Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
The document discusses the evolution of network architecture and the implications for public policy. It notes that originally computer networks were designed to enable connected computers to exchange data directly, but content distribution networks now deliver most content. This has resulted in a role reversal where private networks carry content to users via CDNs, rather than users connecting directly to services. It argues this shift calls into question concepts like universal service obligations and net neutrality when applied to the dominant CDNs. It draws parallels to the Gilded Age, where a small number of large companies came to exert outsized influence due to new technologies, and says we may now be in the Internet's Gilded Age, with a few giant companies like Google, Facebook, and Amazon wield
VNNIC Internet Conference 2022: The Future of the InternetAPNIC
APNIC Chief Scientist Geoff Huston presents on the future of the Internet at the inaugural VNNIC Internet Conference, held from 22 to 25 June in Da Nang, Viet Nam.
This document discusses how the internet has evolved from a "dumb network" with smart devices in the 1980s to a more distributed architecture today. It notes that abundant network capacity, computing power, and storage are driving changes where more functionality is pulled into the network and services are provisioned at the edge. Looking ahead, it questions whether unique addressing, naming systems, and other network-centric functions will still be necessary if everything continues to be pushed to applications at the edge. The document raises issues around how services, content, and referential frameworks would work without common network-level standards and functions.
This document discusses Internet exchange points (IXPs) and their role in internet infrastructure. It notes that IXPs allow different networks to interconnect and exchange traffic, reducing costs. While most IXPs operate neutrally, some are influenced by governments seeking to control internet access. The document also discusses consolidation among backbone and last-mile providers. It provides data on the major IXPs in the US and notes increasing vertical integration among content providers, data centers, and networks. In conclusion, it suggests ensuring IXPs continue enabling market forces while addressing governance and competition challenges.
This document provides an overview of computer network fundamentals, including data transmission modes, network topologies, and network categories. It discusses the three main data transmission modes - simplex, half-duplex, and full-duplex - and describes their characteristics and examples. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and explores their key applications and advantages and disadvantages.
This document provides an overview of computer communications and networking concepts. It begins with an introduction to the evolution of computer networks from early messenger systems to the development of ARPANET and the Internet. It then discusses key network categories including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers data transmission modes, network topologies, and common networking protocols and standards such as the OSI model and TCP/IP. Overall, the document serves as an introductory guide to fundamental computer networking concepts.
The document discusses the evolution of network architecture and the implications for public policy. It notes that originally computer networks were designed to enable connected computers to exchange data directly, but content distribution networks now deliver most content. This has resulted in a role reversal where private networks carry content to users via CDNs, rather than users connecting directly to services. It argues this shift calls into question concepts like universal service obligations and net neutrality when applied to the dominant CDNs. It draws parallels to the Gilded Age, where a small number of large companies came to exert outsized influence due to new technologies, and says we may now be in the Internet's Gilded Age, with a few giant companies like Google, Facebook, and Amazon wield
VNNIC Internet Conference 2022: The Future of the InternetAPNIC
APNIC Chief Scientist Geoff Huston presents on the future of the Internet at the inaugural VNNIC Internet Conference, held from 22 to 25 June in Da Nang, Viet Nam.
This document discusses how the internet has evolved from a "dumb network" with smart devices in the 1980s to a more distributed architecture today. It notes that abundant network capacity, computing power, and storage are driving changes where more functionality is pulled into the network and services are provisioned at the edge. Looking ahead, it questions whether unique addressing, naming systems, and other network-centric functions will still be necessary if everything continues to be pushed to applications at the edge. The document raises issues around how services, content, and referential frameworks would work without common network-level standards and functions.
This document discusses Internet exchange points (IXPs) and their role in internet infrastructure. It notes that IXPs allow different networks to interconnect and exchange traffic, reducing costs. While most IXPs operate neutrally, some are influenced by governments seeking to control internet access. The document also discusses consolidation among backbone and last-mile providers. It provides data on the major IXPs in the US and notes increasing vertical integration among content providers, data centers, and networks. In conclusion, it suggests ensuring IXPs continue enabling market forces while addressing governance and competition challenges.
This document provides an overview of computer network fundamentals, including data transmission modes, network topologies, and network categories. It discusses the three main data transmission modes - simplex, half-duplex, and full-duplex - and describes their characteristics and examples. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and explores their key applications and advantages and disadvantages.
This document provides an overview of computer communications and networking concepts. It begins with an introduction to the evolution of computer networks from early messenger systems to the development of ARPANET and the Internet. It then discusses key network categories including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers data transmission modes, network topologies, and common networking protocols and standards such as the OSI model and TCP/IP. Overall, the document serves as an introductory guide to fundamental computer networking concepts.
The Evolution of Carriage, Content and InterconnectionGeoffHuston
A look at the recent issues with "Sender Pays" in the broader context of Internet service provider interconnection. Used for a BEREC Workship in October 2023.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
The document discusses the evolution and key concepts of the Internet. It describes how packet switching, TCP/IP, and client-server computing enabled the Internet to develop. Packet switching allowed messages to be broken into packets and sent over multiple paths. TCP/IP provided protocols for transmitting and routing these packets. Client-server models distributed processing power across many connected computers. Together these innovations formed the basis of the Internet and World Wide Web.
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
This document provides an overview of metropolitan area networks (MANs) and wide area networks (WANs). It defines MANs and WANs, describes their key characteristics, and compares MAN technologies like SONET and Ethernet. It also covers WAN basics such as routing algorithms, congestion, and an example of WANs in smartphones. The document seeks to explain the differences between LANs, MANs and WANs and how data is transmitted over each type of network.
The document provides an overview of broadband internet access technologies and adoption in the United States in the early 2000s. It discusses various broadband technologies including cable internet, DSL, satellite, WiFi, WiMax, and fiber. Cable internet and DSL were the main options for consumers at the time, with cable having a higher market share. Regulatory policies and investment decisions affected the competitiveness between telephone and cable companies in providing broadband. The document also discusses the importance of widespread broadband adoption for economic growth and competitiveness of the US.
Open access networks allow multiple service providers to offer services to customers over a shared network infrastructure. In an open access model, the physical network is built and maintained by an infrastructure owner, while multiple retail service providers can utilize the network to provide services directly to end users. This promotes competition and efficient use of resources. The document discusses the benefits of open access networks, provides examples of open access models in countries like Sweden and South Africa, and outlines the key actors and considerations in an open access ecosystem.
This document provides an introduction to computer networks through a series of lectures. Lecture a defines what a communication network is, explains the purposes and benefits of networks, and outlines the histories of the Internet and World Wide Web. It describes different ways to connect to the Internet, such as wired, wireless, broadband, and mobile technologies. The lecture establishes that networks allow sharing of hardware, software, files, and communication between connected devices.
This document discusses issues related to the transition to IP networks and net neutrality rules. Regarding the IP transition, it notes that the public telephone network is being replaced by an IP-based network, which could impact services, reliability, and regulatory obligations. On net neutrality, it explains the debate around whether and how to regulate broadband providers to prevent blocking or discrimination of internet traffic. Local governments should be concerned with how these changes could impact services, public safety networks, and economic development. The FCC is considering new rules around an "open internet" and prohibiting blocking of lawful content.
This document provides an overview of telecommunications and the internet. It describes the basic telecom model involving computers, interfaces, and communication channels. It then discusses typical home telecom models using modems, phone lines, and different types of communication channels such as twisted pair, coaxial cable, fiber optics, and wireless. It also covers internet protocols, network topologies, transmission speeds, and the evolution and growth of the internet.
SEA IGF 2021: Some thoughts on Internet infrastructure APNIC
This document discusses how the internet infrastructure has changed over time and questions how it may continue to change. It notes that in the 1980s the network was simply a packet transmission system, but in the 1990s client/server architecture pulled more functions like naming, routing, messaging into the network. Today, content delivery networks (CDNs) serve most internet content from distributed edge locations, reducing the need to push content across networks. This raises questions about whether elements like transit and peering will become irrelevant as more occurs on private CDNs. Increased encryption also limits inspection points. The document questions what will be left of public infrastructure and if changes are resistible as internet control shifts to private markets globally.
APNIC Training Delivery Manager Terry Sweetser presents an overview of Internet Exchange Points at PacNOG 31, held in Port Vila, Vanuatu from 26 to 30 June 2023.
PITA 27th AGM & Business Forum Expo 23: Internet Exchange PointsAPNIC
APNIC Training Delivery Manager Terry Sweetser presented on smarter networking and Internet traffic efficiency with Internet Exchange Points at the PITA 27th AGM & Business Forum Expo 23, held from 29 May to 1 June 2023, in Port Moresby, Papua New Guinea.
Telecommunications and the Internet rely on various transmission channels to transmit digital signals between computers and networks. Common channels include twisted pair wiring, coaxial cable, fiber optics, microwave transmission, and wireless technologies. These channels can transmit data at speeds ranging from 56 kbps for older modems up to several gigabits per second for newer fiber optic networks. The Internet itself is a global system of interconnected computer networks that uses standardized communication protocols like TCP/IP to link billions of devices worldwide.
Telecommunications and the Internet rely on various transmission channels to transmit digital signals between computers and networks. Common channels include twisted pair wiring, coaxial cable, fiber optics, microwave transmission, and wireless technologies. These channels can transmit data at speeds ranging from 56 kbps for older modems up to several gigabits per second for newer fiber optic networks. The Internet itself is a global system of interconnected computer networks that uses standardized communication protocols like TCP/IP to link billions of devices worldwide.
The internet is a network of computers linking many different types of computers all over the world. It is a very large wide area network (WAN) connecting computers and networks around the world.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
Contenu connexe
Similaire à 'Future Evolution of the Internet' delivered by Geoff Huston at Everything Open 2024
The Evolution of Carriage, Content and InterconnectionGeoffHuston
A look at the recent issues with "Sender Pays" in the broader context of Internet service provider interconnection. Used for a BEREC Workship in October 2023.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
The document discusses the evolution and key concepts of the Internet. It describes how packet switching, TCP/IP, and client-server computing enabled the Internet to develop. Packet switching allowed messages to be broken into packets and sent over multiple paths. TCP/IP provided protocols for transmitting and routing these packets. Client-server models distributed processing power across many connected computers. Together these innovations formed the basis of the Internet and World Wide Web.
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
This document provides an overview of metropolitan area networks (MANs) and wide area networks (WANs). It defines MANs and WANs, describes their key characteristics, and compares MAN technologies like SONET and Ethernet. It also covers WAN basics such as routing algorithms, congestion, and an example of WANs in smartphones. The document seeks to explain the differences between LANs, MANs and WANs and how data is transmitted over each type of network.
The document provides an overview of broadband internet access technologies and adoption in the United States in the early 2000s. It discusses various broadband technologies including cable internet, DSL, satellite, WiFi, WiMax, and fiber. Cable internet and DSL were the main options for consumers at the time, with cable having a higher market share. Regulatory policies and investment decisions affected the competitiveness between telephone and cable companies in providing broadband. The document also discusses the importance of widespread broadband adoption for economic growth and competitiveness of the US.
Open access networks allow multiple service providers to offer services to customers over a shared network infrastructure. In an open access model, the physical network is built and maintained by an infrastructure owner, while multiple retail service providers can utilize the network to provide services directly to end users. This promotes competition and efficient use of resources. The document discusses the benefits of open access networks, provides examples of open access models in countries like Sweden and South Africa, and outlines the key actors and considerations in an open access ecosystem.
This document provides an introduction to computer networks through a series of lectures. Lecture a defines what a communication network is, explains the purposes and benefits of networks, and outlines the histories of the Internet and World Wide Web. It describes different ways to connect to the Internet, such as wired, wireless, broadband, and mobile technologies. The lecture establishes that networks allow sharing of hardware, software, files, and communication between connected devices.
This document discusses issues related to the transition to IP networks and net neutrality rules. Regarding the IP transition, it notes that the public telephone network is being replaced by an IP-based network, which could impact services, reliability, and regulatory obligations. On net neutrality, it explains the debate around whether and how to regulate broadband providers to prevent blocking or discrimination of internet traffic. Local governments should be concerned with how these changes could impact services, public safety networks, and economic development. The FCC is considering new rules around an "open internet" and prohibiting blocking of lawful content.
This document provides an overview of telecommunications and the internet. It describes the basic telecom model involving computers, interfaces, and communication channels. It then discusses typical home telecom models using modems, phone lines, and different types of communication channels such as twisted pair, coaxial cable, fiber optics, and wireless. It also covers internet protocols, network topologies, transmission speeds, and the evolution and growth of the internet.
SEA IGF 2021: Some thoughts on Internet infrastructure APNIC
This document discusses how the internet infrastructure has changed over time and questions how it may continue to change. It notes that in the 1980s the network was simply a packet transmission system, but in the 1990s client/server architecture pulled more functions like naming, routing, messaging into the network. Today, content delivery networks (CDNs) serve most internet content from distributed edge locations, reducing the need to push content across networks. This raises questions about whether elements like transit and peering will become irrelevant as more occurs on private CDNs. Increased encryption also limits inspection points. The document questions what will be left of public infrastructure and if changes are resistible as internet control shifts to private markets globally.
APNIC Training Delivery Manager Terry Sweetser presents an overview of Internet Exchange Points at PacNOG 31, held in Port Vila, Vanuatu from 26 to 30 June 2023.
PITA 27th AGM & Business Forum Expo 23: Internet Exchange PointsAPNIC
APNIC Training Delivery Manager Terry Sweetser presented on smarter networking and Internet traffic efficiency with Internet Exchange Points at the PITA 27th AGM & Business Forum Expo 23, held from 29 May to 1 June 2023, in Port Moresby, Papua New Guinea.
Telecommunications and the Internet rely on various transmission channels to transmit digital signals between computers and networks. Common channels include twisted pair wiring, coaxial cable, fiber optics, microwave transmission, and wireless technologies. These channels can transmit data at speeds ranging from 56 kbps for older modems up to several gigabits per second for newer fiber optic networks. The Internet itself is a global system of interconnected computer networks that uses standardized communication protocols like TCP/IP to link billions of devices worldwide.
Telecommunications and the Internet rely on various transmission channels to transmit digital signals between computers and networks. Common channels include twisted pair wiring, coaxial cable, fiber optics, microwave transmission, and wireless technologies. These channels can transmit data at speeds ranging from 56 kbps for older modems up to several gigabits per second for newer fiber optic networks. The Internet itself is a global system of interconnected computer networks that uses standardized communication protocols like TCP/IP to link billions of devices worldwide.
The internet is a network of computers linking many different types of computers all over the world. It is a very large wide area network (WAN) connecting computers and networks around the world.
Similaire à 'Future Evolution of the Internet' delivered by Geoff Huston at Everything Open 2024 (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Lao Digital Week 2024: It's time to deploy IPv6APNIC
APNIC Development Director Che-Hoo Cheng presents on the importance of deploying IPv6 at the Lao Digital Week 2024, held in Vientiane, Lao PDR from 10 to 14 January 2024.
