460 likes | 601 Views
Growing Pains: The Internet in Adolescence. Fred Baker ISOC Chairman of the Board Cisco Fellow. The parable of the swing. The optical internet backbone Gigabit to terabit links. Access networks xDSL, cable modem, ISDN, asynchronous dial
E N D
Growing Pains:The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow
The optical internet backbone Gigabit to terabit links Access networks xDSL, cable modem, ISDN, asynchronous dial 20,000 instantaneous sessions per GBPS backbone bandwidth Today’s Internet Campus Networks (LANs) Internet in Airlines
Brief History of the Internet Comic Book to Cyberspace
Len Kleinrock, 1962 The strength of a chain is its weakest link The strength of a web is its surviving path Datagram Switching Developed at UCLA+Xerox PARC DARPA Funding Datagram Switching
Early commercialization Source: http://www.cidr-report.org Killer Applications: Early Business Adoption Borderless Business Mail, FTP, Archie, Network News Consumer Adoption Multi-player Games WWW, IRC Projected routing table growth without CIDR/NAT Moore’s Law and NATs, with aggressive address conservation policy, make routing work today Deployment Period of CIDR
Marketing rushes in where engineering fears to tread • Internet bubble: • “Build it and they will come” • “New Economy” where profitability is irrelevant • “.com” era
Profitability… • …The Final Frontier. • Companies are operating on the premise that if it doesn’t make money, it is not a good business to be in…
Status of Internet Technology in developed nations • A utility: • Water, Sewer • Electricity, Natural Gas • Telephone • Internet • Internet access and facility is assumed in education, business, and increasingly in society
The Digital Divide • “In addressing the digital divide, Uganda and other countries in the region face three broad challenges: • Creating and exploiting access to external information resources; • Creating internal information resources; • Creating and exploiting access to internal information resources. • A common underlying factor that cuts across the three broad challenges is the need for a competent human resource.” Dr. F. F. Tusubira Makerere University, February 2003
Telephones/Point to Point Need an address when you call them, and are therefore servers in private realm For web: Sufficient to have clients in private address spaces access servers in global address space Client/Server Architecture is overtaken by events Private Address Realm Global Addressing Realm Private Address Realm
Who are today’s application innovators? • Open Source example: Freenet/KaZaA • Large-scale peer-to-peer network • Pools the power of member computers • Create a massive virtual information store • Open to anyone • Highly survivable, private, secure, efficient, • http://www.firenze.linux.it/~marcoc/index.php?page=whatis
Originally supporting Research Networks • Dates: • Started 1986 • Non-US participation by 1988 • First non-US meeting: Vancouver, August 1990 • Constituents: • Originally US Government only • Added NSFNET (NRN), education, research • Eventually added vendors • The government left… • International participation
Characterizing the community: • Semi-homogenous • People largely knew and trusted each other • “Netiquette” • Anti-social behavior drew direct and public censure as “impolite” • Key interest: • Making the Internet interesting and useful for themselves and their friends.
IETF Mission Statement • Make the Internet Work • Whatever it takes… • But what is the Internet? • IPv4? IPv6? MPLS? • Applications like WWW? Mail? VoIP?
End to End principle Robustness principle Rough Consensus and Running Code Institutionalized altruism Mutual Benefit Managed Trust Highly relational Principle of least surprise Openness Anti-kings Achieving “right” results because they are right Historical principles
Now supporting all IP-based Networks • Constituents: • Researchers • Network Operators • ISP, NRN, Enterprise • Implementers (engineers, often from vendors) • Large percentage of attendees • Interactions with various governments… • Fully international participation
Characterizing the community: • Heterogeneous • Business reasons for involvement • “Netiquette” • Expectation of safe environment • Moving towards codification of expectations • Key interest: • Defining technology to use or to sell
Undercurrents • Business agenda • Business relationships rather than personal relationships • Political process • Intellectual Property Issues • About protecting ideas, not sharing them • Civil servants as leaders
What makes IETF hard?Breakdown of trust • Community sees leaders as a cabal • Leaders see community that designs for narrow scope of applicability or misses key issues
What makes IETF hard?Opaque processes • RFC Editor • Secretariat • Internet Assigned Number Authority • Internet Engineering Steering Group • Internet Architecture Board
What makes IETF hard?Consensus process • Lack of comment interpreted as consent, but may mean loss of interest • Consensus may not be desired by participants seeking market share
What makes IETF hard?Personal responsibility • Expectation that “they” should do something: • IETF composed of people, and people do the work • Personal involvement essential to progress
Sounds like bad news • Not really • The IETF is just deciding what it wants to be when it grows up… • Quite a bit of good work going on there • Other groups of interest • NANOG, Apricot, RIPE, etc • Many others
High-end research backbones • Combining IP routing and optical routing in overlay networks • “Designer networks” for research purposes • Production networks for applications • What parts of network to research? • Routing (IP, Optical) • Applications • IPv6-based
Dark Fiber / Lambda / 10G NYC CHI Edmonton Alberta LON FRA POZ KRA SE PAR MIL COP CERN VIE ATH BUD AMS PRA LambdaNet / 2,5G GARDENNetwork Topology NTT via NYI to SuperSINET *) *) UKLight *) CANARIE 1GE to 10GE To US T-Systems NetherLight Global Crossing DANTE POP StarLight Chicago SurfNet / 10G CESNET / 2,5G *) under discussion Nordic Connections Ukerna / 10G via GEANT / 2.5G via SWITCH / 2.5G High Speed Optical Domains
High Bandwidth Real Time Applications WP6 Advanced Protocol & Service Deployment WP2 Protocol & Architecture Research WP3 Measurement Security & AAA WP4 Mgmt & Provisioning WP5 Project Management WP0 Technical Support, Dissemination, Training and Demonstration WP7 Integrated IP + Optical Network WP1 GARDENProject Structure
10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Production Network 中央研究院 台灣大學 東華大學 Taipei C7609 C7609 中央大學 C7609 C7609 GSR 中正大學 交通大學 C7609 C7609 成功大學 TWAREN C7609 GSR GSR 新竹 Tainan Hsin-chu 暨南大學 中興大學 清華大學 GSR 中山大學 C7609 C7609 C7609 C7609 Taichung
10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Research Network 中央研究院 台灣大學 Taipei C7609 GSR C7609 東華大學 C7609 ONS15600 ONS15454 ONS15454 TWAREN 中央大學 中正大學 ONS15454 ONS15454 C7609 C7609 Hsin-chu Tainan ONS15600 ONS15600 成功大學 交通大學 C7609 GSR GSR C7609 ONS15454 清華大學 GSR 中山大學 C7609 ONS15454 中興大學 C7609 Taichung 暨南大學 C7609 C7609
電路數量 (#) 10GE STM-64/OC-192 STM-16/OC-48 GE 建議電路 Optical Production Research Optical Network -1 中央研究院 東華大學 C7609 台灣大學 Taipei (2) C7609 C7609 GSR ONS15454 (2) (2) ONS15454 ONS15454 (2) (6) 中正大學 中央大學 ONS15600 C7609 C7609 ONS15454 (2) (2) ONS15454 ONS15454 TWAREN ONS15454 交通大學 ONS15454 成功大學 Tainan C7609 ONS15600 (6) ONS15600 (6) (3) C7609 (3) (2) GSR (2) Hsin-chu ONS15454 GSR ONS15454 ONS15454 (4) (2) 中山大學 清華大學 暨南大學 中興大學 GSR C7609 C7609 C7609 C7609 (2) Taichung (2) (2) (2) ONS15454 ONS15454 ONS15454 ONS15454
Proposed UN-FAO “Growing Connection”: Ghana 384 KBPS Or E1 Internet Long distance IEEE 802.11 Database.library.de Village.school.gh several PCs + Router Village.school.gh several PCs + Router Village.school.gh several PCs + Router 42 42 42
“Enterprise” infrastructure network Connects roaming devices which themselves form the infrastructure Neighbor relationships change randomly in routing Not appropriate as backbone Fundamental issue: Not “can I find the addressed device/prefix in my network”, but “Is there a usable route to the addressed device/prefix.” Manet looks at a mobile infrastructure 43 43 43
We trust people to access servers and do limited operations on them As a result, we limit our applications by the power of the servers we run them on Today’s Client/Server access control 44 44 44
Let everyone talk Distributed computing Peer computers to perform function, not server Central Authentication/ Authorization Access control Accountability Peer-peer access control model 45 45 45
What needs to change? • Effective prophylactic security • Firewall ≠ Network Address Translator • Secure Firewall Traversal • Secure identity/authority management • Spam management… • Good point-to-point application software and models (Freenet/KaZaA?) • Managability…
“As new IP communications services and devices become available, they may stimulate new demand and increase VoIP traffic flows beyond the growth rates characteristic of the traditional voice telephony market. … the total market may reach … six percent of the world's forecasted international traffic for the calendar year 2001” Telegeography 2002 47 47 47
Voice/Video on IP networks Billing/ Authorization Control Plane Data Path
Video on Demand… Internet Router located in the POP Video-on-demand Server located in the POP 100-baseT to Home Carrying multiple Video streams plus Voice and data
Forensics in an Internet environment Who did they “speak” with? What did they “say”? IP Control Traffic Control Device: Call Manager, SIP Proxy, Authentication Server, etc IP Data Log Stream Control Mediation Data ACL Intercept Configuration Warrant Intercepted Data Intercepted Information Data Mediation
Growing Up… • Profitability… • User-tolerant (if not friendly) applications • Business-tolerant applications… • Manageable applications and networks • Convergence…
Growing Pains:The Internet in Adolescence Fred Baker ISOC Chairman of the Board Cisco Fellow