Vint Cerf on Internet Challenges


【注】摘自网络


Vint Cerf  once in a tech-talk said 


Where is the science in CS? Here are places some with underlying theory:

  • Automata theory (strong)
  • Compiler and language theory (strong)
  • Operating system design (weak) - we are vulnerable to how to make OS’s secure and they take too many resources trying to manage resources.
  • Data structures (strong)
  • Queuing theory (networks of queues) - strong theory, but too much of the network functionality has to be abstracted away before you can apply the theory.
  • Animation and rendering (strong) - Vint has recently come to have a respect for the theory, physics, and mathematics hiding behind the artistry.

Networking isone area that he picks on as not having significant underlying theory.There areimportant principals, like layering, but much of the theory is shallow.Protocol design, as an example, doesn’t have much theory. There has been some work in formalizing protocols and their analysis, but it’s way too complex.Other examples of places where we need deep analytical elements are distribute dalgorithms and cooperating processes.


We know almostnothing about making programming more efficient and systems more secure andscalable. Hecharacterizes our progress in programming efficiency as a “joke” compared to hardware.


Security (andhere he’s really mostly talking about identity) works well in hierarchicalorganizations, but not elsewhere. The cost of authenticating individual users is one of the key factors.Hierarchical organizations can more efficiently issue IDs and performauthentications. Hementions virtual machines as an intriguing notion because theoretically they can create safe execution environments for various applications. JVMs do this, as an example.One of the reasons that people went tosingle application servers (for example, a DNS server, a mail server, etc.) inthe 90’s was to get safe execution environments and process independence. Thefalling cost of hardware made this possible. VMs allow the cost of creating amachine to fall more dramatically still.


Here are some potential trouble spots:

  • Penetrable operating systems.
  • Insecure networks
  • Buggy servers
  • Broken models of perimeter security
  • Worms, virus, Trojan horses, keyboard and web page monitors
  • Bluetooth security in mobiles
  • SPAM, SPIM, and SPIT
  • Phishing and Pharming
  • IDN ambiguities and DNS hijacking
  • Intellectual property problems
  • Routing attacks with BGP routing
  • Distributed denial of service
    • Millions of zombies
    • Insecure servers, laptops, desktops, mobiles, etc.

Worms have the potential to create resilient processes that run across multiple machines forbusiness continuity.Vintnotes that the first instance of a worm was at Xerox Park for precisely thispurpose. Business processes could be broken up and run as worm-like agents onmultiple machines.


Speaking of identity, Vint wishes that the original design of the Internet hadrequired that each end point on the network be able to authenticate themselvesto every other end point.He notes that public key cryptography was still four years in the futureat that point and symmetric key encryption was too expensive.


He lists afew more challenges that remain:

  • Identity theft
  • Personal privacy
  • Search algorithms
  • Semantic networks (related to last point)
  • Database sharing (genome and space data are examples)
  • IPv6 deployment
    • Layers of details such as the network management systems, DNS refactoring, provisioning
    • Allocation policy development
  • Networked scientific instruments (tele-operation)

Some policy challenges in the Internet environment:

  • WSIS/WGIG - Internet governance
  • ICANN vs. ITU
  • International eCommerce - imagine an Amazon customer in Hong Kong, ordering from Amazon in the US. The book is sourced in South Africa, and shipped to Paris. Certain questions arise:
    • dispute resolution
    • online contracts (authenticity, legal framework)
    • taxation policies

He calls out Creative Commons and iTunes and new, innovative models of solving contentmanagement challenges.He notes that the regulatory system we have today is broken because it’s based onthe modality of the communication and the Internet is subsuming them all.


Inter planetary Internet: InterPlaNet (IPN). The flowcontrol mechanism of TCP doesn’t work well when the latency goes to 40 minutes.What’s more, planets are in motion, so distances apart vary with time and thus latency varies with time. So do error rates. Some of these problems are likemobile networks.


IPN  assumes that you can use TCP/IP on the surfaceof the planet. Each planet has its own IP space demarked by a separateidentifier. DNS doesn’t work on an interplanetary scale since by the time youget a resolution for an earth DNS address from Mars, the IP number may havechanged (think mobile or DHCP). The protocol  looks more like a store-and-forward emailsystem than an end-to-end protocol like TCP. The result is an interplanetarynetwork protocol.



(The end )

内容概要:本文系统介绍了算术优化算法(AOA)的基本原理、核心思想及Python实现方法,并通过图像分割的实际案例展示了其应用价值。AOA是一种基于种群的元启发式算法,其核心思想来源于四则运算,利用乘除运算进行全局勘探,加减运算进行局部开发,通过数学优化器加速函数(MOA)和数学优化概率(MOP)动态控制搜索过程,在全局探索与局部开发之间实现平衡。文章详细解析了算法的初始化、勘探与开发阶段的更新策略,并提供了完整的Python代码实现,结合Rastrigin函数进行测试验证。进一步地,以Flask框架搭建前后端分离系统,将AOA应用于图像分割任务,展示了其在实际工程中的可行性与高效性。最后,通过收敛速度、寻优精度等指标评估算法性能,并提出自适应参数调整、模型优化和并行计算等改进策略。; 适合人群:具备一定Python编程基础和优化算法基础知识的高校学生、科研人员及工程技术人员,尤其适合从事人工智能、图像处理、智能优化等领域的从业者;; 使用场景及目标:①理解元启发式算法的设计思想与实现机制;②掌握AOA在函数优化、图像分割等实际问题中的建模与求解方法;③学习如何将优化算法集成到Web系统中实现工程化应用;④为算法性能评估与改进提供实践参考; 阅读建议:建议读者结合代码逐行调试,深入理解算法流程中MOA与MOP的作用机制,尝试在不同测试函数上运行算法以观察性能差异,并可进一步扩展图像分割模块,引入更复杂的预处理或后处理技术以提升分割效果。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值