SlideShare a Scribd company logo
SO WHERE IS THE INTERNET?
IT’S NOT HERE
It is common to visualize the internet using
some type of cloud icon. While convenient, it
does hide the fact that the internet is most
certainly not composed of magic water vapor,
but a whole lot of stuff.
WE NEED TO BEGIN HERE …
The Internet is composed of millions of
kilometers of wires (metal and fiber optic)
and millions of computing devices, such as
servers, routers, switches, hubs, and other
networking devices, most of which is
housed in specialized environments
requiring countless air conditioners and
power devices.
The internet is a conglomeration of many
different physical networks that are able to
communicate thanks to the use of common
connection protocols.
The internet is built on top of a massive
amount of telecommunications
infrastructure, most of it initially
government-funded, but now generally
privately owned.
The most important infrastructure belongs
to what are commonly called Tier 1
Networks or Tier 1 ISPs. When someone
talks about the Internet Backbone, they are
talking about Tier 1 networks.
About sixteen different companies are
considered to be Tier 1 networks, and
include Level 3, Tata Communications, NTT,
AT&T, and Verizon.
Tier 2 Networks may peer for free with
some networks but must pay to access at
least some other Tier 1 networks (referred
to as buying transit).
Many regional networks are Tier 2. Some
examples include Rogers, Telus, Comcast,
British Telecom, and Vodaphone.
R O G E R S
C A N A D A
2 5 , 0 0 0 K M
CENTURYLINK
855,000 KM
Since the internet is composed of many
interconnected, but independent networks,
there needs to be mechanisms for creating
those interconnections.
Internet Exchange Points (IXPs) have
become one of the most important
mechanisms for creating those
interconnections.
An Internet Exchange Point is a physical
location where different IP networks and
content providers meet to exchange local
traffic with each other (that is, peer) via a
switch.
The internet was designed to be a robust
communication network that could continue
to work even if parts of the network are
disrupted or destroyed.
It is the TCP/IP set of protocols that makes
this possible. A given message is broken
into smaller packets which can take their
own independent route from the sender to
the destination.
Routers are a key technology in the network
in that they shuttle packets from one
network to another.
How are destination computers identified?
Each piece of hardware has a unique IP
address. Initially each IP address was 12
digits longs. Due to the increase in the
number of devices, IP addresses are now
substantially longer.
I P A D D R E S S E S
W h a t a b o u t t h e w e b ?
The web uses a client-server model of
communication.
The client-server model is one in which a
computer client, such as a browser, makes
requests of another computer called a
server, which is normally continually active,
listening for requests from clients.
HTTP (Hypertext Transfer Protocol) defines
a set of rules about how computers
communicate with one another. It is actually
a simple text-based protocol.
While the latest generations of browsers
often hide the “http://” in the address bar,
HTTP is still present.
Other than the fact that almost all web-
communication makes use of HTTP, having
some idea about how HTTP works can help
you in understanding many of the
constraints that exist within the field of web
development, and many of the security
problems that bedevil the web space.
What about HTTPS?
HTTP Secure (sometimes also called, more
long-windely, as HTTP over Transport Layer
Security).
This protocol is essentially identical to HTTP
except the connection content is also
encrypted. It protects against man-in-the-
middle attacks, so that an eavesdropper on
a session can not read or tamper with it.
In some of the earlier diagrams, the server
was represented as a single entity. This is in
fact quite misleading.
A typical website makes use of several,
dozens, hundreds or even hundreds of
thousands of servers. Why?
Partly this is for functional reasons: different
types of tasks will be isolated in different
servers.
Partly this is for performance reasons: a
single server has limits to how many
simultaneous requests it can manage.
Another important reason is for
redundancy: computers do fail and so
having multiple servers ensures a service
works even when a single server stops
working.
Server farms are typically housed within
specialized facilities known as data centers.
These facilities contain a lot more than just
lots of computers contained within server
racks.
