Growing Pains: The Internet in Adolescence - PowerPoint PPT Presentation

About This Presentation
Title:

Growing Pains: The Internet in Adolescence

Description:

Growing Pains: The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow The parable of the swing Today s Internet The optical internet ... – PowerPoint PPT presentation

Number of Views:257
Avg rating:3.0/5.0
Slides: 47
Provided by: FredB159
Category:

less

Transcript and Presenter's Notes

Title: Growing Pains: The Internet in Adolescence


1
Growing PainsThe Internet in Adolescence
  • Fred Baker
  • ISOC Chairman of the Board
  • Cisco Fellow

2
The parable of the swing
3
(No Transcript)
4
Todays Internet
  • The optical internet backbone
  • Gigabit to terabit links

Campus Networks (LANs)
Internet in Airlines
  • Access networks
  • xDSL, cable modem, ISDN, asynchronous dial
  • 20,000 instantaneous sessions per GBPS backbone
    bandwidth

5
Brief History of the Internet
  • Comic Book to Cyberspace

6
Datagram Switching
  • Len Kleinrock, 1962
  • The strength of a chain is its weakest link
  • The strength of a web is its surviving path
  • Datagram Switching
  • Developed at UCLAXerox PARC
  • DARPA Funding

7
Early commercialization
Source http//www.cidr-report.org
Killer Applications
Borderless Business
Early Business Adoption
Mail, FTP, Archie, Network News
Consumer Adoption
Multi-player Games
WWW, IRC
Projected routing table growth without CIDR/NAT
Moores Law and NATs, with aggressive
address conservation policy, make routing work
today
Deployment Period of CIDR
8
Marketing rushes in where engineering fears to
tread
  • Internet bubble
  • Build it and they will come
  • New Economy where profitability is irrelevant
  • .com era

9
Profitability
  • The Final Frontier.
  • Companies are operating on the premise that if it
    doesnt make money, it is not a good business to
    be in

10
Status of Internet Technology in developed nations
  • A utility
  • Water, Sewer
  • Electricity, Natural Gas
  • Telephone
  • Internet
  • Internet access and facility is assumed in
    education, business, and increasingly in society

11
The Digital Divide
  • In addressing the digital divide, Uganda and
    other countries in the region face three broad
    challenges
  • Creating and exploiting access to external
    information resources
  • Creating internal information resources
  • Creating and exploiting access to internal
    information resources.
  • A common underlying factor that cuts across the
    three broad challenges is the need for a
    competent human resource.

Dr. F. F. Tusubira Makerere University, February
2003
12
Client/Server Architecture is overtaken by events
  • For web
  • Sufficient to have clients in private address
    spaces access servers in global address space

Private Address Realm
Global Addressing Realm
Private Address Realm
  • Telephones/Point to Point
  • Need an address when you call them, and are
    therefore servers in private realm

13
Who are todays application innovators?
  • Open Source example Freenet/KaZaA
  • Large-scale peer-to-peer network
  • Pools the power of member computers
  • Create a massive virtual information store
  • Open to anyone
  • Highly survivable, private, secure, efficient,
  • http//www.firenze.linux.it/marcoc/index.php?page
    whatis

14
History of the IETF
15
Originally supporting Research Networks
  • Dates
  • Started 1986
  • Non-US participation by 1988
  • First non-US meeting Vancouver, August 1990
  • Constituents
  • Originally US Government only
  • Added NSFNET (NRN), education, research
  • Eventually added vendors
  • The government left
  • International participation

16
Characterizing the community
  • Semi-homogenous
  • People largely knew and trusted each other
  • Netiquette
  • Anti-social behavior drew direct and public
    censure as impolite
  • Key interest
  • Making the Internet interesting and useful for
    themselves and their friends.

17
IETF Mission Statement
  • Make the Internet Work
  • Whatever it takes
  • But what is the Internet?
  • IPv4? IPv6? MPLS?
  • Applications like WWW? Mail? VoIP?

