
Computer Scientist Explains the Internet in 5 Levels of Difficulty | WIRED
The internet is the most technically complex system humanity has ever built. Jim Kurose, Professor at UMass Amherst, has been challenged to explain the internet to 5 different people; a child, a teen, a college student, a grad student, and an expert. Still haven’t subscribed to WIRED on YouTube? ►► http://wrd.cm/15fP7B7 Listen to the Get WIRED podcast ►► https://link.chtbl.com/wired-ytc-desc Want more WIRED? Get the magazine ►► https://subscribe.wired.com/subscribe/splits/wired/WIR_YouTube?source=EDT_WIR_YouTube_0_Video_Description_ZZ Follow WIRED: Instagram ►►https://instagram.com/wired Twitter ►►http://www.twitter.com/wired Facebook ►►https://www.facebook.com/wired Get more incredible stories on science and tech with our daily newsletter: https://wrd.cm/DailyYT Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. ABOUT WIRED WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture.
Computer Scientist Explains the Internet in 5 Levels of Difficulty | WIRED
Introduction to the Internet
In this section, Jim Carossa introduces himself and describes the internet as a network of networks.
The Internet as a Complex System
- The internet is the most technically complex system ever built by humanity.
- It is a network of networks that serves as a platform for various internet applications.
- The internet allows us to perform a wide range of interesting applications.
Understanding the Internet
In this section, Skyler shares his understanding of the internet and its usage.
Skyler's Conception of the Internet
- Skyler sees the internet as something he uses for searching information and watching videos.
Physical Infrastructure of the Internet
This section focuses on the physical infrastructure of the internet and how computers are connected.
Computers and Networks
- The internet consists of billions of interconnected computers.
- These computers physically communicate with each other to form the internet.
- The internet enables various applications and services.
Building an Internet Model
Jim demonstrates how an internet model works using toy balls representing computers.
Simulating Data Transfer
- Toy balls represent computers, while connections between them represent communication links.
- Matilda (video) is sent from one computer to another through these connections.
- The purpose is to show that the internet is a network for carrying information between computers.
Routing in Networks
This section explains routing in networks and explores different paths data can take within an internet model.
Multiple Paths in Routing
- Data can travel through multiple paths within a network to reach its destination.
- Shortest path routing is commonly used, but there can be alternative routes if necessary.
- Having multiple paths ensures reliability in case one path becomes unavailable.
Importance of Protocols in Communication
This section discusses the significance of protocols in governing communication within networks.
Understanding Protocols
- Protocols are rules that govern communication between computers.
- They ensure that computers can communicate even if they have never interacted before.
- The internet relies on various protocols to enable seamless communication.
Applications and the Internet
This section explores how applications utilize the internet for their functionality.
Internet as a Platform for Applications
- The internet allows various applications, such as Zoom and video streaming services, to run on top of it.
- These applications leverage the infrastructure provided by the internet to offer their services.
Analogy: Internet and Road Systems
Jim uses an analogy to explain how the internet is similar to road systems.
Internet as an Interconnection of Networks
- The internet can be compared to road systems with local roads, state roads, and interstate highways.
- Local networks connect to larger networks, forming a global interconnection.
- Ethernet cables are used to connect networks within homes or apartments.
Connecting Networks: Ethernet Cables
This section focuses on how networks within homes connect to city networks using Ethernet cables.
Connecting Home Networks
- Ethernet cables are used to connect home networks with city networks.
- These cables transmit data at high speeds, bringing information from the internet service provider into homes or apartments.
Undersea Cables and Global Connectivity
This section explains undersea cables and their role in connecting different regions globally.
Undersea Cables for Global Connectivity
- Undersea cables are large cables laid down by ships that cross oceans.
- These cables connect different continents, enabling global connectivity through interconnecting networks.
Wireless Connectivity: First Hop
This section discusses wireless connectivity and the first hop in internet communication.
Wireless Communication
- The first hop in internet communication is typically wireless, such as Wi-Fi.
- Devices like phones, tablets, and computers communicate with the first-hop router wirelessly.
Routing and Intercontinental Communication
This section explains how routing works for intercontinental communication.
Routing for Intercontinental Communication
- Routers play a crucial role in directing data traffic across networks.
- Data can travel from one coast of the United States to another before reaching its destination in Australia.
- Undersea cables facilitate long-distance communication between continents.
Conclusion
The transcript provides an introduction to the internet, covering topics such as its physical infrastructure, routing, protocols, applications, and global connectivity. It also includes analogies to road systems to help understand the concepts better.
How does the internet know what to do without getting scrambled up?
This section discusses how information is sent over the internet and how it knows where to go without getting mixed up.
Internet Information Flow
- Information is sent in packets from the server to the display device.
- Each packet is labeled with a specific order, allowing for reordering if needed.
- The TCP protocol allows devices to request missing packets from the server.
- The Internet Protocol assigns an address to each packet, ensuring it reaches the correct destination.
What is packet switching and why was it developed?
This section explains packet switching and its purpose in developing a robust communication network.
Packet Switching Network
- Packet switching enables robust communication by allowing packets to find alternative routes if parts of the network fail.
- It was developed by DARPA (Defense Advanced Research Projects Agency) in the 1960s as a research project.
- Unlike circuit-switched networks, which have dedicated paths, packet switching offers more flexibility and resilience.
History of the internet: ARPA and packet switching
This section provides a brief history of ARPA (Advanced Research Projects Agency) and its role in developing packet switching.
ARPA and Packet Switching
- In the 1960s, DARPA (then called ARPA) aimed to create a reliable form of communication through packet switching.
- Packet switching allowed packets to find their own routes through the network, even if parts failed.
- The complexity of reliability was built into the edges of the network rather than its core.
APIs and Sockets: Building on top of internet infrastructure
This section discusses APIs (Application Programming Interfaces) and how they enable building applications on top of internet infrastructure using sockets.
APIs and Sockets
- The API for the internet is called a socket, which allows communication between devices.
- A socket requires knowing the internet address (IP address) of the destination device.
- With sockets, programmers can send messages to any IP address worldwide.
DNS: Translating domain names to IP addresses
This section explains the role of DNS (Domain Name System) in translating domain names to IP addresses.
Domain Name System (DNS)
- DNS translates domain names like gaia.cs.ums.edu or ibm.com to their corresponding IP addresses.
- This translation enables applications to send messages to specific named services.
- DNS provides a form of control over naming and addressing on the internet.
Decentralization and Control of the Internet
This section discusses decentralization and control of the internet.
Decentralization and Control
- The internet is decentralized, meaning no single authority holds complete control over decisions or destinations.
- Network owners have control within their own networks (e.g., att.com or verizon.com).
- However, there is a centralized organization called ICANN (Internet Corporation for Assigned Names and Numbers) responsible for managing names and numbers on the internet.
Wi-Fi Speed Increases: Upgrading for faster speeds
This section talks about Wi-Fi speed increases and how upgrading can provide faster speeds.
Wi-Fi Speed Increases
- Tenfold increases in Wi-Fi speed depend on device upgrades.
- The current Wi-Fi protocol is 802.11, but congestion can affect actual speeds.
- Congestion between servers and devices can cause dropped packets, impacting overall speed.
Understanding the Internet: Realizations from the conversation
This section reflects on what has been learned about the internet during the conversation.
Understanding the Internet
- The internet is a complex infrastructure that enables various applications and services.
- APIs, sockets, DNS, and decentralization are key components of the internet's functionality.
- The conversation has provided insights into how information flows, network control, and the history of packet switching.
Introduction and Research Interests
In this section, Casper Lant introduces himself as a PhD student at Columbia University. He discusses his research interests in networking, IoT, and data science.
Casper's Background and Research Interests
- Casper Lant is a PhD student at Columbia University.
- His research interests include networking, IoT, and data science.
- He focuses on exploring the use of data sets obtained from IoT devices for various applications.
Designing an IoT Pill Dispenser
In this section, Casper talks about a previous project he worked on before starting his PhD. He designed an IoT pill dispenser that uses facial detection and computer vision controls to ensure correct medication intake.
Designing an IoT Pill Dispenser
- Casper designed an IoT pill dispenser as a previous project.
- The device pairs with smartphones and utilizes facial detection and computer vision controls.
- It ensures that sensitive medication is taken correctly by identifying the user.
- The challenge lies in connecting low-power devices wirelessly and maintaining proper configuration.
Challenges in Configuring IoT Devices
This section focuses on the challenges faced when configuring IoT devices. One primary challenge is establishing wireless connections between devices. Additionally, keeping configurations consistent despite changes in network settings or location poses another challenge.
Challenges in Configuring IoT Devices
- Establishing wireless connections across devices is a primary challenge.
- Another challenge is maintaining consistent configurations when network settings change or when moving to a new location.
- Most IoT devices require users to enter Wi-Fi credentials through captive login portals during initial configuration.
- If Wi-Fi SSID or password changes or if the user moves to a new place, reconfiguration becomes necessary.
Managing Complexity in IoT Device Configuration
This section discusses the importance of managing complexity in IoT device configuration. As the number of devices increases, it is crucial to ensure that the complexity of managing them does not scale linearly.
Managing Complexity in IoT Device Configuration
- The goal is to prevent the complexity of managing IoT devices from increasing linearly as more devices are added.
- Changes in network settings or location should not require extensive reconfiguration.
- Simplifying configuration processes and minimizing manual intervention can help manage complexity effectively.
Data Transmission Rates for IoT Devices
This section explores data transmission rates for IoT devices. Unlike wired Ethernet cables capable of handling high data rates, IoT devices typically transmit small amounts of data.
Data Transmission Rates for IoT Devices
- IoT devices transmit relatively small amounts of data compared to wired Ethernet cables.
- Typical data rates for IoT devices range from kilobits per second (kbps) to bytes per second.
- For example, a temperature sensor reporting house temperature every minute would produce far less than kilobits per second on average.
