Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.

Slides:



Advertisements
Similar presentations
Emerging Wireless Internet Standards
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Russ Housley IETF Chair5 October 2011 Extremely Brief Introduction to the Internet Engineering Task Force (IETF)
Russ Housley IETF Chair LACNOG 4 October 2011 Successful Internet Protocol Development.
IETF in the Browser Harald Alvestrand. The Purpose of the IETF The goal of the IETF is to make the Internet work better. The mission of the IETF is to.
IPv6 at NCAR 8/28/2002. Overview What is IPv6? What’s wrong with IPv4? Features of IPv6 IPv6 will soon be available at NCAR How to use IPv6.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
EE 545 – BOGAZICI UNIVERSITY. Agenda Introduction to IP What happened IPv5 Disadvantages of IPv4 IPv6 Overview Benefits of IPv6 over IPv4 Questions -
Sofía Silva Berenguer lacnic.net Paramaribo - Surinam IPv4 Exhaustion And IPv6 Deployment.
1 Muhammed Rudman
Enabling IPv6 in Corporate Intranet Networks
Russ Housley IETF Chair 23 July 2012 Introduction to the IETF Standards Process.
Group #1: Protocols for Wireless Mobile Environments.
SIP Simplified August 2010 By Dale Anderson. SIP Simplified Session Initiation Protocol Core of SIP specifications is documented in IETF RFC 3261 Many.
IPv6: The Next Generation Internet Dipen Chauhan.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
ENUM Chris Wong Converging Services Branch International Training Program 7 September 2006.
What Makes for a Successful Protocol? Presented By: Nigel Medforth.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Internet Engineering Task Force (IETF) Tony Hain.
Chapter Overview TCP/IP Protocols IP Addressing.
Jonathan Reichardt. Internet Regulation Internet regulations censor data on the internet monitor IP addresses. The Internet Society wants to stop regulations.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 A short introduction to the IETF Harald Alvestrand IETF chair Harald Alvestrand IETF chair.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Summary - Part 1 - Objectives The purpose of this basic IP technology training is to explain video over an IP network. This training describes how video.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
1 Eliot Lear. 2 2 SCTP, DCP? DNSSEC, DANE, new RR types? Thought exercise: MPLS-ng.
IPv6 and the Role of RIRs RIGF.Asia Hong Kong, June 2010.
1 FMC: Driving the Transition to IMS Ken Kuenzel VP and Founder Covergence Inc.
1 November 2006 in Dagstuhl, Germany
Juan Ortega 8/13/09 NTS300. “The problem with version 5 relates to an experimental TCP/IP protocol called the Internet Stream Protocol, Version 2, originally.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Page 1 Network Addressing CS.457 Network Design And Management.
1 Lessons from IPv6 Steven M. Bellovin
Protocol Privacy Considerations Russ Housley IETF Chair 8 December 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Jabber Technical Overview Presenter: Ming-Wei Lin.
Compsci 82, Fall Bits and Atoms l How do send a letter? A phone call? A musical recording? An Internet Packet?  I want to watch Iron Man tomorrow.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
The State of the IETF Keeping one Internet Harald Alvestrand, IETF chair Antalya, May 13, 2001.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
IETF sec - 1 Security Work in the IETF Scott Bradner Harvard University
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Internet of Things. Creating Our Future Together.
Submitted to: Submitted by: Mrs. Kavita Taneja Jasleen kaur (lect.) Hitaishi verma MMICT & BM MCA 4 th sem.
NT1210 Introduction to Networking
Multicast in Information-Centric Networking March 2012.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Internet Protocol Version4 (IPv4)
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
Chapter 2 Introduction Application Requirements VS. Transport Services
Should all the building blocks be yellow?
Link State on Data Center Fabrics
Emerging Wireless Internet Standards
CSCD 330 Network Programming Spring
Silicon Flatirons Roundtable:
Presentation transcript:

Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development

Internet Engineering Task Force “We make the net work” The mission of the IETF is to produce high quality, relevant technical and engineering documents that influence the way people design, use, and manage the Internet in such a way as to make the Internet work better. These documents include protocol standards, best current practices, and informational documents of various kinds. [RFC 3935]

IETF Open Standards While the mission of the IETF is to make the Internet work better, no one is “in charge” of the Internet. Instead, many people cooperate to make it work. Each person brings a unique perspective of the Internet, and this diversity sometimes makes it difficult to reach consensus. Yet, when consensus is achieved, the outcome is better, clearer, and more strongly supported than the initial position of any participant.

Successful protocols Consider the following successful protocols: Inter-domain: IPv4, TCP, UDP, HTTP, SMTP, DNS, … Intra-domain: ARP, PPP, DHCP, OSPF, … Successful: a protocol that is used in the way it was originally envisioned Wildly Successful: a successful protocol that is deployed on a scale much greater than originally envisioned or used in ways beyond its original design

Potential success factors 1. Meets a real need 2. Incremental deployment 3. Open code availability 4. Freedom from usage restrictions 5. Open specification availability 6. Open development and maintenance processes 7. Good technical design Additional “wild success” factors: 8. Extensible 9. No hard scalability limitations 10. Security threats sufficiently mitigated

Success factor importance 1. Meets a real need 2. Incremental deployment 3. Open code availability 4. Freedom from usage restrictions 5. Open specification availability 6. Open development and maintenance processes 7. Good technical design Additional “wild success” factors: 8. Extensible 9. No hard scalability limitations 10. Security threats sufficiently mitigated

Role of the IETF Many successful IETF protocols have origins outside the IETF Technical quality not a primary factor in success IETF had a role in improving many of these protocols, often after success of version 1 Much easier when version 1 included a mechanism for extensibility At least a protocol version number

IETF takes on work when … The problem needs to be solved The scope is well defined and understood Agreement that the specific deliverables Reasonable probability of timely completion People willing to do the work

IETF is right place when … The problem fits one of the IETF Areas Applications Internet Operations and Management Real-time Applications and Infrastructure Routing Security Transport Working to get better at problems that span Areas Have had bad experiences with problems that span Standards Development Organizations (SDOs)

IETF is successful when … Participants care about solving the problem Participants represent all stakeholders I’d like to see more Research and Educational Network (REN) involvement. I’d like to see more network operator involvement too.

Protocol development Successful Internet protocols have come from top-down and bottom-up approaches Bottom-up is more common today Most things are incremental improvements

Internet challenges Different technologies are pulling the Internet in many different directions Power Bandwidth Mobility New applications Infrastructure I’d like to see more academic researchers involved.

Power Routers Consume lots of power and generate lots of heat Demands for even greater throughput Small and Mobile Devices Act as always connected Many very small devices are servers Demands for longer battery life

Bandwidth Big pipes Greater bandwidth than ever before, and not just between large data centers Availability Competing technologies benefit consumers More that 20% of the world's population has access to the Internet, and it is growing steadily

Mobility Mobile Devices More and more capabilities: voice, video, , instant messaging, web browsing, geo-location Mobile Networks Ships, trains, and planes (and soon automobiles) Critical system using Internet protocols Connect passenger’s mobile and portable devices

New Applications Many new applications Voice, video, and entertainment Social networking Peer-to-peer (p2p) Presence and geo-location Synchronization among devices Changing perception of the Internet Critical Demand for privacy and security

Infrastructure IPv4 Address Exhaustion 2010: IANA unused IPv4 address pool empty IPv6 offers much greater address space IPv4 to IPv6 transition mechanisms under development Infrastructure Security DNS Security: authentication and integrity Routing Security: first steps toward authorization

Challenge Summary Different technologies are pulling the Internet in many different directions: More demanding applications transferring much more data from many more locations to many more locations being used by many more users on vastly more devices Your experience is needed to meet these challenges.

Thank You Russ Housley Phone: