1 / 46

Growing Pains: The Internet in Adolescence

Growing Pains: The Internet in Adolescence. Fred Baker ISOC Chairman of the Board Cisco Fellow. The parable of the swing. The optical internet backbone Gigabit to terabit links. Access networks xDSL, cable modem, ISDN, asynchronous dial

Télécharger la présentation

Growing Pains: The Internet in Adolescence

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Growing Pains:The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow

  2. The parable of the swing

  3. The optical internet backbone Gigabit to terabit links Access networks xDSL, cable modem, ISDN, asynchronous dial 20,000 instantaneous sessions per GBPS backbone bandwidth Today’s Internet Campus Networks (LANs) Internet in Airlines

  4. Brief History of the Internet Comic Book to Cyberspace

  5. Len Kleinrock, 1962 The strength of a chain is its weakest link The strength of a web is its surviving path Datagram Switching Developed at UCLA+Xerox PARC DARPA Funding Datagram Switching

  6. Early commercialization Source: http://www.cidr-report.org Killer Applications: Early Business Adoption Borderless Business Mail, FTP, Archie, Network News Consumer Adoption Multi-player Games WWW, IRC Projected routing table growth without CIDR/NAT Moore’s Law and NATs, with aggressive address conservation policy, make routing work today Deployment Period of CIDR

  7. Marketing rushes in where engineering fears to tread • Internet bubble: • “Build it and they will come” • “New Economy” where profitability is irrelevant • “.com” era

  8. Profitability… • …The Final Frontier. • Companies are operating on the premise that if it doesn’t make money, it is not a good business to be in…

  9. Status of Internet Technology in developed nations • A utility: • Water, Sewer • Electricity, Natural Gas • Telephone • Internet • Internet access and facility is assumed in education, business, and increasingly in society

  10. The Digital Divide • “In addressing the digital divide, Uganda and other countries in the region face three broad challenges: • Creating and exploiting access to external information resources; • Creating internal information resources; • Creating and exploiting access to internal information resources. • A common underlying factor that cuts across the three broad challenges is the need for a competent human resource.” Dr. F. F. Tusubira Makerere University, February 2003

  11. Telephones/Point to Point Need an address when you call them, and are therefore servers in private realm For web: Sufficient to have clients in private address spaces access servers in global address space Client/Server Architecture is overtaken by events Private Address Realm Global Addressing Realm Private Address Realm

  12. Who are today’s application innovators? • Open Source example: Freenet/KaZaA • Large-scale peer-to-peer network • Pools the power of member computers • Create a massive virtual information store • Open to anyone • Highly survivable, private, secure, efficient, • http://www.firenze.linux.it/~marcoc/index.php?page=whatis

  13. History of the IETF

  14. Originally supporting Research Networks • Dates: • Started 1986 • Non-US participation by 1988 • First non-US meeting: Vancouver, August 1990 • Constituents: • Originally US Government only • Added NSFNET (NRN), education, research • Eventually added vendors • The government left… • International participation

  15. Characterizing the community: • Semi-homogenous • People largely knew and trusted each other • “Netiquette” • Anti-social behavior drew direct and public censure as “impolite” • Key interest: • Making the Internet interesting and useful for themselves and their friends.

  16. IETF Mission Statement • Make the Internet Work • Whatever it takes… • But what is the Internet? • IPv4? IPv6? MPLS? • Applications like WWW? Mail? VoIP?

  17. End to End principle Robustness principle Rough Consensus and Running Code Institutionalized altruism Mutual Benefit Managed Trust Highly relational Principle of least surprise Openness Anti-kings Achieving “right” results because they are right Historical principles

  18. Now supporting all IP-based Networks • Constituents: • Researchers • Network Operators • ISP, NRN, Enterprise • Implementers (engineers, often from vendors) • Large percentage of attendees • Interactions with various governments… • Fully international participation

  19. Characterizing the community: • Heterogeneous • Business reasons for involvement • “Netiquette” • Expectation of safe environment • Moving towards codification of expectations • Key interest: • Defining technology to use or to sell

  20. Undercurrents • Business agenda • Business relationships rather than personal relationships • Political process • Intellectual Property Issues • About protecting ideas, not sharing them • Civil servants as leaders

  21. IETF: in a maze of twisty passages – all different

  22. What makes IETF hard?Breakdown of trust • Community sees leaders as a cabal • Leaders see community that designs for narrow scope of applicability or misses key issues

  23. What makes IETF hard?Opaque processes • RFC Editor • Secretariat • Internet Assigned Number Authority • Internet Engineering Steering Group • Internet Architecture Board

  24. What makes IETF hard?Consensus process • Lack of comment interpreted as consent, but may mean loss of interest • Consensus may not be desired by participants seeking market share

  25. What makes IETF hard?Personal responsibility • Expectation that “they” should do something: • IETF composed of people, and people do the work • Personal involvement essential to progress

  26. The IESG is rapidly approaching a solution

  27. Sounds like bad news • Not really • The IETF is just deciding what it wants to be when it grows up… • Quite a bit of good work going on there • Other groups of interest • NANOG, Apricot, RIPE, etc • Many others

  28. What is next for the Internet?

  29. High-end research backbones • Combining IP routing and optical routing in overlay networks • “Designer networks” for research purposes • Production networks for applications • What parts of network to research? • Routing (IP, Optical) • Applications • IPv6-based

  30. Dark Fiber / Lambda / 10G NYC CHI Edmonton Alberta LON FRA POZ KRA SE PAR MIL COP CERN VIE ATH BUD AMS PRA LambdaNet / 2,5G GARDENNetwork Topology NTT via NYI to SuperSINET *) *) UKLight *) CANARIE 1GE to 10GE To US T-Systems NetherLight Global Crossing DANTE POP StarLight Chicago SurfNet / 10G CESNET / 2,5G *) under discussion Nordic Connections Ukerna / 10G via GEANT / 2.5G via SWITCH / 2.5G High Speed Optical Domains

  31. High Bandwidth Real Time Applications WP6 Advanced Protocol & Service Deployment WP2 Protocol & Architecture Research WP3 Measurement Security & AAA WP4 Mgmt & Provisioning WP5 Project Management WP0 Technical Support, Dissemination, Training and Demonstration WP7 Integrated IP + Optical Network WP1 GARDENProject Structure

  32. 10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Production Network 中央研究院 台灣大學 東華大學 Taipei C7609 C7609 中央大學 C7609 C7609 GSR 中正大學 交通大學 C7609 C7609 成功大學 TWAREN C7609 GSR GSR 新竹 Tainan Hsin-chu 暨南大學 中興大學 清華大學 GSR 中山大學 C7609 C7609 C7609 C7609 Taichung

  33. 10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Research Network 中央研究院 台灣大學 Taipei C7609 GSR C7609 東華大學 C7609 ONS15600 ONS15454 ONS15454 TWAREN 中央大學 中正大學 ONS15454 ONS15454 C7609 C7609 Hsin-chu Tainan ONS15600 ONS15600 成功大學 交通大學 C7609 GSR GSR C7609 ONS15454 清華大學 GSR 中山大學 C7609 ONS15454 中興大學 C7609 Taichung 暨南大學 C7609 C7609

  34. 電路數量 (#) 10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Optical Network -1 中央研究院 東華大學 C7609 台灣大學 Taipei (2) C7609 C7609 GSR ONS15454 (2) (2) ONS15454 ONS15454 (2) (6) 中正大學 中央大學 ONS15600 C7609 C7609 ONS15454 (2) (2) ONS15454 ONS15454 TWAREN ONS15454 交通大學 ONS15454 成功大學 Tainan C7609 ONS15600 (6) ONS15600 (6) (3) C7609 (3) (2) GSR (2) Hsin-chu ONS15454 GSR ONS15454 ONS15454 (4) (2) 中山大學 清華大學 暨南大學 中興大學 GSR C7609 C7609 C7609 C7609 (2) Taichung (2) (2) (2) ONS15454 ONS15454 ONS15454 ONS15454

  35. Proposed UN-FAO “Growing Connection”: Ghana 384 KBPS Or E1 Internet Long distance IEEE 802.11 Database.library.de Village.school.gh several PCs + Router Village.school.gh several PCs + Router Village.school.gh several PCs + Router 42 42 42

  36. “Enterprise” infrastructure network Connects roaming devices which themselves form the infrastructure Neighbor relationships change randomly in routing Not appropriate as backbone Fundamental issue: Not “can I find the addressed device/prefix in my network”, but “Is there a usable route to the addressed device/prefix.” Manet looks at a mobile infrastructure 43 43 43

  37. We trust people to access servers and do limited operations on them As a result, we limit our applications by the power of the servers we run them on Today’s Client/Server access control 44 44 44

  38. Let everyone talk Distributed computing Peer computers to perform function, not server Central Authentication/ Authorization Access control Accountability Peer-peer access control model 45 45 45

  39. What needs to change? • Effective prophylactic security • Firewall ≠ Network Address Translator • Secure Firewall Traversal • Secure identity/authority management • Spam management… • Good point-to-point application software and models (Freenet/KaZaA?) • Managability…

  40. “As new IP communications services and devices become available, they may stimulate new demand and increase VoIP traffic flows beyond the growth rates characteristic of the traditional voice telephony market. … the total market may reach … six percent of the world's forecasted international traffic for the calendar year 2001” Telegeography 2002 47 47 47

  41. Voice/Video on IP networks Billing/ Authorization Control Plane Data Path

  42. Video on Demand… Internet Router located in the POP Video-on-demand Server located in the POP 100-baseT to Home Carrying multiple Video streams plus Voice and data

  43. Forensics in an Internet environment Who did they “speak” with? What did they “say”? IP Control Traffic Control Device: Call Manager, SIP Proxy, Authentication Server, etc IP Data Log Stream Control Mediation Data ACL Intercept Configuration Warrant Intercepted Data Intercepted Information Data Mediation

  44. Growing Up… • Profitability… • User-tolerant (if not friendly) applications • Business-tolerant applications… • Manageable applications and networks • Convergence…

  45. Growing Pains:The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow

More Related