Internet Perspectives May 2002 Geoff Huston Chief Scientist, Internet Telstra.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

A Clash of Two Cultures ISPs and Telcos Geoff Huston.
The Internet Market. ISP Economics The ISP business is a repackaging of carriage offerings, combining IT capabilities with data transmission services.
Desperately Seeking Default Internet Policy Update A Perspective from the Pacific June 1994 – INET94 Presentation Geoff Huston Australian Academic and.
Technology Directions for IP Infrastructure GH 3/7/00.
A Clash of Two Cultures ISPs and Telcos Geoff Huston.
Views of Technology Futures An Internet Perspective Geoff Huston Internet Society October 2000.
End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
Internet Issues One outlook for 2003 and beyond Geoff Huston Chief Internet Scientist Telstra.
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
End-to-End and Innovation Geoff Huston Chief Scientist, APNIC.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC APNIC 24, September 2007.
Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Encrypting Wireless Data with VPN Techniques
An Implementable NGN Architecture and Its Capabilities
Multi-service Architecture: Evolution of Network Architecture Keith Knightson Khalid Ahmad Carrier Data Networks Nortel Networks, Canada IP-Networking/Mediacom.
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Evolution of NGN and NGA scenario in Nepal Nepal Telecommunications Authority.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Vodacom Microsoft Hosted Lync
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
IETF 63 - Paris VOIPPEER BoF A Broadband Service Provider’s Perspective on VoIP Peering August 5, 2005 Presented by Jason Livingood.
MPLS networking at PSP Co Multi-Protocol Label Switching Presented by: Hamid Sheikhghanbari 1.
6. Next Generation Networks A. Transition to NGN B
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Competitive Differentiation: Using Technology to Deliver on Staples EASY Brand Promise Scott Floeck, Sr. Vice President, Staples, Inc.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
1 Convergence ? Geoff Huston Research Scientist APNIC.
Hosted Communications and Services David Byrd Chief Marketing Officer.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
It’s a Mixed Up World Deploying Unified Communications and Collaboration in Mixed Environments David J. Wippich Chief Executive Officer Ensim Corp.
Tussel in Cyberspace Based on Slides by I. Stoica.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
National Institute of Science & Technology Voice Over Digital Subscriber Line (VoDSL) Vinay TibrewalEE [1] VoDSL: Next Generation Voice Solution.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
LAN Switching and Wireless – Chapter 1
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC November 2007.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Hosted Voice & Hosted Contact Center
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
- D1 - FT/Networks and Carriers Division ITU-T WORKSHOP on NGN (Geneva 9-10 July 2003) NGN an architecture for 21st century networks? ITU-T NGN Workshop.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Association of Competitive Telecom Operators IPv6 & TELCOs Workshop On IPv6 New Delhi 21 st July 2009.
March, 2004 Into the LAN: An Integrated LAN/WAN End User Study © 2004 Frost & Sullivan. All rights reserved. This document contains highly confidential.
CIM Modeling for E&U - (Short Version)
IS3120 Network Communications Infrastructure
Geoff Huston Research Scientist APNIC
Developing Innovative Unified Communications Applications
It’s a Mixed Up World David J. Wippich Chief Executive Officer Ensim Corp. Deploying Unified Communications and Collaboration in Mixed Environments.
Presentation transcript:

Internet Perspectives May 2002 Geoff Huston Chief Scientist, Internet Telstra

One View of the Internet Moving from disruption to disruption Characterization of the Internet as a disruptive technology Internet deployment is driven by a succession of disruptive events Market survival is characterized by adaptation to rapidly shifting models in the wake of each disruptive technology Market leadership is characterized by advance identification of disruptive events

Internet Disruption Events The so-called Killer -Apps of the Internet: FTP 1990 The Web 1993 Portals 1996 Instant Messaging 1998 Napster 1999

Contenders for future K-As Mobility & Wireless E-identity services Music Distribution Video Distribution GRIDs Telephony services Appliances ??

BUT… The problem with this perspective on the Internet is that leading market players are forced into making investment decisions on likely directions in disruptive environments. This predictive investment has a high risk There is little tolerance left for high risk options in this sector Players are looking for a more conservative approach to investment in this sector

Another View of the Internet Packet carriage medium Packet architecture Address architecture Flow control protocol The so-called hourglass model of IP as a generalized adaptation layer between the communications medium and the application

Hourglass IP Objectives IP is not an end in itself It enables applications to work across a diverse set of environments IP is not a panacea for all communications requirements Some applications demand a higher level of service than IP can effectively deliver But IP has a market role by levering off three major assets: potentially cheaper than alternatives flexible in that it makes few assumptions about application behaviour scales into environments of high volume and high speed

Technology Phases 1. Innovation 2. Deployment and Adoption 3. Exploitation The Internet is now at the stage where the initial phases of innovation and early adopter models are completed. The current phase is one of exploitation of the technology to lever advantage in other activity sectors This phase is typically a commodity phase

Internet as a Commodity Deregulated market with competing suppliers Open market price information Uniform product with limited scope for bundled value add as a product differentiator Price is everything!

Commodity Markets Prevailing market price determined by the second most efficient producer Market share determined by Producers efficiency scale of production reliability

The Commodity Perspective of the Internet Each supplier must drive down its cost of production in order to maintain market share The drivers behind production cost for base level Internet services are Technology innovation Volume of production Stability of customer base Reliability of production Maturity of offering Complexity of offering

Looking Forward Commodity markets are dominated by production efficiency Producers are forced to create products that are: Cheaper to produce and operate Support a broader application base Support a larger, more diverse client base

The Message to Providers Bundling and complex solutions (value-add) should not be undertaken at the expense of base level efficiency of the product Use simple architectures with basic functions Complexity costs rise disproportionately to size Use extensible solutions Avoid excessive layering Grand unified convergence is a myth Everything over Something can become a tragic technology mistake Manage cost

The Message to Vendors Fewer features in base components Simple, stable platforms Component modularity Longer active lifecycles for equipment Reliable and predictable operation

Specific Concerns What technologies are of interest to carrier-based public Internet Service providers at present?

IP-based Technology Issues Whats on our technology radar? VPNs VOIP and ENUM QoS Identity technologies V6 DNS Zeroconf PnP (in no particular order!) Mobility Management Architectures Multi-Provider last mile access AAA and EAP TE and MPLS

IP-based Technology Issues Provider-Provisioned VPNs Cross-product impacts with circuit-switched VPN technologies Edge-to-edge overlay and shared secret alternatives Complexity issues of routing and topology maintenance, QoS control, VPN stacking, network management and use metering There is a suspicion that the value of the provider role in supporting PP-VPNS is greater than the incremental cost of supporting various levels of differentiation within the host network. This has yet to be conclusively proved. There is also the belief that private data networks will continue to be valued as a premium offering by enterprise customers as a surrogate to effective distributed security solutions. This has yet to be contradicted.

IP-based Technology Issues VOIP and ENUM Cross product impact with telephone revenue streams for value-added services Ability to integrate enterprise private voice environments with the PSTN Ability to create further value-added services that leverage telephone services The concentration of interest is not so much in the carriage of voice over IP as the integration of switching control systems with IP-based distributed applications

IP-based Technology Issues QoS Today - largely an enterprise approach to resource rationing No large scale adoption within the public network environment Issues with service management, metering, application interaction, inter-provider interaction, routing, complexity control, and viability of outcomes It would be wonderful to charge disproportionately more for some packets. It would be a mistake if the costs associated with this functions are greater than the incremental revenue opportunities

IP-based Technology Issues Identity technologies Most forms of e-commerce architectures rely on robust authentication and adequate privacy Most forms of network abuse leverage off the weak level of authenticated identity that exists within the public IP environment There is a view that a widely deployed trustable authentication service would enable wider adoption of online transactions across a larger client base Shift the emphasis away from a trusted device to that of a trusted user of the device The base technology is largely available – the regulatory and business models to support such a framework are still formative

IP-based Technology Issues V6 Any day now Really Trust me! The incremental deployment model of NAT technologies is well- suited to the current collection of deployed applications and weak authentication Large scale public deployments are increasingly based on private address space and NAT / ALG edges with limited capability provided to the end client Requirements for stronger authentication and peer-to-peer applications drive a need for end-to-end coherency But provider push is not enough – the actual driver is based in client pull, and to date the application base that drives client need for end-to-end coherency (V6) remains elusive

IP-based Technology Issues DNS One of the most alarming cesspits of the public Internet infrastructure! The distributed nature of the application requires strong authentication and security to operate with any degree of integrity The distributed nature of the application ensures that this remains an elusive objective A visible need to use advanced DNS technologies (DNSSEC, DNS IND, PKIX) to address the more overt weaknesses in this application

IP-based Technology Issues Zeroconf PnP Broader deployment models encourage the use of self-configuring arrangements where a device establishes its address, routing and identity context using a model of trusted configuration agents DHCP-based solutions have been effective in particular environments (dial and enterprise). Some further refinement of solutions appear necessary in the area of LAN-based connection services found in DSL, and similar

IP-based Technology Issues Mobility Recognition of high value solutions in the area of nomadic and roaming IP environments Issues of differing technical solutions, differing transport characteristics, identity and location ambiguity, differing tariffs in the mobility domain, inter-provider roaming arrangements Leverage of current mobile telephone infrastructure vs deployment of data-specific nomadic technologies 3G vs b,a,g

IP-based Technology Issues Management Architectures Current element-by-element view of management is ill-suited to an overall view of network integrity If service management is an increasing topic of interest in enterprise overlays then management tools need to monitor the end-to-end delivered outcomes

IP-based Technology Issues Multi-Provider last mile access Requirement to provide switching solutions that operate on policy-based constraints rather than header-based directives A morass of competing technologies including various forms of PPP, L2TP VCs, LSPs coupled with policy-controlled aggregators Highly complex switching environments with poor scaling properties

IP-based Technology Issues AAA and EAP Desire to separate the access mechanism from the billable end user Support of a variety of inter-provider roaming arrangements that allow efficient use of access infrastructure

IP-based Technology Issues TE and MPLS Intended to allow for more efficient use of network resources through managed load dispersal Current routing-based approaches to TE suffer from uncontrolled feedback loops leading to network instability The area of interest at present is not MPLS per se, but the ingress control systems which assign traffic into LSPs