Peering Asia 2021v: Little-known IXPs in Asia PacificAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presents on less well known IXPs in the region and the important role they play in their economies.
TWNOG 3.0: Stories of IXP development and the way forwardAPNIC
APNIC Infrastructure & Development Director Che-Hoo Cheng gives some examples of regional IXP development and what the future holds at TWNOG 3.0 in Taipei from 20 to 21 June 2019.
HKNOG 10.0: 30 Years of Internet in HK – A Quick Look Back at the First 20 YearsAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng remembers the first 20 years of the Internet at HKNOG 10.0, held online on 10 September 2021.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
Peering Asia 2021v: Little-known IXPs in Asia PacificAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presents on less well known IXPs in the region and the important role they play in their economies.
TWNOG 3.0: Stories of IXP development and the way forwardAPNIC
APNIC Infrastructure & Development Director Che-Hoo Cheng gives some examples of regional IXP development and what the future holds at TWNOG 3.0 in Taipei from 20 to 21 June 2019.
HKNOG 10.0: 30 Years of Internet in HK – A Quick Look Back at the First 20 YearsAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng remembers the first 20 years of the Internet at HKNOG 10.0, held online on 10 September 2021.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
Rolling the Root Zone DNSSEC Key Signing Key, by Edward Lewis.
A presentation given at APNIC 42's DNS and INR Security session on Monday, 3 October 2016.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
SGNOG 6: The stories of IXP development and the way forward APNIC
Infrastructure and Development Director, Che-Hoo Cheng gives and overview of IXP development and the way forward at SGNOG 6 in Singapore on 20 July 2018.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
APNIC Chief Scientist Geoff Huston presents on Future network needs and what's driving change at the 38th TWNIC OPM, held on 1 December 2022 in Taipei.
VNNIC Internet Conference 2022: The Future of the InternetAPNIC
APNIC Chief Scientist Geoff Huston presents on the future of the Internet at the inaugural VNNIC Internet Conference, held from 22 to 25 June in Da Nang, Viet Nam.
Rolling the Root Zone DNSSEC Key Signing Key, by Edward Lewis.
A presentation given at APNIC 42's DNS and INR Security session on Monday, 3 October 2016.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
SGNOG 6: The stories of IXP development and the way forward APNIC
Infrastructure and Development Director, Che-Hoo Cheng gives and overview of IXP development and the way forward at SGNOG 6 in Singapore on 20 July 2018.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
APNIC Chief Scientist Geoff Huston presents on Future network needs and what's driving change at the 38th TWNIC OPM, held on 1 December 2022 in Taipei.
VNNIC Internet Conference 2022: The Future of the InternetAPNIC
APNIC Chief Scientist Geoff Huston presents on the future of the Internet at the inaugural VNNIC Internet Conference, held from 22 to 25 June in Da Nang, Viet Nam.
Decentralized Internet ppt slides for educational purposes and can be used for Technical seminars. This gives you an overview of decentralization." LETS US LEARN TOGETHER BY SHARING SLIDES".
Always Offline: Delay-Tolerant Networking for the Internet of ThingsDaniel Austin
Discussion of IoT networks and DTNs, including some speculation on social behavior-based routing and the similarities between the IoT and the ecology of living things.
This presentation clearly explains how the network evolved till now.
this will be helpful to explore the internet world. How do we connect over the internet?
what's the beginning of the network.
More about OSI Models, TCP models protocols, and frame relay concepts.
if you have any queries/suggestions please visit: https://sabarish.techcodes.in/
Edge computing allows data produced by internet of things (IoT) devices to be processed closer to where it is created instead of sending it across long routes to data centers or clouds.
Doing this computing closer to the edge of the network lets organizations analyze important data in near real-time – a need of organizations across many industries, including manufacturing, health care, telecommunications and finance.Edge computing deployments are ideal in a variety of circumstances. One is when IoT devices have poor connectivity and it’s not efficient for IoT devices to be constantly connected to a central cloud.
