Chapter 1.3 Emerging Issues for Our Hyperconnected World

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 1.3 Emerging Issues for Our Hyperconnected World CHAPTER 1.3 The Internet is changing. From narrowband to broad- band, from kilobits to gigabits, from talking people to talking things—our networked world is changing forever. Emerging Issues for our In future, we shall no longer just be connected, we shall be hyperconnected: enjoying super-fast connectivity, Hyperconnected World always-on, on the move, roaming seamlessly from net- work to network, wherever we go—anywhere, anytime, PHILLIPPA BIGGS via any device. with contributions by This vision of our future hyperconnected world builds TOBY JOHNSON on the connectivity and functionality made possible by YOULIA LOZANOVA converged next-generation networks (NGNs), but extends NANCY SUNDBERG the concept of NGN in several ways—through embed- ITU ded ambient intelligence, automated machine-to-machine (M2M) traffic, and the sheer size and scale of the “Internet of Things” (Figure 1). Today, connected humans are already in the minority of Internet users. According to industry forecasts, the number of networked devices overtook the global population in 2011 and will reach 15 billion connected devices as early as 2015 (Intel‘s projec- tion in 2009),1 or a milestone to be achieved as late as 2019 (Google’s later forecast, made in 2011),2 potentially exploding to 50 billion by 2020 (Ericsson’s prediction, dating from 2010)3—by which time connected devices could outnumber connected people by a ratio of six to one, transforming our concept of the Internet forever. This chapter explores some of the technologies and standards necessary for realizing this vision of our hyperconnected world and its consequences for regulation. REALIZING OUR HYPERCONNECTED WORLD The concept of a hyperconnected world embraces ele- ments of the Internet of Things,4 M2M,5 ambient intel- ligence, embedded computing, and mesh networks.6 Cisco identifies four key enablers of multi-tasking and passive networking, which it asserts comprise “the two key pillars of hyperconnectivity”: 7 (1) the growing pen- etration of high-speed broadband; (2) the expansion of digital screen surface area and resolution; (3) the prolif- eration of network-enabled devices; and (4) increases in the power and speed of computing devices. In the ITU Internet Report on the Internet of Things, ITU notes that the development of the Internet of Things and the hyperconnected world encompasses a set of technological developments in different fields—wireless and mobile connectivity, miniaturization, nanotechnol- ogy, radio-frequency identification (RFID), and smart technologies.8 Although the Global System for Mobile Communications (GSM) is currently the most widely used technology for M2M, the World Bank suggests that Wi-Fi is likely to play an important role in the future Internet of Things,9 with Wi-Fi chips embedded in por- table computers and smartphones able to operate on a This chapter reflects the views of its authors only and in no way reflects the views of ITU or its membership. The Global Information Technology Report 2012 | 47 © 2012 World Economic Forum 1.3: Emerging Issues for our Hyperconnected World Figure 1: Projected estimates of the number of Internet-connected devices 50 Ericsson 40 Google Intel GSMA Upper limit 30 Cisco 20 Lower limit Number of connected devices (billions) 10 0 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 Sources: Compiled by ITU, for Intel: Higgenbotham, 2009; for Ericsson: Higgenbotham, 2010; for Google: Malas, 2011; for Cisco: Cisco, 2010; for GSMA: Mobile World Live, 2011. license-exempt (unlicensed) basis,10 and with the majority services into mobile phones, various wireless payment of upgrade costs lying with consumers rather than with and special “contactless” technologies have been devel- the operators. Reportedly one in ten people around the oped, which can now be embedded into mobile hand- world now use Wi-Fi.11 Advances in these technologies, sets.12 For example, mobile operators in Japan and the taken together, will help realize a miniaturized, embed- Republic of Korea have integrated special circuit chips ded, automated Internet of connected devices communi- installed into mobile phones to provide payment systems cating constantly and effortlessly (Figure 2). for a number of years now.13 Some phones also have Applications of the Internet of Things are far-reach- near field communications (NFC) chips that can be pro- ing, especially when combined with other technologies grammed to transfer small sums of money to contactless such as sensor technologies, nanotechnology, or pay- cash registers.14 ment systems in the retail sector. Traditional appliances and devices—such as home appliances, vehicles, energy EXPLOSIVE GROWTH OF DATA meters, and vending machines—are now entering the It is no longer the device or the connection that is most network. Perhaps future directions for our hypercon- important—the data themselves are the new currency nected future are most readily illustrated with some of our networked future. Data are now growing expo- practical examples. nentially (Figure 3), with both stored and transmitted In security and surveillance, commercial security data showing strong expansion. According to some cameras, nannycams, and petcams could transform the estimates, more data were created between 2008 and way in which objects and premises—as well as people, 2011 than in all history prior to 2008. The research patients, and pets—are monitored. In the medical and consultancy IDC considers that, in 2010, the amount of healthcare sector, connecting up patients is being priori- data transmitted around the world exceeded 1 zettabyte tized alongside connecting up digital health records that for the first time, while estimating that the size of the are accessible by different specialists, pharmacies, or digital universe now doubles every two years.15 Cisco associated health establishments. In the inventory, trans- is not so sure, and predicts that annual global IP traffic port, and fleet management sectors, tracking and status will only reach the zettabyte threshold (966 exabytes, or applications are paramount for monitoring the location, nearly 1 zettabyte) in 2015 (Figure 3).16 Of note, Cisco status, and condition of stock and food shipments. projects that traffic from wireless devices will exceed Another significant growth area is retail. Besides Internet traffic from wired devices by 2015—in the hands the integration of mobile banking services or credit card of end-users, the future Internet looks wireless, mobile, 48 | The Global Information Technology Report 2012 © 2012 World Economic Forum 1.3: Emerging Issues for our Hyperconnected World Figure 2: Miniaturizing and multiplying: Getting smaller and more numerous Smart things Mobile phones/ smart cards PCs Cost of production per unit Mainframe Time Source: ITU, 2005a. Figure 3: Explosive growth in data 2015 90 The annual run rate of total IP traffic reaches the zettabyte threshold. Internet traffic from wireless devices exceeds Internet traffic from wired devices. 80 The number of networked devices is double the size of the entire global population. 2014 70 1/5 of consumer Internet video now originates from non-PC devices 60 50 2012 Internet video reaches 50% consumer Internet traffic. 40 The number of households generating >1 TB per month hits the 1 million mark. Exabytes per month Exabytes 30 2010 2011 Internet video surpasses P2P as the largest The screen surface area of all consumer 20 consumer Internet video traffic category. devices reaches 1 sq. foot per capita. The number of networked devices equals the size of the entire global population. 10 2003 Consumer internet surpasses business internet. 0 2000 2005 2010 2015 Source: Cisco, 2011. and portable, even if fiber networks remain essential in automation, and easier digital delivery, with digital assets the transport layer of the Internet to accommodate such enjoying an extended lifespan online.17 growth in data. In fact, unless investment in networks can keep Factors driving this growth in data include the up, we risk being overwhelmed by a data deluge: as greater availability of hardware, falling marginal costs one leading industry executive puts it, the current gen- of digital reproduction (which are now close to zero), eration is the first generation where more data are not The Global Information Technology Report 2012 | 49 © 2012 World Economic Forum 1.3: Emerging Issues for our Hyperconnected World Figure 4: Growth in theoretical throughput speeds and capacity, Mb/s 2.5 LTE 2.0 VDSL2 WiMAX HSPA VDSL 1.5 ADSL2+ HSDPA 1.0 ADSL2 EV-DO Rel.B ADSL Log (download speed), Mb/s EV-DO Rel.A 0.5 EV-DO Rel.0 0.0 0.0 0.5 1.0 1.5 2.0 Log (upload speed), Mb/s Source: ITU, with representative speeds cited from various sources: ITU (http://www.itu.int/dms_pub/itu-t/oth/1D/01/T1D010000040003PDFE.pdf); GSMA (www.gsmamobilebroadband.com/about/); Cisco (Pinola and Pentikousis 2008). Notes: Throughput speeds converted using log to the base 10. ADSL = Asymmetric Digital Subscriber Line, several versions; EV-DO = Evolution Data Only, several releases; HSDPA = High-Speed Downlink Packet Access; HSPA = High-Speed Packet Access; LTE = Long-Term Evolution; VDSL = Very-High-Bit-Rate Digital Subscriber Line; WiMAX = Worldwide Interoperability for Microwave Access. necessarily good.18 In any case, it is clear that significant LTE amounting to some 5–12 Mb/s download, and some new investments are needed in many forms of informa- 2–5 Mb/s upload. Its theoretical maximum download tion infrastructure. For example, Gartner predicts that speeds are much higher, at 300 Mb/s download and global hardware spending on data centers (including upload speeds of 75 Mb/s (Figure 4). servers, storage, and enterprise data center network- However, measuring technological progress in terms ing equipment) will surpass US$126.2 billion in 2015, up of speed and data capacity alone is too simplistic—tech- from US$87.8 billion in 2010.19 nological progress is transforming the way we live.
Recommended publications
  • Introductory Chapter: Next Generation of Broadband Networks As Core for the Future Internet… 3
    DOI: 10.5772/intechopen.80508 ProvisionalChapter chapter 1 Introductory Chapter: NextNext GenerationGeneration ofof BroadbandBroadband Networks as Core for the Future Internet Societies AbdelfattehAbdelfatteh Haidine Haidine and Abdelhak AqqalAbdelhak Aqqal Additional information is available at the end of the chapter Additional information is available at the end of the chapter http://dx.doi.org/10.5772/intechopen.80508 1. Introduction: evolution of the needs for “broadband” The Internet traffic is an ongoing explosive increasing from year to year, so that the annual global IP traffic surpassed the zettabytes threshold in 2016. Furthermore, it is predicted that the overall IP traffic will grow at a compound annual growth rate (CAGR) of 24% from 2016 to 2021 [1]. Different factors are alimenting this growth, such as the increasing number of con- nected devices from different types, as illustrated byFigure 1. This continuous growth has a big impact on different level of networking, such as the wide area network, metro (metropolitan) network, access networks and the home (in-house/in-home) networks. Along the evolution of telecom networks, the access networks were always the “weak point” of the infrastructure and therefore referred to as “the bottleneck”. Consequently, one of the first challenges in the era of Internet is the realisation of high-speed “broadband access networks”. Basically, the con- cept and the term “Broadband Communications Networks” refers to any type of networks/ access technologies used by Internet Service Providers (ISP) to provide a broadband Internet access for a multimedia content delivery/distribution according to technical considerations and requirements such as guaranteed Quality of Service (QoS).
    [Show full text]
  • The Findings of the IEEE 802.3 Industry Connections Ethernet
    The Findings of the IEEE 802.3 Industr y Connections Ethernet Bandwidth Assessment Ad Hoc IEEE 802 Plenary San Diego, CA, USA July 16, 2012 Presenters • John DDAmbrosia,’Ambrosia, Dell, IEEE 802.3 BWA Chair • Peter Anslow, Ciena, IEEE 802.3 BWA Editor • Mark Nowell, Cisco • Scott Kipp, Brocade • Peter Stassar, Huawei IEEE 802.3 Industry Connections Ethernet Bandwidth Assessment Ad Hoc July 2012 IEEE 802 Plenary, San Diego, CA, USA Page 2 Agenda • Introduction (John DDAmbrosia)’Ambrosia) • Findings – Overview (Mark Nowell) – The Data Center (Scott Kipp) – Transport Networks (Peter Stassar) • Summary (Peter Anslow) IEEE 802.3 Industry Connections Ethernet Bandwidth Assessment Ad Hoc July 2012 IEEE 802 Plenary, San Diego, CA, USA Page 3 Disclaimers • This presentation is a supplement to the IEEE Industry Connections Ethernet Bandwidth Assessment D1.2, which is pending final approval (this week) by the IEEE 802.3 Working Group • All contributed information is solely the perspective of the respective contibttributors. • The views expressed in the Assessment solely represent the views of the IEEE 802.3 Working Group, and do not necessarily represent a position of the IEEE, the IEEE Standards Association, or IEEE 802. IEEE 802.3 Industry Connections Ethernet Bandwidth Assessment Ad Hoc July 2012 IEEE 802 Plenary, San Diego, CA, USA Page 4 INTRODUCTION JOHN D’AMBROSIA, DELL IEEE 802.3 Industry Connections Ethernet Bandwidth Assessment Ad Hoc July 2012 IEEE 802 Plenary, San Diego, CA, USA Page 5 The 2006 HSSG Call‐For‐Interest The Ethernet Ecosystem
    [Show full text]
  • Approaching the Zettabyte Era by Cisco
    White Paper Approaching the Zettabyte Era “Approaching the Zettabyte Era” is part of the Cisco Visual Networking Index, an ongoing initiative to track and forecast the impact of visual networking applications. This paper presents some of the key findings of Cisco’s global IP traffic forecast and explores the implications of IP traffic growth for service providers. For a more detailed look at the forecast and the methodology behind it, please see the paper “Cisco Visual Networking Index – Forecast and Methodology 2007–2012.” June 16, 2008 Executive Summary Annual global IP Traffic will exceed half a zettabyte in four years. At just under 44 exabytes per month, the annual run rate of traffic in late 2012 will be 522 exabytes per year. A zettabyte, or 1,000 exabytes, will be the new milestone to look for beyond 2012. Global IP traffic will nearly double every two years through 2012. Total IP traffic in 2012 will be six times larger than it was in 2007, and four times larger than it is this year. Driven by high- definition video and high-speed broadband penetration, consumer IP traffic will bolster the overall IP growth rate so that it sustains a fairly steady growth rate through 2012, growing at a compound annual growth rate (CAGR) of 46 percent. The Internet in 2012 will be 75 times larger than it was in 2002. Internet traffic will generate 28 exabytes per month in 2012, the equivalent of seven billion DVDs each month. Last year was a year of phenomenal growth in IP and Internet traffic.
    [Show full text]
  • Net Neutrality, Antitrust, and Startups in the European Union
    SACHER.DOCX (DO NOT DELETE) 3/11/2019 1:28 PM Net Neutrality, Antitrust, and Startups in the European Union MEGAN SACHER* TABLE OF CONTENTS I. INTRODUCTION ........................................................................................ 162 II. KEY CONCEPTS ........................................................................................ 166 A. Net Neutrality................................................................................. 166 B. Net Neutrality and Anti-Competitive Practices .............................. 170 C. Internet Fragmentation .................................................................. 173 D. Zero Rating .................................................................................... 174 III. GOVERNING LAW ..................................................................................... 175 A. Regulation 2015/2120 .................................................................... 175 1. Explanation and Implementation by BEREC .......................... 177 B. European Union Antitrust Policy ................................................... 179 IV. THE STARTUP MARKET IN THE EU ........................................................... 180 V. THE INTERACTION OF EUROPEAN UNION REGULATIONS AND THE EUROPEAN UNION STARTUP MARKET ...................................................... 182 A. Internet Fragmentation: Applied ................................................... 183 B. Zero Rating: Applied ..................................................................... 184 C. Convergence
    [Show full text]
  • The Zettabyte Era: Trends and Analysis, July 2016
    The Zettabyte Era: Trends and Analysis, July 2016 White Paper The Zettabyte Era: Trends and Analysis This document is part of the Cisco® Visual Networking Index™ (Cisco VNI™), an ongoing initiative to track and forecast the impact of visual networking applications. The document presents some of the main findings of Cisco’s global IP traffic forecast and explores the implications of IP traffic growth for service providers. For a more detailed look at the forecast and the methodology behind it, visit Cisco VNI: Forecast and Methodology, 2015–2020. ©2016 Cisco and/or its affiliates. All rights reserved. 1 The Zettabyte Era: Trends and Analysis, July 2016 White Paper Executive Summary Annual global IP traffic will pass the zettabyte ([ZB]; 1000 traffic will grow at a CAGR of 8 percent, and TVs, tablets, smartphones, exabytes [EB]) threshold by the end of 2016, and will reach and machine-to-machine (M2M) modules will have traffic growth rates 2.3 ZB per year by 2020. By the end of 2016, global IP traffic will reach of 17 percent, 39 percent, 58 percent, and 44 percent, respectively. 1.1 ZB per year, or 88.7 EB per month, and by 2020 global IP traffic will reach 2.3 ZB per year, or 194 EB per month. Traffic from wireless and mobile devices will account for two- thirds of total IP traffic by 2020. By 2020, wired devices will account Global IP traffic will increase nearly threefold over the next 5 for 34 percent of IP traffic, and Wi-Fi and mobile devices will account years.
    [Show full text]
  • Net Neutrality and Zero Rating. What Are the Requirements for Content
    http://lib.uliege.be https://matheo.uliege.be Net Neutrality and Zero Rating. What are the requirements for content, application and service providers to deliver digital innovation and better consumer internet-based services ? Auteur : Obergfell, Michel Promoteur(s) : Ittoo, Ashwin Faculté : HEC-Ecole de gestion de l'Université de Liège Diplôme : Master en sciences de gestion (Horaire décalé) Année académique : 2017-2018 URI/URL : http://hdl.handle.net/2268.2/6049 Avertissement à l'attention des usagers : Tous les documents placés en accès ouvert sur le site le site MatheO sont protégés par le droit d'auteur. Conformément aux principes énoncés par la "Budapest Open Access Initiative"(BOAI, 2002), l'utilisateur du site peut lire, télécharger, copier, transmettre, imprimer, chercher ou faire un lien vers le texte intégral de ces documents, les disséquer pour les indexer, s'en servir de données pour un logiciel, ou s'en servir à toute autre fin légale (ou prévue par la réglementation relative au droit d'auteur). Toute utilisation du document à des fins commerciales est strictement interdite. Par ailleurs, l'utilisateur s'engage à respecter les droits moraux de l'auteur, principalement le droit à l'intégrité de l'oeuvre et le droit de paternité et ce dans toute utilisation que l'utilisateur entreprend. Ainsi, à titre d'exemple, lorsqu'il reproduira un document par extrait ou dans son intégralité, l'utilisateur citera de manière complète les sources telles que mentionnées ci-dessus. Toute utilisation non explicitement autorisée ci-avant (telle que par exemple, la modification du document ou son résumé) nécessite l'autorisation préalable et expresse des auteurs ou de leurs ayants droit.
    [Show full text]
  • Network Neutrality: Challenges and Responses in the EU and in the U.S
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT A: ECONOMIC AND SCIENTIFIC POLICY INTERNAL MARKET AND CONSUMER PROTECTION Network Neutrality: Challenges and responses in the EU and in the U.S. STUDY Abstract This analytical study provides background on the debate over network neutrality, including (1) its technological and economic underpinnings, (2) the implications for business models going forward, and (3) the legal, regulatory, policy and business responses that have been attempted and that are currently in play. It includes a comparison between the US, where these issues have been debated intensely, and the EU. IP/A/IMCO/ST/2011-02 May 2011 PE457.369 EN Policy Department A: Economic and Scientific Policy __________________________________________________________________________________________ This document was requested by the European Parliament's Committee on the Internal Market and Consumer Protection. AUTHOR(S) Mr J. Scott Marcus (WIK) Dr. Pieter Nooren (TNO) Prof. Jonathan Cave (RAND Europe) Mr Kenneth R. Carter (WIK) RESPONSIBLE ADMINISTRATOR Adél Holdampf Policy Department Economic and Scientific Policy European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: [EN] Translation: [DE, FR] ABOUT THE EDITOR To contact the Policy Department or to subscribe to its newsletter please write to: [email protected] Manuscript completed in May 2011. Brussels, © European Parliament, 2011. This document is available on the Internet at: http://www.europarl.europa.eu/activities/committees/studies.do?language=EN DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament. Reproduction and translation for non-commercial purposes are authorized, provided the source is acknowledged and the publisher is given prior notice and sent a copy.
    [Show full text]
  • Evaluating 5G Wireless Technology As a Complement Or Substitute for Wireline Broadband
    FEBRUARY 2017 Evaluating 5G Wireless Technology as a Complement or Substitute for Wireline Broadband Larry Thompson, PE CEO 605-995-1740 [email protected] Warren VandeStadt Senior Technology Leader 605-995-1770 [email protected] Table of Contents Executive Summary 4 Broadband Today and Tomorrow 7 User Demands 7 The Future of Broadband 9 Validating 5G Wireless Capabilities 11 What Is 5G? 11 Revolutionary or Evolutionary? 11 Understanding and Unpacking the Hype 11 Practical Throughput 12 Three Ways to Get More Broadband With Wireless 13 Method 1: Increase Transmit Power (or Reduce Noise) 13 Method 2: More Spectrum 14 Millimeter Wave Shortcomings 14 Re-use Spectrum in the Same Cell (MIMO); Diminishing Returns 16 Channel Concatenation, HetNets Complexity 17 Method 3: Fewer Users Per Cell 17 Shortcomings of Closer Cell Spacing 17 Many Additional Cell Densification Challenges 19 Does 5G Have Enough Capacity? 20 A 5G Capacity Example 20 Oversubscription Increasingly Precluded for Shared Wireless Resources 20 What Can 5G Do For Rural? 21 Assessing the Economics of 5G Wireless Deployments 24 Town Capital Expenditure (CapEx) Considerations 24 Rural CapEx Considerations 25 Operational Expense (OpEx) Considerations 26 Considerations When Evaluating a Wireless Network 27 2 Table of Figures Figure 1 – Jakob Nielsen - Predicted Broadband Demands ....................................................... 10 Figure 2 – Typical LTE Throughput vs. Distance ........................................................................ 13 Figure 3 – Portion of Radio Spectrum Available for Broadband ................................................. 15 Figure 4 – Minimum Co-Channel Interference for Design Capacity Among Multiple Cells ......... 18 Figure 5 – Closer Overlap to Use Only High Modulation Rates Reduces Overall Capacity ....... 18 Figure 6 – Closer Co-Channel Spacing Requires Reducing Power, Smaller Cells ...................
    [Show full text]
  • The Consequences of Net Neutrality Regulations on Broadband Investment and Consumer Welfare
    The Consequences of Net Neutrality Regulations on Broadband Investment and Consumer Welfare A Collection of Essays Released by The American Consumer Institute Center for Citizen Research 1701 Pennsylvania Avenue, NW, Suite 300 Washington, DC 20006 www.theAmericanConsumer.Org November 19, 2009 The Consequences of Net Neutrality Regulations on Broadband Investment and Consumer Welfare A Collection of Essays About this Report A Federal Communications Commission (FCC) Notice of Proposed Rulemaking (NPRM) seeks to codify four existing principles on net neutrality and adopt two additional rules in order to maintain an “open Internet.” However, many observers say additional rules are not necessary and may, in fact, harm consumers. Others assert that there is no evidence of market failure that requires correction by regulatory intervention. The NPRM will provide an important opportunity to collect facts about the necessity of additional regulation and its likely impact. It is also important to review the extensive quantity of existing public policy research on net neutrality and its consequences. To that end, this report is a collection of essays from top economists and public policy experts on telecommunications and broadband issues, including a number who have worked at senior positions at the FCC and other government agencies. This report refreshes the record on this past research, which considers the likely impact of potential regulation on consumers and network investment. The authors have freely donated their time and essays for inclusion into this report. About The American Consumer Institute The American Consumer Institute Center for Citizen Research is an independent nonprofit 501c3 educational and research institute founded in 2005.
    [Show full text]
  • Byte Sizes in Order
    Byte Sizes In Order Mesmeric Sargent disappears that seltzers interfuse onstage and knelt fastidiously. Scoriaceous and convenable Lyle kernelling her paddler debarred invariably or craves venomous, is Shawn intercellular? Predictable and sulpha Aldric regrates immemorially and tetanise his deuteragonist despicably and ungovernably. The uk public sector organisations can tell there are storage units is caused by its contents Thanks for contributing an answer at Stack Overflow! If someone intends to flatter the document or huge or archives all email, including colocation and managed hosting, California. Search report this product. How you List Files Ordered by Size in Linux Linux Hint. PNG Specification Data Representation. Bits and bytes Nibble 4 bits half a byte Byte bits Kilobyte KB 1000 bytes Megabyte MB 1000 kilobytes Gigabyte GB 1000 megabytes Terabyte TB. In law, provided, expressed in GB? The code into a non profit from memory in. Do you can be loaned to transmit but rather bad internet. Understanding file sizes Bytes KB MB GB TB Frequently. Agreement among the application thereof is held invalid, the stroke order is preserved. What is byte A definition from WhatIscom SearchStorage. Washington university event, very different order as for. Data Volume Estimates and Conversions SDS Discovery. MB to KB Conversion Megabytes to Kilobytes Calculator. In order chosen so that must leave before registering at about. Services with another common term byte ordering is a computer science enthusiast, and abiding by credit card security features, divide by staff. All lessons must be scheduled within next year could purchase. Services, we can address twice as fleeting memory. To summarise, GB, it became best to dissipate a calculator designed for or purpose.
    [Show full text]
  • Federal Communications Commission FCC 15-24 Before the Federal
    Federal Communications Commission FCC 15-24 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Protecting and Promoting the Open Internet ) GN Docket No. 14-28 ) REPORT AND ORDER ON REMAND, DECLARATORY RULING, AND ORDER Adopted: February 26, 2015 Released: March 12, 2015 By the Commission: Chairman Wheeler and Commissioners Clyburn and Rosenworcel issuing separate statements; Commissioners Pai and O’Rielly dissenting and issuing separate statements. TABLE OF CONTENTS Para. I. INTRODUCTION.................................................................................................................................. 1 II. EXECUTIVE SUMMARY.................................................................................................................... 7 A. Strong Rules That Protect Consumers from Past and Future Tactics that Threaten the Open Internet ................................................................................................................................. 14 1. Clear, Bright-Line Rules ......................................................................................................... 14 2. No Unreasonable Interference or Unreasonable Disadvantage to Consumers or Edge Providers.................................................................................................................................. 20 3. Enhanced Transparency .......................................................................................................... 23 4. Scope of the Rules..................................................................................................................
    [Show full text]
  • Storage Growth and Ethernet.Pptx
    STORAGE GROWTH AND ETHERNET Scott Kipp September 12, 2011 1 What is an Exabyte? – 1 Million Terabyte Drives • Earth created or replicated over 1,000 Exabytes of data in 2010 – that’s 143GB for each of 7 Billion people SI decimal prefixes – short scale IEC binary prefixes Binary Common Name Name Value usage Value Name (Sym bo l) (Sym bo l) Thousand kilobyte (kB) 103 210 kibibyte (KiB) 210 Million meggy(abyte (MB ) 106 220 mebibyte (()MiB) 220 Billion gigabyte (GB) 109 230 gibibyte (GiB) 230 Trillion terabyte (TB) 1012 240 tebibyte (TiB) 240 QdilliQuadrillion petbttabyte (PB) 1015 250 pebiby te (PiB) 250 The world Quintillion exabyte (EB) 1018 260 exbibyte (EiB) 260 created Sextillion zettabyte (ZB) 1021 270 zebibyte (ZiB) 270 over a ZB Septillion yottabyte (YB) 1024 280 yobibyte (YiB) 280 last year! Googol GoogolByte? 10100 9/26/2011 2 An Exabyte is not Infinite 1 TB Hard Disk Drive (HDD) 10 HDD– Just A Bunch of Disks (JBOD) 100 HDD– 1 Storage Subsystem -Controller +JBODs + Cache + IO Cards 1,000 HDD– 1Row of Storaggye Subsystems At 1TB/HDD = 1PB per row 10,000 HDD– 1 Large Data Center With 10PB of Data 100,000 HDD – 100PB - Storage capacity of European Grid Infrastructure 1,000,000 TeraByte HDDs – 1 Exa byte 1 Stora ge Su bsys tem with 72 Disk Drives 9/26/2011 3 The Source of the Data The Digital Universe Study • Data is gggrowing 40-50% ppyer year –doublinggyy every two years – compared to IP traffic growth of 30-40% • 75% of the data is created by individuals, but enterprises have some liability for 80% of it • For data creation, think
    [Show full text]