APNIC Chief Scientist Geoff Huston presents on the increasing adoption of privacy-related mechanisms that obscure how the network can observe user traffic at AINTEC 2023, held in Bangkok, Thailand from 12 to 14 December 2023.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
3. The 19th Century Internet
• In 1800 Alessandro Volta invented the battery that allowed electricity to be
used in a controlled manner
• In 1820 Hans Christian Oersted demonstrated the connection between
electric current and magnetism
• In the 1830’s in the UK William Cooke and Charles Wheatstone used a
system of five pointers to send text - the first use was railway signalling in the
UK
• In the 1840’s Samuel Morse developed a simpler system using a keypad to
complete a circuit.
• By 1861 telegraph lines spanned the US
• By 1870 an undersea cables spanned the Atlantic
4. The Great Telegraph Boom
The period from the 1850’s to the 1900 saw major
investments in national and international telegraph
cable systems
Most of the initial international investment activity was
from the UK – by 1982 British companies owned and
operated two thirds of the world’s telegraph cables.
In the US newspapers expanded 5-fold in the period
1840 – 1860 as 50,000 miles of telegraph cable were
installed
When combined with the railway this became an
effective means for the projection of power and control
– enterprises saw opportunities in extensive reach,
creating private monopolies to complement the older
state-sponsored monopolies
5. The Next Wave: the Telephone
• First shown to the world at the 1876 World Exposition at
Philadelphia, its invention triggered a struggle to the death
between Western Union’s telegraph and Bell’s telephone
• Western Union never fully appreciated that the telephone
was an existential threat to the telegraph until it was simply
too late.
• Thousands of regional telephone companies appeared all
over the world in the following years
Sound familiar?
6. The Telephone Cartel
• Theodore Vail - President of American Telephone and Telegraph
(twice!) - oversaw the construction of a national monopoly
masquerading as a public utility through the Kingsbury Commitment
with US Congress in 1913
• AT&T divested itself of Western Union Telegraph and in return created
a substantial private monopoly under the catch cry of“one policy, one
system and one universal service”
• Other countries emulated this transformation from competition to
national monopoly in just a few years, using existing telegraph
monopoly to subsume telephone operators into public utility
structures
7. And then the story just stopped
• The telephone network was constructed to match the human voice
• And that’s all it did
• Telephone service innovations were deployed early on in the history of telephone
• Time Division Multiplexing was developed in 1870’s for telegraphy (later adapted for digital telephony)
• The Stroger Automatic Exchange was invented in 1891
• The Fax dates back to 1843
• And there was the Speaking Clock of course
• And not much else!
• While telephone companies monopolized technology, they did so in a defensive stance to
maintain their hold on telephony services
• Meanwhile, …
8. Meanwhile…
The phone companies’ research labs invented:
• the transistor,
• switching,
• DACs,
• DSPs,
• packet networking,
• ciphers,
• radio astronomy,
• television,
• solar cells,
• C,
• Unix,
• microprocessors
Almost the entirety of the technology of the 20th century!
10. Computer Networks
The original conceptual model for computer networks was
the telephone network
• The network was there to enable connected computers to
exchange data
• All connected computers were able to initiate or receive “calls” to/from
other connected computers
• A connected computer could not call ”the network” – the network was
an invisible common substrate
• It made no difference if the network had active or passive internal
elements
10
12. 1980’s Internet Architecture
“End-to-End” design:
• Connected computer to computer
• The network switching function was stateless
No virtual circuits, no dynamic state for packets to follow
• Single network-wide addressing model
• Single network-wide routing model
• Simple datagram unreliable datagram delivery in each packet switching
element
• hop-by-hop destination-address-based packet forwarding paradigm
13. The Result was Revolutionary!
By stripping out network-centric virtual circuit
states and removing time synchronicity the
resultant packet carriage network was minimal
in design and functionality
More complex functions, such as flow control,
jitter stability, loss mitigation and reliability, were
pushed out to the attached devices on the edge
Packet carriage networks were far cheaper to
operate than circuit-switched networks
13
14. (in)Equality of Networks
In the regulated world of national telephone operators every telephone network
was “equal”
But we rapidly started differentiating between Internet networks -- Internet
networks were not all the same.
We also started differentiating between attached devices – some were “servers”
that provided services to clients, and some (many more) were “clients” who
provided no services, but access services provided by server
We started differentiating on roles and services and differentiating by the flow of
revenues between networks
16. Enter Content
Segmenting attached computers into clients and servers
• Access networks service the needs of clients
• Clients are not directly reachable by other clients
• Clients connect to services
Content (and service) provision is the role of servers
The role of the network here is to carry clients to service access
points
• The assumption here is that there are many more clients than service
points
18. Content vs Carriage
Who pays whom?
• The only reason why access networks have clients is because there are
content services that clients want to access
• Therefore, carriage providers should pay for content
• There is no “end-to-end” financial settlement model in the Internet – both
“ends” pay for access and network providers settle between themselves.
To a carriage network, content is just another client
• Content providers should pay for carriage services, just like any other client
19. Content vs Carriage
Who pays whom?
• The only reason why access networks have clients is because there are
content services that clients want to access
• Therefore, carriage providers should pay for content
• There is no “end-to-end” financial settlement model in the Internet – both
“ends” pay for access and network providers settle between themselves.
To a carriage network, content is just another client
• Content providers should pay for carriage services, just like any other client
The content folk resolved this tension by
going “over the top” and created
relationships directly with users
20. The Tyranny of Distance
But not all clients enjoy the same experience from a single
service
Facebook presentation at
NANOG 68
21. What’s the problem?
• Having everyone pull the same content over long haul transit
networks is inefficient, expensive and tediously slow
• Many carriage providers were playing with opportunistic content
caching, but it relied on unencrypted content and content
providers objected to the loss of “direct touch” with content
consumers
• Network-level encrypted cached content can work, but it needs
the participation of the content holder
• The alternative was for content caches to separately deploy at the
edge of the network
21
23. Let them eat data!
The rise of the Content Distribution Network
• Replicate content caches close to large user populations
• The challenge of delivering many replicant service requests over high
delay network paths is replaced by the task of updating a set of local
caches by the content distribution system and then serving user service
requests over the access network
• Reduced service latency, increased service resilience, happy customers!
24. Optimising Service Delivery
• Reducing the network delay between content and consumer
increases the efficiency of delivery and decreases cost
• Bypassing network transit eliminates a whole bunch of odious
Network Neutrality issues that have plagued many national
regulatory regimes for years!
• The falling costs of storage and local delivery more than offset the
costs of operating a CDN
24
25. Eliminating Distance
• The major overhead for service and content delivery is distance
• Distance adds to the net carriage cost
• Distance makes transport protocols less efficient
• Distances encourages the formation of choke points
• Distance calls in multiple providers into the e2e path, with more points of
vulnerability in service delivery
• CDNs replace “on-demand” delivery with pre-provisioned local
cache delivery (“just in case”) 25
26. Reviving Locality
Localized last mile delivery
• Avoids trunk carriage costs
• Removes intermediary providers
• Improves service robustness
• Allows direct ”touch” between service provider and customer
• Low RTT allows efficient transport operation
Local content caches
• Exploit abundance in storage, processing and local carriage infrastructure
• Optimise cache refresh timing to scavenge otherwise uncommitted
transit capacity
26
27. For the Content Provider…
CDN platforms represents a clear advantage in:
• Scalability
• Reduced service provision cost
• Reduced number of external dependencies on intermediaries
• Improved service resilience
27
What’s not to like about the
economics of CDNs?
28. CDNs Today
• Remember “Food Miles”?
• The distance your food has to travel from farm gate to plate
• What about “Packet Miles”?
• The distance your packets have to travel from platform to your device
• What is the average “Packet Mile” metric for all your content?
