Networks

Networks / Recently Commented

Why DNS Blacklists Don’t Work for IPv6 Networks

All effective spam filters use DNS blacklists or blocklists, known as DNSBLs. They provide an efficient way to publish sets of IP addresses from which the publisher recommends that mail systems not accept mail. A well run DNSBL can be very effective; the Spamhaus lists typically catch upwards of 80% of incoming spam with a very low error rate. DNSBLs take advantage of the existing DNS infrastructure to do fast, efficient lookups. A DNS lookup typically goes through three computers... more

Cisco Collaboration Summit - Where Unified Communications Could Be Going

This year's Cisco Collaboration Summit was a step up from last year, and I say that for good reason. Last year's event was good -- all of Cisco's events are good -- but the venue was too small and it took away from the messaging. For 2010, Cisco went out of town to the classy and classic Arizona Biltmore in Phoenix. They don't build them like this anymore, and to me, this setting did far more justice for what Cisco has to say about collaboration. more

Will the Cloud Kill Telecom Vendors?

There are many big questions in telecom these days, and this is one that's on my mind right now. Over the past few months, I've participated in events or briefed with leading vendors in our space, namely Avaya, ShoreTel, BroadSoft, Aastra, Metaswitch, Mitel, Interactive Intelligence, and this week Cisco. Every analyst has their own core circle of vendors they stay close to, but I'd say that's a pretty fair representation of who's driving telecom. To varying degrees, all of these vendors have a cloud story, and the more I hear it, the more I start to wonder what it really means. more

China and Taiwan to Lead the Development of 4G

China missed out on playing a leadership role in the development of 3G and as we predicted at that time, China would most certainly start looking at 4G for a major involvement in developing the technologies for it. more

Myanmar Internet Down from Massive DDoS Attack

Craig Labovitz of Arbor Networks reports: "Back in 2007, the Myanmar government reportedly severed all Myanmar Internet connectivity in a crackdown over growing political unrest. Yesterday, Myanmar once again fell of the Internet. Over the course of the past several days, Myanmar's main Internet provider, the Ministry of Post and Telecommunication (or PTT for short), suffered a large, sustained DDoS attack disrupting most network traffic in and out of the country." more

Global Spam Levels Drop Following Certain Events

If you haven't noticed lately, spam levels around the world have started dropping especially in October after a couple of events occurred. The first is a Russian crackdown on alleged spam king Igor Gusev, thought to be involved in the operations of SpamIt.com. SpamIt mysteriously shut down in late September, perhaps because Gusev caught wind of law enforcement starting to take notice of him. more

IPv6 for Mobile Networks: Time to Act Now!

Mobile Network Operators (MNOs) serve the largest constituent of connected devices. There are over 4.6B GSM (and its derivatives) subscriptions today. When you add the CDMA family along with technologies with smaller footprints such as WiMax, IDEN to this list, that number tops 5B mark. On the other hand there are only (yes only!) 800M Internet hosts per ISC. Considering such a small percentage of those 5B or so devices are capable of being an Internet host and out of that percentage even a much smaller percentage is connected at a given time, one can understand the sheer potential of explosion in the number of Internet hosts as mobile devices in the next 3-5 years. more

Google Internet Traffic Continues to Soar

Craig Labovitz reporting today on Arbor Networks blog: "In their earnings call last week, Google announced a record 2010 third-quarter revenue of $7.29 billion (up 23% from last year). The market rejoiced and Google shares shot past $615 giving the company a market cap of more than $195 billion. This month, Google broke an equally impressive Internet traffic record -- gaining more than 1% of all Internet traffic share since January. If Google were an ISP, as of this month it would rank as the second largest carrier on the planet..." more

AS Path Lengths Over Time - How Interconnected is the Internet?

One way to determine the denseness of the Internet, or its "interconnectedness", is to look at the path length between Autonomous Systems (ASes). The "shortest AS path" is a route selection rule in the Border Gateway Protocol (BGP) that means traffic from one AS will chose the path with the least number of ASes to get to the receiving AS. With IPv6 being deployed in parts of the Internet, we looked at the AS path length to see if the IPv6 portion of the Internet is more or less interconnected than the IPv4 Internet. more

U.S. Now Leading Source of Attack Traffic, Followed by China and Russia

The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more

IPv6 Momentum?

Last month, the Obama administration sponsored one of the first high-level government workshops on IPv6. At the meeting, the administration's Chief Information Officer, Vivek Kundra, announced a remarkable 2012 deadline for federal agencies to support IPv6. So with a high-level US government mandate and a recent spade of vendor and carrier IPv6 announcements (e.g. VeriSign, Hurricane Electric), is the 15 year old IPv6 migration effort finally gaining momentum? more

The Submarine Cable Conundrum

The boom and bust cycle of submarine cable deployment can be traced back to the 19th century. However it doesn't look as though we have learned a lot in those 150 years. One of the problems is that it generally takes two years to plan these international projects and two years to deploy the system. And even before the process commences there are often an initial two years when the potential builders are contemplating their plans. This means that new cables need to be planned at times when there is little demand for new capacity. more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

The IPTV Growth in South Korea

At the beginning of 2008, the South Korean government passed a law that allowed telecoms operators to broadcast programmes in real-time over their broadband networks. The KCC awarded IPTV licences to KT Corp, Hanaro Telecom and LG Dacom. KT was banking on real-time Internet TV services because growth in the traditional broadband and telephone markets had slowed. The company planned to invest more than KRW1.7 trillion (US$1.5 billion) in IPTV services by 2012 as part of efforts to cultivate new sources of revenue. more

IPv6: Smart Investments and Smart Grids

IPv6 a major catalyst for billions of dollars worth of deals? The Intel announcement of their McAfee purchase for 7.7 billion seems to indicate as much when Dave DeWalt , McAfee CEO is quoted as saying during a conference call; "If we look at the transition from IPv4 to IPv6, we're seeing an explosion of billions of devices and they all need to be secured." more