The Mobile Internet
It has been observed that the most profound technologies are those that disappear
We would like to provide you with a better user experience. Please re-enable Javascript in your web browser.
It has been observed that the most profound technologies are those that disappear
In some ways the details of specific case of DDOS attacks are less material than the larger picture. The Internet always had the potential issue that the aggregate sum of I/O capacity of the edge was massively larger than the interior, and the sum of multiple edge outputs was always…
This presentation looked at a number of specific examples of route hijacking. The examples included: Network hijacking to support the creation of bitcoin farms and bitcoin mining via hijacked pool of servers, which, in turn, may use a hijacked pool of routes. The scope of a Canadian hijack was limited…
The Proposed FCC order on the regulation framework for ISPs in the US will be voted on by the FCC’s Commissioners on Feb 26. The proposal is rumoured to be one that pulls in ISPs into the common carrier provisions of the US Telecommunications Act, with just, reasonable and non-discriminatory…
ARIN’s John Curran referenced the 14 March 2014 announcement that the USG planed to transition oversight of the IANA functions contract to the global multistakeholder community. He references the NTIA’s conditions, namely supporting the multistakeholder model, security and stability and robustness. It explicitly states that it would not accept a…
One view of the IETF’s positioning is that as a technology standardisation venue then the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. What is the role of a technology standards body? Should it try and be all…
On February 26 of this year the Federal Communications Commission (FCC) of the United States will vote on a proposed new ruling on the issue of “Network Neutrality” in the United States, bringing into force a new round of measures that are intended to prevent certain access providers from deliberately…
Time for another annual roundup from the world of IP addresses. What happened in 2014 and what is likely to happen in 2015? This is an update to the reports prepared at the same time in previous years, so lets see what has changed in the past 12 months in…
The WAND group from Computer Science Department Waikato University presented on developments in libtrace. Code is available from https://github.com/rsanger/libtrace and provides for parallel processing of network captures, which is aware of the 5-tuple and can keep this bound to one thread. This has possibilities for being useful in lots of…
Jon Brewer for NSRC presented at NZNOG on the pacific networking scene. He did a really good job of showing how the pacific floor is covered by a mesh of fibre connecting the developed economies, but they have bypassed many of the smaller island economies. There are sound economic reasons…