{"id":96,"date":"2018-06-14T19:04:54","date_gmt":"2018-06-14T19:04:54","guid":{"rendered":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch12-3\/"},"modified":"2026-02-03T15:37:15","modified_gmt":"2026-02-03T15:37:15","slug":"ch12-3","status":"publish","type":"chapter","link":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch12-3\/","title":{"raw":"12.3 Getting Where You\u2019re Going","rendered":"12.3 Getting Where You\u2019re Going"},"content":{"raw":"<div id=\"slug-12-3-getting-where-youre-going\" class=\"chapter standard\">\r\n<div class=\"ugc chapter-ugc\">\r\n<div id=\"fwk-38086-ch14_s03_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p id=\"fwk-38086-ch14_s03_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\r\n\r\n<ol id=\"fwk-38086-ch14_s03_l01\" class=\"orderedlist\">\r\n \t<li>Understand the layers that make up the Internet\u2014application protocol, transmission control protocol, and Internet protocol\u2014and describe why each is important.<\/li>\r\n \t<li>Discuss the benefits of Internet architecture in general and TCP\/IP in particular.<\/li>\r\n \t<li>Name applications that should use TCP and others that might use UDP.<\/li>\r\n \t<li>Understand what a router does and the role these devices play in networking.<\/li>\r\n \t<li>Conduct a traceroute and discuss the output, demonstrating how Internet interconnections work in getting messages from point to point.<\/li>\r\n \t<li>Understand why mastery of Internet infrastructure is critical to modern finance and be able to discuss the risks in automated trading systems.<\/li>\r\n \t<li>Describe VoIP, and contrast circuit versus packet switching, along with organizational benefits and limitations of each.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">TCP\/IP: The Internet\u2019s Secret Sauce<\/h2>\r\n<p id=\"fwk-38086-ch14_s03_s01_p01\" class=\"nonindent para editable block\">OK, we know how to read a Web address, we know that every device connected to the Net needs an IP address, and we know that the DNS can look at a Web address and find the IP address of the machine that you want to communicate with. But how does a Web page, an e-mail, or an iTunes download actually get from a remote computer to your desktop?<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p02\" class=\"indent para editable block\">For our next part of the Internet journey, we\u2019ll learn about two additional protocols: TCP and IP. These protocols are often written as TCP\/IP and pronounced by reading all five letters in a row, \u201cT-C-P-I-P\u201d (sometimes they\u2019re also referred to as the <em class=\"emphasis\">Internet protocol suite<\/em>). TCP and IP are built into any device that a user would use to connect to the Internet\u2014from handhelds to desktops to supercomputers\u2014and together TCP\/IP make Internet working happen.<\/p>\r\n\r\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\r\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 12.4<\/span> TCP\/IP in Action<\/p>\r\n<p class=\"indent\"><a>\r\n<img style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/a94f3a2d06359b631873e868252ce6f5.jpg\" alt=\"In this example, a server on the left sends a Web page to the user on the right. The application (the Web server) passes the contents of the page to TCP (which is built into the server\u2019s operating system). TCP slices the Web page into packets. Then IP takes over, forwarding packets from router to router across the Internet until it arrives at the user\u2019s PC. Packets sometimes take different routes, and occasionally arrive out of order. TCP running on the receiving system on the right checks that all packets have arrived, requests that damaged or lost packets be resent, puts them in the right order, and sends a perfect, exact copy of the Web page to your browser.\" \/>\r\n<\/a><\/p>\r\n<p class=\"indent para\">In this example, a server on the left sends a Web page to the user on the right. The application (the Web server) passes the contents of the page to TCP (which is built into the server\u2019s operating system). TCP slices the Web page into packets. Then IP takes over, forwarding packets from router to router across the Internet until it arrives at the user\u2019s PC. Packets sometimes take different routes, and occasionally arrive out of order. TCP running on the receiving system on the right checks that all packets have arrived, requests that damaged or lost packets be resent, puts them in the right order, and sends a perfect, exact copy of the Web page to your browser.<\/p>\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch14_s03_s01_p03\" class=\"indent para editable block\">TCP and IP operate below http and the other application transfer protocols mentioned earlier. <span class=\"margin_term\"><a class=\"glossterm\">TCP (transmission control protocol)<\/a><\/span> works its magic at the start and endpoint of the trip\u2014on both your computer and on the destination computer you\u2019re communicating with. Let\u2019s say a Web server wants to send you a large Web page. The Web server application hands the Web page it wants to send to its own version of TCP. TCP then slices up the Web page into smaller chunks of data called <span class=\"margin_term\"><a class=\"glossterm\">packets (or datagrams)<\/a><\/span>. The packets are like little envelopes containing part of the entire transmission\u2014they\u2019re labeled with a destination address (where it\u2019s going) and a source address (where it came from). Now we\u2019ll leave TCP for a second, because TCP on the Web server then hands those packets off to the second half of our dynamic duo, IP.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p04\" class=\"indent para editable block\">It\u2019s the job of <span class=\"margin_term\"><a class=\"glossterm\">IP (Internet protocol)<\/a><\/span> to route the packets to their final destination, and those packets might have to travel over several networks to get to where they\u2019re going. The relay work is done via special computers called <span class=\"margin_term\"><a class=\"glossterm\">routers<\/a><\/span>, and these routers speak to each other and to other computers using IP (since routers are connected to the Internet, they have IP addresses, too. Some are even named). Every computer on the Internet is connected to a router, and all routers are connected to at least one (and usually more than one) other router, linking up the networks that make up the Internet.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p05\" class=\"indent para editable block\">Routers don\u2019t have perfect, end-to-end information on all points in the Internet, but they do talk to each other all the time, so a router has a pretty good idea of where to send a packet to get it closer to where it needs to end up. This chatter between the routers also keeps the Internet decentralized and fault-tolerant. Even if one path out of a router goes down (a networking cable gets cut, a router breaks, the power to a router goes out), as long as there\u2019s another connection out of that router, then your packet will get forwarded. Networks fail, so good, fault-tolerant network design involves having alternate paths into and out of a network.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p06\" class=\"indent para editable block\">Once packets are received by the destination computer (your computer in our example), that machine\u2019s version of TCP kicks in. TCP checks that it has all the packets, makes sure that no packets were damaged or corrupted, requests replacement packets (if needed), and then puts the packets in the correct order, passing a perfect copy of your transmission to the program you\u2019re communicating with (an e-mail server, Web server, etc.).<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p07\" class=\"indent para editable block\">This progression\u2014application at the source to TCP at the source (slice up the data being sent), to IP (for forwarding among routers), to TCP at the destination (put the transmission back together and make sure it\u2019s perfect), to application at the destination\u2014takes place in both directions, starting at the server for messages coming to you, and starting on your computer when you\u2019re sending messages to another computer.<\/p>\r\n\r\n<div id=\"fwk-38086-ch14_s03_s01_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">UDP: TCP\u2019s Faster, Less Reliable Sibling<\/h4>\r\n<p id=\"fwk-38086-ch14_s03_s01_p08\" class=\"nonindent para\">TCP is a perfectionist and that\u2019s what you want for Web transmissions, e-mail, and application downloads. But sometimes we\u2019re willing to sacrifice perfection for speed. You\u2019d make this sacrifice for streaming media applications like Windows Media Player, Real Player, Internet voice chat, and video conferencing. Having to wait to make sure each packet is perfectly sent would otherwise lead to awkward pauses that interrupt real-time listening. It\u2019d be better to just grab the packets as they come and play them, even if they have minor errors. Packets are small enough that if one packet doesn\u2019t arrive, you can ignore it and move on to the next without too much quality disruption. A protocol called <span class=\"margin_term\"><a class=\"glossterm\">UDP (user datagram protocol)<\/a><\/span> does exactly this, working as a TCP stand-in when you\u2019ve got the need for speed, and are willing to sacrifice quality. If you\u2019ve ever watched a Web video or had a Web-based phone call and the quality got sketchy, it\u2019s probably because there were packet problems, but UDP kept on chugging, making the \u201cget it fast\u201d instead of \u201cget it perfect\u201d trade-off.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_n02\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">VoIP: When Phone Calls Are Just Another Internet Application<\/h4>\r\n<p id=\"fwk-38086-ch14_s03_s01_p09\" class=\"nonindent para\">The increasing speed and reliability of the Internet means that applications such as Internet phone calls (referred to as <em class=\"emphasis\">VoIP<\/em>, or <span class=\"margin_term\"><a class=\"glossterm\">voice over Internet protocol<\/a><\/span>) are becoming more reliable. That doesn\u2019t just mean that Skype becomes a more viable alternative for consumer landline and mobile phone calls; it\u2019s also good news for many businesses, governments, and nonprofits.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p10\" class=\"indent para\">Many large organizations maintain two networks\u2014one for data and another for <em class=\"emphasis\">POTS<\/em> (plain old telephone service). Maintaining two networks is expensive, and while conventional phone calls are usually of a higher quality than their Internet counterparts, POTS equipment is also inefficient. Old phone systems use a technology called <em class=\"emphasis\">circuit switching<\/em>. A \u201ccircuit\u201d is a dedicated connection between two entities. When you have a POTS phone call, a circuit is open, dedicating a specific amount of capacity between you and the party on the other end. You\u2019re using that \u201ccircuit\u201d regardless of whether you\u2019re talking. Pause between words or put someone on hold, and the circuit is still in use. Anyone who has ever tried to make a phone call at a busy time (say, early morning on Mother\u2019s Day or at midnight on New Year\u2019s Eve) and received an \u201call circuits are busy\u201d recording has experienced congestion on an inefficient circuit-switched phone network.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p11\" class=\"indent para\">But unlike circuit-switched counterparts, Internet networks are packet-switched networks, which can be more efficient. Since we can slice conversations up into packets, we can squeeze them into smaller spaces. If there are pauses in a conversation or someone\u2019s on hold, applications don\u2019t hold up the network. And that creates an opportunity to use the network\u2019s available capacity for other users. The trade-off is one that swaps circuit switching\u2019s quality of service (QoS) with packet switching\u2019s efficiency and cost savings. Try to have a VoIP call when there\u2019s too much traffic on a portion of the network and your call quality will drop. But packet switching quality is getting much better. Networking standards are now offering special features, such as \u201cpacket prioritization,\u201d that can allow voice packets to gain delivery priority over packets for applications like e-mail, where a slight delay is OK.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_p12\" class=\"indent para\">When voice is digitized, \u201ctelephone service\u201d simply becomes another application that sits on top of the Internet, like the Web, e-mail, or FTP. VoIP calls between remote offices can save long distance charges. And when the phone system becomes a computer application, you can do a lot more. Well-implemented VoIP systems allow users\u2019 browsers access to their voice mail inbox, one-click video conferencing and call forwarding, point-and-click conference call setup, and other features, but you\u2019ll still have a phone number, just like with POTS.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">What Connects the Routers and Computers?<\/h2>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p01\" class=\"nonindent para editable block\">Routers are connected together, either via cables or wirelessly. A cable connecting a computer in a home or office is probably copper (likely what\u2019s usually called an Ethernet cable), with transmissions sent through the copper via electricity. Long-haul cables, those that carry lots of data over long distances, are usually fiber-optic lines\u2014glass lined cables that transmit light (light is faster and travels farther distances than electricity, but fiber-optic networking equipment is more expensive than the copper-electricity kind). Wireless transmission can happen via Wi-Fi (for shorter distances), or cell phone tower or satellite over longer distances. But the beauty of the Internet protocol suite (TCP\/IP) is that it doesn\u2019t matter what the actual transmission media are. As long as your routing equipment can connect any two networks, and as long as that equipment \u201cspeaks\u201d IP, then you can be part of the Internet.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p02\" class=\"indent para editable block\">In reality, your messages likely transfer via lots of different transmission media to get to their final destination. If you use a laptop connected via Wi-Fi, then that wireless connection finds a base station, usually within about three hundred feet. That base station is probably connected to a local area network (LAN) via a copper cable. And your firm or college may connect to fast, long-haul portions of the Internet via fiber-optic cables provided by that firm\u2019s Internet service provider (ISP).<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p03\" class=\"indent para editable block\">Most big organizations have multiple ISPs for redundancy, providing multiple paths in and out of a network. This is so that if a network connection provided by one firm goes down, say an errant backhoe cuts a cable, other connections can route around the problem (see <a class=\"xref\" href=\"#fwk-38086-ch14_s02_f01\">Figure 12.1<\/a>).<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p04\" class=\"indent para editable block\">In the United States (and in most deregulated telecommunications markets), Internet service providers come in all sizes, from smaller regional players to sprawling international firms. When different ISPs connect their networking equipment together to share traffic, it\u2019s called <span class=\"margin_term\"><a class=\"glossterm\">peering<\/a><\/span>. Peering usually takes place at neutral sites called <em class=\"emphasis\">Internet exchange points<\/em> (IXPs), although some firms also have private peering points. Carriers usually don\u2019t charge one another for peering. Instead, \u201cthe money is made\u201d in the ISP business by charging the end-points in a network\u2014the customer organizations and end users that an ISP connects to the Internet. Competition among carriers helps keep prices down, quality high, and innovation moving forward.<\/p>\r\n\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">Finance Has a Need for Speed<\/h4>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p05\" class=\"nonindent para\">When many folks think of Wall Street trading, they think of the open outcry pit at the New York Stock Exchange (NYSE). But human traders are just too slow for many of the most active trading firms. Over half of all U.S. stock trades and a quarter of worldwide currency trades now happen via programs that make trading decisions without any human intervention (Timmons, 2006). There are many names for this automated, data-driven frontier of finance\u2014algorithmic trading, black-box trading, or high-frequency trading. And while firms specializing in automated, high-frequency trading represent only about 2 percent of the trading firms operating in the United States, they account for about three quarters of all U.S. equity trading volume (Iati, 2009).<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p06\" class=\"indent para\">Programmers lie at the heart of modern finance. \u201cA geek who writes code\u2014those guys are now the valuable guys\u201d says the former head of markets systems at Fidelity Investments, and that rare breed of top programmer can make \u201ctens of millions of dollars\u201d developing these systems (Berenson, 2009). Such systems leverage data mining and other model-building techniques to crunch massive volumes of data and discover exploitable market patterns. Models are then run against real-time data and executed the instant a trading opportunity is detected. (For more details on how data is gathered and models are built, see <a class=\"xref\" href=\"part-011-chapter-11-the-data-asset-databases-business-intelligence-and-competitive-advantage.html\">Chapter 11 \u201cThe Data Asset: Databases, Business Intelligence, and Competitive Advantage\u201d<\/a>.)<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p07\" class=\"indent para\">Winning with these systems means being quick\u2014very quick. Suffer delay (what techies call <em class=\"emphasis\">latency<\/em>) and you may have missed your opportunity to pounce on a signal or market imperfection. To cut latency, many trading firms are moving their servers out of their own data centers and into <em class=\"emphasis\">colocation facilities<\/em>. These facilities act as storage places where a firm\u2019s servers get superfast connections as close to the action as possible. And by renting space in a \u201c<em class=\"emphasis\">colo<\/em>,\u201d a firm gets someone else to manage the electrical and cooling issues, often providing more robust power backup and lower energy costs than a firm might get on its own.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p08\" class=\"indent para\">Equinix, a major publicly traded IXP and colocation firm with facilities worldwide, has added a growing number of high-frequency trading firms to a roster of customers that includes e-commerce, Internet, software, and telecom companies. In northern New Jersey alone (the location of many of the servers where \u201cWall Street\u201d trading takes place), Equinix hosts some eighteen exchanges and trading platforms as well as the NYSE Secure Financial Transaction Infrastructure (SFTI) access node.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p09\" class=\"indent para\">Less than a decade ago, eighty milliseconds was acceptably low latency, but now trading firms are pushing below one millisecond into microseconds (Schmerken, 2009). So it\u2019s pretty clear that understanding how the Internet works, and how to best exploit it, is of fundamental and strategic importance to those in finance. But also recognize that this kind of automated trading comes with risks. Systems that run on their own can move many billions in the blink of an eye, and the actions of one system may cascade, triggering actions by others.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p10\" class=\"indent para\">The spring 2010 \u201cFlash Crash\u201d resulted in a nearly 1,000-point freefall in the Dow Jones Industrial Index, it\u2019s biggest intraday drop ever. Those black boxes can be mysterious\u2014weeks after the May 6th event, experts were still parsing through trading records, trying to unearth how the flash crash happened (Daimler &amp; Davis, 2010). Regulators and lawmakers recognize they now need to understand technology, telecommunications, and its broader impact on society so that they can create platforms that fuel growth without putting the economy at risk.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_n02\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">Watching the Packet Path via Traceroute<\/h4>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p11\" class=\"nonindent para\">Want to see how packets bounce from router to router as they travel around the Internet? Check out a tool called <em class=\"emphasis\">traceroute<\/em>. Traceroute repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p12\" class=\"indent para\">Traceroute is built into all major desktop operating systems (Windows, Macs, Linux), and several Web sites will run traceroute between locations (traceroute.org and visualroute.visualware.com are great places to explore).<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p13\" class=\"indent para\">The message below shows a traceroute performed between Irish firm VistaTEC and Boston College. At first, it looks like a bunch of gibberish, but if we look closely, we can decipher what\u2019s going on.<\/p>\r\n\r\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_f01\" class=\"figure large\">\r\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 12.5<\/span><\/p>\r\n<p class=\"indent\"><a>\r\n<img style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2026\/01\/451b67eb372b58387eba43d819d514b7.jpg\" alt=\"a table of\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p14\" class=\"indent para\">The table above shows ten hops, starting at a domain in vistatec.ie and ending in 136.167.9.226 (the table doesn\u2019t say this, but all IP addresses starting with 136.167 are Boston College addresses). The three groups of numbers at the end of three lines shows the time (in milliseconds) of three packets sent out to test that hop of our journey. These numbers might be interesting for network administrators trying to diagnose speed issues, but we\u2019ll ignore them and focus on how packets get from point to point.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p15\" class=\"indent para\">At the start of each line is the name of the computer or router that is relaying packets for that leg of the journey. Sometimes routers are named, and sometimes they\u2019re just IP addresses. When routers are named, we can tell what network a packet is on by looking at the domain name. By looking at the router names to the left of each line in the traceroute above, we see that the first two hops are within the vistatec.ie network. Hop 3 shows the first router outside the vistatec.ie network. It\u2019s at a domain named tinet.net, so this must be the name of VistaTEC\u2019s Internet service provider since it\u2019s the first connection outside the vistatec.ie network.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p16\" class=\"indent para\">Sometimes routers names suggest their locations (oftentimes they use the same three character abbreviations you\u2019d see in airports). Look closely at the hosts in hops 3 through 7. The subdomains dub20, lon11, lon01, jfk02, and bos01 suggest the packets are going from Dublin, then east to London, then west to New York City (John F. Kennedy International Airport), then north to Boston. That\u2019s a long way to travel in a fraction of a second!<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p17\" class=\"indent para\">Hop 4 is at tinet.net, but hop 5 is at cogentco.com (look them up online and you\u2019ll find out that cogentco.com, like tinet.net, is also an ISP). That suggests that between those hops peering is taking place and traffic is handed off from carrier to carrier.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p18\" class=\"indent para\">Hop 8 is still cogentco.com, but it\u2019s not clear who the unnamed router in hop 9, 38.104.218.10, belongs to. We can use the Internet to sleuth that out, too. Search the Internet for the phrase \u201cIP address lookup\u201d and you\u2019ll find a bunch of tools to track down the organization that \u201cowns\u201d an IP address. Using the tool at whatismyip.com, I found that this number is registered to PSI Net, which is now part of cogentco.com.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p19\" class=\"indent para\">Routing paths, ISPs, and peering all revealed via traceroute. You\u2019ve just performed a sort of network \u201cCAT scan\u201d and looked into the veins and arteries that make up a portion of the Internet. Pretty cool!<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p20\" class=\"indent para\">If you try out traceroute on your own, be aware that not all routers and networks are traceroute friendly. It\u2019s possible that as your trace hits some hops along the way (particularly at the start or end of your journey), three \u201c*\u201d characters will show up at the end of each line instead of the numbers indicating packet speed. This indicates that traceroute has timed out on that hop. Some networks block traceroute because hackers have used the tool to probe a network to figure out how to attack an organization. Most of the time, though, the hops between the source and destination of the traceroute (the steps involving all the ISPs and their routers) are visible.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p21\" class=\"indent para\">Traceroute can be a neat way to explore how the Internet works and reinforce the topics we\u2019ve just learned. Search for traceroute tools online or browse the Internet for details on how to use the traceroute command built into your computer.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_n03\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">There\u2019s Another Internet?<\/h4>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p22\" class=\"nonindent para\">If you\u2019re a student at a large research university, there\u2019s a good chance that your school is part of Internet2. Internet2 is a research network created by a consortium of research, academic, industry, and government firms. These organizations have collectively set up a high-performance network running at speeds of up to one hundred gigabits per second to support and experiment with demanding applications. Examples include high-quality video conferencing; high-reliability, high-bandwidth imaging for the medical field; and applications that share huge data sets among researchers.<\/p>\r\n<p id=\"fwk-38086-ch14_s03_s01_s01_p23\" class=\"indent para\">If your university is an Internet2 member and you\u2019re communicating with another computer that\u2019s part of the Internet2 consortium, then your organization\u2019s routers are smart enough to route traffic through the superfast Internet2 backbone. If that\u2019s the case, you\u2019re likely already using Internet2 without even knowing it!<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_n04\" class=\"bcc-box bcc-success\">\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul id=\"fwk-38086-ch14_s03_s01_s01_l01\" class=\"itemizedlist\">\r\n \t<li>TCP\/IP, or the Internet protocol suite, helps get perfect copies of Internet transmissions from one location to another. TCP works on the ends of transmission, breaking up transmissions up into manageable packets at the start and putting them back together while checking quality at the end. IP works in the middle, routing packets to their destination.<\/li>\r\n \t<li>Routers are special computing devices that forward packets from one location to the next. Routers are typically connected with more than one outbound path, so in case one path becomes unavailable, an alternate path can be used.<\/li>\r\n \t<li>UDP is a replacement for TCP, used when it makes sense to sacrifice packet quality for delivery speed. It\u2019s often used for media streaming.<\/li>\r\n \t<li>TCP\/IP doesn\u2019t care about the transition media. This allows networks of different types\u2014copper, fiber, and wireless\u2014to connect to and participate in the Internet.<\/li>\r\n \t<li>The ability to swap in new applications, protocols, and media files gives the network tremendous flexibility.<\/li>\r\n \t<li>Decentralization, fault tolerance, and redundancy help keep the network open and reliable.<\/li>\r\n \t<li>VoIP allows voice and phone systems to become an application traveling over the Internet. This is allowing many firms to save money on phone calls and through the elimination of old, inefficient circuit-switched networks. As Internet applications, VoIP phone systems can also have additional features that circuit-switched networks lack. The primary limitation of many VoIP systems is quality of service.<\/li>\r\n \t<li>Many firms in the finance industry have developed automated trading models that analyze data and execute trades without human intervention. Speeds substantially less than one second may be vital to capitalizing on market opportunities, so firms are increasingly moving equipment into collocation facilities that provide high-speed connectivity to other trading systems.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch14_s03_s01_s01_n05\" class=\"bcc-box bcc-info\">\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol id=\"fwk-38086-ch14_s03_s01_s01_l02\" class=\"orderedlist\">\r\n \t<li>How can the Internet consist of networks of such physically different transmission media\u2014cable, fiber, and wireless?<\/li>\r\n \t<li>What is the difference between TCP and UDP? Why would you use one over the other?<\/li>\r\n \t<li>Would you recommend a VoIP phone system to your firm or University? Why or why not? What are the advantages? What are the disadvantages? Can you think of possible concerns or benefits not mentioned in this section? Research these concerns online and share your finding with your instructor.<\/li>\r\n \t<li>What are the risks in the kinds of automated trading systems described in this section? Conduct research and find an example of where these systems have caused problems for firms and\/or the broader market. What can be done to prevent such problems? Whose responsibility is this?<\/li>\r\n \t<li>Search the Internet for a traceroute tool, or look online to figure out how to use the traceroute command built into your PC. Run three or more traceroutes to different firms at different locations around the world. List the number of ISPs that show up in the trace. Circle the areas where peering occurs. Do some of the \u201chops\u201d time out with \u201c*\u201d values returned? If so, why do you think that happened?<\/li>\r\n \t<li>Find out if your school or employer is an Internet2 member. If it is, run traceroutes to schools that are and are not members of Internet2. What differences do you see in the results?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h2>References<\/h2>\r\n<p class=\"nonindent\">Berenson, A., \u201cArrest Over Software Illuminates Wall St. Secret,\u201d <em class=\"emphasis\">New York Times<\/em>, August 23, 2009.<\/p>\r\n<p class=\"indent\">Daimler E. and G. Davis, \u201c\u2018Flash Crash\u2019 Proves Diversity Needed in Market Mechanisms,\u201d <em class=\"emphasis\">Pittsburgh Post-Gazette<\/em>, May 29, 2010.<\/p>\r\n<p class=\"indent\">Iati, R., \u201cThe Real Story of Trading Software Espionage,\u201d <em class=\"emphasis\">Advanced Trading<\/em>, July 10, 2009.<\/p>\r\n<p class=\"indent\">Schmerken, I.,\u201cHigh-Frequency Trading Shops Play the Colocation Game,\u201d <em class=\"emphasis\">Advanced Trading<\/em>, October 5, 2009.<\/p>\r\n<p class=\"indent\">Timmons, H., \u201cA London Hedge Fund that Opts for Engineers, Not M.B.A.\u2019s,\u201d <em class=\"emphasis\">New York Times<\/em>, August 18, 2006.<\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<div id=\"slug-12-3-getting-where-youre-going\" class=\"chapter standard\">\n<div class=\"ugc chapter-ugc\">\n<div id=\"fwk-38086-ch14_s03_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p id=\"fwk-38086-ch14_s03_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\n<ol id=\"fwk-38086-ch14_s03_l01\" class=\"orderedlist\">\n<li>Understand the layers that make up the Internet\u2014application protocol, transmission control protocol, and Internet protocol\u2014and describe why each is important.<\/li>\n<li>Discuss the benefits of Internet architecture in general and TCP\/IP in particular.<\/li>\n<li>Name applications that should use TCP and others that might use UDP.<\/li>\n<li>Understand what a router does and the role these devices play in networking.<\/li>\n<li>Conduct a traceroute and discuss the output, demonstrating how Internet interconnections work in getting messages from point to point.<\/li>\n<li>Understand why mastery of Internet infrastructure is critical to modern finance and be able to discuss the risks in automated trading systems.<\/li>\n<li>Describe VoIP, and contrast circuit versus packet switching, along with organizational benefits and limitations of each.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">TCP\/IP: The Internet\u2019s Secret Sauce<\/h2>\n<p id=\"fwk-38086-ch14_s03_s01_p01\" class=\"nonindent para editable block\">OK, we know how to read a Web address, we know that every device connected to the Net needs an IP address, and we know that the DNS can look at a Web address and find the IP address of the machine that you want to communicate with. But how does a Web page, an e-mail, or an iTunes download actually get from a remote computer to your desktop?<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p02\" class=\"indent para editable block\">For our next part of the Internet journey, we\u2019ll learn about two additional protocols: TCP and IP. These protocols are often written as TCP\/IP and pronounced by reading all five letters in a row, \u201cT-C-P-I-P\u201d (sometimes they\u2019re also referred to as the <em class=\"emphasis\">Internet protocol suite<\/em>). TCP and IP are built into any device that a user would use to connect to the Internet\u2014from handhelds to desktops to supercomputers\u2014and together TCP\/IP make Internet working happen.<\/p>\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 12.4<\/span> TCP\/IP in Action<\/p>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/a94f3a2d06359b631873e868252ce6f5.jpg\" alt=\"In this example, a server on the left sends a Web page to the user on the right. The application (the Web server) passes the contents of the page to TCP (which is built into the server\u2019s operating system). TCP slices the Web page into packets. Then IP takes over, forwarding packets from router to router across the Internet until it arrives at the user\u2019s PC. Packets sometimes take different routes, and occasionally arrive out of order. TCP running on the receiving system on the right checks that all packets have arrived, requests that damaged or lost packets be resent, puts them in the right order, and sends a perfect, exact copy of the Web page to your browser.\" \/><br \/>\n<\/a><\/p>\n<p class=\"indent para\">In this example, a server on the left sends a Web page to the user on the right. The application (the Web server) passes the contents of the page to TCP (which is built into the server\u2019s operating system). TCP slices the Web page into packets. Then IP takes over, forwarding packets from router to router across the Internet until it arrives at the user\u2019s PC. Packets sometimes take different routes, and occasionally arrive out of order. TCP running on the receiving system on the right checks that all packets have arrived, requests that damaged or lost packets be resent, puts them in the right order, and sends a perfect, exact copy of the Web page to your browser.<\/p>\n<\/div>\n<p id=\"fwk-38086-ch14_s03_s01_p03\" class=\"indent para editable block\">TCP and IP operate below http and the other application transfer protocols mentioned earlier. <span class=\"margin_term\"><a class=\"glossterm\">TCP (transmission control protocol)<\/a><\/span> works its magic at the start and endpoint of the trip\u2014on both your computer and on the destination computer you\u2019re communicating with. Let\u2019s say a Web server wants to send you a large Web page. The Web server application hands the Web page it wants to send to its own version of TCP. TCP then slices up the Web page into smaller chunks of data called <span class=\"margin_term\"><a class=\"glossterm\">packets (or datagrams)<\/a><\/span>. The packets are like little envelopes containing part of the entire transmission\u2014they\u2019re labeled with a destination address (where it\u2019s going) and a source address (where it came from). Now we\u2019ll leave TCP for a second, because TCP on the Web server then hands those packets off to the second half of our dynamic duo, IP.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p04\" class=\"indent para editable block\">It\u2019s the job of <span class=\"margin_term\"><a class=\"glossterm\">IP (Internet protocol)<\/a><\/span> to route the packets to their final destination, and those packets might have to travel over several networks to get to where they\u2019re going. The relay work is done via special computers called <span class=\"margin_term\"><a class=\"glossterm\">routers<\/a><\/span>, and these routers speak to each other and to other computers using IP (since routers are connected to the Internet, they have IP addresses, too. Some are even named). Every computer on the Internet is connected to a router, and all routers are connected to at least one (and usually more than one) other router, linking up the networks that make up the Internet.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p05\" class=\"indent para editable block\">Routers don\u2019t have perfect, end-to-end information on all points in the Internet, but they do talk to each other all the time, so a router has a pretty good idea of where to send a packet to get it closer to where it needs to end up. This chatter between the routers also keeps the Internet decentralized and fault-tolerant. Even if one path out of a router goes down (a networking cable gets cut, a router breaks, the power to a router goes out), as long as there\u2019s another connection out of that router, then your packet will get forwarded. Networks fail, so good, fault-tolerant network design involves having alternate paths into and out of a network.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p06\" class=\"indent para editable block\">Once packets are received by the destination computer (your computer in our example), that machine\u2019s version of TCP kicks in. TCP checks that it has all the packets, makes sure that no packets were damaged or corrupted, requests replacement packets (if needed), and then puts the packets in the correct order, passing a perfect copy of your transmission to the program you\u2019re communicating with (an e-mail server, Web server, etc.).<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p07\" class=\"indent para editable block\">This progression\u2014application at the source to TCP at the source (slice up the data being sent), to IP (for forwarding among routers), to TCP at the destination (put the transmission back together and make sure it\u2019s perfect), to application at the destination\u2014takes place in both directions, starting at the server for messages coming to you, and starting on your computer when you\u2019re sending messages to another computer.<\/p>\n<div id=\"fwk-38086-ch14_s03_s01_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">UDP: TCP\u2019s Faster, Less Reliable Sibling<\/h4>\n<p id=\"fwk-38086-ch14_s03_s01_p08\" class=\"nonindent para\">TCP is a perfectionist and that\u2019s what you want for Web transmissions, e-mail, and application downloads. But sometimes we\u2019re willing to sacrifice perfection for speed. You\u2019d make this sacrifice for streaming media applications like Windows Media Player, Real Player, Internet voice chat, and video conferencing. Having to wait to make sure each packet is perfectly sent would otherwise lead to awkward pauses that interrupt real-time listening. It\u2019d be better to just grab the packets as they come and play them, even if they have minor errors. Packets are small enough that if one packet doesn\u2019t arrive, you can ignore it and move on to the next without too much quality disruption. A protocol called <span class=\"margin_term\"><a class=\"glossterm\">UDP (user datagram protocol)<\/a><\/span> does exactly this, working as a TCP stand-in when you\u2019ve got the need for speed, and are willing to sacrifice quality. If you\u2019ve ever watched a Web video or had a Web-based phone call and the quality got sketchy, it\u2019s probably because there were packet problems, but UDP kept on chugging, making the \u201cget it fast\u201d instead of \u201cget it perfect\u201d trade-off.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_n02\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">VoIP: When Phone Calls Are Just Another Internet Application<\/h4>\n<p id=\"fwk-38086-ch14_s03_s01_p09\" class=\"nonindent para\">The increasing speed and reliability of the Internet means that applications such as Internet phone calls (referred to as <em class=\"emphasis\">VoIP<\/em>, or <span class=\"margin_term\"><a class=\"glossterm\">voice over Internet protocol<\/a><\/span>) are becoming more reliable. That doesn\u2019t just mean that Skype becomes a more viable alternative for consumer landline and mobile phone calls; it\u2019s also good news for many businesses, governments, and nonprofits.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p10\" class=\"indent para\">Many large organizations maintain two networks\u2014one for data and another for <em class=\"emphasis\">POTS<\/em> (plain old telephone service). Maintaining two networks is expensive, and while conventional phone calls are usually of a higher quality than their Internet counterparts, POTS equipment is also inefficient. Old phone systems use a technology called <em class=\"emphasis\">circuit switching<\/em>. A \u201ccircuit\u201d is a dedicated connection between two entities. When you have a POTS phone call, a circuit is open, dedicating a specific amount of capacity between you and the party on the other end. You\u2019re using that \u201ccircuit\u201d regardless of whether you\u2019re talking. Pause between words or put someone on hold, and the circuit is still in use. Anyone who has ever tried to make a phone call at a busy time (say, early morning on Mother\u2019s Day or at midnight on New Year\u2019s Eve) and received an \u201call circuits are busy\u201d recording has experienced congestion on an inefficient circuit-switched phone network.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p11\" class=\"indent para\">But unlike circuit-switched counterparts, Internet networks are packet-switched networks, which can be more efficient. Since we can slice conversations up into packets, we can squeeze them into smaller spaces. If there are pauses in a conversation or someone\u2019s on hold, applications don\u2019t hold up the network. And that creates an opportunity to use the network\u2019s available capacity for other users. The trade-off is one that swaps circuit switching\u2019s quality of service (QoS) with packet switching\u2019s efficiency and cost savings. Try to have a VoIP call when there\u2019s too much traffic on a portion of the network and your call quality will drop. But packet switching quality is getting much better. Networking standards are now offering special features, such as \u201cpacket prioritization,\u201d that can allow voice packets to gain delivery priority over packets for applications like e-mail, where a slight delay is OK.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_p12\" class=\"indent para\">When voice is digitized, \u201ctelephone service\u201d simply becomes another application that sits on top of the Internet, like the Web, e-mail, or FTP. VoIP calls between remote offices can save long distance charges. And when the phone system becomes a computer application, you can do a lot more. Well-implemented VoIP systems allow users\u2019 browsers access to their voice mail inbox, one-click video conferencing and call forwarding, point-and-click conference call setup, and other features, but you\u2019ll still have a phone number, just like with POTS.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">What Connects the Routers and Computers?<\/h2>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p01\" class=\"nonindent para editable block\">Routers are connected together, either via cables or wirelessly. A cable connecting a computer in a home or office is probably copper (likely what\u2019s usually called an Ethernet cable), with transmissions sent through the copper via electricity. Long-haul cables, those that carry lots of data over long distances, are usually fiber-optic lines\u2014glass lined cables that transmit light (light is faster and travels farther distances than electricity, but fiber-optic networking equipment is more expensive than the copper-electricity kind). Wireless transmission can happen via Wi-Fi (for shorter distances), or cell phone tower or satellite over longer distances. But the beauty of the Internet protocol suite (TCP\/IP) is that it doesn\u2019t matter what the actual transmission media are. As long as your routing equipment can connect any two networks, and as long as that equipment \u201cspeaks\u201d IP, then you can be part of the Internet.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p02\" class=\"indent para editable block\">In reality, your messages likely transfer via lots of different transmission media to get to their final destination. If you use a laptop connected via Wi-Fi, then that wireless connection finds a base station, usually within about three hundred feet. That base station is probably connected to a local area network (LAN) via a copper cable. And your firm or college may connect to fast, long-haul portions of the Internet via fiber-optic cables provided by that firm\u2019s Internet service provider (ISP).<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p03\" class=\"indent para editable block\">Most big organizations have multiple ISPs for redundancy, providing multiple paths in and out of a network. This is so that if a network connection provided by one firm goes down, say an errant backhoe cuts a cable, other connections can route around the problem (see <a class=\"xref\" href=\"#fwk-38086-ch14_s02_f01\">Figure 12.1<\/a>).<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p04\" class=\"indent para editable block\">In the United States (and in most deregulated telecommunications markets), Internet service providers come in all sizes, from smaller regional players to sprawling international firms. When different ISPs connect their networking equipment together to share traffic, it\u2019s called <span class=\"margin_term\"><a class=\"glossterm\">peering<\/a><\/span>. Peering usually takes place at neutral sites called <em class=\"emphasis\">Internet exchange points<\/em> (IXPs), although some firms also have private peering points. Carriers usually don\u2019t charge one another for peering. Instead, \u201cthe money is made\u201d in the ISP business by charging the end-points in a network\u2014the customer organizations and end users that an ISP connects to the Internet. Competition among carriers helps keep prices down, quality high, and innovation moving forward.<\/p>\n<div id=\"fwk-38086-ch14_s03_s01_s01_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">Finance Has a Need for Speed<\/h4>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p05\" class=\"nonindent para\">When many folks think of Wall Street trading, they think of the open outcry pit at the New York Stock Exchange (NYSE). But human traders are just too slow for many of the most active trading firms. Over half of all U.S. stock trades and a quarter of worldwide currency trades now happen via programs that make trading decisions without any human intervention (Timmons, 2006). There are many names for this automated, data-driven frontier of finance\u2014algorithmic trading, black-box trading, or high-frequency trading. And while firms specializing in automated, high-frequency trading represent only about 2 percent of the trading firms operating in the United States, they account for about three quarters of all U.S. equity trading volume (Iati, 2009).<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p06\" class=\"indent para\">Programmers lie at the heart of modern finance. \u201cA geek who writes code\u2014those guys are now the valuable guys\u201d says the former head of markets systems at Fidelity Investments, and that rare breed of top programmer can make \u201ctens of millions of dollars\u201d developing these systems (Berenson, 2009). Such systems leverage data mining and other model-building techniques to crunch massive volumes of data and discover exploitable market patterns. Models are then run against real-time data and executed the instant a trading opportunity is detected. (For more details on how data is gathered and models are built, see <a class=\"xref\" href=\"part-011-chapter-11-the-data-asset-databases-business-intelligence-and-competitive-advantage.html\">Chapter 11 \u201cThe Data Asset: Databases, Business Intelligence, and Competitive Advantage\u201d<\/a>.)<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p07\" class=\"indent para\">Winning with these systems means being quick\u2014very quick. Suffer delay (what techies call <em class=\"emphasis\">latency<\/em>) and you may have missed your opportunity to pounce on a signal or market imperfection. To cut latency, many trading firms are moving their servers out of their own data centers and into <em class=\"emphasis\">colocation facilities<\/em>. These facilities act as storage places where a firm\u2019s servers get superfast connections as close to the action as possible. And by renting space in a \u201c<em class=\"emphasis\">colo<\/em>,\u201d a firm gets someone else to manage the electrical and cooling issues, often providing more robust power backup and lower energy costs than a firm might get on its own.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p08\" class=\"indent para\">Equinix, a major publicly traded IXP and colocation firm with facilities worldwide, has added a growing number of high-frequency trading firms to a roster of customers that includes e-commerce, Internet, software, and telecom companies. In northern New Jersey alone (the location of many of the servers where \u201cWall Street\u201d trading takes place), Equinix hosts some eighteen exchanges and trading platforms as well as the NYSE Secure Financial Transaction Infrastructure (SFTI) access node.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p09\" class=\"indent para\">Less than a decade ago, eighty milliseconds was acceptably low latency, but now trading firms are pushing below one millisecond into microseconds (Schmerken, 2009). So it\u2019s pretty clear that understanding how the Internet works, and how to best exploit it, is of fundamental and strategic importance to those in finance. But also recognize that this kind of automated trading comes with risks. Systems that run on their own can move many billions in the blink of an eye, and the actions of one system may cascade, triggering actions by others.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p10\" class=\"indent para\">The spring 2010 \u201cFlash Crash\u201d resulted in a nearly 1,000-point freefall in the Dow Jones Industrial Index, it\u2019s biggest intraday drop ever. Those black boxes can be mysterious\u2014weeks after the May 6th event, experts were still parsing through trading records, trying to unearth how the flash crash happened (Daimler &amp; Davis, 2010). Regulators and lawmakers recognize they now need to understand technology, telecommunications, and its broader impact on society so that they can create platforms that fuel growth without putting the economy at risk.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_s01_n02\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">Watching the Packet Path via Traceroute<\/h4>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p11\" class=\"nonindent para\">Want to see how packets bounce from router to router as they travel around the Internet? Check out a tool called <em class=\"emphasis\">traceroute<\/em>. Traceroute repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p12\" class=\"indent para\">Traceroute is built into all major desktop operating systems (Windows, Macs, Linux), and several Web sites will run traceroute between locations (traceroute.org and visualroute.visualware.com are great places to explore).<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p13\" class=\"indent para\">The message below shows a traceroute performed between Irish firm VistaTEC and Boston College. At first, it looks like a bunch of gibberish, but if we look closely, we can decipher what\u2019s going on.<\/p>\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\n<div id=\"fwk-38086-ch14_s03_s01_s01_f01\" class=\"figure large\">\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 12.5<\/span><\/p>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2026\/01\/451b67eb372b58387eba43d819d514b7.jpg\" alt=\"a table of\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p14\" class=\"indent para\">The table above shows ten hops, starting at a domain in vistatec.ie and ending in 136.167.9.226 (the table doesn\u2019t say this, but all IP addresses starting with 136.167 are Boston College addresses). The three groups of numbers at the end of three lines shows the time (in milliseconds) of three packets sent out to test that hop of our journey. These numbers might be interesting for network administrators trying to diagnose speed issues, but we\u2019ll ignore them and focus on how packets get from point to point.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p15\" class=\"indent para\">At the start of each line is the name of the computer or router that is relaying packets for that leg of the journey. Sometimes routers are named, and sometimes they\u2019re just IP addresses. When routers are named, we can tell what network a packet is on by looking at the domain name. By looking at the router names to the left of each line in the traceroute above, we see that the first two hops are within the vistatec.ie network. Hop 3 shows the first router outside the vistatec.ie network. It\u2019s at a domain named tinet.net, so this must be the name of VistaTEC\u2019s Internet service provider since it\u2019s the first connection outside the vistatec.ie network.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p16\" class=\"indent para\">Sometimes routers names suggest their locations (oftentimes they use the same three character abbreviations you\u2019d see in airports). Look closely at the hosts in hops 3 through 7. The subdomains dub20, lon11, lon01, jfk02, and bos01 suggest the packets are going from Dublin, then east to London, then west to New York City (John F. Kennedy International Airport), then north to Boston. That\u2019s a long way to travel in a fraction of a second!<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p17\" class=\"indent para\">Hop 4 is at tinet.net, but hop 5 is at cogentco.com (look them up online and you\u2019ll find out that cogentco.com, like tinet.net, is also an ISP). That suggests that between those hops peering is taking place and traffic is handed off from carrier to carrier.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p18\" class=\"indent para\">Hop 8 is still cogentco.com, but it\u2019s not clear who the unnamed router in hop 9, 38.104.218.10, belongs to. We can use the Internet to sleuth that out, too. Search the Internet for the phrase \u201cIP address lookup\u201d and you\u2019ll find a bunch of tools to track down the organization that \u201cowns\u201d an IP address. Using the tool at whatismyip.com, I found that this number is registered to PSI Net, which is now part of cogentco.com.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p19\" class=\"indent para\">Routing paths, ISPs, and peering all revealed via traceroute. You\u2019ve just performed a sort of network \u201cCAT scan\u201d and looked into the veins and arteries that make up a portion of the Internet. Pretty cool!<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p20\" class=\"indent para\">If you try out traceroute on your own, be aware that not all routers and networks are traceroute friendly. It\u2019s possible that as your trace hits some hops along the way (particularly at the start or end of your journey), three \u201c*\u201d characters will show up at the end of each line instead of the numbers indicating packet speed. This indicates that traceroute has timed out on that hop. Some networks block traceroute because hackers have used the tool to probe a network to figure out how to attack an organization. Most of the time, though, the hops between the source and destination of the traceroute (the steps involving all the ISPs and their routers) are visible.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p21\" class=\"indent para\">Traceroute can be a neat way to explore how the Internet works and reinforce the topics we\u2019ve just learned. Search for traceroute tools online or browse the Internet for details on how to use the traceroute command built into your computer.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_s01_n03\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">There\u2019s Another Internet?<\/h4>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p22\" class=\"nonindent para\">If you\u2019re a student at a large research university, there\u2019s a good chance that your school is part of Internet2. Internet2 is a research network created by a consortium of research, academic, industry, and government firms. These organizations have collectively set up a high-performance network running at speeds of up to one hundred gigabits per second to support and experiment with demanding applications. Examples include high-quality video conferencing; high-reliability, high-bandwidth imaging for the medical field; and applications that share huge data sets among researchers.<\/p>\n<p id=\"fwk-38086-ch14_s03_s01_s01_p23\" class=\"indent para\">If your university is an Internet2 member and you\u2019re communicating with another computer that\u2019s part of the Internet2 consortium, then your organization\u2019s routers are smart enough to route traffic through the superfast Internet2 backbone. If that\u2019s the case, you\u2019re likely already using Internet2 without even knowing it!<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_s01_n04\" class=\"bcc-box bcc-success\">\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul id=\"fwk-38086-ch14_s03_s01_s01_l01\" class=\"itemizedlist\">\n<li>TCP\/IP, or the Internet protocol suite, helps get perfect copies of Internet transmissions from one location to another. TCP works on the ends of transmission, breaking up transmissions up into manageable packets at the start and putting them back together while checking quality at the end. IP works in the middle, routing packets to their destination.<\/li>\n<li>Routers are special computing devices that forward packets from one location to the next. Routers are typically connected with more than one outbound path, so in case one path becomes unavailable, an alternate path can be used.<\/li>\n<li>UDP is a replacement for TCP, used when it makes sense to sacrifice packet quality for delivery speed. It\u2019s often used for media streaming.<\/li>\n<li>TCP\/IP doesn\u2019t care about the transition media. This allows networks of different types\u2014copper, fiber, and wireless\u2014to connect to and participate in the Internet.<\/li>\n<li>The ability to swap in new applications, protocols, and media files gives the network tremendous flexibility.<\/li>\n<li>Decentralization, fault tolerance, and redundancy help keep the network open and reliable.<\/li>\n<li>VoIP allows voice and phone systems to become an application traveling over the Internet. This is allowing many firms to save money on phone calls and through the elimination of old, inefficient circuit-switched networks. As Internet applications, VoIP phone systems can also have additional features that circuit-switched networks lack. The primary limitation of many VoIP systems is quality of service.<\/li>\n<li>Many firms in the finance industry have developed automated trading models that analyze data and execute trades without human intervention. Speeds substantially less than one second may be vital to capitalizing on market opportunities, so firms are increasingly moving equipment into collocation facilities that provide high-speed connectivity to other trading systems.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch14_s03_s01_s01_n05\" class=\"bcc-box bcc-info\">\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol id=\"fwk-38086-ch14_s03_s01_s01_l02\" class=\"orderedlist\">\n<li>How can the Internet consist of networks of such physically different transmission media\u2014cable, fiber, and wireless?<\/li>\n<li>What is the difference between TCP and UDP? Why would you use one over the other?<\/li>\n<li>Would you recommend a VoIP phone system to your firm or University? Why or why not? What are the advantages? What are the disadvantages? Can you think of possible concerns or benefits not mentioned in this section? Research these concerns online and share your finding with your instructor.<\/li>\n<li>What are the risks in the kinds of automated trading systems described in this section? Conduct research and find an example of where these systems have caused problems for firms and\/or the broader market. What can be done to prevent such problems? Whose responsibility is this?<\/li>\n<li>Search the Internet for a traceroute tool, or look online to figure out how to use the traceroute command built into your PC. Run three or more traceroutes to different firms at different locations around the world. List the number of ISPs that show up in the trace. Circle the areas where peering occurs. Do some of the \u201chops\u201d time out with \u201c*\u201d values returned? If so, why do you think that happened?<\/li>\n<li>Find out if your school or employer is an Internet2 member. If it is, run traceroutes to schools that are and are not members of Internet2. What differences do you see in the results?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2>References<\/h2>\n<p class=\"nonindent\">Berenson, A., \u201cArrest Over Software Illuminates Wall St. Secret,\u201d <em class=\"emphasis\">New York Times<\/em>, August 23, 2009.<\/p>\n<p class=\"indent\">Daimler E. and G. Davis, \u201c\u2018Flash Crash\u2019 Proves Diversity Needed in Market Mechanisms,\u201d <em class=\"emphasis\">Pittsburgh Post-Gazette<\/em>, May 29, 2010.<\/p>\n<p class=\"indent\">Iati, R., \u201cThe Real Story of Trading Software Espionage,\u201d <em class=\"emphasis\">Advanced Trading<\/em>, July 10, 2009.<\/p>\n<p class=\"indent\">Schmerken, I.,\u201cHigh-Frequency Trading Shops Play the Colocation Game,\u201d <em class=\"emphasis\">Advanced Trading<\/em>, October 5, 2009.<\/p>\n<p class=\"indent\">Timmons, H., \u201cA London Hedge Fund that Opts for Engineers, Not M.B.A.\u2019s,\u201d <em class=\"emphasis\">New York Times<\/em>, August 18, 2006.<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":217,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[49],"contributor":[],"license":[],"class_list":["post-96","chapter","type-chapter","status-publish","hentry","chapter-type-numberless"],"part":86,"_links":{"self":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/users\/217"}],"version-history":[{"count":2,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/96\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/96\/revisions\/351"}],"part":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts\/86"}],"metadata":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/96\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapter-type?post=96"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/contributor?post=96"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/license?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}