Cisco’s approach to forecasting IP traffic has been characterized as conservative. Emerging trends and innovations in network architectures, device/connection deployments, and application adoption/usage have the potential to increase the outlook for traffic volumes, shapes and characteristics significantly. Based on our perspective and analysis, the following topics warrant consideration as future “wildcards” in the forecasting process.

Consider how long it takes to download an HD movie at these speeds: at 10 Mbps, it takes 20 minutes; at 25 Mbps, it takes 9 minutes; but at 100 Mbps, it takes only 2 minutes. High-bandwidth speeds will be essential to support consumer cloud storage, making the download of large multimedia files as fast as a transfer from a hard drive. Table 5 shows the percentage of broadband connections that will be faster than 10 Mbps, 25 Mbps, and 50 Mbps by region.
Overall IP traffic is expected to grow to 396 EB per month by 2022, up from 122 EB per month in 2017, a CAGR of 26 percent (Figure 1). This growth represents a slight increase in expectations over last year’s forecast, which projected a CAGR of 24 percent from 2016 to 2021, driven by an increase in the growing share of mobile traffic as a percentage of the total IP traffic.
Affiliate marketing has grown quickly since its inception. The e-commerce website, viewed as a marketing toy in the early days of the Internet, became an integrated part of the overall business plan and in some cases grew to a bigger business than the existing offline business. According to one report, the total sales amount generated through affiliate networks in 2006 was £2.16 billion in the United Kingdom alone. The estimates were £1.35 billion in sales in 2005.[19] MarketingSherpa's research team estimated that, in 2006, affiliates worldwide earned US$6.5 billion in bounty and commissions from a variety of sources in retail, personal finance, gaming and gambling, travel, telecom, education, publishing, and forms of lead generation other than contextual advertising programs.[20]
In 2008 the state of New York passed a law asserting sales tax jurisdiction over Amazon.com sales to New York residents. New York was aware of Amazon affiliates operating within the state. In Quill Corp. v. North Dakota, the US Supreme Court ruled that the presence of independent sales representatives may allow a state to require sales tax collections. New York determined that affiliates are such independent sales representatives. The New York law became know as "Amazon's law" and was quickly emulated by other states[44]. While that was the first time states successfully addressed the internet tax gap, since 2018 states have been free to assert sales tax jurisdiction over sales to their residents regardless of the presence of retailer affiliates[45].
Users expect their online experience to be always available and always secure—and their personal and business assets to be safe. The last several years have been easily the most eventful period from a security threat perspective, with many serious data breaches that have been discussed widely in the media. Given the scope of the monetary and brand damage associated with data breaches, cybersecurity is treated as a business risk rather than merely an IT issue. Advances in technology is the main driver for economic growth but has also led to a higher incidence of cyberattacks. The leading trends such as ecommerce, mobile payments, cloud computing, Big Data and analytics, IoT, AI, machine learning, and social media, all increase cyber risk for users and businesses. Compounding the problem, the nature of the threats is becoming more diverse. The list includes Distributed Denial-of-Service (DDoS), ransomware, Advanced Persistent Threats (APTs), viruses, worms, malware, spyware, botnets, spam, spoofing, phishing, hacktivism and potential state-sanctioned cyberwarfare.
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps, and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations.
Traffic classification is a major component of automated intrusion detection systems.[12][13][14] They are used to identify patterns as well as indication of network resources for priority customers, or identify customer use of network resources that in some way contravenes the operator’s terms of service. Generally deployed Internet Protocol (IP) traffic classification techniques are based approximately on direct inspection of each packet’s contents at some point on the network. Source address, port and destination address are included in successive IP packet's with similar if not the same 5-tuple of protocol type. ort are considered to belong to a flow whose controlling application we wish to determine. Simple classification infers the controlling application’s identity by assuming that most applications consistently use well known TCP or UDP port numbers. Even though, many candidates are increasingly using unpredictable port numbers. As a result, more sophisticated classification techniques infer application type by looking for application-specific data within the TCP or User Datagram Protocol (UDP) payloads.[15]
Although average Internet traffic has settled into a steady growth pattern, busy hour traffic (or traffic in the busiest 60 minute period of the day) continues to grow more rapidly than average Internet traffic. Service providers plan network capacity according to peak rates rather than average rates. Between 2017 and 2022, global busy hour Internet use will grow at a CAGR of 37 percent, compared with 30 percent for average Internet traffic (Figure 23).
Forms of new media have also diversified how companies, brands, and ad networks serve ads to visitors. For instance, YouTube allows video-makers to embed advertisements through Google's affiliate network.[22][23] New developments have made it more difficult for unscrupulous affiliates to make money. Emerging black sheep are detected and made known to the affiliate marketing community with much greater speed and efficiency.[citation needed]

It might be awkward, but this is our last chance, so please don't scroll past this. This Monday we humbly ask you to defend Wikipedia's independence. Our 2019 fundraiser will be over very soon. 98% of our readers don't give; they look the other way. If you are an exceptional reader who already donated, we sincerely thank you. If all our readers donated just $2.75 today, Wikipedia could thrive for years. Most people donate because Wikipedia is so useful. If Wikipedia gave you $2.75 worth of knowledge this year, take a minute to secure its future with a gift to the Wikimedia Endowment. Show the volunteers who bring you reliable, neutral information that their work matters. Thank you.
×