Networkcodes are assigned by theFDSN to uniquely identify the owner and operator responsible for thedata collected by a network. Network operators may request a networkcode as needed for newdeployments.
Historical temporary network codes were allocated as two-charactercodes, with the first character being a digit (0-9) or the letters X,Y or Z. Many of these codes have been reused for differentdeployments in different years and are therefore not globallyunique. A data owner or delegate data center may wish to convert, orprovide an alias, for data using the older, 2-character codes. Themapping from the 2-character codes is strongly recommended to followthis pattern:
A temporary network operator may wish to request a 6 character networkcode in the transitional mapping pattern above in order have aglobally unique code that is also usable with miniSEED 2 through themapping. Furthermore, the FDSN reserves all 6 character networkcodes that match the transitional mapping pattern for all previouslyor future allocated 2 character temporary network codes. Thus the codeXA2002 must be assigned solely to the temporary network with code XAthat was operating in 2002.
The European Commission has today adopted the first-ever EU network code on cybersecurity for the electricity sector. Foreseen under the Electricity Regulation (EU) 2019/943 (Article 59) and in the 2022 EU Action Plan to digitalise the energy system, this delegated act is an important step to improve the cyber resilience of critical EU energy infrastructure and services. It will support a high, common level of cybersecurity for cross-border electricity flows in Europe. The dossier now passes to the Council and European Parliament to scrutinise the text and the rules will enter into force once this period is over.
The network code aims to establish a recurrent process of cybersecurity risk assessments in the electricity sector. These assessments are aimed at systematically identifying the entities that perform digitalised processes with a critical or high impact in cross-border electricity flows, their cybersecurity risks, and then the necessary mitigating measures that are needed. For that, this network code establishes a governance model that uses and is aligned with existing mechanisms established in horizontal EU legislation, notably the revised Network and Information Security Directive (NIS2). This is the case, for example, for the reporting of cyberattacks and vulnerabilities using the established Computer Security Incident Response Teams (CSIRTs), or coordination with the CyCLONe network in case of large-scale cybersecurity incidents and crises. The new rules will therefore promote a common baseline, while respecting existing practices and investments as much as possible. This model can develop, follow and regularly review the methodologies of different stakeholders, taking into account the current mandates of different bodies in both the cybersecurity and electricity regulatory systems.
For decades, the telecommunications industry has operated within the confines of closed networks, tightly controlling access to their infrastructure. This insular approach, while providing a degree of control and security, has ultimately served as a barrier to innovation and progress. However, the advent of software-defined networking standards and the transformative 5G revolution has ushered in a paradigm shift, compelling telco companies to embrace ecosystem-centric models and the imperative of network openness.
The transformative potential of APIs lies at the core of these ecosystems, enabling seamless communication between applications and networks. These APIs leverage the programmable nature of cloud-native 5G networks, facilitating dynamic allocation of network capabilities based on real-time requirements. This unprecedented level of flexibility and responsiveness represents a paradigm shift in network management, allowing applications to request and receive specialized capabilities tailored to their specific needs.
Network APIs play a pivotal role in catalyzing significant revenue growth by strategically aligning 5G-era network capabilities with cutting-edge applications. This synergy unlocks an array of unprecedented possibilities that stand poised to reshape industries and redefine experiences:
Network APIs are a game-changer for the 5G ecosystem, enabling developers to harness the full potential of advanced network capabilities seamlessly. They foster innovation, enhance application performance, and open up new revenue opportunities for service providers, paving the way for a more connected and intelligent world.
Along with the underlying source control system, such as git, is the platform used to provide shared access to repositories across a team. Products like GitHub, GitLab, BitBucket, Gogs, etc all provide an implementation of git in a web accessible portal where teams can share projects repos. But these solutions offer far more than just a centralized remote location for repositories. They also include collaboration features such as issue logging, release tracking, documentation wikis, project management boards, and much more. This means that successful NetDevOps teams can leverage code reviews, issue logs, pull requests, and releases in the same way successful software development teams are.
So, if we agree that computers are better suited for deploying configurations across the network, it only makes sense that we use interfaces that are best suited to computers and not ones suited to humans. This of course means that with Network as Code we will leave behind the CLI as the primary method for deploying network configurations, and move to APIs such as the new standards of NETCONF and RESTCONF or native platform APIs.
I'm all about the human touch, but I completely agree that humans are error prone. Let's automate from the core, and reserve the finer human details for final packaging, focused on the user experience.
Absolutely correct. Syntax checking for CLI is definitely a challenge for legacy interfaces that lack a data model schema that can be validated against. In those cases, the best solution is thorough testing of templates in non-production environments, and strict adherence to those templates.
Good starter. Will you be tackling more advanced topics like secrets management, CI/CD pipelines and moving beyond config replacement and into orchestration? Maybe something involving event driven automation?
Dhana, my plan is to continue discussing and building content and ideas around all the topics in the NetDevOps space including the ones you listed. No specifics on the order or timeline for when I'll cover them. Mostly will be up to available time and other factors that push me in one direction or another.
Great article, Hank. Looking forward to the future one on source code. Especially curious on how to maintain synchronization between device config and git config (especially with api and traditional CLI changes).
Catalyzing Networks for Social Change, published by GEO and the Monitor Institute in 2011, provided an orientation for grantmakers to understand networks for social change and the potential impact of embracing networked ways of working. In February 2013, GEO and four partners published Pathways to Grow Impact, which noted that grantmaker support for networks is useful no matter what strategy organizations are using to grow their impact. In this publication, we dig deeper into the mindset shifts necessary to be an effective network participant and offer practical recommendations for how grantmakers can support networks.
The gas industry is based on a vast interconnected physical network consisting of pipelines, LNG terminals, and gas storage facilities. Access to the EU gas market depends on access to the cross-border gas networks. To facilitate networks' access across EU Member States, the Union law foresaw to harmonise the relevant market rules in a number of Network Codes and Guidelines.
Today, the EU Agency for the Cooperation of Energy Regulators (ACER) has submitted to the European Commission its revision of the Network Code for cybersecurity aspects of cross-border electricity flows. This cybersecurity network code aims to further contribute to maintaining the security and resilience of the electricity system across Europe.
ACER has submitted the revised Network Code to the European Commission within the allowed time limit of six months. Next, the Commission will review the submitted Network Code and initiate its procedure for the adoption of delegated acts. When adopted by Member States, it becomes legally binding across the EU.
The mobile country code consists of three decimal digits and the mobile network code consists of two or three decimal digits (for example: MNC of 001 is not the same as MNC of 01). The first digit of the mobile country code identifies the geographic region as follows (the digits 1 and 8 are not used):
An MCC is used in combination with an MNC (a combination known as an "MCC/MNC tuple") to uniquely identify a mobile network operator (carrier) using the GSM (including GSM-R), UMTS, LTE, and 5G public land mobile networks. Some but not all CDMA, iDEN, and satellite mobile networks are identified with an MCC/MNC tuple as well. For WiMAX networks, a globally unique Broadband Operator ID can be derived from the MCC/MNC tuple.[1] TETRA networks use the mobile country code from ITU-T Recommendation E.212 together with a 14-bit binary mobile network code (T-MNC) where only values between 0 and 9999 are used.[2] However, a TETRA network may be assigned an E.212 network code as well.[3] Some network operators do not have their own radio access network at all. These are called mobile virtual network operators (MVNO) and are marked in the tables as such. Note that MVNOs without their own MCC/MNC (that is, they share the MCC/MNC of their host network) are not listed here.
The following tables attempt to provide a complete list of mobile network operators. Country information, including ISO 3166-1 alpha-2 country codes is provided for completeness. Mostly for historical reasons, one E.212 MCC may correspond to multiple ISO country codes (e.g., MCC 362 corresponds to BQ, CW, and SX). Some operators also choose to use an MCC outside the geographic area that it was assigned to (e.g. Digicel uses the Jamaica MCC throughout the Caribbean). ITU-T updates an official list of mobile network codes in its Operational Bulletins which are published twice a month.[4] ITU-T also publishes complete lists: as of January 2024 list issued on 15 November 2023 was current, having all MCC/MNC before 15 November 2023.[5] The official list is often incomplete as national MNC authorities do not forward changes to the ITU in a timely manner. The official list does not provide additional details such as bands and technologies and may not list disputed territories such as Abkhazia or Kosovo.
3a8082e126