All those computers will generate a great
deal of heat, and so a key component of a
data center will be its heat generation
counter-measures.
These include reliable air conditioning,
forced air recirculation, and using chilled
water directly within the server racks.
Reliable and even power is the other key
component of any data center. This will be
achieved via UPS and other devices to
normalize electrical power as well as diesel
generators and DC battery supplies to
preserve electrical power even during power
outages.
Data centers in 2013 consumed somewhere
between 2% to 4% of the entire United
States electrical consumption.
Data centers in Ireland in 2016 consumed about
20% of Ireland’s entire electrical consumption.
Computing in general in 2012 consumed
somewhere about 5% of the world’s
electricity.
Optimistic Estimate: by 2025, computing
will consume 20% of world-wide electricity.
In 2016 about 11% of all global electricity
was consumed by computing.
Computing will soon produce about 3% of
global carbon emissions.
Optimistic Estimate: Within a decade,
computing will produce about 14% of global
carbon emissions.
“The analysis shows that for the worst-case scenario, CT
could use as much as 51% of global electricity in 2030.
…
the present investigation suggests, for the worst case
scenario, that CT electricity usage could contribute up to
23% of the globally released greenhouse gas emissions in
2030.”
In 2011, Google reported its energy
consumption to be 230 MWh.
In 2014, it reported 3.2 GWh (i.e. 3200 MWh)
even though it had made many of its data
centers significantly more energy efficient.
How is this possible?
Governments and environmentalists
generally assume that improving the energy
efficiency of a process will lower its resource
consumption.
Yet in economics, the Jevons Paradox
argues that the opposite will often occur.
In economics, the Jevons paradox occurs
when technological progress increases the
efficiency with which a resource is used
(reducing the amount necessary for any one
use),
but the rate of consumption of that resource
rises because of increased demand due to
falling prices.
Thus, the dramatic improvements of energy efficiency in
data centers in recent years has actually increased the
amount of energy being consumed in data centers
(because improved energy efficiency has lowered costs
thereby encouraging more people to make use of data
centers).
Estimate: 550GWh of power consumed just to
serve these 3 billion views (YouTube
servers+downloads+views) … roughly equal to
Canada’s yearly energy consumption)
But what about energy savings as a result
of the displacement of older technologies
with newer computing-based ones?
One study, for instance, that examined the
total energy footprint of a paper newspaper
compared to its online version found that
paper version consumed about half as much
energy (and that study didn't even factor in
data center energy consumption).
However, a different study examining
energy consumption of rented DVDs vs
streamed movies found a reduction in the
total energy footprint with the switch to
streaming (however that study also didn't
factor in data center energy consumption).
DEPLOYMENT
VIRTUALIZATION
A N D
D E D I C AT E D H O S T I N G
Each site is on its own server(s)
S I M P L E S H A R E D H O S T I N G
V I RT U A L S H A R E D H O S T
C L O U D H O S T I N G
W h y C l o u d H o s t i n g ?
R e d u n d a n c y
01
O n - D e m a n d
P r o v i s i o n i n g02
S c a l a b i l i t y
03
C o s t
E f f i c i e n c y04
L o w S t a r t u p
C o s t s05
M a n a g e r s
S e e m t o
L o v e C l o u d s
…
06
HOW?
S E RV E R I N E F F I C I E N C I E S
H O W I T W O R K S
C l o u d S e r v i c e M o d e l s
C l o u d c o m p u t i n g p r o m i s e s s o m e t h i n g u s u a l l y r e f e r r e d t o a s e l a s t i c
c a p a c i t y / c o m p u t i n g ,
m e a n i n g t h a t s e r v e r c a p a b i l i t y c a n s c a l e w i t h d e m a n d .
Platform as a Service
(PaaS)
Infrastructure as a Service
(IaaS)
Software as a Service
(SaaS)
Amazon Web Services
Microsoft Azure
Google Cloud Platform
Security
and
Search
T H E P R O B L E M W I T H E V E
U S I N G E N C RY P T I O N
P R O B L E M : H O W T O T R A N S P O R T K E Y
S I M P L E E N C RY P T I O N E X A M P L E
H T T P S
Q U I C K LY
S E C U R I T Y T H R E AT S
S Q L I N J E C T I O N AT TA C K
C R O S S - S I T E S C R I P T I N G AT TA C K
D E N I A L O F S E RV I C E AT TA C K
R A I N B O W TA B L E AT TA C K ( C O N T E X T )
R A I N B O W TA B L E AT TA C K ( S O L U T I O N ? )
R A I N B O W TA B L E AT TA C K ( S O L U T I O N ! )

