Architecture and Principles

Slides:



Advertisements
Similar presentations
End-to-End Arguments in System Design
Advertisements

End-to-End and Innovation Geoff Huston Chief Scientist, APNIC.
Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
1.End to end arguments in system design (1981) 2.Tussles in cyberspace: Defining Tomorrow’s Internet (2005) Nick McKeown CS244 Lecture 3 Architecture and.
Chapter 12 Network Security.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Ryan Huebsch CS294-4 P2P Systems – 9/29/03.
EE 122: Layering and the Internet Architecture Kevin Lai September 4, 2002.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Information-Centric Networks02a-1 Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols –David D. Clark –ACM CCR, Vol. 18, No. 4, August.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
EPL606 Topic 1 Introduction Part B - Design Considerations 1 The majority of the slides in this course are adapted from the accompanying slides to the.
Karlstad University IP security Ge Zhang
Juan Ortega 8/13/09 NTS300. “The problem with version 5 relates to an experimental TCP/IP protocol called the Internet Stream Protocol, Version 2, originally.
1 Lessons from IPv6 Steven M. Bellovin
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
Developing a Next-Generation Internet Architecture Robert Braden, David Clark,Scott Shenker, and John Wrokclawski Presented By Ding Lizhao.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Distributed Systems Distributed Algorithms – The End to End Argument p-1 “The End To End Argument In System’s Design”, Zaltzer et. al, ACM Transactions.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Protocol Layering Myungchul Kim Tel:
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
END-TO-END Arguments in System Design END-TO-END Arguments in System Design J. SaltzerD. Reed D. Clark M.I.T. Laboratory, 1981 Presented By Mohammad Malli.
Jan.19 th, 2007Seminar In Networks End-To-End Arguments in System Design Ayodele Onibokun Seminar In Networks Jan. 19 th, 2007.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
An Engineering Perspective on the Layered and End-to-End Approaches Christopher S. Yoo University of Pennsylvania Law School May 6, 2010.
Networking Using the OSI Model.
Introduction to: The Architecture of the Internet
David Wetherall Spring 2000
Encryption and Network Security
Presented by Muhammad Abu Saqer
The Design Philosophy of the DARPA Internet Protocols [Clark 1988]
OSI Protocol Stack Given the post man exemple.
Distributed Systems (Section B)
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
LESSON 3.3_A Networking Fundamentals Understand IPv6 Part 1.
Protocols and the TCP/IP Suite
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Introduction to: The Architecture of the Internet
E2E Arguments & Project Suggestions (Lecture 4, cs262a)
CSCD 433/533 Advanced Computer Networks
Introduction to: The Architecture of the Internet
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
System Models and Networking Chapter 2,3
CSCD 330 Network Programming
Introduction to: The Architecture of the Internet
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
Network Architecture Models
Internet Architecture: Design Philosophy -Then and Now
Architectures of distributed systems
Protocols and the TCP/IP Suite
Architectures of distributed systems Fundamental Models
CSE 542: Operating Systems
CS 381: Introduction to Computer Networks
CSE 542: Operating Systems
Announcements You need to register separately for the class mailing list and online paper review system. Do it now so that we can work out any “bugs”.
Computer Networks Protocols
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Architecture and Principles CS244 Lecture 3 Architecture and Principles End to end arguments in system design (1981) Conclusion from previous paper Misgivings Datagram is a pretty good abstraction, a stateless self-contained unit for internetworking Build a variety of services on top of it Anticipated the conflict between datagram and the fact that often decisions need to be made on collections of datagrams called flows e.G firewalls,multipath routing. So lots of complexity has grown in the network Flows imply soft state Which they were trying very hard to avoid due to the first requirement This leads us to this paper Sachin Katti & Keith Winstein

Conclusion (Internet Design Principles) “Datagram” good for most important goals, but poor for the rest of the goals. Processing packets in isolation, resource management, accountability all hard. Anticipates flows and “soft-state” for the future.

End-to-End Arguments in System Design [Saltzer, Reed, Clark 1981] End-to-end in a nutshell “The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.)” What is the end to end argument? Three components: What is the function? Doesn’t state that, its merely trying to say where you should place it Its guidance, not law What is the end? Depends on the function and the context needed for that function. Also depends on who owns responsibility for that function What is it really? Common sense: if you want a job done right, you have to do it yourself. All the examples are about that. But a bit more. If you have to do it yourself anyway, then no point adding complexity in the network to do it, its redundanrt. So its also about performance management.

Some consequences In layered design, the E2E principle provides guidance on where functions belong. “Dumb, minimal” network and “intelligent” end-points. Many argue that: E2E principle allowed the Internet to grow rapidly because innovation took place at the edge, in applications and services. Ex. WWW, Skype, BitTorrent, Bitcoin The biggest consequence; dumb minimal network What has been the biggest impact of this: www Explosion of growth Other examples

Case studies Error handling in file transfer Encryption and authentication The partition between TCP, IP, and the link layer of error handling, flow control and congestion control. Fairness in resource allocation

What you said “Performance matters, and we should strive to make the network provide the desired behaviors most of the time, and make the failures rare in which case the (maybe) costly recovery at the higher level can kick in” - Peiqian Li James Hong, keep it private

What you said “The application function is necessary to ensure encryption between the application endpoints, while the network implementation serves the role of preventing leaking of information that the network operator does not wish to be exposed. I felt this area of non-overlapping functionality could have been explored further in regards to other types of functions.” - Jayden Navarro

On the other hand… E2E principle appears to have become diluted: NATs, firewalls, VPN tunnel endpoints, … Perhaps not surprising: E2E principle grew in an era of trust among users. Now network must protect itself. The network is no longer “dumb, minimal” Now over 7,000 RFCs. Router OS’s based on 100M lines of source code. Q: Is this a problem?

What belongs in, what out? Questions: Does routing belong in the “dumb, minimal” network? How about multicast, mobility, QoS…? Are NATs necessary, good, or evil? Is the E2E principle constraining innovation of the infrastructure?

Additional references [rfc3724] “The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture” - Kempf et al. [Blumenthal] “Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world”, ACM Transactions on Internet Technology, Vol. 1, No. 1, August 2001, pp 70-109.