alphadogg writes "Having lots of Wi-Fi networks packed into a condominium or apartment building can hurt everyone's wireless performance, but Stanford University researchers say they've found a way to turn crowding into an advantage. In a dorm on the Stanford campus, they're building a single, dense Wi-Fi infrastructure that each resident can use and manage like their own private network. That means the shared system, called BeHop, can be centrally managed for maximum performance and efficiency while users still assign their own SSIDs, passwords and other settings. The Stanford project is making this happen with inexpensive, consumer-grade access points and SDN (software-defined networking)."
Slashdot is powered by your submissions, so send in your scoop
BUL2294 writes "The Chicago Tribune is reporting that, over the next few months in Chicago, Comcast is turning on a feature that turns customer networks into public Wi-Fi hotspots. After a firmware upgrade is installed, 'visitors will use their own Xfinity credentials to sign on, and will not need the homeowner's permission or password to tap into their Wi-Fi signal. The homegrown network will also be available to non-subscribers free for several hours each month, or on a pay-per-use basis. Any outside usage should not affect the speed or security of the home subscriber's private network. [...] Home internet subscribers will automatically participate in the network's growing infrastructure, although a small number have chosen to opt out in other test markets.' The article specifically mentions that this capability is opt-out, so Comcast is relying on home users' property, electricity, and lack of tech-savvy to increase their network footprint." Comcast tried this in the Twin Cities area, and was apparently satisfied with the results, though subscribers are starting to notice.
judgecorp writes "Facebook is reportedly hoping to buy drone specialist Titan Aerospace in order to provide airborne relays for Internet connectivity in developing countries, as part of its internet.org project. The solar-powered drones are classified as "atmospheric satellites" and can fly for five years. The rumoured project sounds quite similar to Google's Project Loon, which proposes using balloons for the same job." More coverage at SlashCloud, which notes that the purchase is rumored but not yet publicly confirmed.
alphadogg writes "Cisco today kicked off a contest with $300,000 in prize money that challenges security experts around the world to put together ways to secure what's now called the 'Internet of Things,' the wide range of non-traditional computing devices used on the electric grid, in healthcare and many other industries. A Cisco SVP concluded his keynote at this week's RSA Conference by announcing what he called the 'Internet of Things Security Grand Challenge.' Christopher Young said the idea is 'a contest of experts around the world to submit blueprints' for how security issues created by the Internet of Things could be addressed. It's expected that up to six winning entries would be selected and the prize money awarded at the Internet of Things Forum in the fall."
sciencehabit writes "700-year-old human feces, preserved in sealed barrels under a town square from the Middle Ages, are shedding new light on the evolution of the bacteria in our guts. Viruses isolated from the ancient poop reveal a growing arms race between our native bacteria and microbial invaders. Such viruses may have been instrumental in helping us digest food, temper inflammation, and fight obesity." Less frightening news that touches on the same domain: European cities (notably Britain) decided to go with sewers instead of barrels, and now, writes reader DW100 "An ISP in the UK has come up with an innovative way to deliver broadband around London: its Victorian sewer network. Geo Networks runs the cables along the roof of the sewers, avoiding any 'waste' issues and providing fast, low-latency, high-fibre services to business and other providers."
lpress writes "I was at a Time Warner Cable (TWC) store returning a router, when I asked what my new monthly bill would be. The answer — $110 — surprised me, so I asked a few questions and ended up with the same service for $76.37. Check out my conversation with their representative to see what was said, then do the same yourself."
Lucas123 writes "As the sophistication of automotive electronics advances, from autonomous driving capabilities to three-dimensional cameras, the industry is in need of greater bandwidth to connect devices to a car's head unit. Enter Ethernet. Industry standards groups are working to make 100Mbps and 1Gbps Ethernet de facto standards within the industry. Currently, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Making Ethernet the standard in the automotive industry could also open avenues for new apps. For example, imagine a driver getting turn-by-turn navigation while a front-seat passenger streams music from the Internet, and each back-seat passenger watches streaming videos on separate displays." This might get us into trouble when the Cylons show up.
badger.foo writes "Have you ever wanted to know what's really going on in your network? Some free tools with surprising origins can help you to an almost frightening degree. Peter Hansteen shares some monitoring insights, anecdotes and practical advice in his latest column on how to really know your network. All of it with free software, of course." From the article: " The NetFlow protocol was invented at Cisco in the early 1990s. It's designed to collect traffic metadata, where the basic unit of reference is the flow, defined as the source and destination IP address pair, the matching source and destination port for protocols that use them, the protocol identifier, time started and ended, number of packets sent, number of bytes sent, and a few other fields that have varied somewhat over the NetFlow versions. ... On OpenBSD, various netflow sensors and collectors had been available for a while when the new network pseudo device pflow debuted in OpenBSD 4.5."
alphadogg writes "Ahead of a major new spectrum auction scheduled for next year, America's four major wireless carriers are jockeying for position in the frequencies available to them, buying, selling and trading licenses to important parts of the nation's airwaves. Surging demand for mobile bandwidth, fueled by an increasingly saturated smartphone market and data-hungry apps, has showed no signs of slowing down. This, understandably, has the wireless industry scrambling to improve its infrastructure in a number of areas, including the amounts of raw spectrum available to the carriers. These shifts, however, are essentially just lateral moves – nothing to directly solve the problems posed by a crowded spectrum. What's really going to save the wireless world, some experts think, is a more comprehensive re-imagining of the way spectrum is used."
An anonymous reader writes "Researchers at the University of Liverpool have shown for the first time that WiFi networks can be infected with a virus that can move through densely populated areas as efficiently as the common cold spreads between humans. The team designed and simulated an attack by a virus, called 'Chameleon,' that not only could spread quickly between homes and businesses, but avoided detection and identified the points at which WiFi access is least protected by encryption and passwords. The research appears in EURASIP Journal on Information Security." The technical details are explained in the journal article.
phantomfive writes "Verizon has said they will not be digging new lines any time soon. Time-Warner's cash flow goes towards paying down debt, not laying down fiber. AT&T is doing everything they can to slow deployment of Google fiber. How can the situation be improved? Mainly by expediting right-of-way access, permits, and inspections, according to Andy Kessler. That is how Google was able to afford to lay down fiber in Austin, and how VTel was able to do it in Vermont (gigabit connections for $35 a month)."
Lauren Weinstein writes "You'd think that with so many concerns these days about whether the likes of AT&T, Verizon, and other telecom companies can be trusted not to turn our data over to third parties whom we haven't authorized, that a plan to formalize a mechanism for ISP and other 'man-in-the-middle' snooping would be laughed off the Net. But apparently the authors of IETF (Internet Engineering Task Force) Internet-Draft 'Explicit Trusted Proxy in HTTP/2.0' (14 Feb 2014) haven't gotten the message. What they propose for the new HTTP/2.0 protocol is nothing short of officially sanctioned snooping."
theodp writes "As Google Fiber forges ahead into new metro areas, Michael Brick reports on worries the fiber project will create a permanent underclass. Building the next generation of information economy infrastructure around current demand, experts say, will deny poor people the physical wiring needed to gain access while the privileged digerati advance at hyperspeed. 'The fiber service deployment means multiplicity of the digital divide, multidimensionality of the digital divide,' says Eun-A Park of the Univ. of New Haven. 'You can see it in Google's trial in Kansas City.' Speed matters, explains Google, 'because a world with universal access and 100 times faster internet could mean 100 times the learning.' Without universal access, as is the case in KC due to pricing that's out of the reach of many of the city's poor, one presumes the outcome could be 100x the learning divide. Another case of the unintended consequences of good intentions?"
TopSpin writes "Alcatel-Lucent has authorized The University of California, Berkeley to 'release all Plan 9 software previously governed by the Lucent Public License, Version 1.02 under the GNU General Public License, Version 2.' Plan 9 was developed primarily for research purposes as the successor to Unix by the Computing Sciences Research Center at Bell Labs between the mid-1980s and 2002. Plan 9 has subsequently emerged as Inferno, a commercially supported derivative, and ports to various platforms, including a recent port to the Raspberry Pi. In Plan 9, all system interfaces, including those required for networking and the user interface, are represented through the file system rather than specialized interfaces. The system provides a generic protocol, 9P, to perform all communication with the system, among processes and with network resources. Applications compose resources using union file systems to form isolated namespaces."
