Beruflich Dokumente
Kultur Dokumente
Vint Cerf
September 2012
1
940
#4 UTAH
360
PDP 10
Internet 1999
888.2 Million
(ftp.isc.org/www/survey/reports/current/
Jan 2012)
Region
Internet Population Asia 1020 Mil. Europe 500.0 Mil. North Am. 273.1 Mil. LATAM/C 235.6 Mil. Mid-East 77.0 Mil. Oceania/Aus 23.9 Mil. Africa 140.0 Mil. TOTAL 2,267.0 Mil.
Black boxes would be used to connect the networks; these would later be called gateways and routers. There would be no information retained by the gateways about the individual flows of packets passing through them, thereby keeping them simple and avoiding complicated adaptation and recovery from various failure modes.
There would be no global control at the operations level.
There were also other secondary concerns, such as implementation efficiency, internetwork performance
Role of Openness
Open Source - Linux, Chrome, Chrome OS, Android, show source HTML
11
12
Security Problems
Spam Viruses/Worms/Trojan Horses
Infected websites Infected thumb drives Infected CD-ROMs, DVDs, etc.
DOS and DDOS attacks Social Engineering Poor passwords (re-usable especially) Phishing, Pharming (DNS compromise) IP address poaching Spectacular human error (configuration esp.)
13
14
Privacy Problems
Lax user behaviors (social networking, unsafe configuration) Weak protection of personal data by business, government
Lost laptops, thumb drives Weak security configuration of servers Poor access controls Bad business practices (sharing personal information)
Invasive devices
Mobiles with cameras and sound recording capacity
GPS tracking
RFID tracking Closed Circuit TV surveillance (traffic, stores, public places)
15
Cloud Collaboration
Multiple Data Centers (replication, responsiveness) Dynamic capacity sharing Data sharing (latest copy is always in the cloud Video and audio conferencing with data sharing Inter-Cloud interactions (new research area!)
How to refer to other clouds? How to refer to data in other clouds? How to make data references persistent (unlike URLs)? How to protect Clouds from various forms of attack (inside, outside)?
16
Multipath routing
Broadcast utilization
Distributed Algorithms
Presence (multi-level)
18
- OPENFLOW
- Content-directed Routing
19
Policy Considerations
Broadband and wireless infrastructure Non-discriminatory access (net neutrality)
21
Semantic Web
Complex objects that can only be rendered via computer
3D interactive objects
Complex spreadsheets Interactive environments
BIT ROT!
Preserving interpretive programs (Windows 3000 and PPT 1997) And the operating systems that run them And the hardware that run the operating systems
Internet-enabled Devices
23
24
25
InterPlaNetary Internet
27
28
MARS RECONAISSANCE ORBITER, MARS EXPRESS, PHOENIX, MARS ROVERS, MARS SCIENCE LABORATORY
29
(RFC 4838)
TDRSS and NASA in-space routing Delay and Disruption Tolerant Protocols
Tactical Mobile applications (DARPA) Civilian Mobile applications (SameNet!) Deep Impact Testing October 2008 Space Station Testing July 2009 (and continuing) EPOXI Testing October 2009 (aborted) EPOXI visits Hartley-2 November 2010
30
End-to-end information flow across the solar system Layered architecture for evolvability and interoperability IP-like protocol suite tailored to operate over long round trip light times Integrated communications and navigation services
31
32