Worth Reading: Maximizing Qname Minimization

23 September 2020

Data privacy and security experts tell us that applying the “need to know” principle enhances privacy and security, because it reduces the amount of information potentially disclosed to a service provider — or to other parties — to the minimum the service provider requires to perform a service.

Worth Reading: A summary of High Speed Ethernet ASICs

23 September 2020

There is a lot going on in the field of the highest speed network ASICs. These are focused on very high speed, less features, and lower buffers, driven by the hyperscalers and the Financial industry which desires the lowest latency switching.

Worth Reading: The 5G lie

22 September 2020

Unless you’ve been living under a rock — which in 2020 actually sounds soothing — you’ve probably heard there’s a new cellphone technology called 5G. Any iPhone or Galaxy owner knows the law of Gs: Every additional G makes downloads faster. 3G sent pictures. 4G streamed video.

Worth Reading: At this point, 5G is a bad joke

22 September 2020

What I really want is a Gigabit via fiber optic to my doorstep. Maybe I’ll get it someday. But, what I do know for a fact is I’m not going to get Gigabit-per-second speeds from 5G. Not now, not tomorrow, not ever.

Worth Reading: NeST — a simple, efficient tool to study congestion control

21 September 2020

Recently, there has been a lot of interest in the Internet Engineering Task Force (IETF) to develop standards for new congestion control algorithms that can provide ultra-low latency and scalable throughput, both of which are crucial to successfully deploy 5G applications.

Worth Reading: The Automation Revolution is Well Underway

21 September 2020

Businesses that implement network automation outperform those that do not. This was one of many key findings in the recently published Juniper Networks State of Network Automation Report (SoNAR) 2020.

Worth Reading: The Cyber Elephant in the Room

17 September 2020

While virtual private networks once boosted security, their current design doesn’t fulfill the evolving requirements of today’s modern enterprise.

Worth Reading: DNS Query Privacy Revisited

17 September 2020

The DNS name resolution protocol was not designed with privacy as the foremost consideration. The queries and responses are unencrypted, which makes them prone to hostile man-in-the-middle manipulation and they leak superfluous information to third party onlookers.

Worth Reading: How DASH helps monitor network health

16 September 2020

The Dashboard for Autonomous System Health (DASH) is APNIC’s latest security product. It allows users to monitor malicious traffic going out of their network, and compare the daily hits on their network with those of their broader region or economy.

Worth Reading: Looking Inside Outages with RIPE Atlas

16 September 2020

In following up on this, one of the things we’ve been looking at is how information from probes can help us gain a better understanding of outages. Here, we share some observations and look at some of the recent work we’ve been doing to visualise the data we have available on these kinds of events.