of the elements of the Internet are orchestrated to work together to produce a seamless Internet which does not expose the boundaries between discrete elements. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

U.S. and China Negotiating Cyeberwarfare Control Deal

United States and China are in negotiation to establish a cyberattack agreement, according to reports. If successful, it "could become the first arms control accord for cyberspace, embracing a commitment by each country that it will not be the first to use cyberweapons to cripple the other's critical infrastructure during peacetime," reports David Sanger in the New York Times. more

Networking Firm Loses $46.7 Million to Fraudulent Wire Transfer

Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation." more

Global IPv6 Summit to Be Held on September 7th 2015

September 7th 2015 will see the Global IPv6 Next Generation Internet Summit 2015 (hereinafter referred to as IPv6 Summit) held in the Presidential Hotel Beijing. The conference will be co-hosted by the IPv6 Forum and BII Group, under the theme of "IPv6 approaching, are you ready?," which will be well attended by top-notch industrial experts both at home and abroad, hundreds of representatives from carriers across the globe, representatives of well-known vendors in the industry, experts from academic agencies, enterprise users, and many influential news outlets, who will discuss the mainstream plans and technical foci of large-scale IPv6 deployment, influence and challenges brought by IPv6 development on network security, Global Internet of Things boosted by IPv6, and other burning issues. more

The Internet of Things: When Sci-Fi Becomes Reality

In my last blog post I shared some of the general security challenges that come with the Internet of Things (IoT). In this post, I will focus on one particular security risk: distributed denial of service (DDoS) attacks. Even before the age of IoT, DDoS attacks have been turning multitudes of computers into botnets, attacking a single target and causing denial of services for the target's users. By "multitudes" we can be talking about thousands or even millions of victim devices. Now add IoT into the equation... more