Telecom

Telecom / Recently Commented

On Comcast and Net Neutrality: Shouting Fire in a Theater

The Comcast traffic shaping case has stirred up passionate debate. Net neutrality proponents are calling for Comcast's head on a platter. The common argument is that Comcast's policy may stifle innovation and competition. If a service provider is allowed to exercise unregulated discretion in how it treats subscriber traffic, it is a slippery slope toward anti-competitive practices. Net neutrality says keep your hands off. Some are preaching net neutrality as if it were an inalienable human right like freedom of speech... more

IPv6 Over Satellite: Pie in the Sky?

I am writing this from the Satellite 2008 conference in Washington, D.C. As I make my way through the exhibits, I see many vendors advertising IP capabilities in their hardware products or network services. But when asked about IPv6 support, the common reply is a not so believable "it is on our roadmap" followed by a somewhat vague delivery date. Although IPv6 development has been slow across the board, it appears to be moving even more slowly in the satellite world... more

Why Regulate Cable Internet Access

The cable guys have their way of saying it: "What do you want to do, nationalize our businesses?" Another way of seeing this issue is: We have a very few very large providers of highspeed internet access in U.S. They have sufficient market power to decide how and when to prioritize internet communications. And all of these providers are competing with the internet in some way -- they are all (or are becoming) old media and old telecom companies that want to maintain control over their distribution channels. more

Call for Telecom Industry Wake-Up

As many of you know, I'm launching the Emerging Communications (eComm) conference -- taking place next month in Silicon Valley, at the Computer History Museum. Communications innovation has been stagnant, in my opinion, for nearly a decade. Telecommunications and Internet communications both seem to be at somewhat of an impasse. The communications industry needs a forum to help break through the stagnancy and highlight the huge opportunity space that is emerging. The stagnancy has been strikingly more so in telecommunications... more

IPv6: Do as I Say or Do as I Do?

How important is it for a vendor, service provider or integrator to be using a service or technology that it is pushing on its clients? When Voice over IP (VoIP) came out Cisco began a gigantic push, having its salespersons pitch it to anyone and everyone on their client list. But Cisco had not yet deployed VoIP within its own corporate network. It was still making use of traditional voice systems from vendors that today it probably considers competitors. Many people on the receiving end of a sales pitch recognized this... more

The Internet’s Weakest Link

This week two major transoceanic cables experienced outages that may last several days. The outages provide a reminder that several Internet bottlenecks exist where these cables make landfall. When one thinks of bottlenecks in telecommunications the first and last mile come to mind. Yet equally vulnerable are the last few 1000 feet of submarine cable links. more

Is China Preparing to Go its Own Way with its Own Internet Root?

Interesting things happening in China. An article in the English edition of the People's Daily on line is headlined, Decimal network security address begins operation: "China's decimal network security address was officially launched. China has made a fundamental breakthrough in its Internet development; and actual use has been successful. The birth of decimal network technology makes China the only country able to unify domain names, IP addresses and MAC addresses into the text of a metric system..." Someone asked whether this was a rumored IPv9? It appears IPv9 is a project name, not a new protocol. It lumps together several activities, including at least... more

More on 700 MHz Block C Hits Reserve Price

This is big... For the upper band C Block, the FCC mandated that any winning licensee have in place "no locking" and "no blocking" provisions conditioning its use of this spectrum: "Licensees offering service on spectrum subject to this section shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee..." The no-locking, no-blocking requirements were hedged in by substantial limitations... But it's still important... Particularly if Google is the winning bidder, something we may not know for a month or so. more

Google Playing to Win in the 700 MHz Auctions

Many say Google will bid to lose in the upcoming 700 MHz auctions and many more are equivocating. The idea is Google's entry alone will induce enough openness, and besides they couldn't afford to become an operator. This shows a total lack of understanding! more

Up to 300 Megawatt Worth of Keepalive Messages to be Saved by IPv6?

The Time Square Ball bringing in 2008 had more than 9,500 LED bulbs displaying 16 million colours while consuming power equivalent to about ten toasters. This compares to 600 incandescent and halogen bulbs adorning last year's Ball. Easy to forget that most mobile devices used by Time Square revelers were behind IPv4 NAT's and that always on applications such as Instant Messaging, Push e-mail, VoIP or location based services tend to be electricity guzzlers. It so happens that applications that we want always to be reachable have to keep sending periodic keepalive messages to keep the NAT state active... more

Walks Like a Telco, Yalks Like a Telco… Must be a Telco

Vonage's latest woes are written up by Om Malik in Vonage: How Low Can You Go. More interesting than Om's reportage (Sprint wins case, Vonage ordered to pay damages, stock drops to $1.30) is the commentary afterward, in which one reader takes Om to task for the "gleeful" way in which he reports the demise of the VoIP companies... Boosters made the argument that VoIP was fundamentally cheaper than the TDM systems that phone companies deploy, and so therefore they enjoyed a price advantage in the market place. Anyone in the business of supplying telecom equipment, however, will tell you that the argument is flawed... more

DNSSEC: Once More, With Feeling!

After looking at the state of DNSSEC in some detail a little over a year ago in 2006, I've been intending to come back to DNSSEC to see if anything has changed, for better or worse, in the intervening period... To recap, DNSSEC is an approach to adding some "security" into the DNS. The underlying motivation here is that the DNS represents a rather obvious gaping hole in the overall security picture of the Internet, although it is by no means the only rather significant vulnerability in the entire system. One of the more effective methods of a convert attack in this space is to attack at the level of the DNS by inserting fake responses in place of the actual DNS response. more

In Praise of Relatively Dumb Pipes

Comcast's furtive and undisclosed traffic manipulation reminds me of a curious, red herring asserted by some incumbent carriers and their sponsored researchers: that without complete freedom to vertically and horizontally integrate the carriers would lose synergies, efficiencies and be relegated to operating "dumb pipes."... Constructing and operating the pipes instead of creating the stuff that traverses them gets a bad rap. It may not be sexy, but it probably has less risk. But of course with less risk comes less reward, and suddenly no one in the telecommunications business is content with that. So incumbent carriers assert that convergence and competitive necessity requires them to add "value" to the pipes. more

Thus Ends the Stupid Network Model?

There is an article in EETimes by Fay Arjomandi of Vancouver-based Mobidia that may shake up the fans of the 10 year old stupid network principle. The stupid network essay calls for intelligence to reside at the edge of the network, rendering IP networks to plumbing pipes -- with carriers ignorant of the application and services being transported. more

Telecommunications Advocacy: Who’s Behind That Blog?

An assignment in a Media and Democracy course I teach at Penn State invites students to select a telecommunications advocacy web site for analysis. I want my students to decode the message and attempt to identify whether a bias exists and who financially supports the site. The exercise typically fails miserably... Most students cannot infer that a site that advertises books by Ann Coulter trends to the right and one that talks about social justice trends to the left. more