Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the...

9
Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the Internet Electronic Commerce Web censorship Intranets and Extranets

Transcript of Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the...

Chapter 6 - The Internet

Evolution of the InternetSecurity vs. Privacy

Video Streaming Over the InternetElectronic Commerce

Web censorshipIntranets and Extranets

Linked Networks

Verizon Backbone AT&T Backbone

MAE* EastVerizon

Vienna, VA

Sprint Nextel Backbone

MAE* WestVerizonSan Jose

* Metropolitan Area Exchanges: Sites with routers where ISPs exchange traffic. Also called network access points, NAPs.

Carriers monitor their Networks at NOCs, Network Operations Centers

Sprint Nextel NAPPennsauken NJ

An Edge Router

* 20 port modular card for connections to optical networks; each port at 10/100 Kbps Ethernet or 1 Gigabit Ethernet

** 2 Port modular card that interfaces with optical networks at 10 Gig-E per port

** 4 built in 10 Gig-E uplinks to optical networksManagement Ports for administration & software updates (Console Ethernet, Aux + USB Drive connector )

*** 2 ports (Clock input/output), BITS input for clocking on protocols such as SONET and Fiber Channel that require exact timing

Dual redundant Power Supplies

Type of ports described above are:* SFP (Small Form-factor Pluggable)** XFP (10 Gigabit Small Form Factor Pluggable)*** UART (Universal Asynchronous

Receiver/Transmitter)

Racks inside cages containing multiple carriers’ routersBackup generators

Windowless hurricane proof building with high-level of security, duplicate power sources and duplicate fiber optic cabling

Fiber cable to carrier backbone

Duplicate cables to carrier backbone and electric utility

Cable to electric utility

A Peering Point

Interconnections & Peering on the Internet

http://www.youtube.com/watch?NR=1&feature=endscreen&v=UIi5IgZIWlIhttp://www.youtube.com/watch?NR=1&v=AlDWMg49z_U

• Note ways ISWest makes its data centers sustainable, secure and connected to the outside:

– Pay attention to

• entry security

• Protection from fire

• Protection from electrical outages and overheating

• Cabinet designs

• Protection from natural disasters (hurricanes, tornadoes)

Carrier Compensation Under Network Neutrality

• Customer in Chicago on a videoconference with Beijing office.

• Pays fees to carrier A and to Skype.

Carrier A; Skype pays nothing to Carrier A.

Carrier B; not compensated

Carrier C: not compensated by Skype

Providers’ coverage areas

Beijing office: Pays fees to Skype & carrier C.

Government or Censorship Protection?

• Governments block web sites:– Child pornography– Foreign e-commerce sites– Copyright infringements– Twitter– Certain social networks

• Governments block & monitor email– Dissenters– Terrorists– Hacking attacks

Extranets and Intranets• Influence of Internet technology• Extranets:

– Making applications available to: • Customers• Business partners

• Intranets– Using Web technology internally

• Single sign-on and password• Collaboration• Access to enterprise information

Summing Up

Describe the structure of the Internet How has the Internet changed the way

We conduct business? Get information? Make purchases?

Intranets & extranets How has the Internet changed the way we

socialize? Can we protect our networks? Is free stuff worth losing privacy for?