The Internet has, in a short space of time, become fundamental to the
global economy. More than a billion people worldwide use it, both at work
and in their social lives. Over the past three decades it has grown from
an experimental research network and now underpins a range of new
economic activities as well as activities and infrastructures that support
our economies, from financial markets and health services to energy and
transport.
The Internet is poised to connect an ever-greater number
of users, objects and information infrastructures. This means that the
policy framework governing its use and development also needs to be
adaptable, carefully crafted and co-ordinated across policy domains,
borders and multiple stakeholder communities.
Before the rapid development of the Internet, separate systems – telephone,
television and video, individual computer systems – stored and transmitted
voice, video and data. Today, these systems are converging onto the
Internet. In addition to convergence of network platforms, convergence is
also taking place at several other levels: at the content level with Video on
Demand (VoD) and television over Internet Protocol networks (IPTV); at the
business level, with companies offering combined television, Internet and
telephone services to subscribers; and at the device level, with
multi-purpose devices that can combine email, telephone and Internet,
for example.
Reachability is symmetric and transitive. Many Internet applications assume that if Host A can contact Host B, then the opposite must be true. Applications use this assumption when they have request-response or callback functions. This assumption isn't always true because middleboxes such as network address translators (NAT) and firewalls get in the way of IP communications, and it doesn't always work with 802.11 wireless LANs or satellite links.
Multicast allows you to send communications out to many systems simultaneously as long as the receivers indicate they can accept the communication. Many applications assume that multicast works within all types of links. But that isn't always true with 802.11 wireless LANs or across tunneling mechanisms such as Teredo or 6to4.
Many applications assume that the end-to-end delay of the first packet sent to a destination is typical of what will be experienced afterwards. For example, many applications ping servers and select the one that responds first. However, the first packet may have additional latency because of the look-ups it does. So applications may choose longer paths and have slower response times using this assumption. Increasingly, applications such as Mobile IPv6 and Protocol Independent Multicast send packets on one path and then switch to a shorter, faster path.
Many applications assume that IP addresses are stable over long periods of time. These applications resolve names to addresses and then cache them without any notion of the lifetime of the name/address connection. This assumption isn't always true today because of the popularity of the Dynamic Host Configuration Protocol as well as roaming mechanisms and wireless communications.
From the onset of the Internet, hosts could have several physical interfaces to the network and each of those could have several logical Internet addresses. Today, computers are dealing with wired and wireless access, dual IPv4/IPv6 nodes and multiple IPv6 addresses on the same interface making this assumption truly a myth.
Some applications assume that the IP address used by an application is the same as the address used for routing. This means an application might assume two systems on the same subnet are nearby and would be better to talk to each other than a system far away. This assumption doesn't hold up because of tunneling and mobility. Increasingly, new applications are adopting a scheme known as an identifier/locator split that uses separate IP addresses to identify a system from the IP addresses used to locate a system.
IP was designed to support new transport protocols underneath it, but increasingly this isn't true. Most NATs and firewalls only allow Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) for transporting packets. Newer Web-based applications only operate over Hypertext Transfer Protocol (HTTP). Some applications open multiple connections -- one for data and another for control -- between two systems for communications. The problem is that middleboxes such as NATs and firewalls block certain ports and may not allow more than one connection. That's why applications such as File Transfer Protocol (FTP) and the Real-time Transfer Protocol (RTP) don't always work.
Several assumptions about Internet security that are no longer true. One of them is that packets are unmodified in transit. While it may have been true at the dawn of the Internet, this assumption is no longer true because of NATs, firewalls, intrusion-detection systems and many other middleboxes. IPsec solves this problem by encrypting IP packets, but this security scheme isn't widely used across the Internet.Another security-related assumption Internet developers and users often make is that packets are private. The only way for Internet users to be sure that their communications are private is to deploy IPsec, which is a suite of protocols for securing IP communications by authenticating and encrypting IP packets. Many Internet applications assume that a packet is coming from the IP source address that it uses. However, IP address spoofing has become common as a way of concealing the identity of the sender in denial of service and other attacks.
The level of infringing traffic varied between internet venues and was highest
in those areas of the internet commonly used for the distribution of pirated
material.
BitTorrent traffic - non-pornographic copyrighted content shared illegitimately such as films, television episodes, music, and computer games and software
Cyberlocker traffic - downloads from sites such as MegaUpload, Rapidshare, or HotFile
Video streaming traffic is the fastest growing area of the internet and is currently believed to account for more than one quarter of all internet traffic.
Other peer to peer networks and file sharing arenas - An examination of eDonkey, Gnutella, Usenet and other similar venues for content distribution