Tuesday, 27 September 2011
PodCast-Welsh
大家好,我是玟谦。欢迎来到我们的部落格。今天
我们要讨论的话题是“云计算”所有人都在谈论“云”,但它到底是什么意思呢?
(Hello, everyone, I'm MunChean. Welcome to our blog. Today we have to discuss the topic is "cloud computing" all the talk about "cloud," but it in the end what does that mean?)
云计算(cloud computing)是一种基于因特网的超级计算模式,在远程的数据中心里,成千上万台电脑和服务器连接成一片电脑云。用户通过电脑、笔记本、手机等方式接入数据中心,按自己的需求进行运算。
(Cloud computing [cloud computing] is an Internet-based super-computing model, in remote data centers, tens of thousands of computers connected to a computer and the server cloud. User through the computer, laptop, mobile phone access to the data center, etc., according to their computing needs.)
云计算的基本原理就是用户端的简单化,仅负责数据输入和读取,而将庞杂的处理工作交给“云”,也就是联网的计算机群和数据中心来处理。
(The basic principle of cloud computing is the simplicity of the client is only responsible for data input and read, but the vast and complex processing to the "cloud", that is, group of networked computers and data centers to deal with.)
云计算本质上是一种更加灵活、高效、低成本、节能的信息运作的全新方式。借助基于互联网的一系列创新技术,存储、计算、软件、管理、网络、信息等各类资源以服务的形式实现虚拟化、即时定制、面向领域、灵活的相互组合,直接满足用户的各种现实需求,真正实现IT服务的透明化。
(Cloud computing is essentially a more flexible, efficient, low-cost, energy-efficient operation of the new way of information. With a range of innovative Internet-based technology, storage, computing, software, management, network, information and other resources to service in the form of virtualization, real-time custom, domain-oriented, flexible combination with each other directly meet user actual needs, truly transparent IT services.)
Thursday, 22 September 2011
The Next Internet
A leading advocate of radical change in the Internet says research solutions will across the dual concepts of replace and revamp.
Technology Review: The problems with the Internet are fairly well understood. What are the basic views of what needs to be done at a technical level?
- There is universal agreement that creating the "Future Internet," which meets the demands of the 21st century, is both a national priority and ripe with research challenges and opportunities. But there are two general schools of thought as to how to pursue this goal said by Larry Peterson.
One view is that we may be the Internet's social utility of the inflection point erosion trust, reduce innovation, and slowing rate of update. This view focuses on assumptions built into today's 30-year-old architecture that limit its ability to cope with emerging threats and opportunities, and argues that it is time for a "clean slate" re-conceptualization of the Internet architecture.
The other view takes today's Internet as a given, and argues that future innovation will come in the form of new services and applications running on top of the Internet. Over time, these innovations will likely have a transformational effect on the Internet, but [this argument goes] it is simply not practical to think in terms of replacing today’s entire Internet infrastructure.
The Future Network in 5 Step

The Future of Networks in 5 Steps
There will be one network:
Wireless and Wireline networks will have converged to form a single, high performance, cost-optimized aggregation and core IP network, with either wireless or wired edges. In fact, even the distinction between the wireless and wired edge connectivity will be blurred as devices embed Ethernet ports, Wifi and LTE modems. So you will no longer even think about connectivity; the device and network will connect you to whatever network best suits your application and mobility needs at each instant in time. In many ways, lightRadio™ is a prime example of this trend: the ‘wired’ IP, optical and access networks are used to connect small wireless radios. Furthermore, increasingly the network will connect the radios to a central pool of control and processing elements situated back in the operator switching and data centers, allowing optimal sharing and re-use between wireless cells and access points, thereby achieving up to a 50% Total Cost of Ownership (TCO) savings over today’s architectures.
The network will be intelligent:
As Moore’s law continues its seemingly inexorable progression, the cost of processing and the associated memory and storage will have decreased to the point where the economics of embedding application-level functionality in the network makes sense. This will allow much more efficient use of network resources, and a concomitant improvement in the user Quality of Experience (QoE)
The network will be open and sustainable:
The traditional service provider applications (voice, data and TV/video) are opening up to allow third-party and ‘web’ application developers to leverage these capabilities and ‘mash them up’ with other web services to create previously unimaginable new applications.We are already seeing this trend with the emergence of applications such as gaming and on-line video delivery leveraging the quality of service (QoS) parameters in the network to deliver the desired user experience.
The network will be a platform:
Think of a PC today: there is a processor, some memory and storage (a hard drive), and Ethernet ports, all connected by an internal communications network (e.g. the PCI and memory busses). if we consider that with the emergence of Cloud computing, processing and storage are separated into pools of resources connected together by Ethernet ports on local area networks in data centers, which in turn are connected together over the wider telecommunications network, the parallels are clear and we can think of the applications increasingly running in the network
The network will be green:
If we look to the more than 30x growth in capacity that is predicted to occur as smart devices and tablets proliferate over the coming years, and person-to-person communications are usurped (in volume) by Machine-to-Machine communications, we must optimize the energy cost per bit in order that the environmental impact of building these networks is minimized and the operational cost of running them does not become prohibitive. we are seeing a real focus on the energy costs of networks.Importantly, this is a problem that transcends a single vendor or a single operator and is the reason that we founded the GreenTouch™ consortium to tackle this massive problem via an open collaboration across the telecommunications industry.
Second poll result analysis
We did a poll voting with title "What's the biggest threat to the future of the Internet?" . To show the result clearly, we created a Pie chart related to the topic.
There is 24 user take part in this Poll Question.From the Pie Chart, it is clearly showing the view of percentages. According to the chart, most of the user choose Limited access to content and services(16 user). The percentage of Lack privacy and Increase in Internet Security threats are equal(4user for each other).
What did you think about the statistic? Is that "Limited access to content and services" is your answer? No? Comment about this..
Thursday, 15 September 2011
Poll Result Analysis
We had created a poll widget for our 1 week's lab task. Our qustion of this poll is 'What do you expect in the future of the development of the internet?
- Faster surfing speed - 4 vote <66.67%>
- More reliable/Hacker safe - 1 vote <16.67%>
- Storage space - 1 vote <16.67%>
- Mobality - 0 vote <0%>
There are total 6 voters participated for our poll voting.
There are the result of the poll:


Thursday, 8 September 2011
The Future of Security

Information Security & Standards Compliance:
Many organizations face the challenge of information security management. More and more, companies are questioning how to protect their data and the consequences of a security breach is what.Professional consultants in the field of information security team, we have assisted in line with standards such as ISO 27001 standard number of customers.
Such As:
- ISO27001 Lead Auditor
- Certified Ethical Hacker (EC Council)
- Computer Hacking Forensic Investigator (EC Council)
Network layer security
TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security.
IPsec Protocol
This protocol is designed to protect communication in a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.
The basic components of the IPsec security architecture are described in terms of the following functionalities:
- Security protocols for AH and ESP
- Security association for policy management and traffic processing
- Manual and automatic key management for the internet key exchange (IKE)
- Algorithms for authentication and encryption
The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.
Electronic mail security (E-mail)
Email messages are composed, delivered, and stored in a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server. The mail client then provides the sender’s identity to the server. Next, using the mail server commands, the client sends the recipient list to the mail server. The client then supplies the message. Once the mail server receives and processes the message, several events occur: recipient server identification, connection establishment, and message transmission. Using Domain Name System (DNS) services, the sender’s mail server determines the mail server(s) for the recipient(s). Then, the server opens up a connection(s) to the recipient mail server(s) and sends the message employing a process similar to that used by the originating client, delivering the message to the recipient(s).
Pretty Good Privacy (PGP)
PGP provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such 3DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:
- Signing an email message to ensure its integrity and confirm the identity of its sender.
- Encrypting the body of an email message to ensure its confidentiality.
- Encrypting the communications between mail servers to protect the confidentiality of both the message body and message header.
The first two methods, message signing and message body encryption, are often used together; however, encrypting the transmissions between mail servers is typically used only when two organizations want to protect emails regularly sent between each other. For example, the organizations could establish a virtual private network (VPN) to encrypt the communications between their mail servers over the Internet.[4] Unlike methods that can only encrypt a message body, a VPN can encrypt entire messages, including email header information such as senders, recipients, and subjects. In some cases, organizations may need to protect header information. However, a VPN solution alone cannot provide a message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient.
Multipurpose Internet Mail Extensions (MIME)
MIME transforms non-ASCII data at the sender's site to Network Virtual Terminal (NVT) ASCII data and delivers it to client's Simple Mail Transfer Protocol (SMTP) to be sent through the Internet. The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non-ASCII data.
- Secure/Multipurpose Internet Mail Extensions (S/MIME)
S/MIME provides a consistent means to securely send and receive MIME data. S/MIME is not only limited to email but can be used with any transport mechanism that carries MIME data, such Hypertext Transfer Protocol (HTTP).
Firewalls
A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
Role of firewalls in Internet security
Firewalls impose restrictions on incoming and outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points. Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.
Types of firewalls
Packet filters
Packet filters are one of several different types of firewalls that process network traffic on a packet-by-packet basis. Their main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.
Circuit-level gateways
The circuit-level gateway is a proxy server that statically defines what traffic will be allowed. Circuit proxies always forward packets containing a given port number, provided the port number is permitted by the rules set. This gateway operates at the network level of an OSI model. The main advantage of a proxy server is its ability to provideNetwork Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.
Application-level gateways
An application-level gateway is a proxy server operating at the TCP/IP application level. A packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received.
Thesis statement
Information security will be much better than it is now. But then and now, everything will get inconceivably worse in 2010.In other words, today's sloppiness will become tomorrow's chaos.
The good news is that we may not get to this point. Most experts are optimistic about the future of the Internet and software security. They said that from now to 2010, the vulnerability will flatten or decline, and so will security breaches.
The bad news is that this confidence, which the industry smartening up the concept, this is hard to imagine the scope and deeply troubling consequences, there will be security incidents based on assumptions, the so-called digital Pearl business Hong Kong? As usual, will be unthinkable.
Web 3.0
Web 3.0 - The location-aware and moment-relevant Internet.
-Web 3.0 is all of the above expect that the Web experience is no longer limited to desktop and laptop computers while stationary in a place. It can be connect by any of mobile computing device.Advantages of Web 3.0
- Information categorized and presented in a visually improved manner that enhances interaction, analysis intuition and search functions.
- Taxonomies – standardized and self-describing classifications
- No software programs to install.
- Web 3.0 browser learns (artificial intelligence) likes and dislikes and would function as trusted advisor, mentor and personal assistant and less like a search engine.
- Browsers will position themselves as true lifestyle canvases, taking into account cutting-edge concepts like social bookmarking and in-group searching to produce a much more customized and targeted Web surfing experience.
- Reconciling the world’s spoken languages with specialized taxonomies and schemas, attached metadata and descriptors.
- Effect that change will have on taxonomies or how best to manage changes.
- Search engine optimization practices may undergo wholesale adjustments as the different information and architectural standards of Web 3.0 fight for supremacy.
- As with any new technology or Internet-related development, personal privacy issues will be at the forefront of consumers’ consciousness.
- Still a long way from reality because of the number of technologies that are involved
- New technologies that not all companies are embracing yet
- New Google Operating System (Google Chrome OS) only netbook focused.
Refferences:
URL ~> http://semanticweb.org/wiki/Main_Page
Web3.0, QuinStreet Inc [Online], Retrieved 06 May 2011.
URL~> http://www.webopedia.com/TERM/W/Web_3_point_0.html
Kate Ray, Web 3.0, Retrieved 08 May 2011.
