Mid-semester presentation for my Computers & Society course at Mount Royal University. Has some technical detail about how the internet works, web protocols, data centres, and typical security threats.
of cloud icon. While convenient, it does hide the fact that the internet is most certainly not composed of magic water vapor, but a whole lot of stuff.
(metal and fiber optic) and millions of computing devices, such as servers, routers, switches, hubs, and other networking devices, most of which is housed in specialized environments requiring countless air conditioners and power devices.
that are able to communicate thanks to the use of common connection protocols. The internet is built on top of a massive amount of telecommunications infrastructure, most of it initially government-funded, but now generally privately owned.
Tier 1 Networks or Tier 1 ISPs. When someone talks about the Internet Backbone, they are talking about Tier 1 networks. About sixteen different companies are considered to be Tier 1 networks, and include Level 3, Tata Communications, NTT, AT&T, and Verizon.
but must pay to access at least some other Tier 1 networks (referred to as buying transit). Many regional networks are Tier 2. Some examples include Rogers, Telus, Comcast, British Telecom, and Vodaphone.
networks, there needs to be mechanisms for creating those interconnections. Internet Exchange Points (IXPs) have become one of the most important mechanisms for creating those interconnections.
that could continue to work even if parts of the network are disrupted or destroyed. It is the TCP/IP set of protocols that makes this possible. A given message is broken into smaller packets which can take their own independent route from the sender to the destination.
they shuttle packets from one network to another. How are destination computers identified? Each piece of hardware has a unique IP address. Initially each IP address was 12 digits longs. Due to the increase in the number of devices, IP addresses are now substantially longer.
model is one in which a computer client, such as a browser, makes requests of another computer called a server, which is normally continually active, listening for requests from clients.
how computers communicate with one another. It is actually a simple text-based protocol. While the latest generations of browsers often hide the “http://” in the address bar, HTTP is still present.
use of HTTP, having some idea about how HTTP works can help you in understanding many of the constraints that exist within the field of web development, and many of the security problems that bedevil the web space.
as HTTP over Transport Layer Security). This protocol is essentially identical to HTTP except the connection content is also encrypted. It protects against man-in-the- middle attacks, so that an eavesdropper on a session can not read or tamper with it.
as a single entity. This is in fact quite misleading. A typical website makes use of several, dozens, hundreds or even hundreds of thousands of servers. Why?
will be isolated in different servers. Partly this is for performance reasons: a single server has limits to how many simultaneous requests it can manage. Another important reason is for redundancy: computers do fail and so having multiple servers ensures a service works even when a single server stops working.
and so a key component of a data center will be its heat generation counter-measures. These include reliable air conditioning, forced air recirculation, and using chilled water directly within the server racks.
any data center. This will be achieved via UPS and other devices to normalize electrical power as well as diesel generators and DC battery supplies to preserve electrical power even during power outages.
the world’s electricity. Optimistic Estimate: by 2025, computing will consume 20% of world-wide electricity. In 2016 about 11% of all global electricity was consumed by computing.
use as much as 51% of global electricity in 2030. … the present investigation suggests, for the worst case scenario, that CT electricity usage could contribute up to 23% of the globally released greenhouse gas emissions in 2030.”
MWh. In 2014, it reported 3.2 GWh (i.e. 3200 MWh) even though it had made many of its data centers significantly more energy efficient. How is this possible?
the efficiency with which a resource is used (reducing the amount necessary for any one use), but the rate of consumption of that resource rises because of increased demand due to falling prices.
in recent years has actually increased the amount of energy being consumed in data centers (because improved energy efficiency has lowered costs thereby encouraging more people to make use of data centers).
of a paper newspaper compared to its online version found that paper version consumed about half as much energy (and that study didn't even factor in data center energy consumption).
vs streamed movies found a reduction in the total energy footprint with the switch to streaming (however that study also didn't factor in data center energy consumption).
s t i n g ? R e d u n d a n c y 01 O n - D e m a n d P r o v i s i o n i n g 02 S c a l a b i l i t y 03 C o s t E f f i c i e n c y 04 L o w S t a r t u p C o s t s 05 M a n a g e r s S e e m t o L o v e C l o u d s … 06
c e M o d e l s C l o u d c o m p u t i n g p r o m i s e s s o m e t h i n g u s u a l l y r e f e r r e d t o a s e l a s t i c c a p a c i t y / c o m p u t i n g , m e a n i n g t h a t s e r v e r c a p a b i l i t y c a n s c a l e w i t h d e m a n d . Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Software as a Service (SaaS) Amazon Web Services Microsoft Azure Google Cloud Platform