• We measured this for a major ISP in Australia in the early 2000’s (pre
CDNs) and the metric was ~8,000 miles for 80% of all delivered traffic
• I suspect this has dropped to under 50 miles for the majority of that
network’s customers these days because of CDNs
29. CDN Reach – some examples
29
August 2019 - https://blog.cloudflare.com/scaling-the-cloudflare-global
30. CDN Reach – some examples
30
https://www.fastly.com/network-map/
33. What’s important for an access
Service Provider?
33
Cumulative % of Delivered Traffic
Cumulative
Carriage
Cost
CDN-Delivered Content / Local Peer Traffic
Remote Content
de4livered via Transit
Today’s 90/10 profile of
traffic cost
34. Transit?
Once the CDN caches sit “inside” the the Access ISP then the
entire wide area transit network becomes a marginal activity
compared to the value of the content feeds!
Does the network fragment into a collection of localized service
“cones” where all inter-zone traffic is mediated through
applications and services hosted within CDNs?
35. Closed Transit?
35
We see the CDN systems reserve a carriage resource through dedicated
bandwidth / wavelength / cable purchase and effectively bypass the open IP
carriage infrastructure
36. No More Open Transit?
• If users don’t send packets to users any more…
• If content is now delivered via CDNs to users via discrete service
cones…
• If there is no universal service obligation…
Then why do we still need Transit Service providers?
37. Internet Names and Addresses?
If the Internet is (or maybe soon will be) a collection of discrete
CDN service ‘cones’ and a collection of applications and services,
then what’s the role of IP?
Taking this one step further, why do we expect end users to pay for
the maintenance of:
• A global IP address plan?
• A single global routing domain?
if all such inter-cone traffic is managed through CDNs and their
service platforms?
38. 2020’s Internet Architecture
A “network” of CDNs:
• Edge devices are connected within a connected service zone defined by
CDN presentation interface
• The network switching function is increasingly stateful
SDN and Source-Directed path specification
• Addressing is unbound from identity
• Locally-scoped routing model
• Residual transit services are provided within a service application context,
nanaged by service applications operation within CDNs
39. It’s not just the Death of Transit
It’s the re-purposing of the entire network
• Service provisioning sits within cloud providers and distributed data
centres
• Edge computers are now acting as televisions into the clouded world of
data
• The distinction between personal and public data realms is disappearing
into the realm of corporately owned private data empires
39
40. Exactly where are we?
• We started this journey building a telephone network for computers
to communicate between each other
• But now one-way content distribution lies at the core of today’s
Internet
• This content distribution role is an enterprise service framework
rather than a public carriage service
• The internal parts of the carriage network are now being privatized
and removed from public regulatory scrutiny (assuming that the Internet every
had any such scrutiny in the first place!)
40
41. Policy?
If CDN feeder networks are private networks, and there is
little residual public carriage other than last mile access
networks, then what do we really mean by “public
communications policy”?
In the regulatory world ‘content’ is commerce, not carriage!
41
42. Policy?
In today’s Internet what do we mean in a policy sense by concepts such
as:
“universal service obligation”
“network neutrality”
“rights of access” or even
“market dominance”
when we are talking about diverse CDNs as the dominant actors in the
Internet?
42
43. The Large and the Largest
43
The world’s 10 largest
publicly traded
companies, as ranked by
their market
capitalization, Q3, 2024
Company Market Cap($B)
Apple 2,994
Microsoft 2,795
Alphabet 1,764
Amazon 1,570
Nvidia 1,223
Meta 909
Tesla 789
Berkshire Hathaway 783
Eli Lilly 553
TSMC 539
44. Content Really is King
• None of these seven technology companies are a
telephone company, or even a transit ISP, or even an
ISP at all!
• Five of them have pushed aside carriage networks in
order to maintain direct relationships with billions of
consumers
• These valuable consumer relationships are based on
content services, not carriage 44
45. Content Consolidation
• There are not thousands of content service platforms
• There are just a few left
• And the space is dominated by a small number of dominant
actors who set the rules of engagement for all others
45
46. Content Consolidation
“The size and scale of the attacks that can now easily be launched online make it
such that if you don't have a network like Cloudflare in front of your content, and
you upset anyone, you will be knocked offline.
