Title: Growing Pains: The Internet in Adolescence
1Growing PainsThe Internet in Adolescence
- Fred Baker
- ISOC Chairman of the Board
- Cisco Fellow
2The parable of the swing
3(No Transcript)
4Todays Internet
- The optical internet backbone
- Gigabit to terabit links
Campus Networks (LANs)
Internet in Airlines
- Access networks
- xDSL, cable modem, ISDN, asynchronous dial
- 20,000 instantaneous sessions per GBPS backbone
bandwidth
5Brief History of the Internet
6Datagram Switching
- Len Kleinrock, 1962
- The strength of a chain is its weakest link
- The strength of a web is its surviving path
- Datagram Switching
- Developed at UCLAXerox PARC
- DARPA Funding
7Early commercialization
Source http//www.cidr-report.org
Killer Applications
Borderless Business
Early Business Adoption
Mail, FTP, Archie, Network News
Consumer Adoption
Multi-player Games
WWW, IRC
Projected routing table growth without CIDR/NAT
Moores Law and NATs, with aggressive
address conservation policy, make routing work
today
Deployment Period of CIDR
8Marketing rushes in where engineering fears to
tread
- Internet bubble
- Build it and they will come
- New Economy where profitability is irrelevant
- .com era
9Profitability
- The Final Frontier.
- Companies are operating on the premise that if it
doesnt make money, it is not a good business to
be in
10Status of Internet Technology in developed nations
- A utility
- Water, Sewer
- Electricity, Natural Gas
- Telephone
- Internet
- Internet access and facility is assumed in
education, business, and increasingly in society
11The Digital Divide
- In addressing the digital divide, Uganda and
other countries in the region face three broad
challenges - Creating and exploiting access to external
information resources - Creating internal information resources
- Creating and exploiting access to internal
information resources. - A common underlying factor that cuts across the
three broad challenges is the need for a
competent human resource.
Dr. F. F. Tusubira Makerere University, February
2003
12Client/Server Architecture is overtaken by events
- For web
- Sufficient to have clients in private address
spaces access servers in global address space
Private Address Realm
Global Addressing Realm
Private Address Realm
- Telephones/Point to Point
- Need an address when you call them, and are
therefore servers in private realm
13Who are todays application innovators?
- Open Source example Freenet/KaZaA
- Large-scale peer-to-peer network
- Pools the power of member computers
- Create a massive virtual information store
- Open to anyone
- Highly survivable, private, secure, efficient,
- http//www.firenze.linux.it/marcoc/index.php?page
whatis
14History of the IETF
15Originally supporting Research Networks
- Dates
- Started 1986
- Non-US participation by 1988
- First non-US meeting Vancouver, August 1990
- Constituents
- Originally US Government only
- Added NSFNET (NRN), education, research
- Eventually added vendors
- The government left
- International participation
16Characterizing the community
- Semi-homogenous
- People largely knew and trusted each other
- Netiquette
- Anti-social behavior drew direct and public
censure as impolite - Key interest
- Making the Internet interesting and useful for
themselves and their friends.
17IETF Mission Statement
- Make the Internet Work
- Whatever it takes
- But what is the Internet?
- IPv4? IPv6? MPLS?
- Applications like WWW? Mail? VoIP?
18Historical principles
- End to End principle
- Robustness principle
- Rough Consensus and Running Code
- Institutionalized altruism
- Mutual Benefit
- Managed Trust
- Highly relational
- Principle of least surprise
- Openness
- Anti-kings
- Achieving right results because they are right
19Now supporting all IP-based Networks
- Constituents
- Researchers
- Network Operators
- ISP, NRN, Enterprise
- Implementers (engineers, often from vendors)
- Large percentage of attendees
- Interactions with various governments
- Fully international participation
20Characterizing the community
- Heterogeneous
- Business reasons for involvement
- Netiquette
- Expectation of safe environment
- Moving towards codification of expectations
- Key interest
- Defining technology to use or to sell
21Undercurrents
- Business agenda
- Business relationships rather than personal
relationships - Political process
- Intellectual Property Issues
- About protecting ideas, not sharing them
- Civil servants as leaders
22IETF in a maze of twisty passages all different
23What makes IETF hard?Breakdown of trust
- Community sees leaders as a cabal
- Leaders see community that designs for narrow
scope of applicability or misses key issues
24What makes IETF hard?Opaque processes
- RFC Editor
- Secretariat
- Internet Assigned Number Authority
- Internet Engineering Steering Group
- Internet Architecture Board
25What makes IETF hard?Consensus process
- Lack of comment interpreted as consent, but may
mean loss of interest - Consensus may not be desired by participants
seeking market share
26What makes IETF hard?Personal responsibility
- Expectation that they should do something
- IETF composed of people, and people do the work
- Personal involvement essential to progress
27The possibilities are exciting
28Specific issues IETF is dealing with
29Status of structural discussion
- Structural discussion organized in two phases
- Identify what the problems are (the Problem WG)
- Address the problems
- Multiple efforts, with individual lifetimes,
control patterns and agendas. - Document management processes key to managing
work flow
30IETF Mission a shared viewpoint?
- The logical response to this
- formulate the IETF's mission in terms that the
community can agree with. - The Problem WG design team working on a proposal
- What is needs to say
- The IETF makes the Internet work
- The Internet consists of SOHO, Enterprise, Access
Provider, and Transit Provider networks - Solutions must span networks while meeting local
requirements
31Issues raised
- Engineering Practices
- Handling Large and/or Complex Problems
- Workload Exceeds the Number of Fully Engaged
Participants - Managing topics and activity
- Management of complexity
32Use of standards hierarchy
- Proposed Standards
- First stage standards
- Not necessarily tested for interoperability
- Best Current Practices
- Policies
- Informational documents
- Example PPPOE
33The IESG is rapidly approaching a solution
34Sounds like bad news
- Not really
- The IETF is just deciding what it wants to be
when it grows up - Quite a bit of good work going on there
- Other groups of interest
- NANOG, Apricot, RIPE, etc
- Many others
35What is next for the Internet?
36High-end research backbones
- Combining IP routing and optical routing in
overlay networks - Designer networks for research purposes
- Production networks for applications
- What parts of network to research?
- Routing (IP, Optical)
- Applications
- IPv6-based
37GARDENNetwork Topology
NTT via NYI to SuperSINET )
)
UKLight )
CANARIE 1GE to 10GE
To US
T-Systems
NetherLight
Global Crossing
DANTE POP
StarLight Chicago
SurfNet / 10G
CESNET / 2,5G
) under discussion
Nordic Connections
Ukerna / 10G
via GEANT / 2.5G
via SWITCH / 2.5G
High Speed Optical Domains
38GARDENProject Structure
39Production Network
?????
????
????
Taipei
C7609
C7609
????
C7609
C7609
GSR
????
????
C7609
C7609
????
TWAREN
C7609
GSR
GSR
??
Tainan
Hsin-chu
????
????
????
GSR
????
C7609
C7609
C7609
C7609
Taichung
40Research Network
?????
????
Taipei
C7609
GSR
C7609
????
C7609
ONS15600
ONS15454
ONS15454
TWAREN
????
????
ONS15454
ONS15454
C7609
C7609
Hsin-chu
Tainan
ONS15600
ONS15600
????
????
C7609
GSR
GSR
C7609
ONS15454
????
GSR
????
C7609
ONS15454
????
C7609
Taichung
C7609
????
C7609
41Optical Network -1
?????
????
C7609
????
Taipei
(2)
C7609
C7609
GSR
ONS15454
(2)
(2)
ONS15454
ONS15454
(2)
(6)
????
????
ONS15600
C7609
C7609
ONS15454
(2)
(2)
ONS15454
ONS15454
TWAREN
ONS15454
????
ONS15454
????
Tainan
C7609
ONS15600
ONS15600
(6)
(6)
(3)
C7609
(3)
(2)
GSR
(2)
Hsin-chu
ONS15454
GSR
ONS15454
ONS15454
(4)
(2)
????
????
????
????
GSR
C7609
C7609
C7609
C7609
(2)
(2)
Taichung
(2)
(2)
ONS15454
ONS15454
ONS15454
ONS15454
42Proposed UN-FAO Growing Connection Ghana
384 KBPS Or E1
Internet
Long distance IEEE 802.11
Database.library.de
Village.school.gh several PCs Router
Village.school.gh several PCs Router
Village.school.gh several PCs Router
42
42
42
43Manet looks at a mobile infrastructure
- Enterprise infrastructure network
- Connects roaming devices which themselves form
the infrastructure - Neighbor relationships change randomly in routing
- Not appropriate as backbone
- Fundamental issue
- Not can I find the addressed device/prefix in my
network, but - Is there a usable route to the addressed
device/prefix.
43
43
43
44Todays Client/Server access control
- We trust people to access servers and do limited
operations on them - As a result, we limit our applications by the
power of the servers we run them on
44
44
44
45Peer-peer access control model
- Let everyone talk
- Distributed computing
- Peer computers to perform function, not server
- Central Authentication/ Authorization
- Access control
- Accountability
45
45
45
46What needs to change?
- Effective prophylactic security
- Firewall ? Network Address Translator
- Secure Firewall Traversal
- Secure identity/authority management
- Spam management
- Good point-to-point application software and
models (Freenet/KaZaA?) - Managability
47As new IP communications services and devices
become available, they may stimulate new demand
and increase VoIP traffic flows beyond the growth
rates characteristic of the traditional voice
telephony market. the total market may reach
six percent of the world's forecasted
international traffic for the calendar year 2001
Telegeography 2002
47
47
47
48Voice/Video on IP networks
Billing/ Authorization
Control Plane
Data Path
49Video on Demand
Internet Router located in the POP
Video-on-demand Server located in the POP
100-baseT to Home Carrying multiple Video streams
plus Voice and data
50Forensics in an Internet environment
- Who did they speak with?
- What did they say?
IP Control Traffic
Control Device Call Manager, SIP Proxy,
Authentication Server, etc
IP Data
Log Stream
Control Mediation
Data ACL
Intercept Configuration
Warrant
Intercepted Data
Intercepted Information
Data Mediation
51Growing Up
- Profitability
- User-tolerant (if not friendly) applications
- Business-tolerant applications
- Manageable applications and networks
- Convergence
52Growing PainsThe Internet in Adolescence
- Fred Baker
- ISOC Chairman of the Board
- Cisco Fellow