URL~> http://vimeo.com/11529540
Labels:
Future of Internet,
History of Internet,
Web 3.0
Tuesday, 6 September 2011
Future Internet Scenarios
Internet planing scenario matrix
We need you to participate:
The internet society and everyone will cares about the internet to think about the possiblities and tendencies they want to avoid and to help the internet to evolve in a position direction.The internet society will ensure that the future of internet will looks like the story call " the common pool " and you all can join us in our effort
Internet future scenarios
- http://www.isoc.org/tools/blogs/scenarios/?p=7
- http://www.isoc.org/tools/blogs/scenarios/?p=9
- http://www.isoc.org/tools/blogs/scenarios/?p=11
The internet society hopes that you find this material helpful and we look forward how we can ensure that the internet of the future truly is for everyone
Monday, 5 September 2011
The Evolution of The Internet
The Evolution of The Internet.
The Internet is upgrading nowadays.In this new era, majority of users pursue changes and updates in the form of software and web applications. Users trying to find some application in order to more easily get their way of communication, appearance of new applications, business, entertainment, and so on. Evolution is all over the network "stack" of the constant feature.
IMPORTANT!!
The Internet is upgrading nowadays.In this new era, majority of users pursue changes and updates in the form of software and web applications. Users trying to find some application in order to more easily get their way of communication, appearance of new applications, business, entertainment, and so on. Evolution is all over the network "stack" of the constant feature.
IMPORTANT!!
Thursday, 1 September 2011
The Age of IPv6
IPv6 - Internet Protocol Version 6 is the next generation protocol for the Internet. It's design for replace IPv6 .The primary reason for design IPv6 is because exhaustion of available IPv4 address Space.The IPv4 does not handle the address Space requirements of the ever-growing Internet.
Benefits of IPv6:
- Larger Address Space
- Simplified header format: Improves efficiency and new features
- Reduced management requirement
- Improved methods to change IPS
- Better Mobility Support
- Multi-Homing
- Embedded Security: Mandatory IPsec Implementation
- Scoped Address: link-local, site-local and global-address space
(Larger Address Space)
Compare to IPv4, IPv6 increase the number of address bits by a factor of 4. from 32 bits to 128 bits.
(Simplified Header Format)
The IPv6 had remove Identification, Flags, Fragment Offset,Header Checksum and Padding Fields. This result will speed up the processing of the basic IPv6.
(Embedded Security)
IPsec is mandatory in IPv6. IPsec is the Ip Security arhitecture that an protect all IP protocol communication
IPv6 News
Scariest IPv6 attack scenarios.
Experts are reporting a rise in the number of attacks that take advantage of known vulnerabilities of IPv6, a next-generation addressing scheme that is being adopted across the Internet. IPv6 replaces the Internet's main communications protocol, which is known as IPv4.Complete info at NetworkWorld, ComputerWorld and PCWorld.
‘IPv6 brokenness’ problem appears fixed
Facebook, Yahoo and others report decline in number of users having difficulty accessing dual-stack websites.
Complete info at NetworkWorld, ComputerWorld and CIO.
Complete info at NetworkWorld, ComputerWorld and CIO.
IPv6: The security risks to business.
Predictions about when the world will end are about as consistent as the predictions about when IPv4 internet addresses will finally run out, but some IT security professionals say that is really the least of our worries.
A much bigger concern, they say, should be the security holes that will open up in many business organisations as the world moves over to internet protocol version six (IPv6).
Nothing either GOOD or BAD but thinking makes it so.
When there is good there is also bad, What did you think about IPv6? The appear of Internet Protocol version 6 not definite as the End of the of Internet Protocol Version 4.
IPv6 Does Not Mean the End of IPv4!
Information -
- http://www.6diss.org/e-learning/
- http://ipv6.com/articles/general/ipv6-the-next-generation-internet.htm
News -
- http://www.ipv6news.info/
- http://www.computerweekly.com/Articles/2011/08/16/247634/IPv6-The-security-risks-to-business.htm
Subscribe to:
Posts (Atom)