5G? IoT? Fiber Deep? 600G? We Are ready for networking at 2019!
For years we have all been talking about the emergence of 5G services, the Internet of Things (IoT) and the new high-capacity, low-latency network architectures that will be needed to support the resulting onslaught of bandwidth. Higher-speed data rates are critical to electronic evolution and revolution.
Here are some of my collection of newest trends and predictions for year 2018. have picked and mixed here quotations from many articles (linked to source) with some of my own additions to make this posting.
5G: The most newsworthy stories in wireless today are all about 5G. In 2019, we enter a cautious, early-adoption phase of this next generation of wireless technology. 2019 will be the year when we see the first commercial networks turning on and first handsets arriving in the market. Only a small number of users will get a first taste of 5G in specific geographic locations, using specific applications, none of which are ubiquitous or cost-optimized. For more details read my 5G trends for 2019 posting.
Deep fiber: Deep deployment of fiber optics into national network infrastructure might not be as glamorous as the eagerly anticipated launch of fifth-generation mobile networks (5G); however, it is just as important—maybe even more important. Wired broadband access supports as much as 90 percent of all internet traffic even though the majority of traffic ultimately terminates on a wireless device. Wireline and wireless networks are driving new architectures to support the move from 4G LTE to 5G infrastructure. In fact, 5G relies heavily on fiber infrastructure. Service providers in the access market are talking about the evolution of their plants to a Fiber Deep (FD) Architecture. FD architectures move the optical node (the optical-to-electrical conversion point) deeper into the network and closer to the subscriber. This means shorter copper, faster speed, more capacity and reduction in maintenance cost for both cable TV network and telephone line based access networks.
Ethernet: Faster Ethernet speeds are taken to use. These transitions are driven by the increasing global IP traffic. Hyper-scalers and service providers are moving from 100GbE to 400GbE Ethernet rates and beyond. In this speed development 56Gb/s And 112Gb/s SerDes Matter.
TSN: Time-Sensitive Networking (TSN) is a set of standards under development by the Time-Sensitive Networking task group of the IEEE 802.1 working group. TSN standards documents that are specified by IEEE 802.1 can be grouped into three basic key component categories that are time synchronization; scheduling and traffic shaping; selection of communication paths, path reservations and fault-tolerance. Industrial Ethernet networks embrace time-sensitive networking (TSN) technology to integrate operational technology (OT) and information technology (IT).
SDN: Software-defined networking (SDN) technology is an approach to cloud computing that facilitates network management and enables programmatically efficient network configuration in order to improve network performance and monitoring. SD-WAN applies similar technology to a wide area network (WAN). SD-WAN allows companies to build higher-performance WANs using lower-cost and commercially available Internet access, enabling businesses to partially or wholly replace more expensive private WAN connection technologies such as MPLS.
IPv6: IPv4 and IPv6 are the two Protocols Run the Internet in 2019. The long-forecasted day the internet runs out of addresses has arrived and it marks a paradigm shift in the internet’s evolution. Though IPv6 has been available globally since 2012, it has seen a slow, if increasing, adoption rate. The migration to IPv6 is inevitable but will take time during that both systems are in use. In many networks a notable amount of traffic is already IPv6.
New Internet protocols: Internet security gets a boost with TLS 1.3. Also HTTP is in process of switching to a protocol layered on top of UDP. Today’s HTTP (versions 1.0, 1.1, and 2) are all layered on top of TCP (Transmission Control Protocol) that is not very optimal in today’s applications as SSL over TCP requires subsequent round trips to establish the encrypted connection.
IoT: The IoT world is here, and the level and rate of convergence is increasing in volume and velocity. We will see the evolution of converged networks for IoT applications in mind. Network convergence (version 2.0) is here with changes and improvements made since the first converged network (Convergence 1.0). TIA TR-42 (Telecommunications Cabling Systems ANSI/TIA-568 family), BICSI (TDMM and others) and proprietary or third documents must adapt and adjust.
PoE: The IEEE 802.3bt standard, approved by the IEEE Standards Association Board on September 27, 2018, included some significant enhancements especially for LED lighting systems. This specification allows for up to 90W of delivered power for cable lengths of up to 100m through the use of all four pairs of wires.
Trade wars: It seem that there is a high tech “trade war” between USA and China. It affects specifically networking business. Big Chinese manufacturers Huawei and ZTE are have received sanctions and their products are not wanted by many countries citing their business practices and potential security nightmares. For example Japan to halt buying Huawei, ZTE equipment and Huawei has been under fire in UK, just to mention examples. It seems that the business that is lost by Huawei and ZTE could benefit Ericsson and Nokia in the 5G base station markets for short term.
Security: The internet is going to hell and its creators want your help fixing it. All agree on one thing however: Right now there is a serious battle for heart and minds, the future of the internet and global society itself. There seems to be need for a conference to address the fact that people increasingly see tech as a threat and no longer as a pure force for good. Government set to revise internal rules on procurement to protect national cybersecurity. Your DNS might be broken, and you don’t even know it. Some DNS old hacks gets thrown out of use by February 1st, 2019.