An anonymous reader writes "Brian Krebs has a followup to this week's 400 Gbps DDoS attack using NTP amplification. Krebs, as a computer security writer, has often been the target of DDoS attacks. He was also hit by a 200Gbps attack this week (apparently, from a 15-year-old in Illinois). That kind of volume would have been record-breaking only a couple of years ago, but now it's just normal. Arbor Networks says we've entered the 'hockey stick' era of DDoS attacks, as a graph of attack volume spikes sharply over the past year. CloudFlare's CEO wrote, 'Monday's DDoS proved these attacks aren't just theoretical. To generate approximately 400Gbps of traffic, the attacker used 4,529 NTP servers running on 1,298 different networks. On average, each of these servers sent 87Mbps of traffic to the intended victim on CloudFlare's network. Remarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests. An attacker with a 1 Gbps connection can theoretically generate more than 200Gbps of DDoS traffic.' In a statement to Krebs, he added, 'We have an attack of over 100 Gbps almost every hour of every day.'"
An anonymous reader writes with this excerpt from The Verge: "The South Korean government has decided to route sensitive data away from networks operated by Huawei, amid longstanding fears from the U.S. that the Chinese company's infrastructure could be used to spy on communications. As the Wall Street Journal reports, the U.S. had been urging its South Korean allies to route government communications away from Huawei networks, claiming that the infrastructure could be used to spy on communications with American military bases there. As a result, Huawei equipment will not be used at any American military base in South Korea. The Obama administration denies playing a role in the decision, and South Korean officials have not commented. The Journal reports that the White House made a point of keeping the talks private because it didn't want to be seen as meddling in its ally's business affairs."
Nemo the Magnificent writes "A few days ago we talked over a post by David Raphael accusing Verizon of slowing down Netflix, by way of throttling Amazon AWS. Now Jonathan Feldman gives us reason to believe that the carriers won't win the war on Netflix, because tools for monitoring the performance of carriers will emerge nd we'll catch them if they try. I just now exercised one such tool, NetNeutralityTest.com from Speedchedker Ltd. My carrier is Verizon (FiOS), and the test showed my download speed at the moment to be 12 Mbps. It was the same to Linode in NJ but only 3 Mbps to AWS East. Hmm."
CowboyRobot writes "Writing for ACM's Queue magazine, Paul Vixie argues, "The edge of the Internet is an unruly place." By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills and budgets that something the size of the Internet deserves. Furthermore, the resiliency of the Internet means that a device or program that gets something importantly wrong about Internet communication stands a pretty good chance of working "well enough" in spite of this. Witness the endless stream of patches and vulnerability announcements from the vendors of literally every smartphone, laptop, or desktop operating system and application. Bad guys have the time, skills, and motivation to study edge devices for weaknesses, and they are finding as many weaknesses as they need to inject malicious code into our precious devices where they can then copy our data, modify our installed software, spy on us, and steal our identities."
Esther Schindler writes "We all know how important tech standards are. But the making of them is sometimes a particularly ugly process. Years, millions of dollars, and endless arguments are spent arguing about standards. The reason for our fights aren't any different from those that drove Edison and Westinghouse: It's all about who benefits – and profits – from a standard. As just one example, Steven Vaughan-Nichols details the steps it took to approve a networking standard that everyone, everyone knew was needed: 'Take, for example, the long hard road for the now-universal IEEE 802.11n Wi-Fi standard. There was nothing new about the multiple-in, multiple-out (MIMO) and channel-bonding techniques when companies start moving from 802.11g to 802.11n in 2003. Yet it wasn't until 2009 that the standard became official.'"
symbolset writes "On the heels of the smackdown received by cable lobbyists in Kansas, Ars reports out of Utah that the cable companies aren't giving up hopes of preventing competition through legislation. The bill, called Interlocal Entity Service Prohibition, would prevent a regional fiber consortium from building infrastructure outside the boundaries of its member cities and towns — a direct attack on Google's work in Provo and the UTOPIA network. Utah is the third state to be involved in the Google Fiber rollout of gigabit fiber to the home."