Networks

Blogs

Innovation Today is IN the Network

The largest and most important global information infrastructure today by any measure is clearly the global mobile network and all of its gateways, services, and connected devices. That network is standardized, managed, and energized by a combination of the 3GPP and GSMA. The level of 3GPP industry involvement and collaboration today probably exceeds all other telecom, internet, and assorted other bodies put together... and then some. more

Give Network Administrators a Zero-Impact Firmware Update Solution

Struggles with the firmware update process are well known by Network Administrators in the cable industry. The copious tasks required to complete an end-to-end firmware update are painstaking and error-prone, often making the investment not worth the time it takes to complete the work... imagine doing these manual tasks over and over for hundreds to thousands of devices, many from different vendors, each with its own unique device update path! Clearly, this complex challenge needs a solution. more

Could SNET Become Cuba's Guifi.net?

In an earlier post, I described Havana's community network, SNET, and wondered what it could become if the government and ETECSA were willing to legitimatize and support it. Spain's Guifi.net provides a possible answer to that question. Guifi.net is said to be the largest community network in the world. It began in 2004 and has grown to have 34,165 nodes online with 16,758 planned, 407 building, 612 testing and 4,043 inactive. more

Data on Cuba's SNET and a Few Suggestions for ETECSA

I've written several posts on Cuba's user-deployed street networks (SNET), the largest of which is SNET in Havana. (SNET was originally built by the gaming community, but the range of services has grown substantially). My posts and journalist's accounts like this one describe SNET, but a new paper presents SNET measurement data as well as descriptive material. more

Internet Hall of Fame Inductees Gather at GNTC to Discuss New Generation of Internet Infrastructure

Confronted with the rapid development of the Internet, the traditional network is facing severe challenges. Therefore, it is imperative to accelerate the construction of global network infrastructure and build a new generation of Internet infrastructure to adapt to the Internet of Everything and the intelligent society. From November 28 to 30, 2017, "GNTC 2017 Global Network Technology Conference" organized by BII Group and CFIEC, will see a grand opening in Beijing. more

Why Aren't We Fixing Route Leaks?

In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, "at 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and that were intended to stay internal to Level 3. By doing so, internet traffic to large eyeball networks like Comcast and Bell Canada, as well as major content providers like Netflix, was mistakenly sent through Level 3's misconfigured routers." more

A Glance Back at the Looking Glass: Will IP Really Take Over the World?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies were just starting to come into their own, and all-optical switching was just beginning to be considered for large-scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: "The past is a foreign country; they do things differently there." more

Enabling Privacy Is Not Harmful

The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more

Why 5G Is in Trouble (and How to Fix It)

I have a somewhat unconventional view of 5G. I just happen to believe it is the right one. It is trapped inside a category error about the nature of packet networking, and this means it is in trouble. As context, we are seeing the present broadband Internet access model maturing and begin to reach its peak. 5G eagerly anticipates the next wave of applications. As such, 5G is attempting to both extend and transcend the present "undifferentiated data sludge" model of mobile broadband. more

RIPE 75: Imprssions of the Meeting

RIPE held its 75th meeting in Dubai in mid-October. As usual, there was a diverse set of presentations covering a broad range of activities that are taking place on today's Internet. The topics include issues relating to network operations, regulatory policies, peering and interconnection, communications practices within data centers, IPv6, the DNS, routing and network measurement. If that's not enough, the topic of the Internet of Things has been added as a Working Group in the RIPE pantheon. If you add address policy, database and RIPE services to the mix, you get a pretty packed five days with topics that would appeal to most Internet folks. more

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more

What Does the Future Hold for the Internet?

This is the fundamental question that the Internet Society is posing through the report just launched today, our 2017 Global Internet Report: Paths to Our Digital Future. The report is a window into the diverse views and perspectives of a global community that cares deeply about how the Internet will evolve and impact humanity over the next 5-7 years. We couldn't know what we would find when we embarked on the journey to map what stakeholders believe could shape the future of the Internet... more

Networks Are Not Cars Nor Cell Phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more

News Briefs

Russia Appears to Have Begun Providing an Internet Connection to North Korea

The Impacts of Hurricanes Harvey, Irma, and Maria on the Internet

Over 190 Internet Engineers, Pioneers, Technologists File Comments with FCC on Net Neutrality

Complete Internet Shutdown Reported in Syria

Mozilla, National Science Foundation Offer $2M Prize for a Decentralized Web

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC's Privacy Roll Back

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Internet Heavy Weights Staying Out of Net Neutrality Battle

Fierce Political Battle Expected as FCC Chair Elaborated on Plan to Reverse 'Net Neutrality' Rules

Cuba Getting Faster YouTube Access in Next 24 Hours, Thanks to Deal Signed in December

Substantial Majority of Americans Say Local Governments Should Be Able to Build Their Own Broadband

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

Interpol's Michael Moran Receives 2017 M3AAWG Litynski Award

China's First IPv6-Only Backbone Network Connecting 1,200 More Campuses

Data Breaches Reported During 2016 Exposed Over 4.2 Billion Records

Canadian Energy Firms at Bigger Risk of Cyberattack

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection