Telecom

Telecom / Most Viewed

Exposing 9 Myths About IPv6

This is a special two-part series article providing a distinct and critical perspective on Internet Protocol Version 6 (IPv6) and the underlying realities of its deployment. The first part gives a closer look at how IPv6 came about. This part exposes the myths.

Good as all this is, these attributes alone have not been enough so far to propel IPv6 into broad-scale deployment, and consequently there has been considerable enthusiasm to discover additional reasons to deploy IPv6. Unfortunately, most of these reasons fall into the category of myth, and in looking at IPv6 it is probably a good idea, as well as fair sport, to expose some of these myths as well. more

Has the FCC Created a Stone Too Heavy for It to Lift?

After five years of bickering, the FCC passed an Open Internet Report & Order on a partisan 3-2 vote this week. The order is meant to guarantee that the Internet of the future will be just as free and open as the Internet of the past. Its success depends on how fast the Commission can transform itself from an old school telecom regulator wired to resist change into an innovation stimulator embracing opportunity. One thing we can be sure about is that the order hasn't tamped down the hyperbole that's fueled the fight to control the Internet's constituent parts for all these years. more

An Interview With Richard Whitt, Google’s Washington Telecom and Media Counsel

I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview. more

DPI is Not a Four-Letter Word!

As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more

Hunting Unicorns: Myths and Realities of the Net Neutrality Debate

In many ways, the emotionally charged debate on Network Neutrality (NN) has been a lot like hunting Unicorns. While hunting the mythical horse could be filled with adrenalin, emotion, and likely be quite entertaining, the prize would ultimately prove to be elusive. As a myth, entertaining; but when myths become reality, then all bets are off. The Network Neutrality public and private debate has been filled with more emotion than rational discussion, and in its wake a number of myths have become accepted as reality. Unfortunately, public policy, consumer broadband services, and service provider business survival hang in the balance. more

Call for Telecom Industry Wake-Up

As many of you know, I'm launching the Emerging Communications (eComm) conference -- taking place next month in Silicon Valley, at the Computer History Museum. Communications innovation has been stagnant, in my opinion, for nearly a decade. Telecommunications and Internet communications both seem to be at somewhat of an impasse. The communications industry needs a forum to help break through the stagnancy and highlight the huge opportunity space that is emerging. The stagnancy has been strikingly more so in telecommunications... more

Infrastructure ENUM

After much initial fanfare a couple of years ago ENUM has matured to a state where it is currently yet another under-achiever in the technology deployment stakes. ENUM initially presented itself as a very provocative response to the legacy telco position of monopolising public voice services through their exclusive control over the Public Switched Telephone Network (PSTN) and the associated controlling position over the telephone number space... The perception was that ENUM was going to dismantle these levers of control and open up the voice market to a new wave of competitive carriers. If the address plan was the key to the PSTN, then ENUM was intended unlock this network and position the new wave of Voice Over IP (VOIP) carriers to take over any residual treasures of the traditional voice market. Events have not played out according to these expectations... more

Privacy Alert: Watch Out For FOISA

This morning, at 10 am in 2141 Rayburn, the Subcommittee on Courts, the Internet, and Intellectual Property is holding a hearing on "Internet Domain Name Fraud -- New Criminal and Civil Enforcement Tools." At that hearing, the Subcommittee will be considering a new Whois bill creating new penalties for people who provide false data when registering a domain name. We need to raise our collective eyebrows at this bill (which was suddenly dropped the evening before this hearing). The title of the bill is the "Fraudulent Online Identity Sanctions Act." (FOISA) more

Squirrels Are the Number One Culprit for Animal Damage to Aerial Fiber

These cute rodents are the number one culprit for animal damage to aerial fiber. To a lesser degree, fiber owners report similar damage by rats and mice. Squirrels mainly chew on cables as a way to sharpen their teeth. Squirrel teeth grow up to 8 inches per year and if squirrels aren't wearing their teeth down from their diet, they look for other things to chew. more

Up to 300 Megawatt Worth of Keepalive Messages to be Saved by IPv6?

The Time Square Ball bringing in 2008 had more than 9,500 LED bulbs displaying 16 million colours while consuming power equivalent to about ten toasters. This compares to 600 incandescent and halogen bulbs adorning last year's Ball. Easy to forget that most mobile devices used by Time Square revelers were behind IPv4 NAT's and that always on applications such as Instant Messaging, Push e-mail, VoIP or location based services tend to be electricity guzzlers. It so happens that applications that we want always to be reachable have to keep sending periodic keepalive messages to keep the NAT state active... more

Monetizing the Internet

What would duopoly providers of internet access really like to have? They'd really like to be paid for providing non-commodity services. They'd really like to be rewarded for running the network, top to bottom. "But that's not possible," you say. No provider can tell one packet from another. Providers can only block the ports used by applications they don't like, and that's a clumsy, unwinnable arms race. The applications can always switch to common and useful ports, and no provider wants to alienate its subscriber base. But what if providers could inspect the contents of packets, without using too much computational power, and discriminate among applications? "Naah," you say. "They can't possibly do that."... more

Parsing Hype From Hope: Will ENUM Spark Changes In Telecom?

In the beginning there was silence; then, silence begat communication, and communication begat more communication and, ultimately, group communication formed and begat a primordial "network" of communication that gradually and inevitably increased in effectiveness and complexity: there were only signal fires at first but, then, there were cave drawings, carrier pigeons, shouting from hill-tops, smoke from fire, lines of cannon fire, the telegraph, Alexander Graham Bell, and, finally, the network of networks known as the Internet. But, is that it? Is there not something more impressive in its impact upon communication than the Internet? What more might one desire than the dynamic wonders of the Internet, you ask? Well, what about ENUM? "E-What!?" more

ICANN, WSIS and the Making of a Global Civil Society - Part I

This is the first part of a two-part series interview by Geert Lovink with Milton Mueller discussing ICANN, World Summit on the Information Society, and the escalating debates over Internet Governance. Read the second part of this Interview here. Geert Lovink: "Would it make sense to analyse ICANN (and its predecessors) as a test model for some sort of secretive 'world government' that is run by self appointed experts? Could you explain why governments are seen as incapable of running the Internet? This all comes close to a conspiracy theory. I am not at all a fan of such reductionist easy-to-understand explanations. However, the discontent with 'global governance' discourse is widespread and it seems that the International Relations experts have little understanding how the Internet is actually run. Where do you think theorization of Internet governance should start?" more

YouTube’s Fine - Analysts Don’t Understand Internet Peering

As widely reported, Credit Suisse analysts have estimated Google's YouTube may lose $470M in 2009 and more in the future. However, their estimates say Google will pay $360M for bandwidth in 2009. I don't know how Google figures their cost of bandwidth, but anyone who understands anything about Internet transit/peering knows Credit is way off base. more

What the Net Did Next

During this slow and long lull of domain name policy and ICANN related news stories, I thought it would be a good time to bring an article by BBC News Online technology correspondent Mark Ward to the attention of the CircleID community. In it, ICANN Chairman of the Board Vint Cerf reflects on the history of the Internet and his involvement as somewhat of a "midwife," rather than the "father" title he doesn't like. He also looks to the future and identifies two key, fundamental changes that will shape the next stage of the Internet. As he puts it, they are VoIP and ENUM. more