Networks

Blogs

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

ECFiber: Building a Fiber-to-Premises Network in the Rural United States

Nestled in the northeastern part of the United States is the small state of Vermont, the 14th State to join the United States in 1789. Its name comes from the French, in which 'vert montagne' means 'green mountain.' and it is known as the Green Mountain state. With only about 625,000 inhabitants, it is the 45th state out of 50 in size, and 49th of 50 in number of people, even less populated than Alaska. more

Let's Not Forget About Solar Flares

As the world becomes more and more reliant on electronics, it's worth a periodic reminder that a large solar flare could knock out much of the electronics on earth. Such an event would be devastating to the Internet, satellite broadband, and the many electronics we use in daily life. A solar flare is the result of periodic ejections of matter from the sun into space. Scientists still aren't entirely sure what causes solar flares, but they know that it's somehow related to shifts in the sun's magnetic field. more

An IPv6 Update for 2020

The Australian Domain Name Administration, AUDA, recently published its quarterly report for the last quarter of 2020. The report contained the interesting snippet: "The rapid digitization of our lives and economy -- necessitated by COVID-19 -- continued to underpin strong growth in .au registrations. New .au domains created in December 2020 were up 23 percent from December 2019, while total domains under management were up more than 2.1 percent over the same period." more

The Netizen's Guide to Reboot the Root (Part II)

The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more

A Look Back at the World of IP Addressing in 2020: What Changed and What It Means

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back around 1992, the IETF gazed into their crystal ball and tried to understand how the Internet was going to evolve and what demands would be placed on the addressing system as part of the "IP Next Generation" study.  more

The Christmas Goat and IPv6 (Year 11)

This is the fourth year now with almost no snow during the Christmas Goat event here in Sweden, and so once again, you get a photo without any snow. Because of Covid-19 and 99.99% people working for home, I have not even seen the Goat live this year... What a crazy year it has been! more

Unintended Consequences of Submarine Cable Deployment on Internet Routing

The network layer of the Internet routes packets regardless of the underlying communication media (Wifi, cellular telephony, satellites, or optical fiber). The underlying physical infrastructure of the Internet includes a mesh of submarine cables, generally shared by network operators who purchase capacity from the cable owners. As of late 2020, over 400 submarine cables interconnect continents worldwide and constitute the oceanic backbone of the Internet. more

DNS Oblivion

Technical development often comes in short, intense bursts, where a relatively stable technology becomes the subject of intense revision and evolution. The DNS is a classic example here. For many years this name resolution protocol just quietly toiled away. The protocol wasn't all that secure, and it wasn't totally reliable, but it worked well enough for the purposes we put it to. more

Protecting an Enterprise from Cyber Catastrophe

We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise can quickly recover in the case of successful cyber-attack or other disaster. University of Vermont Medical Center (UVMMC) is an excellent hospital. I owe my life to treatment there and am grateful for both the skill and the kindness of UVMMC staff. They have been devastated by a cyber-attack. more

An Innovative Framework That Will Help the IoT Industry Scale Into the Billions

The Internet of Things (IoT) is on an explosive growth trajectory. According to Transforma Insights, the number of IoT-connected devices is projected to increase to 24.1 billion worldwide by 2030. That's almost a three-fold increase from 2019. Much of this growth will be fueled by the coming 5G revolution, which will enable businesses and consumers to take advantage of a wide range of increasingly sophisticated connected devices. more

Cybersecurity Considerations in the Work-From-Home Era

Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more

The End of Broadband Networks as We Know Them

A group of major telecommunications companies -- Vodafone, BT, Telefonica and Deutsche Telekom -- recently announced something a bit unexpected. In the Open BNG Operator Position Paper, they call for a fundamental, industry-wide change to the way broadband networks are built. Specifically, they advocate for collaboration throughout the telco world, with a convergence around open broadband network gateways (BNGs). more

Network Outages Go Global

On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more

A Brief Look at the Domain Attack Surface of Streaming Media Companies

The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more

News Briefs

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

Other Countries Beginning to Adopt China's Unique Approach to an Isolated Internet Structure

Microsoft Becomes the Latest Company to Join the Internet Society’s MANRS Initiative

Nigerian Cable Company Takes Blame for Misrouting Google's Global Traffic Through China

China Telecom Accused of Misdirecting Internet Traffic

US Senators Urge Canada to Drop China’s Huawei Technologies in Building Future Telecom Networks

Internet Society Partnering With Facebook to Develop Internet Exchange Points Throughout Africa

Microsoft Cancels Plans to Move Its Internal Wireless Network to IPv6-Only

Large-Scale Study by Security Researchers in China Sheds Light on the Scope of DNS Interception

Group of Engineers Have Created a Way to Detect Dangerous Objects in Baggage Using Public Wifi

Escalating War in Yemen Dividing Country's Internet

Russian Hackers Have Penetrated U.S. Electric Utilities

Doug Madory Reports on Shutting Down the BGP Hijack Factory

Oracle Launches Internet Intelligence Map Providing Insight Into the Impact of Internet Disruptions

DNS Firewall Market Expected to Grow From $90.5 Million in 2018 to $169.7 Million by 2023

US Federal Judge Dismisses Kaspersky Lawsuit, Government-Wide Ban Stays in Place

Kaspersky Lab Software Too Deeply Embedded in US Gov Network, Impossible to Get Rid Off by October

Newly Discovered Malware Called VPNFilter is Targeting at Least 500K Networking Devices Worldwide

New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol

Moving to IPv6 Is Becoming a Matter of Business Continuity, Says NASA Transition Manager

Most Viewed

Most Commented

Industry Updates

How to Monitor IP Netblocks for Possible Targeted Attacks

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

Everything You Need to Know About IPv4 vs. IPv6

The Louisiana State Ransomware Attack: Enhancing Cyberdefense with Reverse IP Address Lookup

The Disney+ Account Hijacking: Preventing Unauthorized Network Access with Threat Intelligence Tools

InterMed Breach: How Threat Intelligence Sources Help Maintain Domain Integrity

Alleviating the Constant Clash Between DevSecOps and DevOps Teams

Moving from the Castle-and-Moat to the Zero-Trust Model

NS1 Raises $33M for Its Application Traffic Management Solutions

How Threat Intelligence Can Solve 3 Common SIEM Problems

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

Peering Versus IP Transit: Answering the Age-Old Question

Navigating IPv4 Market: Industry Pioneers Marc Lindsey and Janine Goodman to Speak at Interop ITX

Attacks Decrease by 23 Percent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Participants – Random Selection