WiFi: WiFi technology gets new marketing naming. The numerical sequence includes: Wi-Fi 6 to identify devices that support 802.11ax technology, Wi-Fi 5 to identify devices that support 802.11ac technology, Wi-Fi 4 to identify devices that support 802.11n technology.
Faster mobile: Mobile networks are getting faster in many countries. Mobile networks are killing Wi-Fi for speed around the world. Average data speeds on mobile networks now outpace customer’s Wi-Fi connection, on average, in 33 countries. That’s the The State of Wifi vs Mobile Network Experience as 5G Arrives.
Energy efficiency: We need to develop more energy efficient networking technologies. Today, information and communication technologies globally consume 8% of electricity and doubles every year.
1,186 Comments
Tomi Engdahl says:
Latency recommendations: ITU-T vs. PAESSLER
https://www.paessler.com/network_latency?utm_source=google&utm_medium=cpc&utm_campaign=FIN_EN_Search-nonBrand_broad_3&utm_adgroup=latency-of-network&utm_adnum=245591992302&utm_keyword=%2Blatency%20%2Bof%20%2Bnetwork&utm_device=c&utm_position=1t1&utm_campaignid=247676064&utm_adgroupid=56492003012&utm_targetid=aud-316250648051:kwd-394758255573&utm_customerid=870-495-6487&utm_location=2246&gclid=EAIaIQobChMItNvls4qH4AIVGamaCh3N0Q7DEAAYASAAEgKb9fD_BwE
ITU-T
The Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T) is responsible for standards in the field of telecommunications. It provides many recommendations with regard to quality of service. When it comes to latency, the ITU-T recommends that delays be no more than 125 milliseconds.
PAESSLER
We have somewhat stricter requirements than the ITU-T, for we recommend a maximum latency of 100 milliseconds.
Network latency: Test vs. monitoring
One-time latency tests
A simple ping query is all it takes to obtain a one-time calculation of latency.
These tests provide for individual measurements. Although they are useful for identifying specific problems, they are not at all suitable for comparisons, analyses, or monitoring.
Perpetual latency monitoring
PRTG keeps a constant eye on all your QoS parameters. Latency, packet loss, jitter, and the Mean Opinion Score are monitored around the clock.
Tomi Engdahl says:
OpenSignal:
OpenSignal Mobile Networks Experience report: Verizon leads in 4G availability and video experience, but ties with T-Mobile for fastest download speeds
USA
Mobile Network Experience Report
January 2019
https://opensignal.com/reports/2019/01/usa/mobile-network-experience
Tomi Engdahl says:
Frederic Lardinois / TechCrunch:
AWS launches WorkLink, a fully managed service for $5 per month per user, that aims to make accessing mobile intranet sites and web apps easier — If your company uses a VPN and/or a mobile device management service to give you access to its intranet and internal web apps, then you know how annoying those are.
AWS launches WorkLink to make accessing mobile intranet sites and web apps easier
https://techcrunch.com/2019/01/23/aws-launches-worklink-to-make-accessing-mobile-intranet-sites-and-web-apps-easier/
Tomi Engdahl says:
Wall Street Journal:
Source: US pressed Chinese tech companies to show their autonomy by giving an example of resisting a data request from the Chinese government, but they couldn’t
U.S. Believes It Doesn’t Need to Show ‘Proof’ Huawei Is a Spy Threat
Chairman of Chinese telecom firm contends Huawei is being unfairly targeted
https://www.wsj.com/articles/u-s-believes-it-doesnt-need-to-show-proof-huawei-is-a-spy-threat-11548288297
The chairman of embattled telecom giant Huawei Technologies Co. is pushing back against claims his company conducts espionage for the Chinese government, contending that Huawei is being unfairly targeted without any proof.
Tomi Engdahl says:
Alert (AA19-024A)
DNS Infrastructure Hijacking Campaign
https://www.us-cert.gov/ncas/alerts/AA19-024A
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an organization’s domain names, enabling man-in-the-middle attacks.
Tomi Engdahl says:
Verizon’s unlimited data carrier Visible starts selling iPhones, announces Android compatibility
https://techcrunch.com/2019/01/24/visible-iphone-sales/?sr_share=facebook&utm_source=tcfbpage
Tomi Engdahl says:
Stu Woo / Wall Street Journal:
Vodafone, the world’s biggest mobile carrier outside China, says it is temporarily halting purchases of Huawei equipment for the core of its new 5G networks
Major Mobile Carrier Halts Huawei Purchases Amid Security Concerns
Vodafone to suspend purchasing Huawei gear for use in core of new 5G networks
https://www.wsj.com/articles/major-mobile-carrier-halts-huawei-purchases-amid-security-concerns-11548418611
Tomi Engdahl says:
It’s Now Clear None of the Supposed Benefits of Killing Net Neutrality Are Real
https://motherboard.vice.com/en_us/article/gyab5m/its-now-clear-none-of-the-supposed-benefits-of-killing-net-neutrality-are-real?utm_campaign=sharebutton
Network investment is down, layoffs abound, and networks are falling apart. This isn’t the glorious future Ajit Pai promised
Tomi Engdahl says:
MAP-E testing helps IPv6 carry IPv4 traffic
https://www.edn.com/design/test-and-measurement/4461465/MAP-E-testing-helps-IPv6-carry-IPv4-traffic?utm_source=Aspencore&utm_medium=EDN&utm_campaign=social
Internet service providers (ISPs) are running out of public IPv4 addresses and want to move away from IPv4 in their internal network. Mapping of Address and Port with Encapsulation (MAP-E), an IPv6 transition mechanism for transporting IPv4 packets across an IPv6 network using IP encapsulation, lets ISPs provide IPv4 services without deploying a full dual-stack network.
MAP-E also helps relieve the issue of IPv4 address exhaustion by letting multiple CPE’s share the same public IPv4 address through a form of Carrier-Grade NAT (CGN).
Tomi Engdahl says:
America Pushes Allies to Fight Huawei in New Arms Race With China
https://www.nytimes.com/2019/01/26/us/politics/huawei-china-us-5g-technology.html
Jeremy Hunt, the British foreign minister, arrived in Washington last week for a whirlwind of meetings dominated by a critical question: Should Britain risk its relationship with Beijing and agree to the Trump administration’s request to ban Huawei, China’s leading telecommunications producer, from building its next-generation computer and phone networks?
Britain is not the only American ally feeling the heat. In Poland, officials are also under pressure from the United States to bar Huawei from building its fifth generation, or 5G, network.
And a delegation of American officials showed up last spring in Germany
Their message: Any economic benefit of using cheaper Chinese telecom equipment is outweighed by the security threat to the NATO alliance.
Over the past year, the United States has embarked on a stealthy, occasionally threatening, global campaign to prevent Huawei and other Chinese firms from participating in the most dramatic remaking of the plumbing that controls the internet since it sputtered into being, in pieces, 35 years ago.
The administration contends that the world is engaged in a new arms race — one that involves technology, rather than conventional weaponry, but poses just as much danger to America’s national security. In an age when the most powerful weapons, short of nuclear arms, are cyber-controlled, whichever country dominates 5G will gain an economic, intelligence and military edge for much of this century.
Tomi Engdahl says:
U.S. Charges Huawei in Technology Theft, Sanctions Violations
https://www.securityweek.com/us-charges-huawei-technology-theft-sanctions-violations
The US Justice Department on Monday unveiled sweeping charges against Chinese telecommunications giant Huawei in two cases likely to ratchet up tensions between the two superpowers — including that of a top executive arrested in Canada on a US warrant.
The department unveiled 13 charges against chief financial officer Meng Wanzhou — the daughter of the company’s founder who is currently out on bail in Canada — and three affiliates related to violating US sanctions on Iran.
Tomi Engdahl says:
Cisco and AppDynamics Ignite New Era of AIOps, Unveiling Vision for the Central Nervous System for IT
https://markets.financialcontent.com/pennwell.cabling/news/read/37628228/cisco_and_appdynamics_ignite_new_era_of_aiops
AppDynamics, a Cisco company, today unveiled its vision for the Central Nervous System for IT, igniting a new era of AIOps. The Central Nervous System for IT will give businesses full visibility, deep insights, and automated actions across all technology domains that run modern companies: the application, infrastructure, and network.
Tomi Engdahl says:
5 tricks for managing complex cabling projects
https://www.cablinginstall.com/articles/2019/01/5-tricks-for-managing-complex-cabling-projects-belden-blog.html?cmpid=enl_cim_cim_data_center_newsletter_2019-01-28&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24&eid=289644432&bid=2354100
After complex cabling projects come to an end, there are always a few lessons to be learned.
To manage a project of this size, here’s what we did:
1. Create a Plan for Success
2. Provide Adequate Installer Training
3. Use Solutions that Will Support Future Growth
4. Make Installation Easier When Possible
5. Streamline Points of Contact
Tomi Engdahl says:
A prediction for cabling standards in 2019
https://www.cablinginstall.com/articles/2018/12/cabling-standards-2019-prediction-belden-franc.html
What’s Driving Industry Change?
The biggest drivers of evolution and change in the ICT industry are the rise of M2M (machine to machine) communication and the IoT (Internet of Things). According to Statista, via IHS and Forbes, the number of connected devices doubled the Earth’s population a few years ago. In 2015, Statista estimated more than 15 billion devices worldwide, forecasting more than 23 billion by the time we read this article and more than 75 billion by 2025.
Traditionally, cabling standards development – specifically when it comes to the ICT industry – has centered on the premise that most requirements are people to people (P2P) or people to machine (P2M) communications. We are well beyond that phase, fast entering the primacy of M2M, which will eclipse traditional P2x telecommunications in scale, scope and complexity. The activities of IEEE, TIA and other standards-developing organizations reflect that new reality.
How Cabling Standards Enable Industry Change
Standards development is leading and enabling the change. In the case of the application standards from organizations such as IEEE, and infrastructure standards from TIA, the volume and velocity of change is incredible. It’s important for all of us to be aware of what’s going on.
