computer science and the internet
TRANSCRIPT
-
8/6/2019 Computer Science and the Internet
1/49
1
Computer Science and the Internet
Vint Cerf
January 2010
-
8/6/2019 Computer Science and the Internet
2/49
2
Computer Science at UVA
HAPPY 25th Anniversary!!!!
-
8/6/2019 Computer Science and the Internet
3/49
3
Internet was a Computer Science Project
ARPANET - Resource Sharing among CS Depts Wide area demonstration of packet switching
Internet - Interconnection of packet switched networks
Defense applications
Developed by CS researchers not telecom engineers
-
8/6/2019 Computer Science and the Internet
4/49
4
UCLA IMP ca. September 1969
-
8/6/2019 Computer Science and the Internet
5/49
5
360#3
UCSBPDP
10
940
#2
SRI
#4
UTAH
#1
UCLASigma
7
The Original
ARPANET
Dec 1969
-
8/6/2019 Computer Science and the Internet
6/49
6
First Three-Network Tests (22 Nov 1977)
-
8/6/2019 Computer Science and the Internet
7/49
7
Internet 1999
-
8/6/2019 Computer Science and the Internet
8/49
8
Internet - Global Statistics 2009
(approx. 4 B mobiles and 1 Billion PCs)
681,064,561
(ftp.isc.org/www/survey/reports/current/
Jul 2009)
1,733 Million Users
(InternetWorldStats.com, Sept. 30, 2009)
-
8/6/2019 Computer Science and the Internet
9/49
9
Regional Internet Statistics 9/30/2009
Region Internet
Population
%
penetration
Asia 738.3 Mil. 19.4 %
Europe 418.0 Mil. 52.0 %
North Am. 252.9 Mil. 74.2 %
LATAM/C 179.0 Mil. 30.5 %
Mid-East 57.4 Mil. 26.3 %
Oceania 21.0 Mil. 60.4 %
Africa 67.4 Mil. 6.8 %
TOTAL 1,734.0 Mil. 25.6 %
-
8/6/2019 Computer Science and the Internet
10/49
10
Major Changes to Internet
IPv6 - in parallel with IPv4
Internationalized Domain Names
Domain Name System Security (DNSSEC)
Digitally-Signed Address Registration (RPKI)
Sensor Networks
Smart Grid
Mobile Devices
-
8/6/2019 Computer Science and the Internet
11/49
11
Security
Spam
Viruses/Worms/Trojan Horses
Infected websites
Infected thumb drives
Infected CD-ROMs, DVDs, etc.
DOS and DDOS attacks
Social Engineering
Poor passwords (re-usable especially)
Phishing, Pharming(DNS compromise)
IP address poaching
Spectacular human error (configuration esp.)
-
8/6/2019 Computer Science and the Internet
12/49
12
Origins of Security Weaknesses
Weak operating systems
Nave Browsers (running with too much privilege)
Poor access control practices
Improper configuration of hosts and clients
Compromised lap/desktops + servers
Leading to BOTNETS
Hackers, Organized Crime, State-sponsored cyberwarfare
-
8/6/2019 Computer Science and the Internet
13/49
13
Privacy
Lax user behaviors (social networking, unsafe configuration)
Weak protection of personal data by business, government
Lost laptops, thumb drives
Weak security configuration of servers
Poor access controls
Bad business practices (sharing personal information)
Invasive devices
Mobiles with cameras and sound recording capacity
GPS tracking
RFID tracking
Closed Circuit TV surveillance (traffic, stores, public places)
-
8/6/2019 Computer Science and the Internet
14/49
14
Social Responsibility
>25% of the world uses Internet and a larger fraction dependson it indirectly
The Internet of Things is at hand (smart grid, smart appliances,
smart phones, etc.)
Software is an endless frontier - there will always be more and
different applications
We face a fragile future if we dont pay more attention to our
ability to produce reliable and trustworthy software (and dontforget hardware and firmware supply chain issues)
-
8/6/2019 Computer Science and the Internet
15/49
15
Challenges to Computer Science
Wheres the science in computer science?
Design of more secure and more usable systems
Operating systems
Browsers
N-factor security procedures and mechanisms
Improved cyber-hygiene
Better programming languages
Better analytical and debugging tools
Better compromise detection (e.g. traffic audits)
-
8/6/2019 Computer Science and the Internet
16/49
16
Cloud Collaboration
Multiple Data Centers (replication, responsiveness) Dynamic capacity sharing
Data sharing (latest copy is always in the cloud
Video and audio conferencing with data sharing
Inter-Cloud interactions (new research area!) How to refer to other clouds?
How to refer to data in other clouds?
How to make data references persistent (unlike URLs)?
How to protect Clouds from various forms of attack (inside, outside)?
How to establish an access control regime (inside, between clouds)? What semantics can we rely on with inter-cloud data exchange?
What notion of object would be useful for inter-cloud exchange?
-
8/6/2019 Computer Science and the Internet
17/49
17
Internet Research Problems
Security at all levels
Internet Erlang formulas
QOS debates (smart
routers?)
