growing pains: the internet in adolescence
DESCRIPTION
Growing Pains: The Internet in Adolescence. Fred Baker ISOC Chairman of the Board Cisco Fellow. The parable of the swing. The optical internet backbone Gigabit to terabit links. Access networks xDSL, cable modem, ISDN, asynchronous dial - PowerPoint PPT PresentationTRANSCRIPT
Today’s Internet The optical internet backbone
Gigabit to terabit links
U N I V E R S I T YU N I V E R S I T Y Access networks
xDSL, cable modem, ISDN, asynchronous dial20,000 instantaneous sessions per GBPS backbone bandwidth
Campus Networks (LANs)
Internetin Airlines
Datagram Switching Len Kleinrock, 1962
The strength of a chain is its weakest link
The strength of a web is its surviving path
Datagram Switching Developed at
UCLA+Xerox PARC DARPA Funding
Early commercialization
Projected routing table growth without CIDR/NAT
Deployment Period of CIDR
Moore’s Law and NATs,with aggressive address
conservation policy, makerouting work today
Source: http://www.cidr-report.org
Killer Applications:
Mail, FTP, Archie,Network News
WWW, IRCConsumerAdoption
BorderlessBusiness
Early BusinessAdoption
Multi-playerGames
Marketing rushes in where engineering fears to tread
Internet bubble: “Build it and they will come” “New Economy” where profitability is
irrelevant “.com” era
Profitability…
…The Final Frontier.
Companies are operating on the premise that if it doesn’t make money, it is not a good business to be in…
Status of Internet Technology in developed nations
A utility: Water, Sewer Electricity, Natural Gas Telephone Internet
Internet access and facility is assumed in education, business, and increasingly in society
Dr. F. F. Tusubira
Makerere University, February 2003
The Digital Divide “In addressing the digital divide,
Uganda and other countries in the region face three broad challenges: Creating and exploiting access to external
information resources; Creating internal information resources; Creating and exploiting access to internal
information resources. A common underlying factor that cuts
across the three broad challenges is the need for a competent human resource.”
Client/Server Architecture is overtaken by events
GlobalAddressing
Realm
PrivateAddressRealm
PrivateAddressRealm
Telephones/Point to Point Need an address when you
call them, and are therefore servers in private realm
For web: Sufficient to have
clients in private address spaces access servers in global address space
Who are today’s application innovators?
Open Source example: Freenet/KaZaA Large-scale peer-to-peer network Pools the power of member computers Create a massive virtual information store Open to anyone Highly survivable, private, secure, efficient,
http://www.firenze.linux.it/~marcoc/index.php?page=whatis
Originally supporting Research Networks Dates:
Started 1986 Non-US participation by 1988 First non-US meeting: Vancouver, August
1990 Constituents:
Originally US Government only Added NSFNET (NRN), education, research Eventually added vendors The government left… International participation
Characterizing the community: Semi-homogenous
People largely knew and trusted each other “Netiquette”
Anti-social behavior drew direct and public censure as “impolite”
Key interest: Making the Internet interesting and useful
for themselves and their friends.
IETF Mission Statement
Make the Internet Work Whatever it takes…
But what is the Internet? IPv4? IPv6? MPLS? Applications like WWW? Mail? VoIP?
Historical principles End to End
principle Robustness
principle Rough Consensus
and Running Code Institutionalized
altruism Mutual Benefit
Managed Trust Highly relational Principle of least
surprise Openness Anti-kings Achieving “right”
results because they are right
Now supporting all IP-based Networks Constituents:
Researchers Network Operators
ISP, NRN, Enterprise Implementers (engineers, often from
vendors) Large percentage of attendees
Interactions with various governments… Fully international participation
Characterizing the community: Heterogeneous
Business reasons for involvement “Netiquette”
Expectation of safe environment Moving towards codification of
expectations Key interest:
Defining technology to use or to sell
Undercurrents
Business agenda Business relationships rather than
personal relationships Political process
Intellectual Property Issues About protecting ideas, not sharing
them Civil servants as leaders
What makes IETF hard?Breakdown of trust
Community sees leaders as a cabal Leaders see community that
designs for narrow scope of applicability or misses key issues
What makes IETF hard?Opaque processes
RFC Editor Secretariat Internet Assigned Number
Authority Internet Engineering Steering
Group Internet Architecture Board
What makes IETF hard?Consensus process
Lack of comment interpreted as consent, but may mean loss of interest
Consensus may not be desired by participants seeking market share
What makes IETF hard?Personal responsibility
Expectation that “they” should do something: IETF composed of people, and people
do the work Personal involvement essential to
progress
Sounds like bad news
Not really The IETF is just deciding what it wants
to be when it grows up… Quite a bit of good work going on
there
Other groups of interest NANOG, Apricot, RIPE, etc Many others
High-end research backbones Combining IP routing and optical
routing in overlay networks “Designer networks” for research
purposes Production networks for applications
What parts of network to research? Routing (IP, Optical) Applications IPv6-based
GARDENNetwork Topology
KRA
POZ
SE
FRA
COP
PRA
To US
NTT via NYI to SuperSINET *)
LONUKLight *)
StarLight Chicago
T-Systems
Global Crossing
NetherLight
DANTE POP
CHICANARIE1GE to 10GE
PAR
AMS
*)
MIL
CERNVIE
Dark Fiber / Lambda / 10G
LambdaNet / 2,5G
SurfNet / 10G
CESNET / 2,5G
*) under discussionNordic Connections
Ukerna / 10G
via GEANT / 2.5G
via SWITCH / 2.5G
High Speed Optical DomainsATH
BUD
Edmonton Alberta
NYC
GARDENProject Structure
High BandwidthHigh BandwidthReal Time ApplicationsReal Time Applications
WP6WP6
High BandwidthHigh BandwidthReal Time ApplicationsReal Time Applications
WP6WP6
Integrated IP + OpticalIntegrated IP + OpticalNetworkNetwork
WP1WP1
Integrated IP + OpticalIntegrated IP + OpticalNetworkNetwork
WP1WP1
AdvancedAdvancedProtocolProtocol
& Service & Service DeploymentDeployment
WP2WP2
AdvancedAdvancedProtocolProtocol
& Service & Service DeploymentDeployment
WP2WP2
ProtocolProtocol&&
ArchitectureArchitectureResearchResearch
WP3WP3
ProtocolProtocol&&
ArchitectureArchitectureResearchResearch
WP3WP3
MeasurementMeasurementSecuritySecurity& AAA& AAAWP4WP4
MeasurementMeasurementSecuritySecurity& AAA& AAAWP4WP4
MgmtMgmt&&
ProvisioningProvisioningWP5WP5
MgmtMgmt&&
ProvisioningProvisioningWP5WP5
Pro
ject Man
agem
ent
Pro
ject Man
agem
ent
WP
0W
P0
Pro
ject Man
agem
ent
Pro
ject Man
agem
ent
WP
0W
P0
Tech
nical S
up
po
rt, Dissem
inatio
n,
Tech
nical S
up
po
rt, Dissem
inatio
n,
Train
ing
and
Dem
on
stration
Train
ing
and
Dem
on
stration
WP
7W
P7
Tech
nical S
up
po
rt, Dissem
inatio
n,
Tech
nical S
up
po
rt, Dissem
inatio
n,
Train
ing
and
Dem
on
stration
Train
ing
and
Dem
on
stration
WP
7W
P7
Production Network
Taipei
Taichung
Tainan新竹
中央研究院東華大學
交通大學
清華大學 中興大學 暨南大學中山大學
成功大學
中正大學
中央大學
台灣大學
TWAREN
Optical
Production
Research
10GE
STM-64/OC-192
STM-16/OC-48
GE
建議電路
C7609
C7609
C7609
C7609
C7609
C7609 C7609
C7609
C7609
C7609C7609
GSR
GSR
GSR
GSR
Hsin-chu
Research NetworkOptical
Production
Research
10GE
STM-64/OC-192
STM-16/OC-48
GE
建議電路
TWAREN
ONS15600 ONS15600
GSR
GSR GSR
ONS15454 ONS15454
ONS15454
GSR
ONS15454
交通大學
中央大學
台灣大學
C7609
C7609
C7609
清華大學
中興大學C7609
C7609
中央研究院
東華大學
中正大學
C7609
C7609
C7609
ONS15454
中山大學
C7609
C7609
成功大學
暨南大學C7609
ONS15600
ONS15454
Taipei
Taichung
TainanHsin-chu
Optical Network -1Optical
Production
Research
TWAREN
ONS15600 ONS15600
GSR
GSRGSR
ONS15454ONS15454
ONS15454
GSR
ONS15454
中央研究院
ONS15600
C7609
ONS15454
C7609
ONS15454
C7609
ONS15454
C7609
ONS15454
中正大學
成功大學
中山大學
C7609
ONS15454
暨南大學
C7609
ONS15454
台灣大學
C7609
ONS15454
交通大學
C7609
ONS15454
中興大學C7609
ONS15454
清華大學
C7609
ONS15454
中央大學
C7609
ONS15454
東華大學
10GE
STM-64/OC-192
STM-16/OC-48
GE
建議電路(#) 電路數量
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)(2)
(4)
(2)
(2)
(6) (6)
(6) (2)
(3)
(2)
(3)
Taipei
Taichung
Tainan
Hsin-chu
424242
Proposed UN-FAO “Growing Connection”: Ghana
384 KBPSOr E1
Village.school.ghseveral PCs + Router
Long distanceIEEE 802.11
Database.library.de
Internet
Village.school.ghseveral PCs + Router
Village.school.ghseveral PCs + Router
434343
Manet looks at a mobile infrastructure
“Enterprise” infrastructure network Connects roaming devices which
themselves form the infrastructure Neighbor relationships change
randomly in routing Not appropriate as backbone
Fundamental issue: Not “can I find the addressed
device/prefix in my network”, but “Is there a usable route to the
addressed device/prefix.”
444444
Today’s Client/Server access control
We trust people to access servers and do limited operations on them
As a result, we limit our applications by the power of the servers we run them on
454545
Peer-peer access control model
Let everyone talk Distributed computing Peer computers to
perform function, not server
Central Authentication/ Authorization Access control Accountability
What needs to change? Effective prophylactic security
Firewall ≠ Network Address Translator Secure Firewall Traversal Secure identity/authority management
Spam management… Good point-to-point application
software and models (Freenet/KaZaA?)
Managability…
474747
“As new IP communications services and devices become available, they may stimulate new demand and increase VoIP traffic flows beyond the growth rates characteristic of the traditional voice telephony market.
… the total market may reach … six percent of the world's forecasted international traffic for the calendar year 2001”
Telegeography 2002
Video on Demand…
100-baseT to HomeCarrying multipleVideo streams plusVoice and data
Video-on-demandServer located inthe POP
Internet Routerlocated in the POP
Forensics in an Internet environment
Who did they “speak” with? What did they “say”?
IP Data
IP ControlTraffic
Control Device:Call Manager, SIP Proxy,
Authentication Server, etc LogStream
WarrantInterceptConfiguration
Data ACL
InterceptedData
InterceptedInformation
ControlMediation
Data Mediation
Growing Up…
Profitability… User-tolerant (if not friendly)
applications Business-tolerant applications… Manageable applications and
networks Convergence…