Self-Citation More than 7 papers at places of least relevance Nothing new except for the problem We stress however that our proposal is somewhat motivated.

Slides:



Advertisements
Similar presentations
Security implications of source- controlled routes Xiaowei Yang UC Irvine NSF FIND PI meeting, June
Advertisements

Source Address Selection in Multi-Prefix Multi-Service Network Arifumi Matsumoto NTT PF Lab.
Deployment of MPLS VPN in Large ISP Networks
Chapter 6-7 IPv6 Addressing. IPv6 IP version 6 (IPv6) is the proposed solution for expanding the possible number of users on the Internet. IPv6 is also.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
OverView Over View Introduction to IPv6Introduction to IPv6 IPv4 and IPv6 ComparisonIPv4 and IPv6 Comparison Current issues in IPv4Current issues in IPv4.
IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Towards an Evolvable Internet Architecture IP layer change IP (routers, headers, addressing, …) Sylvia Ratnasamy (Intel Research), Scott Shenker (U.C.
IETF 72 – July 2008 Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Noel Chiappa, John Curran, Dino Farinacci, and David Meyer LISP Deployment.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Draft-vandevelde-v6ops-harmful-tunnels-01.txt 1 Are they the future of the Internet? Non-Managed Tunnels Considered Harmful Gunter Van de Velde, Ole Troan,
The Future Internet: A clean-slate design? Nicholas Erho.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Key Negotiation Protocol & Trust Router draft-howlett-radsec-knp ABFAB, IETF March, Prague.
Towards an Evolvable Internet Architecture IP layer change IP (routers, headers, addressing, …) Sylvia Ratnasamy (Intel Research), Scott Shenker (U.C.
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
© 2008 Nokia V1-Filename.ppt / YYYY-MM-DD / Initials 1 Dealing with P2P Traffic in an Operator Network: State-of-the-Art Hannes Tschofenig Marcin Matuszewski.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally During the course of this.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Best Practices in IPv4 Anycast Routing Version 0.9 August, 2002 Bill Woodcock Packet Clearing House.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Networking Components Chad Benedict – LTEC
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
1 Rick Tang Rick Tang IP Centrex - Integration Service IP Centrex - Integration Service Convergence Network Practice.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
TCOM 515 Lecture 6.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Brett Neely IP Next Generation. To boldly go where no network has gone before...
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Addressing Issues David Conrad Internet Software Consortium.
Vytautas Valancius, Nick Feamster, Akihiro Nakao, and Jennifer Rexford.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Eliminating Packet Loss Caused by BGP Convergence Nate Kushman Srikanth Kandula, Dina Katabi, and Bruce Maggs.
Ethernet. Ethernet  Ethernet is the standard communications protocol embedded in software and hardware devices, intended for building a local area network.
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Engineering Workshops Multihoming A Discussion. Engineering Workshops Multihoming Issues Many sites are multihomed in the current Internet –reliability.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Information-Centric Networks Section # 2.3: Internet Evolution Instructor: George Xylomenos Department: Informatics.
CPS 82, Fall IETF: Internet Engineering Task Force l “governs” the Internet (according to some)  What does this mean? Who elects the members?
1/13 draft-carpenter-nvo3-addressing-00 Brian Carpenter Sheng Jiang IETF 84 Jul/Aug 2012 Layer 3 Addressing Considerations for Network Virtualization Overlays.
This paper is Misleading Shu, Johnny. Paper summary Many IP assumptions are wrong IP is not suitable for some networks Suggest using circuit switching.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Analysis and Comparison of TCP Reno and TCP Vegas Review
Towards an Evolvable Internet Architecture
Evolution Towards Global Routing Scalability
RSVP: A New Resource ReSerVation Protocol
Instructor Materials Chapter 10: OSPF Tuning and Troubleshooting
NET 323D: Networks Protocols
Static Routing 2nd semester
Presentation transcript:

Self-Citation More than 7 papers at places of least relevance Nothing new except for the problem We stress however that our proposal is somewhat motivated by… Our proposal, along the lines described in [33]… - Taken right from the paper Meet the paper without Conclusion (Ok… There is a section on Discussion)

Something, somewhere, went terrible wrong! Authors: Sylvia Ratnasamy Scott Shenker Steven McCanne Presentation By: Rahul Potharaju Theodore Brockly

Even Asimov’s Robotics laws will come to their knees! Assumptions spoilt the game… For instance, take A4  Revenue Flow We know that IPvN is great because of its benefits but who will convince the “normal” not-so-hi-tech consumers? Alright, ISP will claim “Faster, Faster and even more Faster”  cliché

So let us consider IPv8 but wait… What does it contain in the first place? What if the long awaited IPv8 increases reliability and security at the cost of throughput? No more advertisements for the ISP! IPv8  Encapsulation of all IPv8 packets through non IPv8 networks  Even lower throughput  What will happen to the users who chose the “advanced” ISP? What if the “revenue gained” is offset due to the overhead incurred by the initial implementation of the new architecture?

Anycast is proposed as an alternative to ISP upgrades and Overlays. Two methods for deployment of Anycast: – ISP Policy Change – Aggregatable address Overlay Anycast is simply a lightweight routing Overlay

Anycast still requires several “next gen” service providers to show any gains. – Will Anycast scale?  They say they are not concerned about scalability! – Completely mitigate the gain of new architectures? – No one knows. Would still require an extraordinary amount of cooperation between ISPs.

Running Anycast discourages evolution just as much as overlays – First mover advantage almost nonexistent – Multiple adopters needed to show gains No incentive whatsoever to deploy. – Why should I help out Next Gen competitor X?

Even if the architecture was adopted against ISP's interests – Opens the door for a variety of incompatible protocols Across networks, nations – Creates hidden costs through added complexity – Complicates current work in the IP space (such as capability systems)‏ – Does not support router dependent protocols Unfortunately our approach does not assist in the deployment of architectures… certain QoS proposals… - Taken from the paper

ISP X ISP A ISP B ISP C Why am I subsidizing X? Nice that I am getting money from settlement payments Some or all of them will block IPv8 So what should the customers do? Spend time and money to switch providers Simply return to IPv4 (more likely because none of us even know what IPv8 is!)

ISPs are not simply going to let forerunners steal all of their business, and may not simply surrender and upgrade their IP architectures to the highest level due to the overhead of making changes.

To use IPv8, any end host can simply encapsulate an IPv8 packet in an IPv4 packet with destination A4… - Taken right from the paper How do you rule out the possibility of spoofing, ARP poisoning etc…? Biggest issue with Anycast itself  Any service which relies on it might not function properly in the case that the address is blackholed due to whatever reasons, or if anyone close by isn’t offering service, you could end up traveling to the ends of the earth to get DNS service.

Good Intentions but bad reasoning throughout the paper After reading your paper, we thought that perhaps a revolution is needed just to understand the contribution! More elaboration on how to fix the “architectural flaw of the lack of incentives”, but not a mere “walk-through of design options and their implications with little to offer in novel mechanisms or radical insights”

Let us say IPv8 becomes famous and everyone wants it The brilliant ISP X has implemented it  All IPv8 traffic from ISPs A,B,C etc… will be going through ISP X provided that IP Anycast routing and advertising-by-proxy is being used. But these rival ISPs are not so happy – they are subsidizing their biggest competitor, who, although not drawing large number of new subscribers, is getting money through settlement payments due to the traffic  Some or all of them will start blocking the IPv8 traffic! So what do the customers do? Spend time and money to switch providers Simply return to IPv4 (more likely because none of us even know what IPv8 is!)

While many discuss the incremental deployment of their solutions, they address the technical but not economic issues of partial deployment… we look for what is missing from today’s architecture that would make evolution by its incumbent operations economically desirable. - Taken right from the paper What is the new architecture? What was addressed was: How the new architecture and why it will propagate and be successful!