Global Internet Infrastructure (that stability thing….)

Slides:



Advertisements
Similar presentations
1 © 2001, Cisco Systems, Inc. Updated_ Mobile IP Lessons Learned The early years.
Advertisements

Measuring IPv6 Deployment Geoff Huston George Michaelson
Self-healing in Routing: Failure Analysis, and Improvements Qi Li Tsinghua University Aug. 28, 2008.
RIPE Network Coordination Centre 25, 29 April 2008, Taiwan 1 Nick Hyrka An Amsterdam Update ArtistServer.com/Brillman.
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
Year 6 SATS Meeting Wednesday 30th January 2013
LETS LOOK AT HOW THE NEWS IS MADE! WHY ARE NEWS SOURCES BIASED?
Word List A.
IPv4 to IPv6 transition ALS Capacity Building April 2014
Wikis, and Wikis, and Blogs Oh My’ By Tracy L. Chenoweth.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
By: Mike Yerina. Internet Regulation: The Internet Regulation is a very important part of the world today and without it there would be huge changes in.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CMPSC-358 (CCNA 4 ) Spring 2007.
IPv6 Forum India An Update Hemanth Dattatreya President IPv6 Forum India.
Phalanx: Withstanding (?) Multimillion-Node (?) Botnets Paper by Colin Dixon, Thomas Anderson and Arvind Krishnamurthy NSDI ‘08 ?? by Mark Ison and Gergely.
The internet layer Skills: None IT concepts: layered protocols, the internet layer, IP protocol, router, dumb (“end-to- end,” “neutral”) networks This.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Internet Review Academic Talent Search. All About Networking DevicesDevices Packet TransferPacket Transfer HardwareHardware SoftwareSoftware Wiring/CablingWiring/Cabling.
NET 499 Leonard Paul Vinas Network Security and Electronics Department of Technology.
1 Crashing the Net Steven M. Bellovin AT&T Labs Research
Utilities, Customers & SMS Rudi Leitner. Who in this room has a mobile phone? Who in this room has ever sent a text (SMS) message?
An overview of IP addressing history and policy issues Leo Vegoda Number Resources Manager, IANA.
Art 315 Lecture 6 Dr. J. Parker. Variables Variables are one of a few key concepts in programming that must be understood. Many engineering/cs students.
11 November 2001 Marina del Rey GAC meeting Vulnerabilities in the Internet Jaap Akkerhuis.
BRIAN BEVERIDGE Co-Director Healthy People, Global Goods Movement Conference “Empowering Residents with CBPR”
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
VLSM and RIPv2 Warren Toomey GCIT. Introduction Switches deliver frames to stations. Routers deliver packets to networks. Only the final router has to.
10/25/2015. Earthquakes are the Earth's natural means of releasing stress. When the Earth's plates move against each other, stress is put on the lithosphere.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
QoS research in a complicated world Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
Kickstart Your Social Media Marketing Presented By: Jordan Hatch.
Building a More Trusted and Secure Internet RIPE 70, May
Cloud Computing Project By:Jessica, Fadiah, and Bill.
ENISA efforts for securing European Internet Infrastructure
“Contact Centers with Nine Lives” Topics 1. Business Continuity Definitions 2. Mission Criticality –Essential constants for mission criticality 3. Business.
Do You Remember What You Were Doing? Unit 5 Section B.
COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Management of Internet Resources ITU Workshop on Developing a Policy and Regulatory Framework for Developing Economies of the Pacific 1 December 2003 Suva,
TERENA GA Claudio Allocchio Update on Root Servers Proposal First of all, a Disclaimer: First of all, a Disclaimer:
Internet Protocol Addresses What are they like and how are the managed? Paul Wilson APNIC.
Cardinal Vs Ordinal Optimization: The Reality Police Vijay Gill Metromedia Fiber Network.
CLEARLY WE KNOW HOW TO BURY LARGE STRUCTURES. DRILLING AND BURYNG ALONG THE SAME ROUTE AS THE “POLES” SHOWS IT CAN BE DONE !!
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
How to Make the Internet more Resilient? Lixia Zhang UCLA April 24, 2003.
Kickstart Your Social Media Marketing Presented By: Jordan Hatch.
Mirjam KuehneRIPE Meeting # 31 RIPE ncc Internet Administration and the RIPE NCC Daniel Karrenberg.
Toolbox Meetings What is a toolbox meeting? An informal 5 to 15 minute meeting held by supervisors used to promote safety.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Earthquake Building Codes BY: SPENCER FAWCETT. Governing Entity Syracuse City Building Official: Brian Lemmons Syracuse City Building Permit Technician:
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security Advanced Network Security Peter Reiher August, 2014
1.4 Wired and Wireless Networks
Common Methods Used to Commit Computer Crimes
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
AP CSP: Making a reliable Internet & DNS
IS3120 Network Communications Infrastructure
The Issue We all depend on the Internet
Internet Governance Hui
Cisco Real Exam Dumps IT-Dumps
The Internet is For Everyone
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Global Internet Infrastructure (that stability thing….)

What is it? First thing I asked myself when I was asked to talk on this subject was… What exactly is Global Internet Infrastructure? If in doubt make up a new Acronym…. – LMGTFY

ernet+Infrastructure Funnily enough… When people talk about the Global Internet Infrastructure the Internet is itself the most global of Infrastructures. The Internet is truly a global infrastructure for the 21st century -- the first really new infrastructure to develop in nearly a century V. Cerf 1995

The Internet is probably the most important communications enabler that has been invented since the telegraph. Global Instability in that system would have very dramatic effects…

Data on Stability of Internet Finding measurement of this is not as easy as you would think – Firstly we dont have a good definition of what this Stability means. – Secondly there have been very few scientific publications on the matter in the last 10 years LMGTFY……

Recent major outages Issues with physical infrastructure…. – Data centers disappearing, fiber cuts etc.. Issues with identifier systems.. – Names, IP addresses (routing) etc…

Earthquakes, Storms and… Taiwan Earthquake – A cable break – Natural causes – The damage was serious locally – New on this Internet outage could be followed on the Internet… (unless you were in Taiwan)

2008 Fiber cuts… – 5 (or was it 3 or 9?) undersea cables were accidently damaged. (reported to be by ship anchors) This caused outages for millions of people. You could follow the minute by minute updates of this on the …. Erm…. Internet.. It was a major outage but its affect was Local.

2010 Haiti Earthquake – Cables were damaged.. – This caused some communications issues inside and with Haiti. My own communication with those inside Haiti was mainly conducted using the Internet... For those going to IGF come see the.HT talk on this at the CENTR panel.

The identifier systems These may be expected to be more global in reach as the protocols are globally deployed.

2002 Attack on Root servers. – Great headlines Massive DDoS Attack Hit DNS Root Servers! – Was followed and reported widely on the Internet. – In reality everything kept working..

2007 Attack against Root Servers – Very large attack… affected a few of the root server systems – Reported heavily on the …erm.. Internet – Everything kept working….

2010 RIPE NCC experiment – Triggered a bug in Cisco IOS code (Routers) – Reported (on the Internet) to have affected about 1% of Internet bug-behind-small-scale-internet- outage?source=nww_rss bug-behind-small-scale-internet- outage?source=nww_rss Very short term outage.. Did cause some short term discomfort

– Although the Internet is Global Infrastructure the way it is designed and implemented means that outages or instability is localized. – In the history of the Internet it is hard to find one example of a truly global outage. – Local outages happen all the time… You can read about them on the Internet!

We should not be complacent…. – The fact that we discuss and act on such issues at length and that a lot of actions have taken place to improve stability and resiliency is testimony to the fact that as industry we are not… – but so far we have done a pretty good job…

Thank you!