Preserve and Enhance: Balancing Goals for the Internet APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APRICOT Kuala Lumpur – 2004.

Slides:



Advertisements
Similar presentations
Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Advertisements

Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
MaGMA: Supporting Groupware in Wireless Networks Idit Keidar Technion EE Joint work with N. Lavi and I. Cidon.
The Dance of Co-Opetition Dave Crocker Brandenburg Consulting MY: +60 (19) (408)
Multiaddressing with MAST SAINT 2004, Tokyo D. Crocker Brandenburg InternetWorking SAINT 2004, Tokyo D. Crocker Brandenburg.
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
Next Step In Signaling (NSIS) and Internet Routing Dynamics Charles Shen and Henning Columbia University in the City of New York Internet.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
The Future Internet as a Model for Future Public Systems Jon Crowcroft,
Rethink the design of the Internet CSCI 780, Fall 2005.
Chapter 25 Internet Routing Internetworking Technology How routing tables are built initially How routing software updates the tables as needed. Propagation.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Network Architectures Week 3 Part 2. Comparing The Internet & OSI.
1/20 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics Implementation Issues.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Internet Protocol Security (IPSec)
Network Layer IS250 Spring 2010
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
Host Identity Protocol
6. Next Generation Networks A. Transition to NGN B
Chapter 1: Hierarchical Network Design
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
1 “Vision for Trustworthy Computing”, Bill Gates, 15 Jan 2002 “…now, when we face a choice between adding features and resolving security issues, we need.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
1 Which Standards are needed toward Future Wireline and Wireless IP Network ? Hee Chang Chung, Jun Kyun Choi
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Part 3: Internetworking Internet architecture, addressing, encapsulation, reliable transport and the TCP/IP protocol suite.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
1 Evolving a Manageable Internet Tom Anderson University of Washington.
AKARI New Generation Network Architecture SeungHo Lee.
Ch 1. Computer Networks and the Internet Myungchul Kim
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
1 John Scudder, David Ward Emerging Routing Issues.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
Network Processing Systems Design
CHAPTER 2 Application Layer.
CPE 401 / 601 Computer Network Systems
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

Preserve and Enhance: Balancing Goals for the Internet APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking

2 2 D. CrockerApricot – KL,2004 Things Are Different Today  The Net’s operation is more complex and less reliable  Firewalls, NATs, Routing partitions, Spam, Worms, internationalization (localization), “Governance”  The Net's architecture is reaching serious limits  Collaboration, Wireless, Mobility, Multihoming, Real-time audio and video, Peer-to-Peer  The Net’s technical community is fragmented  Poor cross-area communications, Long standards cycles, Narrow and complex specifications, political factions  The Net’s operation is more complex and less reliable  Firewalls, NATs, Routing partitions, Spam, Worms, internationalization (localization), “Governance”  The Net's architecture is reaching serious limits  Collaboration, Wireless, Mobility, Multihoming, Real-time audio and video, Peer-to-Peer  The Net’s technical community is fragmented  Poor cross-area communications, Long standards cycles, Narrow and complex specifications, political factions

3 3 D. CrockerApricot – KL,2004 Lessons: Recent Personal Experiences – I  Facsimile  Improve service, by copying related, existing service  Saves on debate about “needs” and “utility”  Instant messaging  Needs a QOS that is incompatible with today’s  Difference between “protocol” and “service”  Internationalized Domain Names and Spam  Local criteria and actions, within global service  Technical response to social issues  Facsimile  Improve service, by copying related, existing service  Saves on debate about “needs” and “utility”  Instant messaging  Needs a QOS that is incompatible with today’s  Difference between “protocol” and “service”  Internationalized Domain Names and Spam  Local criteria and actions, within global service  Technical response to social issues

4 4 D. CrockerApricot – KL,2004 Lessons: Recent Personal Experiences – II  Emergency services  Demand for periodic QOS  Possibility of local structure, without global coordination  Multiaddressing (mobility/multihoming)  Infrastructure vs. Endpoints  Common core vs. specialized mechanisms  IETF  Reduced timeliness and productivity  Fragmented, complicated mechanisms (sigh)  And (sigh) ICANN  Nothing is mundane  Emergency services  Demand for periodic QOS  Possibility of local structure, without global coordination  Multiaddressing (mobility/multihoming)  Infrastructure vs. Endpoints  Common core vs. specialized mechanisms  IETF  Reduced timeliness and productivity  Fragmented, complicated mechanisms (sigh)  And (sigh) ICANN  Nothing is mundane

5 5 D. CrockerApricot – KL,2004 Basics in Scaling: More and Faster 56 kbps  1+ gbps Bandwidth: 56 kbps  1+ gbps Tune performance parameters 1  140,000+ Networks: 1  140,000+ Hierarchical and area routing 4  4 million(?) Hosts and routers: 4  4 million(?) Address space, and maybe namespace 500  500 million Users:500  500 million 5  13 User Application Protocols: 5  13 Not so impressive… 56 kbps  1+ gbps Bandwidth: 56 kbps  1+ gbps Tune performance parameters 1  140,000+ Networks: 1  140,000+ Hierarchical and area routing 4  4 million(?) Hosts and routers: 4  4 million(?) Address space, and maybe namespace 500  500 million Users:500  500 million 5  13 User Application Protocols: 5  13 Not so impressive… Continue what we have been doing for 35 years

6 6 D. CrockerApricot – KL,2004 Threat to End-to-End Model?  End-to-End has never been about “direct” exchanges  Packet-switching is based on mediation  Inter-networking – AS, OSPF vs. BGP  , of course  Mediation is our friend  Divide-and-conquer makes scaling tractable  Even “peer-to-peer” requires mediation, e.g., rendezvous “tussle”  These are “tussle” boundaries (Clark, et al)  One challenge is that we have more tussles, at more levels  The real challenge is to make designs that anticipate boundaries  End-to-End has never been about “direct” exchanges  Packet-switching is based on mediation  Inter-networking – AS, OSPF vs. BGP  , of course  Mediation is our friend  Divide-and-conquer makes scaling tractable  Even “peer-to-peer” requires mediation, e.g., rendezvous “tussle”  These are “tussle” boundaries (Clark, et al)  One challenge is that we have more tussles, at more levels  The real challenge is to make designs that anticipate boundaries

7 7 D. CrockerApricot – KL,2004 End-to-End Should Mean… model  Design a peer-to-peer model, if possible  Design for interactions between endpoints  Internet model of minimal infrastructure service  Design complexity at the edges  When it becomes popular, it looks like infrastructure  Design for edge network versus edge host operation  Infrastructure net vs. edge net vs. edge host operation  When design must specify new infrastructure  Add it as adjunct to endpoints  Add it for special cases, only, if possible model  Design a peer-to-peer model, if possible  Design for interactions between endpoints  Internet model of minimal infrastructure service  Design complexity at the edges  When it becomes popular, it looks like infrastructure  Design for edge network versus edge host operation  Infrastructure net vs. edge net vs. edge host operation  When design must specify new infrastructure  Add it as adjunct to endpoints  Add it for special cases, only, if possible

8 8 D. CrockerApricot – KL,2004 MultiaddressingMultiaddressing  Overlapping requirements Mobility: Different addresses over time Multihoming : Different addresses at the same time  Hosts need to add/remove locators dynamically  And it would be nice to preserve existing connections  Architectural challenges  Find a destination that is mobile or behind a firewall  Change the infrastructure versus add to transport or new “wedge” layer?  Separate identifiers from locators  New identifier space versus use existing one?  Put Identifier into every payload packet?  Overlapping requirements Mobility: Different addresses over time Multihoming : Different addresses at the same time  Hosts need to add/remove locators dynamically  And it would be nice to preserve existing connections  Architectural challenges  Find a destination that is mobile or behind a firewall  Change the infrastructure versus add to transport or new “wedge” layer?  Separate identifiers from locators  New identifier space versus use existing one?  Put Identifier into every payload packet?

9 9 D. CrockerApricot – KL,2004 SpamSpam  is more complex than people usually realize  And having to worry about human factors is distracting  Spam is a social problem  Technical solutions need to follow the social assessment  Technicians make bad social scientists  Social scientists make bad engineers  Complicated and simplistic solutions will be damaging  There is no such thing as an “interim” solution  is more complex than people usually realize  And having to worry about human factors is distracting  Spam is a social problem  Technical solutions need to follow the social assessment  Technicians make bad social scientists  Social scientists make bad engineers  Complicated and simplistic solutions will be damaging  There is no such thing as an “interim” solution

10 D. CrockerApricot – KL,2004 ObservationsObservations very  New applications propagate very slowly much  Modified applications propagate much slower  Rate of adoption depends of adoptee incentives  Internet architecture is getting more fragmented  Uncoordinated, piecemeal designs  Large, cumbersome designs  Failure to incorporate reality of user-driven intermediaries  Scaling issues get little serious attention during design  Large-scale use  Large-scale administration and operations very  New applications propagate very slowly much  Modified applications propagate much slower  Rate of adoption depends of adoptee incentives  Internet architecture is getting more fragmented  Uncoordinated, piecemeal designs  Large, cumbersome designs  Failure to incorporate reality of user-driven intermediaries  Scaling issues get little serious attention during design  Large-scale use  Large-scale administration and operations

11 D. CrockerApricot – KL,2004 The Balancing Act  Simpler designs  Long list of “requirements” is for the future  Only a subset needs to be satisfied initially  Much quicker specification cycles  Permits incremental enhancement, based on experience  More cross-area coordination, sooner  Applications, operations, security, management  Simpler designs  Long list of “requirements” is for the future  Only a subset needs to be satisfied initially  Much quicker specification cycles  Permits incremental enhancement, based on experience  More cross-area coordination, sooner  Applications, operations, security, management

12 D. CrockerApricot – KL,2004 Terima Kasih