In today's excerpt from Delancey Place - the
internet was created by the U.S. military as a way to preserve communications
to missile silos in the event of a Soviet nuclear attack:
"From its inception as a
U.S. military funded project in the 1960s, the Internet was designed to solve
a particular problem above all else: to ensure the continuity of
communications in the face of disaster. Military leaders at the time were
concerned that a preemptive nuclear attack by the Soviets on U.S.
telecommunications hubs could disrupt the chain of command -- and that their
own counterstrike orders might never make it from their command bunkers to
their intended recipients in the missile silos of North Dakota. So they
asked the Internet's original engineers to design a system that could sense
and automatically divert traffic around the inevitable equipment failures
that would accompany any such attack.
"The Internet achieves this
feat in a simple yet ingenious way: It breaks up every email, web page, and
video we transmit into packets of information and forwards them through a
labyrinthine network of routers -- specialized network computers that are
typically redundantly connected to more than one other node on the network.
Each router contains a regularly updated routing table, similar to a local
train schedule. When a packet of data arrives at a router, this table is
consulted and the packet is forwarded in the general direction of its
destination. If the best pathway is blocked, congested, or damaged, the
routing table is updated accordingly and the packet is diverted along an
alternative pathway, where it will meet the next router in its journey, and
the process will repeat. A packet containing a typical web search may
traverse dozens of Internet routers and links -- and be diverted away from
multiple congestion points or offline computers -- on the seemingly
instantaneous trip between your computer and your favorite website.
The highly distributed nature of
the routing system ensures that if a malicious hacker were to disrupt a single,
randomly chosen computer on the Internet, or even physically blow it up, the
network itself would be unlikely to be affected. The routing tables of nearby
routers would simply be updated and would send network traffic around the
damaged machine. In this way, it's designed to be robust in the face of the
anticipated threat of equipment failure.
However, the modern Internet is
extremely vulnerable to a form of attack that was unanticipated when it was
first invented: the malicious exploitation of the network's open architecture
-- not to route around damage, but to engorge it with extra, useless
information. This is what Internet spammers, computer worms and viruses,
botnets, and distributed denial of service attacks do: They flood the
network with empty packets of information, often from multiple sources at
once. These deluges hijack otherwise beneficial features of the network to
congest the system and bring a particular computer, central hub, or even the
whole network to a standstill.
Author: Andrew Zolli &
Ann Marie Healy
Title: Resilience: Why Things Bounce Back Publisher: Free Press Date: Copyright 2012 by Andrew Zolli Pages: 28-29
Delanceyplace is a brief
daily email with an excerpt or quote we view as interesting or noteworthy,
offered with commentary to provide context. There is no theme, except
that most excerpts will come from a non-fiction work, mainly works of history,
are occasionally controversial, and we hope will have a more universal
relevance than simply the subject of the book from which they came.
|
Former leading New Zealand publisher and bookseller, and widely experienced judge of both the Commonwealth Writers Prize and the Montana New Zealand Book Awards, talks about what he is currently reading, what impresses him and what doesn't, along with chat about the international English language book scene, and links to sites of interest to booklovers.
Tuesday, September 04, 2012
Resilience: Why Things Bounce Back
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment