Networks

Networks / Recently Commented

Is IPv6 an Essential Precondition for Internet of Things? Or Are Things Just Fine with IPv4?

It has often been claimed that IPv6 and the Internet of Things are strongly aligned, to the extent that claims are made they are mutually reliant. An Internet of Things needs the massively expanded protocol address space that only IPv6 can provide, while IPv6 needs to identify a compelling use case to provide a substantive foundation to justify the additional expenditures associated with a widespread deployment of this new protocol that only the Internet of Things can provide. more

Broadband Carrier Quandary: Exploit Bandwidth Scarcity, or Reduce It?

Comcast enhanced the value position of its broadband subscriptions by increasing the monthly data allowance to 1 Terrabyte (1000 Gigabytes). See Comcast Announcement. As an independent, unsponsored researcher, I can say "Thank You Comcast" without adverse consequences and only a bit of irony. This company does much to displease, but an expanded data allowance offers a winning proposition. more

Why You Should Demand ‘Net Morality’ Instead of ‘Net Neutrality’

I have come to the conclusion that "net neutrality" is an ethical issue at heart, one about the appropriate constraint of unfair ISP power. Some people are (I pray unintentionally) on the wrong side of a now-clear moral divide. They are claiming to prevent harmful abuse of power, when in reality their actions create fresh harm. A central issue is one of technical competence to comment. If your beliefs are disconnected from how the world works, you cannot evaluate whether you are espousing something sensible or silly. more

On the Internet Everyone is Connected to Everyone Else - Right?

We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more

Why SDN is Not Enough

A hot topic in telecoms at the moment is 'software-defined networking' (SDN). This term covers a range of technologies that put networks under the control of centralised management software. But what if SDN misses the point of why broadband networks exist in the first place? Network equipment vendors are busy pushing operator CTOs to adopt a 'software telco' approach. A small army of analysts and consultants cheer this process on. more

Behind the Curtain: Making IPv6 Work

Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in. more

The Changing Mobile World

Today's Internet is undoubtedly the mobile Internet. Sales of all other forms of personal computers are in decline and the market focus is now squarely on tablets, "smart" phones and wearable peripherals. In 2014 these providers sold 1.5 billion such devices into the global consumer market, and doubtless 2015's numbers will be greater. Half of all Internet-visible devices are now mobile devices and they generate 75% of all access provider revenues. more

Thoughts on the Open Internet - Part 1: What Is “Open Internet”

I'm sure we've all heard about "the Open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more

The Real Reason Why Network ‘Neutrality’ Is Impossible

In "Net Neutrality: Discrimination, Competition, and Innovation in the UK and US", Alissa Cooper and Ian Brown explore the relationship between two broadband regulatory regimes and their practical outcomes. The paper is of (paradoxical) interest as it (unintentionally) demonstrates how policy is being made without sufficient understanding of packet network performance. This paper contains many common fallacies about performance. These fallacies are fuelling misdirected conflicts over broadband regulatory policy. The underlying (false) assumption is that 'neutral' (aka 'non-discriminatory') networks exist. more

Global IPv6 Deployment Now Passes 10%!

Global IPv6 deployment just passed a major milestone over the past few days when Google's IPv6 adoption statistics showed over 10% of users connecting to Google's sites coming in over IPv6. Considering that only two years ago I wrote here on CircleID about IPv6 passing the 3% adoption mark, this is a great amount of growth to see! If you look on the "per-country" tab of Google's stats you will see that in some countries deployment is much higher. For example, around 25% in the USA, Portugal and Germany, 31% in Switzerland and 44% in Belgium. more

Verisign’s Perspective on Recent Root Server Attacks

On Nov. 30 and Dec. 1, 2015, some of the Internet's Domain Name System (DNS) root name servers received large amounts of anomalous traffic. Last week the root server operators published a report on the incident. In the interest of further transparency, I'd like to take this opportunity to share Verisign's perspective, including how we identify, handle and react, as necessary, to events such as this. more

Internet Root Servers Hit with Unusual DNS Amplification Attack

On Nov. 30 and Dec. 1, several of the Internet Domain Name System's root name servers received high rate of suspicious queries, reaching as high as 5 million queries per second, according to a report released by the Root Server System Advisory Council. The incident has been categorized as a unique type of DNS amplification attack. more

Steering Website Traffic with Managed DNS vs. IP Anycast

I recently read an interesting post on LinkedIn Engineering's blog entitled "TCP over IP Anycast -- Pipe dream or Reality?" The authors describe a project to optimize the performance of www.linkedin.com. The web site is served from multiple web server instances located in LinkedIn's POPs all over the world. Previously LinkedIn used DNS geomapping exclusively to route its users to the best web server instance, but the post describes how they tried using BGP routing instead. more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

Verisign iDefense Analysis of XcodeGhost

At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more