growing pains: the internet in adolescence fred baker isoc chairman of the board cisco fellow

46
Growing Pains: The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow

Upload: morgan-booker

Post on 17-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Growing Pains:The Internet in Adolescence

Fred BakerISOC Chairman of the Board

Cisco Fellow

The parable of the swing

Today’s Internet The optical internet backbone

Gigabit to terabit links

U N I V E R S I T YU N I V E R S I T Y Access networks

xDSL, cable modem, ISDN, asynchronous dial20,000 instantaneous sessions per GBPS backbone bandwidth

Campus Networks (LANs)

Internetin Airlines

Brief History of the Internet

Comic Book to Cyberspace

Datagram Switching Len Kleinrock, 1962

The strength of a chain is its weakest link

The strength of a web is its surviving path

Datagram Switching Developed at

UCLA+Xerox PARC DARPA Funding

Early commercialization

Projected routing table growth without CIDR/NAT

Deployment Period of CIDR

Moore’s Law and NATs,with aggressive address

conservation policy, makerouting work today

Source: http://www.cidr-report.org

Killer Applications:

Mail, FTP, Archie,Network News

WWW, IRCConsumerAdoption

BorderlessBusiness

Early BusinessAdoption

Multi-playerGames

Marketing rushes in where engineering fears to tread

Internet bubble: “Build it and they will come” “New Economy” where profitability is

irrelevant “.com” era

Profitability…

…The Final Frontier.

Companies are operating on the premise that if it doesn’t make money, it is not a good business to be in…

Status of Internet Technology in developed nations

A utility: Water, Sewer Electricity, Natural Gas Telephone Internet

Internet access and facility is assumed in education, business, and increasingly in society

Dr. F. F. Tusubira

Makerere University, February 2003

The Digital Divide “In addressing the digital divide,

Uganda and other countries in the region face three broad challenges: Creating and exploiting access to external

information resources; Creating internal information resources; Creating and exploiting access to internal

information resources. A common underlying factor that cuts

across the three broad challenges is the need for a competent human resource.”

Client/Server Architecture is overtaken by events

GlobalAddressing

Realm

PrivateAddressRealm

PrivateAddressRealm

Telephones/Point to Point Need an address when you

call them, and are therefore servers in private realm

For web: Sufficient to have

clients in private address spaces access servers in global address space

Who are today’s application innovators?

Open Source example: Freenet/KaZaA Large-scale peer-to-peer network Pools the power of member computers Create a massive virtual information store Open to anyone Highly survivable, private, secure, efficient,

http://www.firenze.linux.it/~marcoc/index.php?page=whatis

History of the IETF

Originally supporting Research Networks Dates:

Started 1986 Non-US participation by 1988 First non-US meeting: Vancouver, August

1990 Constituents:

Originally US Government only Added NSFNET (NRN), education, research Eventually added vendors The government left… International participation

Characterizing the community: Semi-homogenous

People largely knew and trusted each other “Netiquette”

Anti-social behavior drew direct and public censure as “impolite”

Key interest: Making the Internet interesting and useful

for themselves and their friends.

IETF Mission Statement

Make the Internet Work Whatever it takes…

But what is the Internet? IPv4? IPv6? MPLS? Applications like WWW? Mail? VoIP?

Historical principles End to End

principle Robustness

principle Rough Consensus

and Running Code Institutionalized

altruism Mutual Benefit

Managed Trust Highly relational Principle of least

surprise Openness Anti-kings Achieving “right”

results because they are right

Now supporting all IP-based Networks Constituents:

Researchers Network Operators

ISP, NRN, Enterprise Implementers (engineers, often from

vendors) Large percentage of attendees

Interactions with various governments… Fully international participation

Characterizing the community: Heterogeneous

Business reasons for involvement “Netiquette”

Expectation of safe environment Moving towards codification of

expectations Key interest:

Defining technology to use or to sell

Undercurrents

Business agenda Business relationships rather than

personal relationships Political process

Intellectual Property Issues About protecting ideas, not sharing

them Civil servants as leaders

IETF: in a maze of twisty passages – all different

What makes IETF hard?Breakdown of trust

Community sees leaders as a cabal Leaders see community that

designs for narrow scope of applicability or misses key issues

What makes IETF hard?Opaque processes

RFC Editor Secretariat Internet Assigned Number

Authority Internet Engineering Steering

Group Internet Architecture Board

What makes IETF hard?Consensus process

Lack of comment interpreted as consent, but may mean loss of interest

Consensus may not be desired by participants seeking market share

What makes IETF hard?Personal responsibility

Expectation that “they” should do something: IETF composed of people, and people

do the work Personal involvement essential to

progress

The IESG is rapidly approaching a solution

Sounds like bad news

Not really The IETF is just deciding what it wants

to be when it grows up… Quite a bit of good work going on

there

Other groups of interest NANOG, Apricot, RIPE, etc Many others

What is next for the Internet?

High-end research backbones Combining IP routing and optical

routing in overlay networks “Designer networks” for research

purposes Production networks for applications

What parts of network to research? Routing (IP, Optical) Applications IPv6-based

GARDENNetwork Topology

KRA

POZ

SE

FRA

COP

PRA

To US

NTT via NYI to SuperSINET *)

LONUKLight *)

StarLight Chicago

T-Systems

Global Crossing

NetherLight

DANTE POP

CHICANARIE1GE to 10GE

PAR

AMS

*)

MIL

CERNVIE

Dark Fiber / Lambda / 10G

LambdaNet / 2,5G

SurfNet / 10G

CESNET / 2,5G

*) under discussionNordic Connections

Ukerna / 10G

via GEANT / 2.5G

via SWITCH / 2.5G

High Speed Optical DomainsATH

BUD

Edmonton Alberta

NYC

GARDENProject Structure

High BandwidthHigh BandwidthReal Time ApplicationsReal Time Applications

WP6WP6

High BandwidthHigh BandwidthReal Time ApplicationsReal Time Applications

WP6WP6

Integrated IP + OpticalIntegrated IP + OpticalNetworkNetwork

WP1WP1

Integrated IP + OpticalIntegrated IP + OpticalNetworkNetwork

WP1WP1

AdvancedAdvancedProtocolProtocol

& Service & Service DeploymentDeployment

WP2WP2

AdvancedAdvancedProtocolProtocol

& Service & Service DeploymentDeployment

WP2WP2

ProtocolProtocol&&

ArchitectureArchitectureResearchResearch

WP3WP3

ProtocolProtocol&&

ArchitectureArchitectureResearchResearch

WP3WP3

MeasurementMeasurementSecuritySecurity& AAA& AAAWP4WP4

MeasurementMeasurementSecuritySecurity& AAA& AAAWP4WP4

MgmtMgmt&&

ProvisioningProvisioningWP5WP5

MgmtMgmt&&

ProvisioningProvisioningWP5WP5

Pro

ject Man

agem

ent

Pro

ject Man

agem

ent

WP

0W

P0

Pro

ject Man

agem

ent

Pro

ject Man

agem

ent

WP

0W

P0

Tech

nical S

up

po

rt, Dissem

inatio

n,

Tech

nical S

up

po

rt, Dissem

inatio

n,

Train

ing

and

Dem

on

stration

Train

ing

and

Dem

on

stration

WP

7W

P7

Tech

nical S

up

po

rt, Dissem

inatio

n,

Tech

nical S

up

po

rt, Dissem

inatio

n,

Train

ing

and

Dem

on

stration

Train

ing

and

Dem

on

stration

WP

7W

P7

Production Network

Taipei

Taichung

Tainan新竹

中央研究院東華大學

交通大學

清華大學 中興大學 暨南大學中山大學

成功大學

中正大學

中央大學

台灣大學

TWAREN

Optical

Production

Research

10GE

STM-64/OC-192

STM-16/OC-48

GE

建議電路

C7609

C7609

C7609

C7609

C7609

C7609 C7609

C7609

C7609

C7609C7609

GSR

GSR

GSR

GSR

Hsin-chu

Research NetworkOptical

Production

Research

10GE

STM-64/OC-192

STM-16/OC-48

GE

建議電路

TWAREN

ONS15600 ONS15600

GSR

GSR GSR

ONS15454 ONS15454

ONS15454

GSR

ONS15454

交通大學

中央大學

台灣大學

C7609

C7609

C7609

清華大學

中興大學C7609

C7609

中央研究院

東華大學

中正大學

C7609

C7609

C7609

ONS15454

中山大學

C7609

C7609

成功大學

暨南大學C7609

ONS15600

ONS15454

Taipei

Taichung

TainanHsin-chu

Optical Network -1Optical

Production

Research

TWAREN

ONS15600 ONS15600

GSR

GSRGSR

ONS15454ONS15454

ONS15454

GSR

ONS15454

中央研究院

ONS15600

C7609

ONS15454

C7609

ONS15454

C7609

ONS15454

C7609

ONS15454

中正大學

成功大學

中山大學

C7609

ONS15454

暨南大學

C7609

ONS15454

台灣大學

C7609

ONS15454

交通大學

C7609

ONS15454

中興大學C7609

ONS15454

清華大學

C7609

ONS15454

中央大學

C7609

ONS15454

東華大學

10GE

STM-64/OC-192

STM-16/OC-48

GE

建議電路(#) 電路數量

(2)

(2)

(2)

(2)

(2)

(2)

(2)

(2)(2)

(4)

(2)

(2)

(6) (6)

(6) (2)

(3)

(2)

(3)

Taipei

Taichung

Tainan

Hsin-chu

424242

Proposed UN-FAO “Growing Connection”: Ghana

384 KBPSOr E1

Village.school.ghseveral PCs + Router

Long distanceIEEE 802.11

Database.library.de

Internet

Village.school.ghseveral PCs + Router

Village.school.ghseveral PCs + Router

434343

Manet looks at a mobile infrastructure

“Enterprise” infrastructure network Connects roaming devices which

themselves form the infrastructure Neighbor relationships change

randomly in routing Not appropriate as backbone

Fundamental issue: Not “can I find the addressed

device/prefix in my network”, but “Is there a usable route to the

addressed device/prefix.”

444444

Today’s Client/Server access control

We trust people to access servers and do limited operations on them

As a result, we limit our applications by the power of the servers we run them on

454545

Peer-peer access control model

Let everyone talk Distributed computing Peer computers to

perform function, not server

Central Authentication/ Authorization Access control Accountability

What needs to change? Effective prophylactic security

Firewall ≠ Network Address Translator Secure Firewall Traversal Secure identity/authority management

Spam management… Good point-to-point application

software and models (Freenet/KaZaA?)

Managability…

474747

“As new IP communications services and devices become available, they may stimulate new demand and increase VoIP traffic flows beyond the growth rates characteristic of the traditional voice telephony market.

… the total market may reach … six percent of the world's forecasted international traffic for the calendar year 2001”

Telegeography 2002

Voice/Video on IP networks

DataPath

ControlPlane

Billing/Authorization

Video on Demand…

100-baseT to HomeCarrying multipleVideo streams plusVoice and data

Video-on-demandServer located inthe POP

Internet Routerlocated in the POP

Forensics in an Internet environment

Who did they “speak” with? What did they “say”?

IP Data

IP ControlTraffic

Control Device:Call Manager, SIP Proxy,

Authentication Server, etc LogStream

WarrantInterceptConfiguration

Data ACL

InterceptedData

InterceptedInformation

ControlMediation

Data Mediation

Growing Up…

Profitability… User-tolerant (if not friendly)

applications Business-tolerant applications… Manageable applications and

networks Convergence…

Growing Pains:The Internet in Adolescence

Fred BakerISOC Chairman of the Board

Cisco Fellow