There has been considerable discussion about the future of broadband in terms of infrastructure i.e. fiber, wireless, community owned etc. However, there has been little discussion, to borrow a phrase from Internet 2, on Net+ broadband services. It is in the Net+ services where I think R&E networks can play a critical in helping communities and small commercial ISPs deploy advanced services and applications that will provide new business models to underwrite the costs of next generation broadband. more
The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more
A number of conversations have recently converged on a single problem: how to match applications to network access. Let's unpeel this issue... When I was Chief Analyst at Telco 2.0, we proposed there was a significant untapped market opportunity for network operators to bundle together access with content, applications or services. The revenue opportunity is to charge the providers of those services for delivering fit-for-purpose data at bulk wholesale prices. This is the "postage problem"... more
The RIPE NCC is 20 years old and it now has over 8,000 members. In this article we are looking at the growth curve and the composition of the membership: what industry do RIPE NCC members come from today. The RIPE NCC became the first Regional Internet Registry in September 1992 (six months after it was set up as the secretariat for the European operators community, RIPE). more
At the recent IETF meeting there has been considerable discussion about interconnection of Content Delivery Networks. A lot of this is being driven unfortunately by the incumbent telco/cableco's who never understood CDN in the first place, and now want to assert control over this critical new Internet architecture, much in the same way that they want to take control over open WiFi hot spots as part of an integration strategy with their 3G/4G networks. more
The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. more
It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more
Pinning down the number of infected computers is really, really hard. I'd go as far as saying it's practically impossible to calculate, let alone observe. Still, that's not going to stop people from attempting to guess or extrapolate from their own observations. Over the years I've heard "reliable" numbers ranging from 10% through to 60% -- and I don't trust any of them. There's a whole gaggle of reasons why the numbers being thrown out to the public are inaccurate and should ideally be interpreted with a lot of skepticism by any right-minded folks. more
Over the weekend and this morning, Microsoft, working in conjunction with others, issued civil lawsuits to sinkhole numerous domains associated with the Zeus botnet. When I say "botnet", I use the term loosely because Zeus is not a botnet in the sense that Rustock or Waledac is (or was). Rather, Zeus is a tool kit that online criminals can buy that lets them create phishing pages, perform fast fluxing, host drive-by downloads in addition to spamming. It's more like infrastructure than a botnet, although it does have a large botnet under its control. more
Network security experts from across the U.S. government told a U.S. Senate Armed Services Subcommittee on Tuesday that federal networks have been thoroughly penetrated by foreign spies, and that current perimeter-based defenses that attempt to curb intrusions are outdated and futile. more
Another twenty five years has just zoomed by, and before you know it, it's all on again. The last time the global communications sector did this was at the WATTC in 1988, when "the Internet" was just a relatively obscure experiment in protocol engineering for data communications. At that time the Rather Grand telephone industry bought their respective government representatives... to the Rather Grandly titled "World Administrative Telegraph and Telephone Conference (WATTC) in November 1988 in Melbourne, Australia and resolved to agree to the Rather Grandly titled "International Telecommunication Regulations." more
About a year ago, we shared some graphs that showed the percentage of IPv6 enabled networks over time. More precisely, it showed the percentage of Autonomous Systems (ASes) that announced one or more IPv6 prefixes in the global routing table. The results for the five Regional Internet Registries (RIRs) were described in an earlier CircleID post... We looked at the progress since then. more
Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more
I regularly bring this issue forward, similar to the discussion in relation to the structural separation of the fixed networks, which I began just over a decade ago. What we are seeing in the mobile industry is an infrastructure and a spectrum crunch. The amount of spectrum needed to satisfy people's demand from mobile phones, tablets and soon a range of other smart devices is limitless. Mobile carriers are scrambling for spectrum... more
A few weeks ago, when I was lurking around IPv6, I found that my own www.ipv6.tk was my first ever IPv6 domain. A "whois" on the domain says that it was registered in 2005, but something told me that I actually started this earlier. ?I therefore logged in at www.nic.tk and could see that my first feeling was correct; the first invoice for ipv6.tk was actually paid in the year of 2002. Here are some of the key things that I have experienced and learned over my first ten years. more