Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.

Slides:



Advertisements
Similar presentations
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Advertisements

Watching the Waist of the Protocol Hourglass
Watching the Waist of the Protocol Hourglass Steve Deering cisco.com TERENA Network Conf., Antalya Turkey May 2001.
Intro (continued) and Design Principles Nick Feamster CS 3251: Computer Networking I Spring 2013.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Save the World! What’s appropriate for global networking?
Skills: none Concepts: local area network, router, inter network, the TCP/IP layered software “stack”, layer functions, layer protocols, dumb versus smart.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Dr. Philip Cannata 1 Principles of Network Applications.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Week 2 Lecture 1 Layers (basics) Dr. Fei Hu. Review last lecture 2.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 6: Packet Filtering
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
1 Watching the Waist of the Protocol Hourglass Steve Deering cisco.com NORDUnet Conference, Copenhagen April
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Sockets process sends/receives messages to/from its socket
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Module 10: How Middleboxes Impact Performance
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
 Chapter 1.5. ~ KNSS  Students ’ feedback  Had difficulties due to: Lack of knowledge in networking English No microphone for.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Introduction and Overview of Network and Telecommunications.
Oct 2000C.Watters1 Internet for E-Commerce Internet, Intranet, Extranet Basics.
Communication Networks NETW 501 Tutorial 2
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
IP and Networking Basics Selection of slides taken from Internet Society Workshop Resource Centre:
Network Processing Systems Design
Introduction and Overview of Network and Telecommunications
Introduction to Technology Infrastructure
Slides taken from: Computer Networking by Kurose and Ross
Introduction 1 1: Introduction.
Introduction to Technology Infrastructure
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000

3/8/002 What are middle boxes?

3/8/003 What are the end boxes? client server Back 20 years… What's on the net - servers/clients (e.g. telnet, ftp, ) - later: peers (e.g. VT) data delivery between the end boxes directly Internet IP delivery

3/8/004 The Role of IP Delivery IP delivers packets from end to end the ends are defined by the communicating application process the ends are indicated by the source and destination addresses in the IP header client server routers

3/8/005 What are middle boxes? data is no longer delivered between the two end boxes by direct IP path The first middleman: server middle box client server sender recipient always connected In the early days:

3/8/006 What are middle boxes? data is no longer delivered between the two end boxes by direct IP path The first middleman: server middle box client server sender recipient server always connected Intermittent connectivity As time went:

3/8/007 Every coin has two sides Gain from having such a middlebox: solved the asynchrony problem between the two ends of delivery Loss for having a box in the middle: –more parts in the system to mingle with –more points of potential failures sender recipient server

3/8/008 sender recipient server The position of server in the IP architecture An application level box – sender talks to server explicitly – recipient fetches from the server explicitly in another word, not a "transparent" box

3/8/009 What we've seen in last couple of years A lot more middle boxes –Web proxies –"transparent" Web caches –portals Web server client Packet hijacking! ("for your benefit") Web proxy

3/8/0010 And more middleboxes yet to come e.g. Proxy servers to facilitate mobile wireless devices and mobile users in handling –intermittent connectivity –location tracking –link QOS constraint –session migration

3/8/0011 What we've seen Growing up of the Internet, of course need for scalable data dissemination –large number of clients requesting same data –requests coming in asynchronously need for information discovery/sorting need for authentication/security and all other kinds of services

3/8/0012 Challenges from growth large number of clients, large number of mobile users, large number of servers too How to do it right? So far pretty much "one hundred flowers blooming" –Web proxies –abuse DNS for load balancing –"transparent" caching –"layer switching", 3 < < 10?

3/8/0013 What's coming Big part of the society moving online what makes up the society & business market: mostly middlemen –largely missing on the Internet the reason that the Internet, by and large, does not look user-friendly to most people Prediction –a lot more middle boxes –IP packet delivery infrastructure fades into background—ubiquitous IP connectivity everywhere

3/8/0014 User programs application protocols transport protocols IP various networks WWW phone... SMTP HTTP RTP... TCP UDP… IP ethernet PPP… CSMA async sonet... copper fiber radio... For now: nowhere, or everywhere haven't you heard the hot buzzword "transparency"? "Internet architecture" ? Where in the architecture do those new middle boxes belong to? Does that raise a concern? YES

3/8/0015 Concerns about transparent middleboxes "transparent" middleboxes considered harmful –packet hijacking versus system manageability –Users: being in control versus being controlled Sticking to the layered protocol architecture considered necessary

3/8/0016 Where middle boxes belong to in the Internet architecture should be application level boxes being visible to end users Middleboxes and end-to-end principle: consider middle boxes as one "end" of "end-to-end" –e.g. the mail server in delivery

3/8/0017 Middleboxes: gains Keep the waist of the hour-glass thin –manageable, scalable, robust connectivity help the Internet scale with growing applications & client population Provide real services, all kinds of them –personalized portals –heterogeneity –building new services from existing applications

3/8/0018 Some potential losses (or things we need to pay attention) Dependency on those middleboxes –increased complexity –increased vulnerability "directory-enabled network": the network is gone when directory crashes, even if all switches are up –a robust, self-configured, self-organizing middlebox infrastructure can lead to higher availability and more robustness more complex security and trust model impact on data integrity

3/8/0019 Summary Finally the Internet is growing up! –Past efforts mostly on packet delivery –Now people start making money out of this packet delivery service middle boxes are a must Warning: pay attention to architecture Right way out: building application level infrastructures on top of the packet delivery infrastructure