This article focuses on the exhaustion of IPv4 addresses: why it happened and how things are with the number of IPv4 in the world. We will talk about ways to solve the problem (IPv6, IPv9, IPv4 resale, reverse proxy servers) and why companies are not in a hurry to refuse IPv4.
About two ways to organize VPN connections in a corporate network: remote access and site-to-site. In addition, we are talking about the pros, cons, and features of PPTP, L2TP / IPsec, SSTP, and OpenVPN.
An overview of the main innovations of the security protocol for wireless networks WPA3: brute-force protection, configuration using third-party devices, personalized data encryption and a new security package. Additionally, inside you will find a selection of materials on the topic: an official release with a detailed description of new features, posts about the future of wireless networks, ways to protect them and prioritize traffic.
Another news post will tell about the features of the specification for the fifth generation of mobile networks. The specification release was decided to be accelerated at the request of the operators and due to the high demand for mobile Internet. Details of this solution, the description of the parameters of the 5G-network and the achievements of England, Russia, Japan and Finland in the "5G-race" are looking under the cut.
Here we will talk about how General Communication provided Alaska residents with broadband Internet through a radio relay network, and talk about alternative ways to deliver Internet to remote areas: atmospheric optical communication lines from Google and Facebook drones.
Another article on the topic of Internet delivery to remote regions. This time we will talk about the Russian project. Inside, you will find a description of the technical side of the construction of a radio-relay Wi-Fi network using point-to-point and point-to-multipoint schemes. We also provided step-by-step instructions that will help get state approval for the construction of such networks.
A small educational program and a historical excursion on the topic of billing: what it is, where it came from and how it developed. Additionally, using examples, let's see how the billing server is implemented and what billing solutions are offered on the market.
We continue the topic of billing, but from a practical point of view. Let us consider an example of the implementation of the SCAT DPI server and the LANBilling billing system into the network infrastructure of a provider with a client base of 2 thousand people.
The article offers tips on how to optimize the speed of Internet access: what the network capacity depends on and how to reduce traffic by five times (caching, data compression, CDN and Flow technologies, etc.).
We describe four network levels: access level, aggregation level, network core level, server level. We talk about the equipment that providers use to implement the work of each of them.
In continuation of the previous material in this article we will discuss the features of the server level. What does a standard set of provider services look like? What is the essence of the work of these services? You will find answers to these and other questions inside.
Introductory material on how to organize access to the Internet using Hotspot technology and not violate Russian laws. As an example, let’s see how Wi-Fi authorization works on Scat DPI in the Home Computer Networks company.
We will talk about the consequences of the ban on Google Global Cache in Russia for users and network operators. We will show you how providers can cope with legislative difficulties in this situation.
We invite you to learn more about the countries whose residents often encounter content blocking on the Internet. The reasons for the blocking and technical features of the implementation of the "prohibition policies" - about this in the article.
Here we will talk about the sensational bans related to social networks and instant messengers. You will learn why Twitter is blocked in China, and LinkedIn in Russia. Additionally, we will discuss the minuses of content moderation in social media and the situation with the prohibition of E2E encryption.
This article opens our multi-part cycle of publications on Net Neutrality and begins with the definition of the essence and origins of the concept. We are talking about the emergence of the term, the role of private and public telecommunications companies in the formation of the principles of network neutrality, as well as the main historical stages of development of these principles.
We continue to delve into the story. This article will focus on the confrontation of the Federal Communications Commission (FCC) and American providers. We will talk about the most high-profile court proceedings and the main stages of modifying the rules of network neutrality, which took place before 2010.
In this material, we describe the course of the "war" between the FCC and the giant operators (Verizon, Google, AT & T) from 2010 to 2017. You will learn why the US president decided to support network neutrality supporters, and 60 technology companies opposed them.
We offer more details on the period from 2015 to 2017, when America lived on the principle of Net Neutrality. We will answer the questions: why the Commission decided to cancel neutrality, and how US citizens, telecommunications companies and the media reacted to this.
In the final article of our cycle, we discuss the initiative of individual states to preserve net neutrality: is it possible and what are their chances for success. In addition, the material will tell you how things are with Net Neutrality in Europe, Russia, India and other countries.