Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.

Slides:



Advertisements
Similar presentations
5 Why’s Overview.
Advertisements

17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
Experience with some Principles for Building an Internet-Scale Reliable System Mike Afergan (Akamai and MIT) Joel Wein (Akamai and Polytechnic University,
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Tussle in Cyberspace: Defining Tomorrow’s Internet by David D. Clark, John Wroclawski Karen R. Sollins, Robert Braden Offense: Ionut Trestian.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
ISP – 8 th Recitation 3 rd exercise review Computer networks - Introduction.
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
TCP/IP.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Tussel in Cyberspace Based on Slides by I. Stoica.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 An Introduction to the future of the Internet (part 1) David Clark MIT CSAIL July 2012.
Mr C Johnston ICT Teacher
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
The Creative Problem Solving Pack. The following pages provide separate packs that you can use in the following situations. * Creative problem solving.
Six Tips for Talking Technical When Your Audience Isn’t By Janis Robinson Presenter: Samir Chahid.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
1 3132/3192 User Accessibility © University of Stirling /3192 User Accessibility 2.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Strategic Reading Step 2 SCAN. Review from yesterday Preview- practice with Hamlet Oedipal Complex.
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Application Architecture Internet Architecture David D. Clark MIT CSAIL September 2005.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Information-Centric Networks Section # 2.2: Internet Evolution Instructor: George Xylomenos Department: Informatics.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
G046 Lecture 04 Task C Briefing Notes Mr C Johnston ICT Teacher
Scrapping the Internet Presented by Dhaval Joshi.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Chapter 2 Network Models
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
Chapter 2 Network Models
Chapter 2 Network Models
How Do You Get Everyone in Book 3 Times?
Chapter 2 Network Models
Fix AOL Mail Error Code 421 Call   for Help
Welcome To : Group 1 VC Presentation
CIS 292 Innovative Education-- snaptutorial.com
CIS 332 Inspiring Innovation-- snaptutorial.com
CSCD 433/533 Advanced Computer Networks
Software Defined Networking (SDN)
Chapter 2 Network Models
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
CSCD 433/533 Advanced Computer Networks
Protocol Application TCP/IP Layer Model
Presentation transcript:

Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice

The paper basically talks about  Accommodating choices in design - Gives flexibility for designers and consumers - Allows innovation - Allows a tussle to occur

 Highlights connection between Engineering and society, …. Good, but issues discussed here not new nor particular to the Internet.  Lacks coherence, discuss complex issues written in books in 10 pages, However sometimes dives into lots of details like Source routing, firewalls etc!  Discuss ethical questions without clearly stating the assumptions or value systems  No concrete value, Things mentioned in this paper are quite obvious but no concrete design guidelines provided.  It talks about more of philosophical issues without any technical advise.

Challenge: Flexibility increases complexity  Flexible designs will be complex  Applications should be written to deal with this complexity  Innovative applications come up….but slowly!

Challenge: Designing for Outcomes  Paper says “Do not design so as to dictate the outcome”  How can a design proceed without a goal in mind?  Design of the internet based on “packet in – packet out” functionality..very simple and not designed for any outcome “..packets go in and come out and this is all happens in the network. This simple idea was powerful in the early days.. but there is much fear that it seems to be eroding..” So what went wrong to the outcome blind internet???? (self-contradicting)

Challenge: Making a tussle space does not solve a problem  Paper does not talk about who wins in the tussle  Allowing a tussle to occur is not a solution Paper’s Example: DNS and Trademarks  Even if we separated trademark names from machine names, trademarks disputes will not disappear “…one could then try to design these latter mechanisms to try to duck the issue of trademark” The SMTP server example: “A user of mail may choose an SMTP server..An ISP might try to control that choice by redirecting packets..”

Challenge: Lots of Choices Confuses Average User  Too much choice does not make a user happy  Confused about choices to make and their consequences  Only informed persons can make correct choices  Configuring and using simple applications becomes hard Papers response to this is unsatisfactory: “..we may see emergence of third parties that rate services (the online catalog of consumer reports) and parties that provide pre-configured software…”  Installing Windows is easier than installing Linux to an average user

Challenge: Little Incentive to Providers of Choice  Providing more choices is costly  Popular choices will get cheaper (Economies of scale)  Users of less popular choices will need to pay more “One should be prepared to pay for what one uses or there is very little incentive for the provider to offer it.”

Finally, The point of this paper is known already and acted upon  Transport layer provides choice: TCP/UDP  “IP-lock in” is addressed by DHCP and NAT’s  Loose source routing is addressed by overlay routing