The IEEE Liaison Report to TIA’s TR-42 Engineering Committee, responsible for the premise and cabling standards that support ICT, is over 40 pages of just highlights, with dozens of active projects.
Remember when 40GBASE Ethernet seemed a stretch for multimode fiber a few years ago? 802.3cm is working on 400GBASE Ethernet. Or remember when GPON was a 1G or 10G play? Now they’re working on 25, 50 and 100 Gb/s networks (802.3ca). But it’s not all faster or farther.
Sometimes, networks need to be shorter, such as M2M or industrial networks; speeds can be slower or, rather, right sized to network requirements, whether it’s the 802.3ch group working on 1 Gb/s networks of ~10 m for the automotive industry, the 802.3cg group working on 10 Mb/s over 1 km for last-mile applications or a 100 Mb/s 4-hop topology for industrial (802.3bw).
Tomi Engdahl says:
http://www.etn.fi/index.php/13-news/9000-valoa-tallennettiin-ensimmaista-kertaa
Tomi Engdahl says:
USA ei löydä takaovea Huawein laitteista
http://www.etn.fi/index.php/13-news/9001-usa-ei-loyda-takaovea-huawein-laitteista
Yhdysvalloissa on nostettu massiivinen, kaikkiaan 13 kohdan syytekirjelmä kiinalaista Huaweita vastaan. Syyttäjäviranomaiset syyttävät Huaweita Irania koskevan kauppasaarron kiertämisestä, teollisuusvakoilusta ja rahanpesusta amerikkalaisten peiteyritysten kautta. Mitään todisteita laitteiden tai tukiasemien takaovista ei ole.
Amerikkalaissyytökset ovat melkoinen pettymys. Mikäli takaovien suunnittelusta laitteisiin olisi todisteita, ne olisi nyt taatusti esitetty. Sellainen näyttö olisi lisäksi ollut massiivinen isku maailman toiseksi suurimmalle tukiasema- ja älypuhelinvalistajalle.
https://assets.bwbx.io/documents/users/iqjWHBFdfxIU/rIz2tT7h2.Fs/v0
Tomi Engdahl says:
Software networking firm Cato Networks lands $55M funding round
https://siliconangle.com/2019/01/29/sd-wan-company-cato-networks-lands-55m-funding-round/
Enterprise networking company Cato Networks Ltd. has refilled its war chest with a $55 million round of funding led by Lightspeed Venture Partners.
The round brings its total amount raised to $125 million.
Cato Networks sells software-defined wide-area networking tools. SD-WAN is a specific application of software-defined networking technology applied to WAN connections, which are used to connect enterprise networks – including branch offices and data centers – over large geographic distances. A WAN might be used, for example, to connect branch offices to a central corporate network, or to connect widely separate data centers.
In the past, these WAN connections often used technology that required special proprietary hardware. The SD-WAN movement seeks to move more of the network control into the cloud, using a software approach.
Cato’s specific SD-WAN platform is called Cato Cloud, which is a hosted traffic management platform that enables organizations to centrally control communications from their data centers to branch offices and cloud deployments. It also allows them to regulate access to applications and services for mobile workers.
“As we take on legacy telcos to offer a new platform for enterprise networks, we are rounding out our managed services offerings in both networking and security, introducing additional enterprise-grade security layers and network optimization features at cloud pace, and invest in scaling our global network footprint,” Kramer said
Tomi Engdahl says:
Fun with some truth in it:
Modern OSI Model
https://xkcd.com/2105/
Tomi Engdahl says:
CCA Cable Should Be Avoided
https://www.belden.com/blog/smart-building/cca-cable-5-reasons-to-stay-away
When network infrastructure budgets are tight, it can be tempting to cut corners where you can. One way we’re seeing attempted cost savings is through the purchase of copper clad aluminum (CCA) cabling systems. Offered as a cost-effective replacement for solid copper cable, CCA cable is anything but an effective solution.
While CCA products might look like (and be advertised to function like) standard Category 5e or Category 6 cabling, there are major differences that could pose network problems, concerns about business continuity, and safety hazards.
Copper-clad aluminium wire
https://en.wikipedia.org/wiki/Copper-clad_aluminium_wire
Copper-clad aluminium wire, commonly abbreviated as CCAW or CCA, is an electrical conductor composed of an inner aluminium core and outer copper cladding.
The primary applications of this conductor revolve around weight reduction requirements. These applications include high-quality coils, such as the voice coils in headphones or portable loudspeakers; high frequency coaxial applications, such as RF antennas and cable television distribution cables; and power cables
The copper/aluminium construction was adopted to avoid some of the problems with aluminium wire, yet retain some of the cost advantage
Tomi Engdahl says:
Huawei: How the Telecoms Giant is Seen Around the World
https://www.securityweek.com/huawei-how-telecoms-giant-seen-around-world
US charges against Chinese telecoms giant Huawei have cranked up tensions between the world’s two biggest economies, but the company is already facing obstructions around the world over alleged cyber-security risks.
Huawei’s status as a leading supplier of the backbone equipment for telecoms systems — mostly in developing markets — has given China an inside track for spearheading fifth-generation (5G) mobile technology.
5G communications are the next milestone in the digital revolution, bringing near-instantaneous connectivity, vast data capacity and futuristic technologies.
However, fears and that Chinese telecoms companies like Huawei could be proxies for Beijing’s intrusive security apparatus, using the sophisticated infrastructure for espionage, a growing number of Western states turn their backs on the giant.
https://www.securityweek.com/us-charges-huawei-technology-theft-sanctions-violations
Tomi Engdahl says:
https://www.uusiteknologia.fi/2019/01/31/nokia-paransi-kannattavuutta-uutena-teollisuuden-verkko-ratkaisut/
http://www.etn.fi/index.php/13-news/9017-5g-alkaa-pian-nakya-nokian-tuloksessa
Tomi Engdahl says:
Chinese Telecommunications Device Manufacturer and its U.S. Affiliate Indicted for Theft of Trade Secrets, Wire Fraud, and Obstruction Of Justice
https://www.justice.gov/opa/pr/chinese-telecommunications-device-manufacturer-and-its-us-affiliate-indicted-theft-trade
Huawei Corporate Entities Conspired to Steal Trade Secret Technology and Offered Bonus to Workers who Stole Confidential Information from Companies Around the World
Tomi Engdahl says:
https://loon.co
Tomi Engdahl says:
Broadband Providers Are Quietly Taking Advantage of an Internet Without Net Neutrality Protections
https://www.publicknowledge.org/news-blog/blogs/broadband-providers-are-quietly-taking-advantage-of-an-internet-without-net-neutrality-protections
The purpose of having net neutrality rules is to have an expert agency investigate examples like these to ensure the internet remains open to everyone. The trends may be subtle, but companies understand that it is not in their best interest to take noticeable, controversial steps
Tomi Engdahl says:
Internet Outage or Internet Manipulation? New America lists government interference, DDoS attacks as top reasons for Internet Outages across the world
https://securityboulevard.com/2019/01/internet-outage-or-internet-manipulation-new-america-lists-government-interference-ddos-attacks-as-top-reasons-for-internet-outages-across-the-world/
On 17th January, New America published a blog post on the rising number of Internet blackouts since 2018, citing various examples for the same and hinting at political reasons behind it. The post also predicts the same trend to continue in 2019 owing to two factors- countries deliberately “turning off” the internet within their borders, and hackers attempting a distributed denial-of-service (DDoS) attack ultimately leading to internet disruptions.
Tomi Engdahl says:
https://www.uusiteknologia.fi/2019/02/06/hs-suomi-selvittaa-huawein-verkkolaitteiden-kayttoa/
Tomi Engdahl says:
Huawei’s Media Mess
https://www.eetimes.com/author.asp?section_id=36&doc_id=1334284
To many Chinese, the rise of Huawei “against all odds” is the story of modern (post-Mao) China and of their own rise.
As a reporter covering the high-tech beat, reporting on Huawei is the toughest nut, especially nowadays when Huawei-bashing is all the rage.
I also talked to engineers at startups in Shenzhen who regard Huawei as a model company. Some even insist that there’s nothing wrong with staying up all night at the office — with a sleeping bag handy — to solve problems at all costs. It’s the “Huawei-way.”
To many Chinese, the rise of Huawei “against all odds” is the story of modern (post-Mao) China and of their own rise. Huawei engineers, often described by rivals as “a pack of wolves,” are determined to prove the world wrong about them (even when the world says they’re right). They thrive on that tenacity. Within Huawei, its “against-all-odds” heritage fuels employees with an “underdog” mentality, driving them to work even harder.
Four reasons driving the negative coverage
First, the Western media rarely has opportunity to talk to Huawei’s top executives. More significantly, Huawei is not a public company.
Second, the suspicions and allegations with which Huawei is charged are multi-fold. They range from IP theft by Huawei employees and the founder’s ties to the People’s Liberation Army to the alleged backdoors secretly created by Huawei in its network equipment and business links to Iran in violation of U.S. sanctions.
Third, we must acknowledge that certain aspects of the charges against Huawei still lack hard evidence.
Fourth, finally, it’s not easy to decipher what the intelligence community really knows about Huawei.
Huawei as China’s agent?
Sanger, author of a book about cyberwar and cyber-sabotage called “The Perfect Weapon,” breaks down the Huawei issues clearly.
During the interview, Sanger mentions new laws issued by the Chinese government two years ago under President Xi Jinping. Under the law, any Chinese company — particularly in telecom — must participate in intelligence operations if so instructed. The company is required to turn over all data sought by the government, according to Sanger.
the Chinese Communist Party’s stranglehold on Huawei makes it hard for anyone in the West to determine whether they’re dealing with a private company or an agent of Beijing.
Huawei Was No. 3 Chip Buyer in 2018
https://www.eetimes.com/document.asp?doc_id=1334286
Huawei, the controversial Chinese vendor of networking gear and smartphones, increased its semiconductor spending by 45% last year to move into the third position among global chip buyers, according to market research firm Gartner Inc.
Huawei spent more than $21 billion on semiconductors in 2018, moving it ahead of Dell on the chip buyer list, despite the U.S. PC vendors own 27% surge in chip spending, Gartner said.
Tomi Engdahl says:
https://www.ofcconference.org/en-us/home/
Tomi Engdahl says:
Platinum Tools brings waterproof RJ45 coupler system to ISE 2019
https://www.cablinginstall.com/articles/2019/01/platinum-tools-waterproof-rj45-couplers-ise-2019.html?cmpid=enl_cim_cim_data_center_newsletter_2019-02-04&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24&eid=289644432&bid=2359269
Features and technical specifications of the new Waterproof RJ45 Coupler System include:
· IP67 Waterproof and Dustproof
· Easy and quick to install
· Shock and vibration resistant
· Works with RJ45 (8P8C) connectors
· For UTP and STP applications
· Category Range: Cat5e and Cat6
· Screw mating system assures secure connection
· Temperature range: -20 degrees C to +80 degrees C
· Housing material: Black nylon
· RoHS compliant
Tomi Engdahl says:
Shrinking expenses as fiber goes deeper in the network
https://www.cablinginstall.com/articles/pt/2019/01/shrinking-expenses-as-fiber-goes-deeper-in-the-network-exfo.html?cmpid=enl_cim_cim_data_center_newsletter_2019-02-04&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24&eid=289644432&bid=2359269
With data rate requirements constantly increasing, multiple system operators (MSOs) are looking to optimize the coax plant, including enabling higher throughput rates transmitted over existing coaxial cable systems. The Data Over Cable Service Interface Specification (DOCSIS®) protocol— a telecommunications standard used to provide internet access via a cable modem—was developed to help accomplish that goal.
More bandwidth means smaller tolerance of noise and the introduction of other detrimental effects, all resulting in shortened delivery distances. To deliver such high speeds, the use of coax cable must be reduced, necessitating the installation of more optical fiber cable much closer to the user. The blend of fiber and coax cables forms the basis of a hybrid fiber/coaxial (HFC) network.
Cable providers are heavily investing in fiber by adding more than a million fiber nodes across their network, rolling out DOCSIS 3.1 across millions of homes, delivering 1-Gbps broadband services using DOCSIS 3.1 over HFC or upgrading to new converged cable access platform (CCAP) systems to shift towards a node-plus-zero architecture. With these upgrades, MSOs can better compete with fiber-based and over-the-top (OTT) service providers by delivering services including 4K or IP video. The upgrades will also enable excellent fronthaul coverage as fiber reaches multiple new access points and service providers prepare for 5G mobile.
Tomi Engdahl says:
Ernesto Falcon / Electronic Frontier Foundation:
Study comparing 30 European nations on net neutrality enforcement finds that zero rating business practices by wireless carriers increases cost of wireless data
Countries With Zero Rating Have More Expensive Wireless Broadband Than Countries Without It
https://www.eff.org/deeplinks/2019/02/countries-zero-rating-have-more-expensive-wireless-broadband-countries-without-it
When an ISP decides to exempt certain applications or services from cutting into a user’s data cap, that’s zero rating. And the evidence is in that it conclusively makes broadband more expensive.
Tomi Engdahl says:
Huawei suurempi kuin Ericsson ja Nokia yhdessä
http://www.etn.fi/index.php/13-news/9056-huawei-suurempi-kuin-ericsson-ja-nokia-yhdessa
Huawei on ollut pitkään myrskyn silmässä. USA; Australia ja Uusi-Seelanti ovat kieltäneet sen laitteiden käytön tulevissa 5G-verkoissa. Silti kiinalaisyritys on selvästi suurin tukiasemien toimittaja.
Tutkimuslaitos Dell´Oron mukaan Huawein osuus matkapuhelinverkkojen tukiasemista oli viime vuoden kolmannella neljänneksellä 28 prosenttia. Nokialla oli noin 18 prosentin siivu ja Ericssonilla 14 prosenttia. ZTE ja Cisco ovat molemmat alle 10 prosentin pelureita.
Tomi Engdahl says:
Nokia siirsi kuidussa 500 gigabittiä yhdellä aallonpituudella
http://www.etn.fi/index.php/13-news/9054-nokia-siirsi-kuidussa-500-gigabittia-yhdella-aallonpituudella
Testissä käytettiin Nokian viime vuonna esittelemää fotoniikkapiiriä, joka uuden modulointitekniikan ansiosta yltää lähelle optisten kuitujen teoreettista rajaa. Yhdellä aallonpituudella PSE-3-piirillä siirrettiin dataa 500 gigabittiä sekunnissa.
PSE3-piirisarja on Nokia Bell Labsin kehittämä.
Tomi Engdahl says:
Congress flaunts its ignorance in House hearing on net neutrality
It isn’t the law that’s old and busted
https://techcrunch.com/2019/02/07/congress-flaunts-its-ignorance-in-house-hearing-on-net-neutrality/?utm_source=tcfbpage&sr_share=facebook
It’s amazing, and yet should surprise no one, that this country’s elected representatives can be either so cynical or so ignorant that two decades into the net neutrality debate, the basics still elude them
Tomi Engdahl says:
Jason Hiner / CNET:
Google Fiber to shut down in Louisville on April 15 after an experimental “nanotrenching” technique to deploy fiber in trenches only two inches deep, failed
Google Fiber’s secret weapon in its gigabit comeback has failed
https://www.cnet.com/news/google-fibers-secret-weapon-in-its-gigabit-comeback-has-failed/
An experimental process for more cheaply and quickly rolling out speedy fiber internet didn’t pan out, forcing Google Fiber to pull out of Louisville.
