Sucking Mud Through a Straw
Tom Kelliher, CS 318
Mar. 10, 2000
Read Chs. 23 and 24.
IP addresses, routing.
- Sharing the bandwidth.
- Protecting sensitive systems.
Socket programming
- Hardware costs: constant dollars, exponential increase in power.
- Internet bandwidth costs: constant dollars, incremental increases:
- Typical ISP $20/month, 50 Kbps downstream, 33 Kbps upstream.
- @Home $40/month, 500 Kbps downstream, 128 Kbps upstream.
ADSL more expensive, less bandwidth.
- @Work about $400/month.
- T1: $1,200/month (?), 1.5 Mbps (duplex?).
These costs are fairly constant.
- Use is growing exponentially: MP3 today, DVD tomorrow.
- Here, the bottleneck shifts. Router today, T1 tomorrow.
- Expense.
- Conflict: ``work'' use vs. ``play'' use. The solution? (Multiple
campus networks; multiple Internet connections.)
Another example: the firewall.
- If all campus systems are on the same network, how do you protect
sensitive systems?
- External threats: use a firewall.
- Why allowing visibility to some machines is bad.
- Internal threats. Standard attacks. Password sniffing if telnet is
used.
- The solution? ((different) Multiple campus networks; multiple
firewalls, secure access applications, static IPs to ensure connections
only from authorized systems.)
Thomas P. Kelliher
Fri Mar 10 11:58:38 EST 2000
Tom Kelliher