Mythbusters 2 Cable Myths Tim Stronge & Alan Mauldin TeleGeography.

Slides:



Advertisements
Similar presentations
Evolution of NGN and NGA scenario in Nepal Nepal Telecommunications Authority.
Advertisements

Carlsbad, CA | Washington, DC | Exeter, UK | Singapore | | Submarine and Terrestrial Network Developments.
UNIVERSITY OF MORATUWA Africa - Asia Regulatory Conference 2012 Colombo, Sri Lanka Why IPv6? Ajith Pasqual University of Moratuwa 15 th February 2012.
The Statute of Westminster 1931 “Canada’s Legislative Independence”
Business Continuity and DR, A Practical Implementation Mich Talebzadeh, Consultant, Deutsche Bank
Network and Business Communications. Use of network and internet Military(1969) Education (1960s, 1970s and 1980s) Open to public ( ) Use of the.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
© 2007 Verizon. All Rights Reserved. PTE /07 FCC Workshop Global Broadband Connects the World Jacquelynn Ruff Vice President, International Public.
Carlsbad, CA | Washington, DC | Exeter, UK | Singapore | | The Flat Earth Theory: Convergence of Prices Around.
Measuring the experience consumers have when using broadband services Tim Gilfedder Technical Advisor 3 rd July 2015.
Carlsbad, CA | Washington, DC | Exeter, UK | Singapore | | The Flat Earth Theory: Convergence of Prices Around.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Search Engine Optimization
Smart Cloud Strategy in Japan November 2010 Yasu TANIWAKI Division Director, ICT Strategy Division Ministry of Internal Affairs and Communications JAPAN.
Forensic DNA Databases: A Global Update Presented by: Tim Schellberg, President GORDON THOMAS HONEYWELL Governmental Affairs Washington, DC (202)
OECD Review of Russian Statistics Peer Review Mission to Russia April 2012 Tim Davis Head, Global Relations, Statistics Directorate.
November 8, Global Competitive Internet Usage Forecasting Across Countries and Languages June Wei Department of Management/MIS College of Business.
A View from the Stoep: Tracking the evolution of local hosting in ZA and beyond Joe Abley, Director of Architecture Jim Cowie, Chief Scientist iWeek 2015.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
Overview of Interexchange Developments in other Regions and Relevance to the Caribbean Max A. Figueroa Vice President International Terremark Worldwide,
Eclipse Foundation, Inc. Eclipse Developer Demographic Profile Information Source Company: Genuitec LLC Product : MyEclispe Enterprise Workbench - 160,000.
Carlsbad, CA | Washington, DC | Exeter, UK | Singapore | | Global Internet Capacity and.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
IPv6 Matrix Project - Page 1 IPv6 Matrix Project Tracking IPv6 connectivity Worldwide Dr. Olivier MJ.
GLOBAL TERPENES MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published-> June 2017 No.
GLOBAL FIBER BRAGG GRATING (FBG) MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published->
GLOBAL DRY ICE MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published-> July 2017 No.
GLOBAL CLOUD COMPUTING STACK LAYERS MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published->
GLOBAL 360 FISHEYE IP CAMERAS MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published->
Global IP Cameras Market By Manufacturers, Countries, Type And Application, Forecast To 2022 Global IP Cameras Market By Manufacturers, Countries, Type.
GLOBAL ICE HOCKEY SHOULDER PROTECTOR MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published->
GLOBAL DATA CENTER CONSTRUCTION MARKET BY MANUFACTURERS, COUNTRIES, TYPE AND APPLICATION, FORECAST TO 2022 Published By -> Global Info Research Published->
Global Fiber Converter Market By Manufacturers, Countries, Type And Application, Forecast To 2022 Global Fiber Converter Market By Manufacturers, Countries,
Virtual Private Networks
1.4 wired and wireless networks lesson 1
Surveillance around the world
Role of Research and Education Networks in Higher Learning and Research Institutions Sci-GaIA Workshop 5 September 2016, Dar es Salaam Prof. Idris Rai,
HUAWEI eSight: Converged Management Solution for Safe City
Studying Transnational Routing Detours through Surveillance States
1.4 Wired and Wireless Networks
Technologies and Applications
The Internet and Its Uses
MMA 2013 NOVELS Group 52.
Measuring IXP Interconnectivity
Global Top Countries Dental Laboratory Workstations Market Report
Global Top Countries Stairlift Market Report
Decrypting Data Compliance in China
The Internet.
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Mythbusters 2 Cable Myths Tim Stronge & Alan Mauldin TeleGeography.
Introduction to Networking
Domain Name System Presentation
Visit:-
Global Virtual Gaming Market Global virtual gaming market, size, share, company profiles,
Why do we need cloud network services? Let’s dig into the content and explore the answer.
Is Your Online Security Intelligent? Internet Performance Management
Anupam Das , Nikita Borisov
Firewalls Routers, Switches, Hubs VPNs
Internet law Business law.
Web Server Technology Unit 10 Website Design and Development.
Key Issues Why is access to folk and popular culture unequal? Why do folk and popular culture face sustainability challenges?
Firewall.
Introduction to the Internet and World Wide Web
Ofcom’s role in cyber security
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
was not invented by Al Gore…
IP connectivity in the Least Developed Countries
Lesson 19 Internet Basics.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Mythbusters 2 Cable Myths Tim Stronge & Alan Mauldin TeleGeography

Presenter Profile Contents Since joining the company in 2000, Mr. Mauldin has served as a principal analyst in many areas of TeleGeography’s research, including international Internet infrastructure, submarine cable systems, and bandwidth demand modeling. Alan made the Kessel run in less than 12 parsecs. Contents Alan Mauldin Research Director amauldin@telegeography.com

Presenter Profile Contents Since joining TeleGeography in 1996, Tim has served as a principal analyst in most areas of research, including network infrastructure, bandwidth demand modeling, cross-border traffic flows, and telecom services pricing. Tim has the death sentence on 12 star systems. Contents Tim Stronge VP—Research tstronge@telegeography.com

Revenge of the Cable Myths What is mythbusting?