The internet titan had pinned its hopes on an experiment called “shallow trenching,” which enabled it to deploy gigabit internet in Louisville in just five months and drastically outpace rival AT&T Fiber. But a Google Fiber spokesperson said problems with the process will force Google Fiber to cease operations in Louisville.
It’s a massive setback for Google Fiber, which “paused” operations in October 2016 but rolled out in Louisville and San Antonio in 2017
In the other 10 metropolitan areas where Google Fiber is still operating
The Google Fiber team cited the experimental construction methods used in Louisville as the reason behind the failure. That deployment technique, called “nanotrenching,” enabled Google Fiber to deploy fiber at greater speed and lower cost.
The construction crews for Google Fiber in Louisville were digging trenches only two inches deep on the edges of roads, laying the fiber cables and then filling in the trench with a rubbery liquid that would solidify when it dried.
Within several months, though, some of the fiber cables started popping out of the trenches and were lying exposed in the streets. In other cities, such as San Antonio, Google Fiber has switched to “microtrenching,” which uses a similar technique but goes at least six inches deep.
Companies like AT&T take a much slower, more measured approach in rolling out new networks, and AT&T thinks of fiber as an investment with a 100-year return.
Tomi Engdahl says:
Quantum-Repeater Trial Ignites Hopes for Long-Distance Quantum Cryptography and Computation
https://spectrum.ieee.org/tech-talk/telecom/internet/quantum-repeater-trial-ignites-hopes-for-longdistance-quantum-cryptography-and-computation
A repeater for quantum communications has been prototyped that requires no expensive cryogenics or elaborate ion traps—only photons. As a result, international quantum cryptography and perhaps the beginnings of a long-distance quantum “internet” could be one step closer to reality.
Tomi Engdahl says:
How quantum terrorists could bring down the future internet
https://www.technologyreview.com/s/612887/how-quantum-terrorists-could-bring-down-the-future-internet/?utm_medium=tr_social&utm_campaign=site_visitor.unpaid.engagement&utm_source=facebook&fbclid=IwAR0hHryVttjtuBBYQJ6EIFKMy94fblpZsJyORdPoRf9IE_gmvvI-sWtmfAs
Malicious actors could exploit the laws of quantum mechanics to destroy quantum information on a global scale, say physicists
One way to combat eavesdropping is to use the rules of quantum physics to protect data. Indeed, there is currently huge investment in designing and testing a quantum version of the internet that will prevent eavesdropping and make communication almost perfectly secure.
But that raises an interesting question. How might malicious actors attack such a quantum internet?
quantum terrorists could bring the quantum internet to its knees almost instantly and without revealing their identity. More worrying still is that there is no obvious way to counter this new kind of attack.
if several attackers inject their quantum information into the network at the same instant, they can disrupt the global quantum state. In that case the initial state of the system cannot be retrieved, even in principle.
How many terrorists are needed for this to happen? The shocking conclusion is that it requires only three or more quantum terrorists working in unison. “Our findings reveal a new form of vulnerability that will enable hostile groups of [three or more] quantum-enabled adversaries to inflict maximal disruption on the global quantum state in such systems,” say the team.
So instead of the quantum internet existing as a global quantum state, it would instead be a set of connected quantum systems each existing within classical networks and connected together. That would prevent an attack on one part of the network from spreading to other parts.
Tomi Engdahl says:
The Key to the Internet and Key Ceremonies: An explainer
https://kimdavies.com/key-ceremony-primer/
If you hear about the “keys to the Internet”, the topic is usually a very specific thing — a digital key that is used to verify the security of the “domain name system”.
Tomi Engdahl says:
University of California Berkeley bans new research projects with Huawei after US indicts Chinese telecoms giant
https://m.scmp.com/news/china/diplomacy/article/2185509/university-california-berkeley-bans-new-research-projects?utm_medium=Social&utm_source=Facebook#Echobox=1549664792
The directive halting new Huawei funding took effect on January 30, two days after the US filed criminal charges against the telecoms equipment maker
The ban does not apply to existing multi-year collaborative deals because ‘none of these projects involve sensitive technological secrets,’ the school said
Tomi Engdahl says:
Amazon Bought A Router Company You’ve Never Heard Of. Here Is Why It’s A Huge Deal.
https://www.buzzfeednews.com/amphtml/nicolenguyen/amazon-acquisition-eero-routers-privacy
Experts are concerned about what Amazon’s acquisition of Eero means for consumer privacy.
through your Eero device, that you’re using a crappy older one.