More Related Content

What's hot

internet ,
internet ,internet ,
internet ,
chetan handa
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7Zain Ul Abedeen
 
P2p networks
P2p networksP2p networks
P2p networks
Shane Farrell
 
Ict u5
Ict u5Ict u5
Cloud computing
Cloud computingCloud computing
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
Patty Ramsey
 
Intrenet and its uses
Intrenet and its usesIntrenet and its uses
Intrenet and its uses
Raj Parekh
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
actanimation
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
Ousman Faal
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
Deepika Chettri
 
A personal perspective on the evolvin...
A personal perspective on the evolvin...A personal perspective on the evolvin...
A personal perspective on the evolvin...MidMarket Place
 
COMMON ONLINE TERMINOLOGIES
COMMON ONLINE TERMINOLOGIESCOMMON ONLINE TERMINOLOGIES
COMMON ONLINE TERMINOLOGIES
Aven Mercado
 
Chapter1
Chapter1Chapter1
Chapter1
pittore44
 
Document Databases In Online Publishing
Document  Databases In  Online Publishing Document  Databases In  Online Publishing
Document Databases In Online Publishing Irakli Nadareishvili
 
INTERNET
INTERNETINTERNET
INTERNET
Flv Martín
 
Linked Data and the Semantic Web - Mimas Seminar
Linked Data and the Semantic Web - Mimas SeminarLinked Data and the Semantic Web - Mimas Seminar
Linked Data and the Semantic Web - Mimas SeminarAdrian Stevenson
 
English
EnglishEnglish
Linked Data an Introduction
Linked Data an IntroductionLinked Data an Introduction
Linked Data an Introduction
Talis Consulting
 
Superfast broadband
Superfast broadbandSuperfast broadband
Superfast broadbandRene Looper
 

What's hot (20)

internet ,
internet ,internet ,
internet ,
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
P2p networks
P2p networksP2p networks
P2p networks
 
Ict u5
Ict u5Ict u5
Ict u5
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Intrenet and its uses
Intrenet and its usesIntrenet and its uses
Intrenet and its uses
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
 
A personal perspective on the evolvin...
A personal perspective on the evolvin...A personal perspective on the evolvin...
A personal perspective on the evolvin...
 
COMMON ONLINE TERMINOLOGIES
COMMON ONLINE TERMINOLOGIESCOMMON ONLINE TERMINOLOGIES
COMMON ONLINE TERMINOLOGIES
 
Chapter1
Chapter1Chapter1
Chapter1
 
Document Databases In Online Publishing
Document  Databases In  Online Publishing Document  Databases In  Online Publishing
Document Databases In Online Publishing
 
INTERNET
INTERNETINTERNET
INTERNET
 
Linked Data and the Semantic Web - Mimas Seminar
Linked Data and the Semantic Web - Mimas SeminarLinked Data and the Semantic Web - Mimas Seminar
Linked Data and the Semantic Web - Mimas Seminar
 
English
EnglishEnglish
English
 
Linked Data an Introduction
Linked Data an IntroductionLinked Data an Introduction
Linked Data an Introduction
 
Superfast broadband
Superfast broadbandSuperfast broadband
Superfast broadband
 

Similar to Where is the Internet? (2019 Edition)

Iot presentation and hand on building tools
Iot presentation and hand on building toolsIot presentation and hand on building tools
Iot presentation and hand on building tools
AhmedMostafa787
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics
HarshitParkar6677
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Jiang Zhu
 
Cloud comoputing
Cloud comoputingCloud comoputing
Cloud comoputing
Mrinmoy Sarkar
 
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
jackiewalcutt
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
TahaMallawala1
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data Centers
Gina Buck
 
Mobility & Data Strategies
Mobility & Data StrategiesMobility & Data Strategies
Mobility & Data StrategiesSam Basu
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
suthi
 
API Design and WebSocket
API Design and WebSocketAPI Design and WebSocket
API Design and WebSocket
Frank Greco
 
Web and software development
Web and software developmentWeb and software development
Web and software development
priyanka sharma
 
Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud Computing
Wyn Douglas
 
What Web 2.pdf
What Web 2.pdfWhat Web 2.pdf
What Web 2.pdf
Marnusharris
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
ijtsrd
 
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
Prof. Chung
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 

Similar to Where is the Internet? (2019 Edition) (20)

Iot presentation and hand on building tools
Iot presentation and hand on building toolsIot presentation and hand on building tools
Iot presentation and hand on building tools
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
Cloud comoputing
Cloud comoputingCloud comoputing
Cloud comoputing
 
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data Centers
 
Mobility & Data Strategies
Mobility & Data StrategiesMobility & Data Strategies
Mobility & Data Strategies
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
API Design and WebSocket
API Design and WebSocketAPI Design and WebSocket
API Design and WebSocket
 
Web and software development
Web and software developmentWeb and software development
Web and software development
 
Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud Computing
 
What Web 2.pdf
What Web 2.pdfWhat Web 2.pdf
What Web 2.pdf
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
[Text Book] IoT Class Material - CoAP, OCF, and IoTivity
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 

More from Randy Connolly

Celebrating the Release of Computing Careers and Disciplines
Celebrating the Release of Computing Careers and DisciplinesCelebrating the Release of Computing Careers and Disciplines
Celebrating the Release of Computing Careers and Disciplines
Randy Connolly
 
Public Computing Intellectuals in the Age of AI Crisis
Public Computing Intellectuals in the Age of AI CrisisPublic Computing Intellectuals in the Age of AI Crisis
Public Computing Intellectuals in the Age of AI Crisis
Randy Connolly
 
Why Computing Belongs Within the Social Sciences
Why Computing Belongs Within the Social SciencesWhy Computing Belongs Within the Social Sciences
Why Computing Belongs Within the Social Sciences
Randy Connolly
 
Ten-Year Anniversary of our CIS Degree
Ten-Year Anniversary of our CIS DegreeTen-Year Anniversary of our CIS Degree
Ten-Year Anniversary of our CIS Degree
Randy Connolly
 
Careers in Computing (2019 Edition)
Careers in Computing (2019 Edition)Careers in Computing (2019 Edition)
Careers in Computing (2019 Edition)
Randy Connolly
 
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
Randy Connolly
 
Helping Prospective Students Understand the Computing Disciplines
Helping Prospective Students Understand the Computing DisciplinesHelping Prospective Students Understand the Computing Disciplines
Helping Prospective Students Understand the Computing Disciplines
Randy Connolly
 
Constructing a Web Development Textbook
Constructing a Web Development TextbookConstructing a Web Development Textbook
Constructing a Web Development Textbook
Randy Connolly
 
Web Development for Managers
Web Development for ManagersWeb Development for Managers
Web Development for Managers
Randy Connolly
 
Disrupting the Discourse of the "Digital Disruption of _____"
Disrupting the Discourse of the "Digital Disruption of _____"Disrupting the Discourse of the "Digital Disruption of _____"
Disrupting the Discourse of the "Digital Disruption of _____"
Randy Connolly
 
17 Ways to Fail Your Courses
17 Ways to Fail Your Courses17 Ways to Fail Your Courses
17 Ways to Fail Your Courses
Randy Connolly
 
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
Randy Connolly
 
Constructing and revising a web development textbook
Constructing and revising a web development textbookConstructing and revising a web development textbook
Constructing and revising a web development textbook
Randy Connolly
 
Computing is Not a Rock Band: Student Understanding of the Computing Disciplines
Computing is Not a Rock Band: Student Understanding of the Computing DisciplinesComputing is Not a Rock Band: Student Understanding of the Computing Disciplines
Computing is Not a Rock Band: Student Understanding of the Computing Disciplines
Randy Connolly
 
Citizenship: How do leaders in universities think about and experience citize...
Citizenship: How do leaders in universities think about and experience citize...Citizenship: How do leaders in universities think about and experience citize...
Citizenship: How do leaders in universities think about and experience citize...
Randy Connolly
 
Thinking About Technology
Thinking About TechnologyThinking About Technology
Thinking About Technology
Randy Connolly
 
A longitudinal examination of SIGITE conference submission data
A longitudinal examination of SIGITE conference submission dataA longitudinal examination of SIGITE conference submission data
A longitudinal examination of SIGITE conference submission data
Randy Connolly
 
Web Security
Web SecurityWeb Security
Web Security
Randy Connolly
 
Is Human Flourishing in the ICT World of the Future Likely?
Is Human Flourishing in the ICT World of the Future Likely?Is Human Flourishing in the ICT World of the Future Likely?
Is Human Flourishing in the ICT World of the Future Likely?
Randy Connolly
 
Constructing a Contemporary Textbook
Constructing a Contemporary TextbookConstructing a Contemporary Textbook
Constructing a Contemporary Textbook
Randy Connolly
 

More from Randy Connolly (20)

Celebrating the Release of Computing Careers and Disciplines
Celebrating the Release of Computing Careers and DisciplinesCelebrating the Release of Computing Careers and Disciplines
Celebrating the Release of Computing Careers and Disciplines
 
Public Computing Intellectuals in the Age of AI Crisis
Public Computing Intellectuals in the Age of AI CrisisPublic Computing Intellectuals in the Age of AI Crisis
Public Computing Intellectuals in the Age of AI Crisis
 
Why Computing Belongs Within the Social Sciences
Why Computing Belongs Within the Social SciencesWhy Computing Belongs Within the Social Sciences
Why Computing Belongs Within the Social Sciences
 
Ten-Year Anniversary of our CIS Degree
Ten-Year Anniversary of our CIS DegreeTen-Year Anniversary of our CIS Degree
Ten-Year Anniversary of our CIS Degree
 
Careers in Computing (2019 Edition)
Careers in Computing (2019 Edition)Careers in Computing (2019 Edition)
Careers in Computing (2019 Edition)
 
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...
 
Helping Prospective Students Understand the Computing Disciplines
Helping Prospective Students Understand the Computing DisciplinesHelping Prospective Students Understand the Computing Disciplines
Helping Prospective Students Understand the Computing Disciplines
 
Constructing a Web Development Textbook
Constructing a Web Development TextbookConstructing a Web Development Textbook
Constructing a Web Development Textbook
 
Web Development for Managers
Web Development for ManagersWeb Development for Managers
Web Development for Managers
 
Disrupting the Discourse of the "Digital Disruption of _____"
Disrupting the Discourse of the "Digital Disruption of _____"Disrupting the Discourse of the "Digital Disruption of _____"
Disrupting the Discourse of the "Digital Disruption of _____"
 
17 Ways to Fail Your Courses
17 Ways to Fail Your Courses17 Ways to Fail Your Courses
17 Ways to Fail Your Courses
 
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...
 
Constructing and revising a web development textbook
Constructing and revising a web development textbookConstructing and revising a web development textbook
Constructing and revising a web development textbook
 
Computing is Not a Rock Band: Student Understanding of the Computing Disciplines
Computing is Not a Rock Band: Student Understanding of the Computing DisciplinesComputing is Not a Rock Band: Student Understanding of the Computing Disciplines
Computing is Not a Rock Band: Student Understanding of the Computing Disciplines
 
Citizenship: How do leaders in universities think about and experience citize...
Citizenship: How do leaders in universities think about and experience citize...Citizenship: How do leaders in universities think about and experience citize...
Citizenship: How do leaders in universities think about and experience citize...
 
Thinking About Technology
Thinking About TechnologyThinking About Technology
Thinking About Technology
 
A longitudinal examination of SIGITE conference submission data
A longitudinal examination of SIGITE conference submission dataA longitudinal examination of SIGITE conference submission data
A longitudinal examination of SIGITE conference submission data
 
Web Security
Web SecurityWeb Security
Web Security
 
Is Human Flourishing in the ICT World of the Future Likely?
Is Human Flourishing in the ICT World of the Future Likely?Is Human Flourishing in the ICT World of the Future Likely?
Is Human Flourishing in the ICT World of the Future Likely?
 
Constructing a Contemporary Textbook
Constructing a Contemporary TextbookConstructing a Contemporary Textbook
Constructing a Contemporary Textbook
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Where is the Internet? (2019 Edition)

  • 1. SO WHERE IS THE INTERNET?
  • 3. It is common to visualize the internet using some type of cloud icon. While convenient, it does hide the fact that the internet is most certainly not composed of magic water vapor, but a whole lot of stuff.
  • 4. WE NEED TO BEGIN HERE …
  • 5. The Internet is composed of millions of kilometers of wires (metal and fiber optic) and millions of computing devices, such as servers, routers, switches, hubs, and other networking devices, most of which is housed in specialized environments requiring countless air conditioners and power devices.
  • 6.
  • 7.
  • 8. The internet is a conglomeration of many different physical networks that are able to communicate thanks to the use of common connection protocols. The internet is built on top of a massive amount of telecommunications infrastructure, most of it initially government-funded, but now generally privately owned.
  • 9. The most important infrastructure belongs to what are commonly called Tier 1 Networks or Tier 1 ISPs. When someone talks about the Internet Backbone, they are talking about Tier 1 networks. About sixteen different companies are considered to be Tier 1 networks, and include Level 3, Tata Communications, NTT, AT&T, and Verizon.
  • 10.
  • 11. Tier 2 Networks may peer for free with some networks but must pay to access at least some other Tier 1 networks (referred to as buying transit). Many regional networks are Tier 2. Some examples include Rogers, Telus, Comcast, British Telecom, and Vodaphone.
  • 12. R O G E R S C A N A D A 2 5 , 0 0 0 K M CENTURYLINK 855,000 KM
  • 13.
  • 14.
  • 15. Since the internet is composed of many interconnected, but independent networks, there needs to be mechanisms for creating those interconnections. Internet Exchange Points (IXPs) have become one of the most important mechanisms for creating those interconnections.
  • 16. An Internet Exchange Point is a physical location where different IP networks and content providers meet to exchange local traffic with each other (that is, peer) via a switch.
  • 17.
  • 18. The internet was designed to be a robust communication network that could continue to work even if parts of the network are disrupted or destroyed. It is the TCP/IP set of protocols that makes this possible. A given message is broken into smaller packets which can take their own independent route from the sender to the destination.
  • 19. Routers are a key technology in the network in that they shuttle packets from one network to another. How are destination computers identified? Each piece of hardware has a unique IP address. Initially each IP address was 12 digits longs. Due to the increase in the number of devices, IP addresses are now substantially longer.
  • 20.
  • 21. I P A D D R E S S E S
  • 22. W h a t a b o u t t h e w e b ?
  • 23. The web uses a client-server model of communication. The client-server model is one in which a computer client, such as a browser, makes requests of another computer called a server, which is normally continually active, listening for requests from clients.
  • 24.
  • 25.
  • 26. HTTP (Hypertext Transfer Protocol) defines a set of rules about how computers communicate with one another. It is actually a simple text-based protocol. While the latest generations of browsers often hide the “http://” in the address bar, HTTP is still present.
  • 27. Other than the fact that almost all web- communication makes use of HTTP, having some idea about how HTTP works can help you in understanding many of the constraints that exist within the field of web development, and many of the security problems that bedevil the web space.
  • 28.
  • 29.
  • 30. What about HTTPS? HTTP Secure (sometimes also called, more long-windely, as HTTP over Transport Layer Security). This protocol is essentially identical to HTTP except the connection content is also encrypted. It protects against man-in-the- middle attacks, so that an eavesdropper on a session can not read or tamper with it.
  • 31. In some of the earlier diagrams, the server was represented as a single entity. This is in fact quite misleading. A typical website makes use of several, dozens, hundreds or even hundreds of thousands of servers. Why?
  • 32. Partly this is for functional reasons: different types of tasks will be isolated in different servers. Partly this is for performance reasons: a single server has limits to how many simultaneous requests it can manage. Another important reason is for redundancy: computers do fail and so having multiple servers ensures a service works even when a single server stops working.
  • 33.
  • 34. Server farms are typically housed within specialized facilities known as data centers. These facilities contain a lot more than just lots of computers contained within server racks.
  • 35.
  • 36.
  • 37. All those computers will generate a great deal of heat, and so a key component of a data center will be its heat generation counter-measures. These include reliable air conditioning, forced air recirculation, and using chilled water directly within the server racks.
  • 38.
  • 39.
  • 40. Reliable and even power is the other key component of any data center. This will be achieved via UPS and other devices to normalize electrical power as well as diesel generators and DC battery supplies to preserve electrical power even during power outages.
  • 41.
  • 42.
  • 43. Data centers in 2013 consumed somewhere between 2% to 4% of the entire United States electrical consumption. Data centers in Ireland in 2016 consumed about 20% of Ireland’s entire electrical consumption.
  • 44. Computing in general in 2012 consumed somewhere about 5% of the world’s electricity. Optimistic Estimate: by 2025, computing will consume 20% of world-wide electricity. In 2016 about 11% of all global electricity was consumed by computing.
  • 45. Computing will soon produce about 3% of global carbon emissions. Optimistic Estimate: Within a decade, computing will produce about 14% of global carbon emissions.
  • 46. “The analysis shows that for the worst-case scenario, CT could use as much as 51% of global electricity in 2030. … the present investigation suggests, for the worst case scenario, that CT electricity usage could contribute up to 23% of the globally released greenhouse gas emissions in 2030.”
  • 47. In 2011, Google reported its energy consumption to be 230 MWh. In 2014, it reported 3.2 GWh (i.e. 3200 MWh) even though it had made many of its data centers significantly more energy efficient. How is this possible?
  • 48. Governments and environmentalists generally assume that improving the energy efficiency of a process will lower its resource consumption. Yet in economics, the Jevons Paradox argues that the opposite will often occur.
  • 49. In economics, the Jevons paradox occurs when technological progress increases the efficiency with which a resource is used (reducing the amount necessary for any one use), but the rate of consumption of that resource rises because of increased demand due to falling prices.
  • 50. Thus, the dramatic improvements of energy efficiency in data centers in recent years has actually increased the amount of energy being consumed in data centers (because improved energy efficiency has lowered costs thereby encouraging more people to make use of data centers).
  • 51. Estimate: 550GWh of power consumed just to serve these 3 billion views (YouTube servers+downloads+views) … roughly equal to Canada’s yearly energy consumption)
  • 52. But what about energy savings as a result of the displacement of older technologies with newer computing-based ones?
  • 53. One study, for instance, that examined the total energy footprint of a paper newspaper compared to its online version found that paper version consumed about half as much energy (and that study didn't even factor in data center energy consumption).
  • 54. However, a different study examining energy consumption of rented DVDs vs streamed movies found a reduction in the total energy footprint with the switch to streaming (however that study also didn't factor in data center energy consumption).
  • 55.
  • 57. D E D I C AT E D H O S T I N G Each site is on its own server(s)
  • 58. S I M P L E S H A R E D H O S T I N G
  • 59. V I RT U A L S H A R E D H O S T
  • 60. C L O U D H O S T I N G
  • 61. W h y C l o u d H o s t i n g ? R e d u n d a n c y 01 O n - D e m a n d P r o v i s i o n i n g02 S c a l a b i l i t y 03 C o s t E f f i c i e n c y04 L o w S t a r t u p C o s t s05 M a n a g e r s S e e m t o L o v e C l o u d s … 06
  • 62. HOW?
  • 63. S E RV E R I N E F F I C I E N C I E S
  • 64. H O W I T W O R K S
  • 65. C l o u d S e r v i c e M o d e l s C l o u d c o m p u t i n g p r o m i s e s s o m e t h i n g u s u a l l y r e f e r r e d t o a s e l a s t i c c a p a c i t y / c o m p u t i n g , m e a n i n g t h a t s e r v e r c a p a b i l i t y c a n s c a l e w i t h d e m a n d . Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Software as a Service (SaaS) Amazon Web Services Microsoft Azure Google Cloud Platform
  • 67. T H E P R O B L E M W I T H E V E
  • 68. U S I N G E N C RY P T I O N
  • 69. P R O B L E M : H O W T O T R A N S P O R T K E Y
  • 70. S I M P L E E N C RY P T I O N E X A M P L E
  • 71. H T T P S Q U I C K LY
  • 72. S E C U R I T Y T H R E AT S
  • 73. S Q L I N J E C T I O N AT TA C K
  • 74. C R O S S - S I T E S C R I P T I N G AT TA C K
  • 75. D E N I A L O F S E RV I C E AT TA C K
  • 76. R A I N B O W TA B L E AT TA C K ( C O N T E X T )
  • 77. R A I N B O W TA B L E AT TA C K ( S O L U T I O N ? )
  • 78. R A I N B O W TA B L E AT TA C K ( S O L U T I O N ! )