…
In a not-so-distant future, if we're not there already, it may be that if you're
going to put content on the Internet you'll need to use a company with a giant
network like Cloudflare, Google, Microsoft, Facebook, Amazon, or Alibaba.
…
Without a clear framework as a guide for content regulation, a small number of
companies will largely determine what can and cannot be online.
46
https://blog.cloudflare.com/why-we-terminated-daily-stormer/ August 2017
47. Competition or Cartel?
With a small number of truly massive enterprises at the heart
of the area of digital content and service is this still a space
that is shaped by competitive pressures?
Or do these dominant incumbents get to set their own terms
of engagement with each other, with users, and even with the
public sector?
47
48. Competition or Cartel?
With a small number of truly massive enterprises at the heart
of the area of digital content and service is this still a space
that is shaped by competitive pressures?
Or do these dominant incumbents get to set their own terms
of engagement with each other, with users, and even with the
public sector?
48
As concerning as this might sound, it’s not
a novel situation!
50. The Gilded Age
A term applied to America in the 1870 – 1890’s about the building of industrial
and commercial corporate giants on platforms that were a mix of industrial
innovation and enterprise with elements of greed, corruption and labor
exploitation
50
Andrew Carnegie - US Steel
John Rockfeller - Standard Oil
Theodore Vail - AT&T
George Westinghouse – Rail Brakes
Thomas Edison – General Electric
J P Morgan - Banking
51. The Gilded Age
51
During this period in the United
States the dominant position within
industry and commerce was
occupied by a very small number of
players who were moving far faster
than the regulatory measures of the
day.
The resulting monopolies took the US
decades to dismember, and even
today many of these gilded age
companies remain dominant in their
field
52. Who’s Gilding Today?
52
Company Market Cap($B)
Apple 2,994
Microsoft 2,795
Alphabet 1,764
Amazon 1,570
Nvidia 1,223
Meta 909
Tesla 789
Berkshire Hathaway 783
Eli Lilly 553
TSMC 539
53. The Internet’s Gilded Age
At some point in the past decade or so
the dominant position across the entire
Internet has been occupied by a very
small number of players who are
moving far faster than the regulatory
measures that were intended to curb
the worst excesses of market
dominance by a small clique of actors.
53
54. The Internet’s Gilded Age
These actors have enough market influence to set their own
rules of engagement with:
• Users,
• Each other,
• Third party suppliers,
• Regulators and Governments
By taking a leading position with these emergent
technologies, these players are able to amass vast
fortunes, with little in the way of accountability to a broader
common public good
54
55. The Internet’s Gilded Age
These actors have enough market influence to set their own
rules of engagement with:
• Users,
• Each other,
• Third party suppliers,
• Regulators and Governments
By taking a leading position with these emergent
technologies, these players are able to amass vast
fortunes, with little in the way of accountability to a broader
common public good
55
Is this the Internet we were
dreaming of?
56. What is this all about?
This is no longer just a conversation about incremental changes in
carriage and communications within the Internet.
For me, the essential topic of this conversation is how we can strike a
sustainable balance between an energetic private sector that has
rapidly amassed overarching control of the digital service and content
space, and the needs of the larger society in which we all would like
some equity of opportunity to thrive and benefit from the outcomes of
this new digital age.
56
57. Wherever we’re heading…
• It’s not the Internet any more
• That has already died and gone to silicon heaven!
58. Sic transit gloria mundi
In 1776 English historian Edward
Gibbon published a mighty 6 volume
work tracing the Roman Empire (and
Western Civilisation) from the height of
Empire to the fall of Byzantium
The seeds of the empire’s eventual
decline and fall were sown early in its
rise