Tomi Engdahl says:
The broadband industry loves bullshit names
53
You’ve heard of 5G; now meet 5G E, 5G TF, and 10G
https://www.theverge.com/2019/2/5/18212091/5g-e-tf-10g-broadband-industry-fake-names-mobile-internet-att-verizon
Tomi Engdahl says:
DriveNets emerges from stealth with $110M for its cloud-based alternative to network routers
https://techcrunch.com/2019/02/14/drivenets-emerges-from-stealth-with-110m-for-its-cloud-based-alternative-to-network-routers/?utm_source=tcfbpage&sr_share=facebook
Tomi Engdahl says:
A test guide for small-satellite constellations and NewSpace applications
https://www.edn.com/electronics-blogs/out-of-this-world-design/4461531/A-test-guide-for-small-satellite-constellations-and-NewSpace-applications?utm_source=Aspencore&utm_medium=EDN&utm_campaign=social
As launch costs continue to fall, almost 17,000 small satellites will be built over the next decade to deliver the next generation of space-based applications.
NewSpace companies around the world are planning large constellations to provide global, low-latency internet coverage, Earth-observation analytics, and satellite-based IoT for asset management.
Tomi Engdahl says:
‘There’s no way the US can crush us,’ Huawei founder claims
https://techcrunch.com/2019/02/18/theres-no-way-the-us-can-crush-us-huawei/?utm_source=tcfbpage&sr_share=facebook
“The world needs Huawei because we are more advanced. Even if they persuade more countries not to use us temporarily, we could just scale things down a little bit,” Ren told the BBC via a translator.
Tomi Engdahl says:
Quantum network to test unhackable communications
https://m.phys.org/news/2018-10-quantum-network-unhackable.html#nRlv
As the number of hacks and security breaches rapidly climbs, scientists say there may be a way to make a truly unhackable network by using the laws of quantum physics.
To explore the concept, scientists are creating a network in the Chicago area that taps the principles of quantum physics to send information.
Tomi Engdahl says:
Build Your Own Dial-Up ISP Server for Retrocomputing
https://blog.hackster.io/build-your-own-dial-up-isp-server-for-retrocomputing-8316c91bfd62
Tomi Engdahl says:
Facebook expands its internet infrastructure projects
https://techcrunch.com/2019/02/25/facebook-expands-its-internet-infrastructure-projects/
Like every year, Facebook is using MWC Barcelona to focus on its infrastructure projects. While you may mostly think of Facebook as a social network, the company started launching infrastructure projects for bringing more people online (and onto its network) many years ago.
At MWC, the company announced a number of new partnerships and projects that expand on its existing projects.
Maybe the most interesting of these projects is called Internet para Todos (IpT) Peru. What Facebook is trying to show here is that it’s possible to create an economically viable provider of rural mobile infrastructure.
Tomi Engdahl says:
OneWeb launches mega-constellation pathfinder satellites
https://www.bbc.com/news/science-environment-47374246
The first six satellites for OneWeb’s mega-constellation have launched on a Soyuz rocket from French Guiana.
The spacecraft are the pathfinders in a network the London-based start-up is building to take high-speed broadband internet to every corner of the globe.
Tomi Engdahl says:
OneWeb launches mega-constellation pathfinder satellites
https://www.bbc.com/news/science-environment-47374246
Tomi Engdahl says:
Ciena is unveiling a technology this week that can transmit 800 gigabits of data per second on a single wavelength of light.
Faster Fiber Links for Data Centers
https://spectrum.ieee.org/tech-talk/telecom/internet/faster-fiber-links-for-data-centers
a new record-setting system this week at the Optical Fiber Communications Conference (OFC), cosponsored by IEEE, which is being held March 3 to 8 in San Diego.
Ciena’s new WaveLogic 5 Extreme system can transmit 800 gigabits of data per second on a single wavelength of light through up to 200 kilometers of optical fiber. The company says it will begin deliveries by year-end.
Fiber-optic transmission capacity has grown at Moore’s Law rates since the 1980s
Data center capacities are growing faster than 10 percent a year
Much data center traffic is packaged as 100-gigabit Ethernet transmitted on one of about a hundred wavelengths in an optical fiber. But operators want to squeeze more data through the cables. The number of ports installed in data centers to carry 200 gigabits or more
At OFC, the Optical Internetworking Forum will demonstrate the interoperability of 400-gigabit transmission equipment meeting the group’s new 400ZR standard. Yu expects shipments of 400-gigabit equipment, first introduced in 2017, “to grow at an exponential rate with cumulative port shipments exceeding 10 million within three years”
Ciena is offering two families of systems. Its Extreme series, optimized for data rate and long-distance performance, includes the 800-gigabit model, which Xenos says can transport the full rate over 100 to 200 kilometers for data center connections, and can be adjusted to carry 600 gigabits for a thousand kilometers, or 400 gigabits for even longer hauls.
A Nano series optimized for the small footprint and low power sought for use inside data centers can carry 100 to 400 gigabits, depending on the distance.
Acacia Communications will show a module that can transmit at 1,200 gigabits, but it reaches that data rate by combining two 600-gigabit signals at different wavelengths.
Some observers have suggested that fiber transmission capacity may be approaching its ultimate limit, but earlier warnings of ultimate limits were proved wrong when new technology came along