Telecom and Networking

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping | Ars Technica An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.  There is a proof-of-concept exploit called KRACK, short for Key Reinstallation Attacks. KRACK

Topological Laser Cavities Could Revolutionize Optoelectronics – IEEE Spectrum  A new type of laser cavity that builds off a Nobel-winning development in physics can take on any shape and switch the flow of light with a magnetic field. Kante and his colleagues describe their so-called topological cavities in the current issue of Science.  Normally, a laser cavity, where light amplification takes place, is shaped like

Tuning for Zero Packet Loss in Red Hat OpenStack Platform For Telcos considering OpenStack, one of the major areas of focus can be around network performance. While the performance discussion may often begin with talk of throughput numbers expressed in Million-packets-per-second (Mpps) values across Gigabit-per-second (Gbps) hardware, it really is only the tip of the performance iceberg. The most common requirement is to have

Delivering 5G mmWave fixed wireless access | EDN Mobile network operators view fixed wireless access (FWA) as the first application for 5G in millimeter wave (mmWave) spectrum. Fixed wireless access describes a wireless 5G connection between a centralized base-station and numerous fixed or nomadic user locations.  With regulatory rules defined, large amounts of spectrum already in the operators’ hands, and enough power output

Fiber optic termination and splicing

We terminate fiber optic cable two ways – with connectors that can mate two fibers to create a temporary joint and/or connect the fiber to a piece of network gear or with splices which create a permanent joint between the two fibers. According to Which field-termination method best fits your fiber-optic LAN? article over the

Future cyber security threats and challenges: Are you ready for what’s coming? | CSO Online The world is changing, and with it so is the internet. Or perhaps it’s the other way around. The internet continues to create new business and social opportunities that massively scale and widely interconnect. The increasing depth and volume of personal and corporate data make it a more rewarding target for cyber crooks and

Are Facebook and Google the New Colonial Powers? To qualify as colonial powers, Facebook and Google must effectively limit the choices and power of users, and punish or coerce those who question or resist their power. The phrase that captures this broad narrative is: When an online service is free, you’re not the customer. You’re the product. In other words, if you’re not

Scientists Have Managed To Store Light As Sound For The First Time | IFLScience A team of researchers from the University of Sydney has managed to convert the digital information carried by light waves into sound waves inside a microchip. As reported in Nature Communications, the researchers were able to build a chip that slows down light by turning it into sound waves. “The information in our chip in acoustic

DIY optical power meter with SFP module and Arduino idea

Fifer optics power meter is an important tool for debugging fiber optics networks. I have earlier tested a cheap commercial fiber optic power meter a at Fiber optics power meter posting. Hardware hackers ares famous for building their own test equipment. The basic operation of optical power meter is quite simple: take a suitable detector,

Five technologies for building 5G | EDN 5G is widely considered a mobile technology that won’t be available until perhaps 2020 or 2021, and even then, not widely.  Cisco predicts that by 2021, a 5G connection will generate 4.7 times more traffic than the average 4G connection. 5G will be a quantum leap from today’s LTE-Advanced networks.