Internationalized Domain
Names (ccTLDs & GTLDs)
Distributed Algorithms
Presence (multi-level)
Mobility, persistence(processes, connections,
references)
Multihoming
Multipath routing
Broadcast utilization
Mesh and Sensor networks
Virtualization (net, storage,
processing)
-
8/6/2019 Computer Science and the Internet
18/49
18
Internet Research Problems - 2
Authentication, Identity,Authorization
Multi-core Processor Algorithms
Delay and Disruption Tolerance
Integration of Applications (e.g.
drag/drop gadgets in calendar)
Intellectual Property Protection
(tracking rights, enforcement)
Role of Layering
Governance
- Law Enforcement
- Policy Development
- Homologation
- Facilitation of electronic
commerce
- Privacy and confidentiality
-
8/6/2019 Computer Science and the Internet
19/49
19
Internet Research Problems - 3
Mobile operation
Dynamic joining (new IP address?, Authentication?)
Dynamic Routing (Dynamic Topology)
Persistent connection (ID at TCP/UDP/RTP layer?)
Interplanetary Long-Haul Architecture (RFC 4838)
Licklider Transport Protocol (LTP)
Bundle Protocol (RFC 5050)
Delayed Binding of Identifiers
Email-like behavior
-
8/6/2019 Computer Science and the Internet
20/49
20
Policy Considerations
Broadband and wireless infrastructure
Non-discriminatory access (net neutrality)
Common Carriage style safe harbors regarding content
Permissionless innovation
Cloud computing efficiencies (note US CIO position)
Multi-lateral ICANN Affirmations
Continuation of IGF
Containing the ITU
Coping with TLD expansion
-
8/6/2019 Computer Science and the Internet
21/49
21
Challenges of the Digital Age
Intellectual property treatment Digital material is easy to copy and distribute
Semantic Web
Complex objects that can only be rendered via computer
3D interactive objects
Complex spreadsheets
Interactive environments
BIT ROT! Preserving interpretive programs (Windows 3000 and PPT 1997)
And the operating systems that run them
And the hardware that run the operating systems
For thousands of years!!
-
8/6/2019 Computer Science and the Internet
22/49
22
APPLICATIONS
-
8/6/2019 Computer Science and the Internet
23/49
23
-
8/6/2019 Computer Science and the Internet
24/49
Text and Video ChattingText and Video Chatting
-
8/6/2019 Computer Science and the Internet
25/49
-
8/6/2019 Computer Science and the Internet
26/49
26
-
8/6/2019 Computer Science and the Internet
27/49
27
-
8/6/2019 Computer Science and the Internet
28/49
-
8/6/2019 Computer Science and the Internet
29/49
29
-
8/6/2019 Computer Science and the Internet
30/49
30
-
8/6/2019 Computer Science and the Internet
31/49
31
-
8/6/2019 Computer Science and the Internet
32/49
32
-
8/6/2019 Computer Science and the Internet
33/49
33
Google Moon
-
8/6/2019 Computer Science and the Internet
34/49
34
-
8/6/2019 Computer Science and the Internet
35/49
35
-
8/6/2019 Computer Science and the Internet
36/49
36
-
8/6/2019 Computer Science and the Internet
37/49
37
Accessibility
@Google: Accessibility Engineering and Capability Council See www.google.com/accessibility
Captioning of YouTube videos
Captions and Subtitles
Automatic Captions (English) and Timing
Language Translation (50 languages) [next slide]
-
8/6/2019 Computer Science and the Internet
38/49
38
-
8/6/2019 Computer Science and the Internet
39/49
39
-
8/6/2019 Computer Science and the Internet
40/49
40
-
8/6/2019 Computer Science and the Internet
41/49
41
Internet-enabled Devices
-
8/6/2019 Computer Science and the Internet
42/49
42
-
8/6/2019 Computer Science and the Internet
43/49
43
The Data Will Come to Us!
Sensor networks everywhere! Seismic, oceanographic, atmospheric, satellite
Smart buildings, instrumented highways
Video sensors (traffic, security)
The Smart Grid
(Google) PowerMeter application
Hybrid and Plug-In vehicles
Injecting power into the Grid
Tracking usage for better lifestyle decisions
Office and building efficiencies
-
8/6/2019 Computer Science and the Internet
44/49
44
InterPlaNetary Internet
-
8/6/2019 Computer Science and the Internet
45/49
45
-
8/6/2019 Computer Science and the Internet
46/49
46
-
8/6/2019 Computer Science and the Internet
47/49
47
QuickTime and adecompressor
are needed to see this picture.
QuickTime and adecompressor
are needed to see this picture.
-
8/6/2019 Computer Science and the Internet
48/49
48
Interplanetary Internet:InterPlaNet (IPN)
Planetary internets
Interplanetary Gateways
Interplanetary Long-Haul Architecture (RFC 4838)
Licklider Transport Protocol (LTP)
Bundle Protocol (RFC 5050)
Delayed Binding of Identifiers
Email-like behavior
TDRSS and NASA in-space routing
Delay and Disruption Tolerant Protocols Tactical Mobile applications (DARPA)
Civilian Mobile applications (SameNet!)
Deep Impact Testing October 2008
Space Station Testing July 2009
EPOXI Testing October 2009
-
8/6/2019 Computer Science and the Internet
49/49
49
End-to-end information flow across the solar system
Layered architecture for evolvability andinteroperability
IP-like protocol suite tailored to operate over longround trip light times
Integrated communications and navigation services