Mass Surveillance Myth The Myth: Cables that avoid U.S. territory are free from mass surveillance Conclusion: ??? Status: ???

Mass Surveillance Concept is nothing new: “Panopticon”

Mass Surveillance Myth Methodology Definition Surveillance of an entire or a substantial fraction of a population Optical or IP layer Approach Determine if there are other countries besides the U.S. engaging in mass surveillance Cite only publicly-available information Conditions I’m not claiming that all countries' surveillance capabilities are equal I’m not weighing in on whether mass surveillance is "good" or "bad"

Mass Surveillance Computing power has allowed for advances

MISSION ACCOMPLISHED, PEOPLE

Mass Surveillance Five Eyes

Mass Surveillance The Commies are pretty good at this, too

Mass Surveillance Even NSA critics want in on the game New French law: * It also requires internet service providers to collect metadata, which is then processed by an algorithm to detect strings of suspicious activity—a page taken right from the NSA’s playbook * Instead of requiring a judge’s approval, security officials can under the new law order surveillance after advice by a newly created supervisory body specifically dedicated to such approvals. * The legislation, which was passed by French parliament in May, drew such strong opposition from the public that France President François Hollande referred it to the nation’s Constitutional Council, which finally gave it the go-ahead in July. Germany Intercept at DE-CIX Frankfurt and several other Internet exchanges * German Foreign Intelligence Agency Bundesnachrichtendienst (BND) is allowed to wiretap 25 Internet Service Providers at DE-CIX, including five German IXP and the traffic of multiple vendors * Some German traffic caught up in this mass surveillance, but mainly aimed at traffic from Africa, Middle East, and Russia

Mass Surveillance Even NSA critics want in on the game

Mass Surveillance India’s in on it, too

Mass Surveillance To be safe … Source: TeleGeography

Mass Surveillance … let’s avoid the U.S. Source: TeleGeography

Mass Surveillance … and Canada Source: TeleGeography

Mass Surveillance … and Australia and New Zealand Source: TeleGeography

Mass Surveillance … and the U.K. Source: TeleGeography

Mass Surveillance … and Russia & the C.I.S. Source: TeleGeography

Mass Surveillance … and France Source: TeleGeography

Mass Surveillance … and India Source: TeleGeography

Mass Surveillance … and Bahrain Source: TeleGeography

Mass Surveillance … and China Source: TeleGeography

Mass Surveillance … and Germany Source: TeleGeography

Mass Surveillance Maybe we shouldn’t talk at all?

Mass Surveillance Myth The Myth: Cables that avoid U.S. territory are free from mass surveillance Conclusion: Mass surveillance of communications is widespread Status: ???

Post-Snowden Myth The Myth: Internet providers around the world have become less reliant on the U.S. as a result of the Snowden revelations Conclusion: ??? Status: ???

Post-Snowden Myth Methodology Examine layer 3 (IP) connectivity patterns Determine whether global Internet became less U.S.-centric after 2012

Internet Capacity Connecting to the U.S. 2003-2012 Source: TeleGeography

Internet Capacity Connecting to the U.S. 2003-2012 + Trendline Projections Source: TeleGeography

Internet Capacity Connecting to the U.S. 2003-2015: Trendline Projections vs. Reality Source: TeleGeography

Internet Capacity Connecting to the U.S. 2015 Global Average (2012 Projection): 28% 2015 Global Average (2015 Actual): 30% Source: TeleGeography

Post-Snowden Myth But that was just IP-layer connectivity IP connections tend to mirror transport layer availability What about end-to-end traffic?

Post-Snowden Myth Methodology Part II End-to-end traffic patterns very difficult to collect But we can use the following as a proxy: Determine most popular websites for users in each country (source: Alexa) Query domain name servers (DNS) in each country Look up IP addresses of the most popular websites Use GeoIP databases to look up server location of those IP addresses (source: Geolite)

Internet Content Served from the U.S. Top Sites Domain Name Server Locations x

Internet Content Served from the U.S. Results Summary Source: TeleGeography

Internet Content Served from the U.S. Users in Hosted in Source: TeleGeography

Post-Snowden Myth Summary As a % of global total, IP capacity to the U.S. has decreased since Snowden But decrease was already happening And decrease has been less than historical trends User-to-server patterns still center on U.S. Even countries w/o direct connections to North America hop to U.S. servers

Post-Snowden Myth The Myth: Internet providers around the world have become less reliant on the U.S. as a result of the Snowden revelations Conclusion: The U.S. remains a central node of the global Internet Status:

Shark Myth The Myth: Sharks pose the greatest danger to undersea cable infrastructure Conclusion: ??? Status: ???

Shark Myth: Recent News Stories

Shark Myth: Research

Shark Myth: Research Results What Sharks Eat Source: Cold, hard science

Shark Myth Cause of External Aggression Cable Faults, 2007-2009 Source: Trends in Submarine Cable System Fault, M. Kordahi, S. Shapiro, & G. Lucas

Shark Myth: A New Threat on the Horizon?

Shark Myth The Myth: Sharks pose the greatest danger to undersea cable infrastructure Conclusion: No. Monkeys do. Status: