Provider’s work: a selection of materials on protocols, IT and network infrastructure

Our selection of materials on old and new standards: from IPv6 to New IP, as well as factors affecting traffic in the networks of mobile operators and Internet providers.

/ Pexels / Brett Sayles

Providers work

  • How to detect Brute Force in a carrier network

    Besides phishing, one of the most popular hacker attacks brute force remains. Attackers use these attacks to crack smart devices and routers to form botnets. An ISP can protect customers if they notice suspicious activity on the network in time. We talk about effective metrics that will help to recognize a brute force attack. Among them are short sessions and a large number of connections per subscriber. We’ll also talk about information security and analyze which passwords are cracked most often.

  • Why should a telecom operator know QoE

    The QoE (Quality of Experience) parameter allows you to evaluate the work of your ISP. It is influenced by a huge number of factors: the total response and packet transit times, the quality of the IPTV picture and sound, the noise and echo in VoIP, and the work of the support service and installers. In the article we will talk about technical metrics: QoS, RTT (round-trip time) and retransmit.

  • How QoS Management Helps Pandemic Operators

    Over the past month, the load on the network of Internet providers has increased – some companies report 20-30% growth. To maintain the Quality of Experience at the same level, the Quality of Service (QoS) management systems will help. The operator frees up a band for high-priority traffic, “cutting” low-priority traffic. Users do not notice the difference in speed. We tell you how to configure QoS using the example of one of the largest Internet providers in Lebanon – iClik.

  • Unusual factors affecting corporate network traffic

    Material about interesting dependencies related to cybersecurity and the load on company networks. Let’s talk about why installing a second monitor at workplaces is a potential threat to network infrastructure and why corporations spend several months patching vulnerabilities.


  • P2P Dat – how it works and by whom it is used

    The protocol was developed in 2013 by engineer Max Ogden to transfer data between municipalities. But they quickly began to use it to exchange scientific information. We talk about the Dat device and the projects that implemented it – for example, the ScienceFair literature search application and the Beaker P2P browser. We will also talk about an analogue of the protocol – the block peer-to-peer distributed file system IPFS (InterPlanetary File System).

  • IPv6 – from theory to practice

    In June 2011 took place worldwide launch of IPv6when Internet providers and equipment manufacturers activated the protocol on their hardware. But since then he has not received wide distribution – he works with him slightly less than 16% sites. In the material we tell how migration proceeds and analyze the experience of applying the protocol to Russian and foreign organizations. We’ll also talk about the difficulties that companies face when introducing IPv6 in the field of the Internet of things – both in home and industrial networks.

/ Pexels / Ann h

  • How the IT community responds to the New IP initiative

    The TCP / IP model appeared back in 1972 and It has many vulnerabilities. Chinese telecoms have proposed a new standard New IP, which will solve the problem and become the basis of the next generation network infrastructure. Already there are first details about the IP packet header structure. However, some experts, including those from the International Telecommunication Union (ITU), see New IP as a threat to the “openness” of the Internet. We discuss various points of view and perspectives of the protocol.

IT infrastructure

  • DDoS and 5G: thicker “pipe” – more problems

    5G on the way – technology is already are testing in the USA, Canada, South Korea, Japan and Russia. It promises a bandwidth of more than 1 Gbit / s and low latency (up to 1 ms). But in this article we are talking about a fly in the ointment – the reasons why new-generation networks will lead to an increase in the number of DDoS attacks. We will also talk about two ways to protect the infrastructure of communication providers – comprehensive traffic cleaning centers and budget integrated systems.

  • Underwater Internet Cables: Who Routes Them

    Telecommunication companies regularly expand their underwater infrastructure. The world is already “encircling” more than three hundred cable systems. We talk about why they are needed in such numbers, and talk about fresh projects in this area – the 144-terabit PLCN cable from Google and Facebook and the first high-speed line between Australia and the region EMEA.

Larger VAS Experts Digests:

  • How to start your service provider
  • Industry Regulation and Service Policies

Similar Posts

Leave a Reply