evolution of internet
play

Evolution of Internet Vint Cerf May 2010 1 The Original ARPANET - PowerPoint PPT Presentation

Evolution of Internet Vint Cerf May 2010 1 The Original ARPANET 940 Dec 1969 #2 #4 SRI UTAH #3 PDP 360 UCSB 10 #1 Sigma UCLA 7 2 The ARPANET IMP 3 Packet Radio Van 4 Inside the PR Van 5 Inside the PR Van (2) 6 Intelsat


  1. Evolution of Internet Vint Cerf May 2010 1

  2. The Original ARPANET 940 Dec 1969 #2 #4 SRI UTAH #3 PDP 360 UCSB 10 #1 Sigma UCLA 7 2

  3. The ARPANET IMP 3

  4. Packet Radio Van 4

  5. Inside the PR Van 5

  6. Inside the PR Van (2) 6

  7. Intelsat IVA - Packet Satellite Network 7

  8. First Three-Network Test of Internet November 22, 1977 8

  9. Internet 1999 9

  10. 10

  11. Internet - Global Statistics 2010 732,740,444 ( ftp.isc.org/www/survey/reports/current/ Jan 2010 ) 1,802 Million Users (InternetWorldStats.com, Dec 31, 2009) 11

  12. Regional Internet Statistics 12/31/2009 Region Internet % Population penetration Asia 764.4 Mil. 20.1 % Europe 425.8 Mil. 53.0 % North Am. 259.6 Mil. 76.2 % LATAM/C 186.9 Mil. 31.9 % Mid-East 58.3 Mil. 28.8 % Oceania 21.1 Mil. 60.8 % Africa 86.2 Mil. 8.7 % TOTAL 1,802.0 Mil. 26.6 % 12

  13. 13

  14. http://www.potaroo.net/tools/ipv4/index.html 14

  15. Major Changes to Internet • IPv6 - in parallel with IPv4 • Internationalized Domain Names • Domain Name System Security (DNSSEC) • Digitally-Signed Address Registration • Sensor Networks • Smart Grid • Mobile Devices 15

  16. Internationalized Domain Names Internet Society of China www.isc.org.cn www. 中国互 联 网 协 会 . 组织 . 中国 Industrial and Commercial Bank of China www.icbc.com.cn www. 中国工商银行 . 国际 . 中国 Ministry of Industry and Information Technology of the PR China www.miit.gov.cn/ www. 中国工 业 与信息化部 . 政府 . 中国 16

  17. APPLICATIONS 17

  18. Chrome 18

  19. 19

  20. 22

  21. 23

  22. 25

  23. Google Earth 26

  24. Google Ocean 27

  25. Google Sky 28

  26. 29

  27. Google Mars 30

  28. Google Moon 31

  29. Mobility and Mobiles • 4.5 Billion Mobiles and counting (15-20% Internet enabled) • Text/Web Access • Payment systems • Innovative interfaces - Note I/O discovery • Navigation systems – GPS, Galileo?, Mobile Tower triangulation, Bldg Announcements? • Geo-location based services (Lake Powell example/saffrom) 32

  30. 33

  31. 34

  32. Evolving and Maturing Technologies • Speech Recognition: Android • Automatic Captioning • (Real-time) Speech and Text Translation 35

  33. 36

  34. 37

  35. 38

  36. 39

  37. Internet-enabled Devices 40

  38. 41

  39. Security Problems • Spam • Viruses/Worms/Trojan Horses – Infected websites – Infected thumb drives – Infected CD-ROMs, DVDs, etc. • DOS and DDOS attacks • Social Engineering • Poor passwords (re-usable especially) • Phishing, Pharming (DNS compromise) • IP address poaching • Spectacular human error (configuration esp.) 42

  40. Origins of Security Weaknesses • Weak operating systems • Naïve Browsers (running with too much privilege) • Poor access control practices • Improper configuration of hosts and clients • Compromised lap/desktops + servers Leading to BOTNETS • Hackers, Organized Crime, State-sponsored cyberwarfare 43

  41. Privacy Problems • Lax user behaviors (social networking, unsafe configuration) • Weak protection of personal data by business, government – Lost laptops, thumb drives – Weak security configuration of servers – Poor access controls – Bad business practices (sharing personal information) • Invasive devices – Mobiles with cameras and sound recording capacity – GPS tracking – RFID tracking – Closed Circuit TV surveillance (traffic, stores, public places) 44

  42. New Technology and Applications • Flow Routers (Nick McKeown - Stanford) • Massive Data Correlation – MAP/Reduce - Cloud computing data centers – Jeff Jonas: every datum is a query – Tweetstream, sigint/humint/sensors, web, media (YouTube, Flickr) – Computers in the Real World • http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html • TIA - DARPA (Poindexter) 45