Other use cases have to do with latency-sensitive processing of information. Edge computing reduces latency because data does not have to traverse over a network to a data center or cloud for processing. This is ideal for situations where latencies of milliseconds can be untenable, such as in financial services or manufacturing.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2. Time is short
• And we are talking about some pretty fundamental topics about the
nature and role of networking
• So I’m going to skate across a whole bunch of detail here as I try and
head quickly through this space
3. Today’s Centrality
• 2021 Outages by Fastly, Akamai and Facebook have global impact affecting
all kinds of enterprises
• A DDOS attack on DYN managed to cause a meltdown of the Internet for
the entire eastern seaboard of the US a few years ago
• Chrome completely dominates browser space
• Google has such a massively dominant position across advanced
technologies that everyone else is left trying to just follow and fill in the
gaps – HTTP/3, QUIC, BBR, to name just a few
• Mobile devices are either made by Apple and run iOS, or run Android
• The entire world now finds itself relying on just one chip manufacturer!
• who is having trouble keeping up with orders
4. How did we get here?
• I thought that we were building a decentralised system with no
critical orchestration components
• No “Route Master 3000” in the middle controlling the routing space
• No ”Name Czar” controlling all DNS resolution queries
• No “Internet Service Controller” managing all Internet services
• All this was meant to be decentralised and adaptive
• We were meant to route around damage of any form
• Yet this is not exactly what we have today
• We’ve built something different
5. Why are we doing this?
Why are we building Internet infrastructure that has:
• Limited diversity of supply
• Points of critical vulnerability
• Increased reliance on a limited set of service orchestration elements
7. Scale
“The only real problem is scaling. All others inherit from this.”
Attributed to Mike O’Dell
8. Scale and Routing
“The most complicated computation ever attempted by mankind is the global
distributed routing algorithm that runs the Internet.
In fact, if anybody thought about it very hard, before we started, they
would've been too scared to try.
Ah, because it runs in near real-time, it's an online algorithm, it runs on
a multimillion node multicomputer, of an arbitrary topology, built by lots
of people who have never met each other. Right?
And, it's a very very complex computation because it's piecewise
constructive, there is a lot of local consistency constraints, there is a
bunch of global correctness criteria that are occasionally satisfied, and
yet the thing mostly works.
Which is astounding, when you actually look at what's going on.”
Also from Mike O’Dell, 2000 (http://www.dtc.umn.edu/~odlyzko/isources/odell-transcript.txt)
9. How have we responded?
• How has the Internet responded to these pressures of inexorable
scaling in the Internet?
10. Bigger
Today’s network architecture is based on abundance, not shared
scarcity
• Increasing transmission capacity by using photonic amplifiers,
wavelength multiplexing and phase/amplitude/polarisation
modulation for fibre cables
• Serving content and service transactions by distributing the load
across many individual platforms through server and content
aggregation
• The rise of high capacity mobile edge networks and mobile platforms
add massive volumes to content delivery
11. Faster
• Reduce latency - stop pushing content and transactions across the network and
instead serve from the edge
• The rise of CDNs that serve (almost) all Internet content and services from
massively scaled distributed delivery systems.
• “Packet Miles” to deliver content to users has shrunk – fewer miles, faster
service!
• The development of high frequency cellular data systems (4G/5G) has resulted in
a highly capable last mile access network with Gigabit capacity
• Applications are being re-engineered to meet faster response criteria
• Compressed interactions across shorter distances using higher capacity circuitry
results in a faster Internet
12. Better
• If “better” means “more trustworthy” and “more privacy” then we
are making progress at last!
• Encryption is close to ubiquitous in the world of web services
• TLS 1.3 is moving to seal up the last open TLS porthole, the SNI field
• Oblivious DNS and Oblivious HTTP is moving to isolate knowledge of the
querier from the name being queried
• The content, application, and platform sectors have all taken the privacy
agenda up with enthusiasm, to the extent that whether networks are
trustable or not doesn’t matter any more – all common shared network
infrastructure is uniformly treated as untrustable!
• And if you can’t trust it then avoid it (where possible)!
13. Cheaper
• We are living in a world of abundant comms and computing capacity
• And working in an industry when there are significant economies of
scale
• And being largely funded by a small number of enterprises
capitalising through advertising a collective asset that is infeasible to
capitalise individually
• The result is that a former luxury service accessible to just a few has
been transformed into an affordable, fast, mass-market commodity
service available to all
• but provided by a small clique of providers
16. Longer Term Trends
Pushing EVERYTHING out of the network and over to the edge!
• Transmission infrastructure is becoming an abundant commodity
• Sharing technology (packet multiplexing) is decreasingly relevant is every large service
platform migrates its own dedicated distribution system
• We have so much network and computing that we no longer have to bring
consumers to service delivery points - instead, we are shifting services
towards consumers and using private network slices to replicate service
delivery from densely deployed data centres
• With so much computing and storage available the application is becoming
the service, rather than just a window to a remotely operated service
operated on expensive computing and storage platforms
19. Who needs Transit?
• If users don’t send packets to users any more…
• If content is now delivered via CDNs to users via discrete service
cones…
• If there is no universal service obligation…
Then why do we still need Transit Service providers?
20. Closed Transit?
20
We see the CDN systems reserve a carriage resource through dedicated
bandwidth / wavelength / cable purchase and effectively bypass the open IP
carriage infrastructure
21. Transit?
Once the CDN caches sit “inside” the Edge NAT of the Access ISP then
the entire wide area network becomes a marginal activity compared
to the value of the content feeds!
22. Transit Routing
• How much data is delivered from the local Data Centre through
Access network to the end device?
• How much data is delivered across just 1 AS hop?
• Who needs to route with a full routing table?
• From the perspective of the edge are we just making a routing decision within
local datacentre to select services points hosted by Amazon, Google,
Cloudflare, Akamai, Fastly, Microsoft and Apple?
• What’s the cost and benefit of a transit and a full routing table any
more?
• Who is willing to spend 80% of their effort and cost providing a service for less
than 1% of their traffic and less than 1% of their revenue?
23. Internet Names and Addresses?
If the Internet is just a collection of discrete CDN service ‘cones’ then
why should we expect end users to pay for the maintenance of:
• A global address plan?
• A global name system?
• A single global routing system?
• A single global network?
24. Exactly where are we now?
• We started this journey building a telephone network for computers to
communicate between each other
• But now one-way content distribution lies at the core of today’s Internet
• This content distribution role is an enterprise service framework rather
than a public carriage service
• The internal parts of the carriage network are now being privatized and
removed from public regulatory oversight
24
25. It’s not just Centrality of
Content and Service
It’s a shift in the role of the network itself
25
26. It’s not just the Death of Transit
It’s the rethinking of the entire network as a common shared glue
• Service provisioning sits within cloud providers and distributed data centres
• Edge computers are now acting as televisions into the clouded world of data
• The distinction between personal and public data realms is disappearing into
the realm of corporately owned private data empires
• And the barriers to entry for new players get increasingly larger as the
platform incumbents bolster their role to replace a single common network
with a small number of such platforms in a cartel-like arrangement
(Today’s version of “centrality”)
26
27. Do shared networks matter any
more?
• We have increasingly stripped out network-centric functionality in our
search for lower cost, higher speed, and better agility
• We are pushing functions out to the edge and ultimately off “the
network” altogether and what is left is just dumb pipes
• What defines “the Internet”?
• A common protocol, common protocol address pool, and a common routing
system?
or
• A disparate collection of services that share common referential mechanisms?
28. How can we fix this?
• Such a level of global dependence of a small set of platform
enterprises that completely dominate their market sector is never a
comfortable place to be
• Monopolies always end up price gouging and entrenching their
incumbency by supressing further innovation
• Is it too late to try and fix it?