Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the Internet Electronic Commerce Web censorship Intranets.

Similar presentations


Presentation on theme: "Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the Internet Electronic Commerce Web censorship Intranets."— Presentation transcript:

1 Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the Internet Electronic Commerce Web censorship Intranets and Extranets

2 Linked Networks Verizon BackboneAT&T Backbone MAE* East Verizon Vienna, VA Sprint Nextel Backbone MAE* West Verizon San Jose * Metropolitan Area Exchanges: Sites with routers where ISPs exchange traffic. Also called network access points, NAPs. Carriers monitor their Networks at NOCs, Network Operations Centers Sprint Nextel NAP Pennsauken NJ

3 An Edge Router * 20 port modular card for connections to optical networks; each port at 10/100 Kbps Ethernet or 1 Gigabit Ethernet ** 2 Port modular card that interfaces with optical networks at 10 Gig-E per port ** 4 built in 10 Gig-E uplinks to optical networks Management Ports for administration & software updates (Console Ethernet, Aux + USB Drive connector ) *** 2 ports (Clock input/output), BITS input for clocking on protocols such as SONET and Fiber Channel that require exact timing Dual redundant Power Supplies Type of ports described above are: * SFP (Small Form-factor Pluggable) ** XFP (10 Gigabit Small Form Factor Pluggable) *** UART (Universal Asynchronous Receiver/Transmitter)

4 Racks inside cages containing multiple carriers’ routers Backup generators Windowless hurricane proof building with high- level of security, duplicate power sources and duplicate fiber optic cabling Fiber cable to carrier backbone Duplicate cables to carrier backbone and electric utility Cable to electric utility A Peering Point

5 Interconnections & Peering on the Internet http://www.youtube.com/watch?NR=1&feature=endscreen&v=UIi5IgZIWlI http://www.youtube.com/watch?NR=1&v=AlDWMg49z_U Note ways ISWest makes its data centers sustainable, secure and connected to the outside: – Pay attention to entry security Protection from fire Protection from electrical outages and overheating Cabinet designs Protection from natural disasters (hurricanes, tornadoes)

6 Carrier Compensation Under Network Neutrality Customer in Chicago on a videoconference with Beijing office. Pays fees to carrier A and to Skype. Carrier A; Skype pays nothing to Carrier A. Carrier B; not compensated Carrier C: not compensated by Skype Providers’ coverage areas Beijing office: Pays fees to Skype & carrier C.

7 Government or Censorship Protection? Governments block web sites: – Child pornography – Foreign e-commerce sites – Copyright infringements – Twitter – Certain social networks Governments block & monitor email – Dissenters – Terrorists – Hacking attacks

8 Extranets and Intranets Influence of Internet technology Extranets: – Making applications available to: Customers Business partners Intranets – Using Web technology internally Single sign-on and password Collaboration Access to enterprise information

9 Summing Up  Describe the structure of the Internet  How has the Internet changed the way  We conduct business?  Get information?  Make purchases?  Intranets & extranets  How has the Internet changed the way we socialize?  Can we protect our networks?  Is free stuff worth losing privacy for?


Download ppt "Chapter 6 - The Internet Evolution of the Internet Security vs. Privacy Video Streaming Over the Internet Electronic Commerce Web censorship Intranets."

Similar presentations


Ads by Google