Computing on IoT Data and Centralization
This section discusses computing on IoT data and the centralization of data processing. While most commercial IoT products currently centralize data, there is potential for collaboration with distributed sensor device managers to leverage valuable research datasets.
Computing on IoT Data and Centralization
- Most commercial IoT products centralize data processing due to being company-owned.
- However, there is significant research value in these datasets that could be utilized through collaboration with distributed sensor device managers.
- Comparing such datasets with specific research projects can yield valuable insights and applications.
Mobility and Future Possibilities
This section explores the possibilities of mobility in IoT devices and the potential for mobile devices to connect through different providers and networks.
Mobility and Future Possibilities
- Long-range networks like Laura enable access over larger coverage areas, providing more flexibility in connectivity.
- The softwareization of the internet allows for mobile devices to potentially connect through different providers and networks.
- Flattening of the internet reduces the number of networks traversed from source to destination, making it easier to switch between networks.
Reflection on SDN and its Beginnings
In this section, Jim reflects on the beginnings of Software-Defined Networking (SDN) and its impact on network protocols.
Reflection on SDN and its Beginnings
- Jim expresses admiration for Casper's work in RCP (Routing Control Platform), a precursor to SDN.
- The frustration with pre-baked protocols in routers led to exploring ideas from telephony network systems.
- The concept of using software instead of distributed protocols emerged as a revelation for controlling network behavior.
Softwareization of the Internet
This section discusses the current state of software-defined networking (SDN) within specific provider backbones, cloud provider networks, or campuses. It also touches upon trends that make softwareization more feasible.
Softwareization of the Internet
- SDN exists within specific provider backbones, cloud provider networks, or campuses.
- Some work has been done at juncture points between pairs of networks.
- The flattening trend reduces the number of networks traversed from source to destination.
- Access networks are getting closer to large Cloud providers like Google or Microsoft, further enabling software-defined networking.
Edge Computing and Infrastructure
This section explores the concept of edge computing and its impact on infrastructure. It highlights scenarios where a cell tower connects to routers, which are directly linked to servers running applications.
Edge Computing and Infrastructure
- Edge computing involves having a cell tower connected to a small number of routers, which are then directly linked to application-running servers.
- In such cases, the entire infrastructure is optimized for specific applications.
- The trend towards edge computing reduces the complexity of network infrastructure.
Timestamps have been associated with bullet points as requested.
The Role of Standards and Protocols in Networking
This section discusses the importance of standards and protocols in maintaining the integrity and security of network communication. It also highlights the existence of certificate authorities that facilitate secure encrypted communication between end hosts.
Protocol Standards and Equipment Communication
- Networks rely on standards and protocols to ensure seamless communication between different equipment.
- Certificate authorities play a crucial role in establishing secure encrypted communication between end hosts.
Country-Specific Regulations
- Each country can have its own laws and norms regarding network access.
- Some countries impose firewalls that restrict certain types of traffic from entering or leaving their networks.
- There is no global body regulating these regulations, allowing each country to have its own control over network access.
Encryption Limitations
- Encryption helps protect privacy and prevent surveillance, but it is not foolproof.
- Even if the content is encrypted, it may still be possible to gather information about the communication, such as identifying the devices involved or estimating data transfer sizes.
Hot Topics in Networking Research
This section explores some exciting areas of research in networking and discusses how wireless communications, cloud computing, and edge computing are converging to enable new applications with real-time requirements.
Convergence of Wireless Communications, Cloud Computing, and Edge Computing
- The convergence of wireless communications (cellular networks, Wi-Fi), cloud computing, and edge computing is an exciting area of research.
- Edge computing allows devices like mobile phones or drones to connect directly to a network that connects them to servers running applications.
- Placing computation close to the endpoint enables real-time processing for applications interacting with the physical world.
Collaboration Between Different Technologies
- Wireless networking, cloud computing, and traditional networking are now required to work together harmoniously for critical applications.
- Safety becomes a concern when applications interact with the physical world, necessitating close collaboration between these technologies.
Advancements in Cellular Networking
This section discusses the advancements in cellular networking beyond just increased bandwidth. It highlights the importance of low latency, proximity of computation to devices, and softwareization in managing networks.
Beyond Bandwidth
- Advancements in cellular networking go beyond high bandwidth.
- Low latency is crucial for real-time applications that require quick responses.
- Proximity of computation to devices allows integration of computation and communication for improved performance.
- Softwareization plays a significant role in managing networks efficiently.
Integration of Compute and Storage
- Networking is just one part of the larger information technology ecosystem that includes compute and storage.
- The opportunity now exists to have all parts work together towards higher-level goals, enabling more efficient infrastructure.
Conclusion
The transcript covers the importance of standards and protocols in networking, country-specific regulations on network access, limitations of encryption, hot topics in networking research such as convergence with wireless communications and cloud computing, and advancements in cellular networking beyond bandwidth. These insights provide a glimpse into the complex world of networking and its future possibilities.