/ Unsplash / Leon Seibert
Networking
- IPv6 Implementation: FAQ for Internet Service Providers
We analyze the issues that telecom operators may have when migrating to IPv6. For example, before upgrading a network, you need to make sure whether a higher-level provider supports a new generation protocol. Here is a list of operators providing IPv6. We will also talk about problems with outdated hardware (including client hardware), legislative aspects and difficulties when working with the IPv4 + IPv6 model.
- "Shot in the foot": critical errors in the construction of networks of telecom operators
For examples, we analyze errors that cannot be made when deploying networks. We divided them into the following categories: prevention, reservation, architecture selection, monitoring, etc. All the cases described are the practical experience of colleagues in the workshop.
- Providing free Wi-Fi under the law
This is a guide to deploying Wi-Fi hotspots at airports, restaurants, shopping malls and other public places. We note what to look for in order not to break the law. Also here you will find recommendations for choosing equipment and a case with the implementation of a wireless network by one of our customers.
- Internet to the village - we are building a radio relay Wi-Fi network
In our country there are places with a low Internet speed, or, in general, without access to the network. Large operators are gradually laying optics to remote villages, but this is expensive. It’s cheaper for small providers to build a wireless relay Wi-Fi network. The article tells how to approach the issue from the legal and technical side. In particular, we consider two common models of radio relay networks: point-to-point and point-to-multipoint.
Information Security
- Spam through routers: what is known about one of the most active botnets
A year ago, information security experts discovered a botnet that attacked 400 thousand routers. The malware “bombarded” devices with the BroadCom UPnP function activated using TCP ports 5431 and 1900. This article is about infection mechanisms and virus tools. We also provide a complete list of vulnerable devices.
- DDOS and 5G: thicker “pipe” - more problems
DDoS is the scourge of the Internet of things. The explosive proliferation of IoT devices (their number will exceed 75 billion by 2025) opens up more opportunities for hackers to carry out such attacks. In the article we will talk about two methods of protecting the networks of Internet providers: budget and not very.
Future technology today
- Prospects for quantum networks: who engages in them and why
We are discussing quantum projects that domestic and foreign engineers are working on. We are writing about the work of physicists from the Russian Quantum Center, Moscow State University, Russian Railways, as well as world institutes from America, Europe and Asia.
/ Unsplash / Umberto
- eSIM: evil or panacea?
ESIM technology was standardized back in 2016. But she began to go out to the masses quite recently. For example, in Russia, the mobile operator received its first permission to work with eSIM only this week. In this article, we consider the capabilities of electronic "sims" and analyze the reasons that slow down the spread of technology - including cyber risks.
- Who implements IPv6, and what hinders its development
IPv4 addresses are gradually depleted . However, the IT industry is in no hurry to switch to IPv6 - the new protocol supports only 15% of sites. In this article, we discuss the reasons for the slow spread of IPv6. For example, there is an opinion that the high cost of migration is to blame, and someone is convinced that the technology has already become obsolete.
miscellanea
- Where is the “slowest” Internet, and who corrects the situation in remote regions
The speed of access to the network within one country can vary one hundred times. We talk about projects whose purpose is to deliver the Internet to remote corners of the world: Loon balloons from Alphabet and the radio relay network in Alaska. We are also talking about Internet regulation in India, China and Australia.
/ Unsplash / Erwan Hesry
- The main thing about the battle for net neutrality in the United States: a chronology of events and the current state of things
In 2017, the FCC abolished network neutrality in the United States. These are the rules by which telecoms cannot prioritize any type of traffic. And even after two years of politics and IT companies do not abandon attempts to return everything “as it was”. This article is a brief retrospective of the history of net neutrality: from litigation to public reaction. We also talk about whether network neutrality will ever be able to return.
Other digests on our blog: