update book for typos

This commit is contained in:
mik-tf
2025-01-20 19:34:14 -05:00
parent fe2e84f250
commit 75338453c0
44 changed files with 282 additions and 273 deletions

View File

@@ -6,9 +6,9 @@ sidebar_position: 4
![](img/ai_agents_centralized.png)
**Within 2 years we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.**
**Within the next two years, we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.**
### **The Role of AI in Our Lives**
## **The Role of AI in Our Lives**
- Right now, humans interact with the internet mainly through apps on their phones, computers, and other devices.
- In the near future (within 2 years), apps will fade into the background, and **AI-driven agents** will become the primary way we interact with technology. For example, instead of using multiple apps for messaging, shopping, or searching, you might simply ask an AI assistant to handle all those tasks through conversation.
@@ -17,20 +17,20 @@ sidebar_position: 4
### **The Race for Intelligence**
## **The Race for Intelligence**
![](img/race_intelligence.png)
The world is in a rapid phase of technological advancement, driven by innovations in AI, quantum computing, and biotechnology.
**Key milestones in internet history:**
### **Key Milestones in Internet History**
- **1960s:** The internet started as a free and open platform, allowing people to share ideas, collaborate, and connect directly.
- **20002024:** The internet has become increasingly controlled by large corporations. These companies dominate through data collection and commercial interests, compromising the internets original vision of freedom and openness.
- **2025 and Beyond:** Large corporations are now racing to develop **Artificial General Intelligence (AGI)**—AI systems that can think and reason like humans. This raises concerns about centralization, control, and ethical use.
### **A Vision for the Future**
## **A Vision for the Future**
Instead of leaving the future of AI in the hands of a few powerful corporations, there is a push to create **Augmented Collective Intelligence.**

View File

@@ -1,13 +1,13 @@
---
title: 'Centralization Risk'
title: 'Centralization Risks'
sidebar_position: 3
---
# Centralization Risk
# Centralization Risks
![](img/blocked.png)
### Why Countries Need Their Own Infrastructure
## Why Countries Need Their Own Infrastructure
The internet is not just cables; its a combination of physical infrastructure (like data centers and servers), software, and services that enable global communication and access to information. When countries dont have control over their own infrastructure, they become overly dependent on external, centralized providers, which is risky for several reasons:
@@ -22,13 +22,13 @@ The internet is not just cables; its a combination of physical infrastructure
---
### Ukraine: A Real-Life Example of Infrastructure Targeting
## Ukraine: A Real-Life Example of Infrastructure Targeting
In the early stages of the war in Ukraine, one of the first targets was the country's data centers and communication infrastructure. Bombing these centers disrupted access to critical systems, cutting off communication and data services. This highlighted the vulnerability of relying on centralized or exposed infrastructure during conflicts.
---
### The Risks of Relying on Centralized Services Like Google or Microsoft
## The Risks of Relying on Centralized Services Like Google or Microsoft
1. **Single Point of Failure**

View File

@@ -1,17 +1,16 @@
---
title: 'Something to think about.'
sidebar_position: 1
---
# Something to think about.'
# Something to Think About...
## Would a country do this?
## Would a Country Do This?
![](img/electricity.png)
Imagine this: Would it make sense to rely on electricity thats generated far away, on the other side of the world? Youd need a super expensive cable to bring it to you, and if that cable breaks, youd lose power completely. No country would ever choose to do this because its costly, inefficient, and risky.
## Why is +70% of the world doing it for the Internet?
## Why is +70% of the World Doing it for the Internet?
![](img/we_are_doing_it_for_internet.png)
@@ -33,4 +32,4 @@ Now think about the internet. Thats exactly what most of the world is doing!
---
Instead of relying on faraway systems, we should build local, decentralized internet infrastructure. Its safer, more affordable, and gives people more control over their digital lives.
Instead of relying on far away systems, we should build local, decentralized internet infrastructure. Its safer, more affordable, and gives people more control over their digital lives.

View File

@@ -36,8 +36,8 @@ Only 50% of world has decent access to Internet, let's recap the issues.
---
### **5. Not to forget less than 50% of world has decent internet.**
### **5. Less than 50% of world has decent internet**
![alt text](img/fortune.png)
And we should not forget the internet is only available to 50% of the world
Finally, we should not forget that the internet is only available to 50% of the world!

View File

@@ -15,7 +15,7 @@ The concept of "Internet GDP negative" in this context highlights the economic d
### 1. **Loss of Revenue from Booking Sites**
- Platforms like global booking and e-commerce websites often charge high commission fees, which results in local businesses losing a significant portion of their revenue.
- **Impact:** Instead of money circulating within the local economy, it is extracted and transferred to the countries where these platforms are headquartered.
- **For a small country like Zanzibar the impact of centralized booking sites means a loss of 200m USD per year**
- For a small country like Zanzibar **the impact of centralized booking sites means a loss of 200m USD per year**.
### 2. **Loss of Advertising and Marketing Dollars**
- Companies within countries purchase online advertisements primarily on platforms like Google, Facebook, and others. These platforms are headquartered in a handful of nations, meaning most of the advertising revenue flows out.

View File

@@ -1,9 +1,9 @@
---
title: 'Hardware Badly Used.'
title: 'Hardware Badly Used'
sidebar_position: 6
---
### The IT world fails to harness the full potential of computer hardware.
## The IT world fails to harness the full potential of computer hardware
![](img/hardware_comparison.png)
@@ -16,15 +16,13 @@ This highlights a regression in our ability to fully utilize computer hardware.
We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential. 
## Why are servers so badly used?
## Why Are Servers So Badly Used?
![](img/layers.png)
Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Here's a simplified explanation:
Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Below, we provide a simplified explanation.
---
### Why Context Switches Are a Problem:
## Why Context Switches Are a Problem
1. **What Are Context Switches?**
@@ -48,19 +46,21 @@ Context switches occur when a computer's processor shifts from executing one tas
- Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity.
### Simplified Analogy:
## Simplified Analogy
Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work.
### How did we get here:
## How Did We Get Here
![](img/eng_model_failing.png)
### Context Switching Details
## Context Switching Details
In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time.
### How It Works
Here's how a context switch typically works in Linux:
1. **Interrupt Handling**: When a higher-priority process needs to run or an event requiring immediate attention occurs (such as I/O completion), the CPU interrupts the currently running process.
@@ -73,6 +73,8 @@ Here's how a context switch typically works in Linux:
5. **Execution**: The newly loaded process begins executing on the CPU.
### Overhead and Performance Impact
Context switches are essential for multitasking, but they come with overhead that can impact system performance:
1. **Time Overhead**: Context switches require time to save and restore process states, as well as to perform scheduling decisions. This overhead adds up, especially in systems with many processes frequently switching contexts.

View File

@@ -1,9 +1,9 @@
---
title: 'More than cables'
title: 'More Than Cables'
sidebar_position: 2
---
# Internet is more than the cables.
# Internet is More Than the Cables
@@ -13,26 +13,26 @@ sidebar_position: 2
1. Compute, AI & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below).
2. Network: this is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and for most countries very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
2. Network: This is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and, for most countries, very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
3. Applications: Currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
We are providing a more optimized solution for the first 2 layers and allows everyone else to build on top.
## The role of Internet Cables.
## The Role of Internet Cables
Digital information mainly travels over large fiber backbone links as pictured here.
Digital information mainly travels over large fiber backbone links as pictured below.
![](img/internet_cables.png)
The Internet as we know it has significantly diverged from its original intent. If 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted and back again.
The Internet as we know it has significantly diverged from its original intent. For example, if two people in Zanzibar, an Island in Africa, use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted, and back again.
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
![](img/absurd.png)
## The role of datacenters.
## The Role of Datacenters
![](img/this_is_our_internet.png)

View File

@@ -18,7 +18,7 @@ Security is another area where TCP/IP falls short. It wasnt designed with cyb
Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but todays internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system.
Adding to the problem is the internets dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions could lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable.
Adding to the problem is the internets dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions can lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable.
> The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, well see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely.
@@ -27,15 +27,16 @@ To fix this, we need a smarter, more resilient approach. Decentralized networks
> The bottom line is clear: the internets outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isnt just a technical upgrade—its a necessity for our connected world.
## Tech brief (only for the experts)
## Tech Brief
The following tech brief is aimed at experts.
### 1. **Lack of Session Management**
- **TCP/IPs Shortcomings:**
- **TCP/IPs Shortcomings**
- TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually.
- This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices.
- **Why It Matters:**
- **Why It Matters**
- Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient.
@@ -43,58 +44,58 @@ To fix this, we need a smarter, more resilient approach. Decentralized networks
### 2. **Layer Violations**
- **The Problem:**
- **The Problem**
- TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example:
- Routing decisions happen at the IP layer.
- Reliable data transfer happens at the TCP layer.
- However, these layers are not isolated and often interfere with each other, creating unnecessary overhead.
- **Impact:**
- **Impact**
- Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle.
---
### 3. **No Built-In Security**
- **TCP/IP Design Flaw:**
- **TCP/IP Design Flaw**
- Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service.
- IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities.
- **Impact:**
- **Impact**
- Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections.
---
### 4. **Scalability Issues**
- **IPv4 vs. IPv6:**
- **IPv4 vs. IPv6**
- IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet.
- IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack.
- **Routing Problems:**
- **Routing Problems**
- The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale.
---
### 5. **No Support for Application-Centric Networking**
- **TCP/IPs Assumption:**
- **TCP/IPs Assumption**
- The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example:
- Cloud applications may move across data centers.
- Mobile devices frequently change networks.
- TCP/IPs static model is incompatible with this dynamic, service-oriented world.
- **Impact:**
- **Impact**
- Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but theyre still built on a flawed foundation.
---
### RINA: A Better Alternative
The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Heres how RINA addresses these issues:
The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Heres how RINA addresses these issues[^1]:
1. **Unified Layering:**
1. **Unified Layering**
- Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture.
2. **Built-In Session Management:**
2. **Built-In Session Management**
- RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions.
3. **Application-Centric Networking:**
@@ -106,11 +107,4 @@ The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the f
5. **Simplified Routing and Scaling:**
- RINA reduces the size and complexity of routing tables, making the network easier to scale and manage.
- **Source:**
- [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
---
### More info
more info [https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
[^1]: [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)

View File

@@ -9,17 +9,16 @@ sidebar_position: 7
Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure.
**Quick Fixes and Additions**
## Quick Fixes and Additions
- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue.
- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched.
## Painkiller Approach: Treating Symptoms, Not Causes
### Painkiller Approach: Treating Symptoms, Not Causes
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges.
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges:
- **Cyber Pandemic** The Cyber Pandemic is real, added these layers leads to weak security.
- **Cyber Pandemic** The Cyber Pandemic is real, and when added to these layers, it results in weakened security.
- **Increased Complexity:** Each new layer adds complexity, making the system harder to understand and maintain.
- **Higher Costs:** More layers often mean more resources, licenses, and management overhead, increasing operational costs.
- **Reduced Agility:** The more complex the stack, the harder it is to make changes or adapt to new requirements, reducing the systems overall agility.