Vous êtes sur la page 1sur 49

Computer Science and the Internet

Vint Cerf

January 2010
1

Computer Science at UVA

HAPPY 25th Anniversary!!!!

Internet was a Computer Science Project


ARPANET - Resource Sharing among CS Depts
Wide area demonstration of packet switching

Internet - Interconnection of packet switched networks


Defense applications Developed by CS researchers not telecom engineers

UCLA IMP ca. September 1969

The Original ARPANET Dec 1969

940

#2 SRI #3 UCSB #1 UCLA Sigma 7

#4 UTAH

360

PDP 10

First Three-Network Tests (22 Nov 1977)

Internet 1999

Internet - Global Statistics 2009

681,064,561
(ftp.isc.org/www/survey/reports/current/

Jul 2009)

1,733 Million Users


(InternetWorldStats.com, Sept. 30, 2009)

(approx. 4 B mobiles and 1 Billion PCs)

Regional Internet Statistics 9/30/2009

Region Asia Europe North Am. LATAM/C Mid-East Oceania Africa TOTAL

Internet Population 738.3 Mil. 418.0 Mil. 252.9 Mil. 179.0 Mil. 57.4 Mil. 21.0 Mil. 67.4 Mil. 1,734.0 Mil.

% penetration 19.4 % 52.0 % 74.2 % 30.5 % 26.3 % 60.4 % 6.8 % 25.6 %


9

Major Changes to Internet


IPv6 - in parallel with IPv4 Internationalized Domain Names Domain Name System Security (DNSSEC) Digitally-Signed Address Registration (RPKI) Sensor Networks Smart Grid Mobile Devices

10

Security
Spam Viruses/Worms/Trojan Horses
Infected websites Infected thumb drives Infected CD-ROMs, DVDs, etc.

DOS and DDOS attacks Social Engineering Poor passwords (re-usable especially) Phishing, Pharming(DNS compromise) IP address poaching Spectacular human error (configuration esp.)
11

Origins of Security Weaknesses


Weak operating systems Nave Browsers (running with too much privilege) Poor access control practices Improper configuration of hosts and clients Compromised lap/desktops + servers
Leading to BOTNETS Hackers, Organized Crime, State-sponsored cyberwarfare

12

Privacy
Lax user behaviors (social networking, unsafe configuration) Weak protection of personal data by business, government
Lost laptops, thumb drives Weak security configuration of servers Poor access controls Bad business practices (sharing personal information)

Invasive devices
Mobiles with cameras and sound recording capacity GPS tracking RFID tracking Closed Circuit TV surveillance (traffic, stores, public places)

13

Social Responsibility
>25% of the world uses Internet and a larger fraction depends on it indirectly The Internet of Things is at hand (smart grid, smart appliances, smart phones, etc.) Software is an endless frontier - there will always be more and different applications We face a fragile future if we dont pay more attention to our ability to produce reliable and trustworthy software (and dont forget hardware and firmware supply chain issues)

14

Challenges to Computer Science


Wheres the science in computer science? Design of more secure and more usable systems
Operating systems Browsers N-factor security procedures and mechanisms

Improved cyber-hygiene Better programming languages Better analytical and debugging tools Better compromise detection (e.g. traffic audits)

15

Cloud Collaboration
Multiple Data Centers (replication, responsiveness) Dynamic capacity sharing Data sharing (latest copy is always in the cloud Video and audio conferencing with data sharing Inter-Cloud interactions (new research area!)
How to refer to other clouds? How to refer to data in other clouds? How to make data references persistent (unlike URLs)? How to protect Clouds from various forms of attack (inside, outside)? How to establish an access control regime (inside, between clouds)? What semantics can we rely on with inter-cloud data exchange? What notion of object would be useful for inter-cloud exchange?

16

Internet Research Problems


Security at all levels Internet Erlang formulas QOS debates (smart routers?) Internationalized Domain Names (ccTLDs & GTLDs) Distributed Algorithms Presence (multi-level) Mobility, persistence (processes, connections, references) Multihoming Multipath routing Broadcast utilization Mesh and Sensor networks Virtualization (net, storage, processing)
17

Internet Research Problems - 2


Authentication, Identity, Authorization Multi-core Processor Algorithms - Policy Development Delay and Disruption Tolerance - Homologation Integration of Applications (e.g. drag/drop gadgets in calendar) Intellectual Property Protection (tracking rights, enforcement) Role of Layering - Facilitation of electronic commerce - Privacy and confidentiality Governance - Law Enforcement

18

Internet Research Problems - 3


Mobile operation Dynamic joining (new IP address?, Authentication?) Dynamic Routing (Dynamic Topology) Persistent connection (ID at TCP/UDP/RTP layer?) Interplanetary Long-Haul Architecture
Licklider Transport Protocol (LTP) Bundle Protocol (RFC 5050) Delayed Binding of Identifiers Email-like behavior

(RFC 4838)

19

Policy Considerations
Broadband and wireless infrastructure Non-discriminatory access (net neutrality) Common Carriage style safe harbors regarding content Permissionless innovation Cloud computing efficiencies (note US CIO position) Multi-lateral ICANN Affirmations Continuation of IGF Containing the ITU Coping with TLD expansion

20

Challenges of the Digital Age


Intellectual property treatment
Digital material is easy to copy and distribute

Semantic Web Complex objects that can only be rendered via computer
3D interactive objects Complex spreadsheets Interactive environments

BIT ROT!
Preserving interpretive programs (Windows 3000 and PPT 1997) And the operating systems that run them And the hardware that run the operating systems For thousands of years!!
21

APPLICATIONS

22

23

Text and Video Chatting

26

27

29

30

31

32

Google Moon

33

34

35

36

Accessibility
@Google: Accessibility Engineering and Capability Council
See www.google.com/accessibility

Captioning of YouTube videos


Captions and Subtitles Automatic Captions (English) and Timing

Language Translation (50 languages) [next slide]

37

38

39

40

Internet-enabled Devices

41

42

The Data Will Come to Us!


Sensor networks everywhere!
Seismic, oceanographic, atmospheric, satellite Smart buildings, instrumented highways Video sensors (traffic, security)

The Smart Grid


(Google) PowerMeter application Hybrid and Plug-In vehicles Injecting power into the Grid Tracking usage for better lifestyle decisions Office and building efficiencies

43

InterPlaNetary Internet

44

45

46

QuickTime and a decompressor are needed to see this picture.

QuickTime and a decompressor are needed to see this picture.

47

Interplanetary Internet:InterPlaNet (IPN)


Planetary internets

Interplanetary Gateways Interplanetary Long-Haul Architecture


Licklider Transport Protocol (LTP) Bundle Protocol (RFC 5050) Delayed Binding of Identifiers Email-like behavior

(RFC 4838)

TDRSS and NASA in-space routing Delay and Disruption Tolerant Protocols
Tactical Mobile applications (DARPA) Civilian Mobile applications (SameNet!) Deep Impact Testing October 2008 Space Station Testing July 2009 EPOXI Testing October 2009

48

End-to-end information flow across the solar system Layered architecture for evolvability and interoperability IP-like protocol suite tailored to operate over long round trip light times Integrated communications and navigation services

49

Vous aimerez peut-être aussi