SlideShare a Scribd company logo
1 of 43
Rules About Networks
There are  only two network models 
Ma Bell
…  or the Internet
Pros: ,[object Object],[object Object],[object Object],[object Object]
Cons: ,[object Object],[object Object],[object Object],[object Object]
Pros: ,[object Object],[object Object],[object Object]
Cons: ,[object Object],[object Object],[object Object]
No one can afford to become  Ma Bell again.
Not These Guys
Or These Guys
Or These Guys
Or These Guys
So what are the odds you will?
No one can afford to become a network dictator again.
Networking:  Yin and Yang Stuff you control Stuff someone else controls
God, grant me the serenity to accept the network elements I cannot change;  the courage to change the network elements I can;  and the wisdom to know the difference.
Grasshopper: you must learn the paradox of internetworking. Which is…?
Not changing things enables you to change things. Huh?
It’s True! Just Look at the Internet!
TCP/IP Protocol Stack Changes Often Rarely Changes
So what things should I try not to change too much?
Q: What element did both the Internet and Ma Bell control?
Q: What element did both the Internet and Ma Bell control? A: Addressing. Jon Postel, Original  Internet Assigned Numbers Authority (IANA) North American Numbering Plan (NANP)
What Else?
A: Pay Attention to Life Cycles. Computers: 2-3 years
A: Pay Attention to Life Cycles. Operating Systems: 3-5 years
A: Pay Attention to Life Cycles. Network Protocols: 7-10 years
A: Pay Attention to Life Cycles. Data Formats: 10+ years
There is a name for network elements that don’t change quickly:
The Installed Base
Unlike in global warming, however,  this almost never gets smaller.
The only reason God could create the world in six days was because He didn't have to worry about  the installed base .* *  Enzo Torresi, Einar Stefferud, Esther Dyson, or someone else
Unfortunately, often today’s hot new technology …. Becomes that junky old stuff that drags down the whole installed base. 1999 2008
A: Inevitable.
Q: What is the likelihood the stuff you want to control eventually becomes your biggest obstacle?
But what about the things I can’t control?
How do you protect yourself against reckless drivers?
Buckle up. Keep alert. Obey signs. Buy insurance. Have airbags. Have bumpers. Yeah, Buckle up.
Protection, Network-Style ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Can I steer a safe passage through these perils?
Do I look like Albert Freakin’ Einstein?
Stuff is out of control all over my network. …  and I’m OK with that. Find Your Own Networking Bliss

More Related Content

Viewers also liked (6)

Getting people into network marketing
Getting people into network marketingGetting people into network marketing
Getting people into network marketing
 
Success Secret for MLM Business
Success Secret for MLM BusinessSuccess Secret for MLM Business
Success Secret for MLM Business
 
Basic Statistical Concepts and Methods
Basic Statistical Concepts and MethodsBasic Statistical Concepts and Methods
Basic Statistical Concepts and Methods
 
Why Network Marketing
Why Network MarketingWhy Network Marketing
Why Network Marketing
 
Multi-Level Marketing Slide
Multi-Level Marketing SlideMulti-Level Marketing Slide
Multi-Level Marketing Slide
 
Ppt 7 network marketing
Ppt 7  network marketingPpt 7  network marketing
Ppt 7 network marketing
 

Similar to Rules About Networks

Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
 
Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008
eComm2008
 
Work or Play
Work or PlayWork or Play
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
eCommConf
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
University of Hertfordshire
 
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docxYou decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
jeffevans62972
 

Similar to Rules About Networks (20)

Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
 
A Digital Conversation: The Next Web
A Digital Conversation: The Next Web A Digital Conversation: The Next Web
A Digital Conversation: The Next Web
 
Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008
 
Work or Play
Work or PlayWork or Play
Work or Play
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
It Exercises
It ExercisesIt Exercises
It Exercises
 
Science and Engineering Out of The Box
Science and Engineering Out of The BoxScience and Engineering Out of The Box
Science and Engineering Out of The Box
 
Exede Internet Welcome Comic Book
Exede Internet Welcome Comic BookExede Internet Welcome Comic Book
Exede Internet Welcome Comic Book
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper  TelegraphUnit 1 Compare And Contrast Visual And Visual Research Paper  Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
 
Slide commentary
Slide commentarySlide commentary
Slide commentary
 
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
 
Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
 
AAAI Beth Logan
AAAI  Beth LoganAAAI  Beth Logan
AAAI Beth Logan
 
Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11
 
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docxYou decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 

Rules About Networks