18
Historical principles
  • End to End principle
  • Robustness principle
  • Rough Consensus and Running Code
  • Institutionalized altruism
  • Mutual Benefit
  • Managed Trust
  • Highly relational
  • Principle of least surprise
  • Openness
  • Anti-kings
  • Achieving right results because they are right

19
Now supporting all IP-based Networks
  • Constituents
  • Researchers
  • Network Operators
  • ISP, NRN, Enterprise
  • Implementers (engineers, often from vendors)
  • Large percentage of attendees
  • Interactions with various governments
  • Fully international participation

20
Characterizing the community
  • Heterogeneous
  • Business reasons for involvement
  • Netiquette
  • Expectation of safe environment
  • Moving towards codification of expectations
  • Key interest
  • Defining technology to use or to sell

21
Undercurrents
  • Business agenda
  • Business relationships rather than personal
    relationships
  • Political process
  • Intellectual Property Issues
  • About protecting ideas, not sharing them
  • Civil servants as leaders

22
IETF in a maze of twisty passages all different
23
What makes IETF hard?Breakdown of trust
  • Community sees leaders as a cabal
  • Leaders see community that designs for narrow
    scope of applicability or misses key issues

24
What makes IETF hard?Opaque processes
  • RFC Editor
  • Secretariat
  • Internet Assigned Number Authority
  • Internet Engineering Steering Group
  • Internet Architecture Board

25
What makes IETF hard?Consensus process
  • Lack of comment interpreted as consent, but may
    mean loss of interest
  • Consensus may not be desired by participants
    seeking market share

26
What makes IETF hard?Personal responsibility
  • Expectation that they should do something
  • IETF composed of people, and people do the work
  • Personal involvement essential to progress

27
The possibilities are exciting
28
Specific issues IETF is dealing with
29
Status of structural discussion
  • Structural discussion organized in two phases
  • Identify what the problems are (the Problem WG)
  • Address the problems
  • Multiple efforts, with individual lifetimes,
    control patterns and agendas.
  • Document management processes key to managing
    work flow

30
IETF Mission a shared viewpoint?
  • The logical response to this
  • formulate the IETF's mission in terms that the
    community can agree with.
  • The Problem WG design team working on a proposal
  • What is needs to say
  • The IETF makes the Internet work
  • The Internet consists of SOHO, Enterprise, Access
    Provider, and Transit Provider networks
  • Solutions must span networks while meeting local
    requirements

31
Issues raised
  • Engineering Practices
  • Handling Large and/or Complex Problems
  • Workload Exceeds the Number of Fully Engaged
    Participants
  • Managing topics and activity
  • Management of complexity

32
Use of standards hierarchy
  • Proposed Standards
  • First stage standards
  • Not necessarily tested for interoperability
  • Best Current Practices
  • Policies
  • Informational documents
  • Example PPPOE

33
The IESG is rapidly approaching a solution
34
Sounds like bad news
  • Not really
  • The IETF is just deciding what it wants to be
    when it grows up
  • Quite a bit of good work going on there
  • Other groups of interest
  • NANOG, Apricot, RIPE, etc
  • Many others

35
What is next for the Internet?
36
High-end research backbones
  • Combining IP routing and optical routing in
    overlay networks
  • Designer networks for research purposes
  • Production networks for applications
  • What parts of network to research?
  • Routing (IP, Optical)
  • Applications
  • IPv6-based

37
GARDENNetwork Topology
NTT via NYI to SuperSINET )
)
UKLight )
CANARIE 1GE to 10GE
To US
T-Systems
NetherLight
Global Crossing
DANTE POP
StarLight Chicago
SurfNet / 10G
CESNET / 2,5G
) under discussion
Nordic Connections
Ukerna / 10G
via GEANT / 2.5G
via SWITCH / 2.5G
High Speed Optical Domains
38
GARDENProject Structure
39
Production Network
?????
????
????
Taipei
C7609
C7609
????
C7609
C7609
GSR
????
????
C7609
C7609
????
TWAREN
C7609
GSR
GSR
??
Tainan
Hsin-chu
????
????
????
GSR
????
C7609
C7609
C7609
C7609
Taichung
40
Research Network
?????
????
Taipei
C7609
GSR
C7609
????
C7609
ONS15600
ONS15454
ONS15454
TWAREN
????
????
ONS15454
ONS15454
C7609
C7609
Hsin-chu
Tainan
ONS15600
ONS15600
????
????
C7609
GSR
GSR
C7609
ONS15454
????
GSR
????
C7609
ONS15454
????
C7609
Taichung
C7609
????
C7609
41
Optical Network -1
?????
????
C7609
????
Taipei
(2)
C7609
C7609
GSR
ONS15454
(2)
(2)
ONS15454
ONS15454
(2)
(6)
????
????
ONS15600
C7609
C7609
ONS15454
(2)
(2)
ONS15454
ONS15454
TWAREN
ONS15454
????
ONS15454
????
Tainan
C7609
ONS15600
ONS15600
(6)
(6)
(3)
C7609
(3)
(2)
GSR
(2)
Hsin-chu
ONS15454
GSR
ONS15454
ONS15454
(4)
(2)
????
????
????
????
GSR
C7609
C7609
C7609
C7609
(2)
(2)
Taichung
(2)
(2)
ONS15454
ONS15454
ONS15454
ONS15454
42
Proposed UN-FAO Growing Connection Ghana
384 KBPS Or E1
Internet
Long distance IEEE 802.11
Database.library.de
Village.school.gh several PCs Router
Village.school.gh several PCs Router
Village.school.gh several PCs Router
42
42
42
43
Manet looks at a mobile infrastructure
  • Enterprise infrastructure network
  • Connects roaming devices which themselves form
    the infrastructure
  • Neighbor relationships change randomly in routing
  • Not appropriate as backbone
  • Fundamental issue
  • Not can I find the addressed device/prefix in my
    network, but
  • Is there a usable route to the addressed
    device/prefix.

43
43
43
44
Todays Client/Server access control
  • We trust people to access servers and do limited
    operations on them
  • As a result, we limit our applications by the
    power of the servers we run them on

44
44
44
45
Peer-peer access control model
  • Let everyone talk
  • Distributed computing
  • Peer computers to perform function, not server
  • Central Authentication/ Authorization
  • Access control
  • Accountability

45
45
45
46
What needs to change?
  • Effective prophylactic security
  • Firewall ? Network Address Translator
  • Secure Firewall Traversal
  • Secure identity/authority management
  • Spam management
  • Good point-to-point application software and
    models (Freenet/KaZaA?)
  • Managability

47
As new IP communications services and devices
become available, they may stimulate new demand
and increase VoIP traffic flows beyond the growth
rates characteristic of the traditional voice
telephony market. the total market may reach
six percent of the world's forecasted
international traffic for the calendar year 2001
Telegeography 2002
47
47
47
48
Voice/Video on IP networks
Billing/ Authorization
Control Plane
Data Path
49
Video on Demand
Internet Router located in the POP
Video-on-demand Server located in the POP
100-baseT to Home Carrying multiple Video streams
plus Voice and data
50
Forensics in an Internet environment
  • Who did they speak with?
  • What did they say?

IP Control Traffic
Control Device Call Manager, SIP Proxy,
Authentication Server, etc
IP Data
Log Stream
Control Mediation
Data ACL
Intercept Configuration
Warrant
Intercepted Data
Intercepted Information
Data Mediation
51
Growing Up
  • Profitability
  • User-tolerant (if not friendly) applications
  • Business-tolerant applications
  • Manageable applications and networks
  • Convergence

52
Growing PainsThe Internet in Adolescence
  • Fred Baker
  • ISOC Chairman of the Board
  • Cisco Fellow
Write a Comment
User Comments (0)
About PowerShow.com