  43. Cloud Collaboration • Multiple Data Centers (replication, responsiveness) • Dynamic capacity sharing • Data sharing (“latest copy is always in the cloud”) • Video and audio conferencing with data sharing • Inter-Cloud interactions (new research area!) – How to refer to other clouds? – How to refer to data in other clouds? – How to make data references persistent (unlike URLs)? – How to protect Clouds from various forms of attack (inside, outside)? – How to establish an access control regime (inside, between clouds)? – What semantics can we rely on with inter-cloud data exchange? – What notion of “object” would be useful for inter-cloud exchange? 46

  44. Internet Research Problems Security at all levels Mobility, persistence (processes, connections, Internet “Erlang” formulas references) QOS debates (smart Multihoming routers?) Multipath routing Internationalized Domain Names (ccTLDs & GTLDs) Broadcast utilization Distributed Algorithms Mesh and Sensor networks Presence (multi-level) Virtualization (net, storage, processing) 47

  45. Internet Research Problems - 2 Authentication, Identity, Governance Authorization - Law Enforcement Multi-core Processor Algorithms - Policy Development Delay and Disruption Tolerance - Homologation Integration of Applications (e.g. drag/drop gadgets in calendar) - Facilitation of electronic commerce Intellectual Property Protection (tracking rights, enforcement) - Privacy and confidentiality Role of Layering 48

  46. Internet Research Problems - 3 Mobile operation Dynamic joining (new IP address?, Authentication?) Dynamic Routing (Dynamic Topology) Persistent connection (ID at TCP/UDP/RTP layer?) Self-organization (security risks?) 49

  47. Internet Research Problems - 4 Performance Latency, Throughput (cf: Greg Chesson’s work) Resilience (AS partitioning) Rate management vs CWND flow control Route convergence Addressing (Identification) What objects should be addressable? New bindings of IP to Identifiers (new DNS?) 50

  48. Important Policy Issues • Broadband access to Internet – Increases range of applications that are feasible – Enhances value of cloud computing – Creates platform for new business development • Open, non-discriminatory access to Internet – Enhances competition for value-added service delivery – May require regulatory oversight (inadequate competition) – Facilitates innovation without permission (end-to-end principle) • Reasonable practices – Differential charging for bandwidth usage (not volume!) – Discrimination among traffic classes (but not among users or providers) – Traffic management to avoid congestion (fairness!) – Resistance to Denial of Service Attacks, etc. 51

  49. Security Policy Issues and Ideas • Cyber Fire Department (Sandia Labs?) – Note, long-standing Conficker Worm dictates continuous response (smoldering fire…) • Possible International Treaty agreements – Significance of Digital Signatures and Certificates – Agreements on Definition of “abuse” – Extradition and Mutual Assistance agreements – Cooperative, Open Software Development for Security • Covert operations • Overt cyber-warfare 52

  50. Challenges of the Digital Age • Intellectual property treatment – Digital material is easy to copy and distribute • Semantic Web • Complex objects that can only be rendered via computer – 3D interactive objects – Complex spreadsheets – Interactive environments • BIT ROT! – Preserving interpretive programs (Windows 3000 and PPT 1997) – And the operating systems that run them – And the hardware that run the operating systems – For thousands of years!! 53

  51. InterPlaNetary Internet 54

  52. 55

  53. 56

  54. 57

  55. DARPA
‘Next
Genera/on
Internet’
ini/a/ve
 • Development
of
an
architecture
for
extending
the
Internet
across
 space
 Crea/on
of
new
“Disrup/on
Tolerant
Networking”
(DTN)
 technology
based
on
‘Bundles’
 • Forma9on
of
the
DTN
Research
Group
in
the
IRTF
 • New
DARPA‐DTN
ini9a9ve
launched
 58

  56.  Increasing reliance on data relays and the need to transition towards an internetworked architecture  Increasing reliance on international cooperation 59

  57. DTN
Standardiza9on
 Wizzy
Digital
Courier
in
South
 Africa
 SeNDT
‐
Sensor
Network
with
 VMESH
project
at
UC
Davis
 Delay
Tolerance
 Node
LocalizaMon
using
 SNC
Project
 Mobile
Robots
in
 ZebraNet
 



Delay‐Tolerant
Sensor
 DTN/SN
‐
DTN
for
wireless
 Networks
at
NICTA,
Australia
 sensor/actuator
networks
 UCLA
DTN
for
Sensor
Networks
 FidoNet
 SUMOWIN
 Technology
and
Infrastructure
 Shared
Wireless
InfostaMon
 for
Emerging
Regions
(TIER)
 Model
(SWIM)
at
Cornell
 Time
Equals
Knowledge
(TeK)
 Mindstream
Project
at
the
 DataMules
 University
of
Waterloo

 DakNet
 World
Wide
Web
Offline
Explorer
 Interplanetary
Internet
 (WWWOFFLE)
 Internet
 Space
DTN
profile
 CCSDS
 DraDs
+
 Recommended
 Standards
 RFCs
 “DTN‐2”
 Space
 Reference
 Reference
 ImplementaMon
 ImplementaMons
 (“ION”)
 Interoperability
tesMng
 60

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend