Speaking at the Westminster eForum on Web 2.0 in London, the VP of legislative affairs with AT&T, Jim Cicconi, has claimed that without investment the Internet's current network architecture will be at full capacity by 2010. That's just 24 short months from now, and with the ever increasing volume of video and user-generated content that is constantly being uploaded it is hardly surprising.
VeriSign, are certainly not surprised, and have been arguing for some time that the Internet is full and we need to get off - or at least get on with increasing capability to cope with this increased capacity requirement. It has already announced an expansion to its Project Titan initiative designed to strengthen, protect and make structural upgrades to the Internet's infrastructure and increase its internet infrastructure ten fold by 2010.
Among the upgrades announced are:
- Adding additional network operations centers in the eastern United States and Northern Europe to manage and provide increased redundancy for Internet traffic. These sites expand VeriSign's data center capacity and diversify its locations to improve Internet traffic management and counter region-specific cyber attacks and threats.
- Increasing its daily Domain Name System (DNS) query capacity from 400 billion queries a day to more than 4 trillion queries a day and scaling its proprietary constellation of resolution systems to increase their bandwidth from over 20 gigabits per second (Gbps) to greater than 200 Gbps.
- Distributing its infrastructure to more than 100 locations around the globe to provide redundancy and reduced latency that improves the experience for users by reducing bottlenecks and increasing speed.
"VeriSign is working to stay ahead of the constantly changing demands on its Internet infrastructure and threats to its security," said Ken Silva, chief technology officer at VeriSign. "The first stage of Project Titan was focused on the speed of the Internet and range of our infrastructure. This next stage will focus on ensuring that the level of security exceeds demands, such as new attacks coming from wireless devices, to keep the infrastructure stable and operational."