Title: Growing Pains: The Internet in Adolescence
1Growing PainsThe Internet in Adolescence
- Fred Baker
- ISOC Chairman of the Board
2Brief History of the Internet
3Datagram Switching
- Len Kleinrock, 1962
- The strength of a chain is its weakest link
- The strength of a web is its surviving path
- Datagram Switching
- Developed at UCLAXerox PARC
- DARPA Funding
4Early commercialization
Source http//www.telstra.net/ ops/bgptable.html
Killer Applications
Borderless Business
Early Business Adoption
Mail, FTP, Archie, Network News
Consumer Adoption
Multi-player Games
WWW, IRC
Projected routing table growth without CIDR/NAT
Moores Law and NATs, with aggressive
address conservation policy, make routing work
today
Deployment Period of CIDR
5Marketing rushes in where engineering fears to
tread
- Internet bubble
- Build it and they will come
- New Economy where profitability is irrelevant
- .com era
6Profitability
- The Final Frontier.
- These are the voyages of the IETF
- It's mission
- To create strange new worlds...
- To seek out new life, and new technology...
- To Boldly Go Where No I-Geek Has Gone Before.
7Status of Internet Technology in developed nations
- A utility
- Water, Sewer
- Electricity, Natural Gas
- Telephone
- Internet
- Internet access and facility is assumed in
education, business, and increasingly in society
8The Digital Divide
- In addressing the digital divide, Uganda and
other countries in the region face three broad
challenges - Creating and exploiting access to external
information resources - Creating internal information resources
- Creating and exploiting access to internal
information resources. - A common underlying factor that cuts across the
three broad challenges is the need for a
competent human resource.
Dr. F. F. Tusubira Makerere University, February
2003
9Client/Server Architecture is overtaken by events
- For web
- Sufficient to have clients in private address
spaces access servers in global address space
Private Address Realm
Global Addressing Realm
Private Address Realm
- Telephones/Point to Point
- Need an address when you call them, and are
therefore servers in private realm
10Who are todays application innovators?
- Open Source example Freenet/KaZaA
- Large-scale peer-to-peer network
- Pools the power of member computers
- Create a massive virtual information store
- Open to anyone
- Highly survivable, private, secure, efficient,
- http//www.firenze.linux.it/marcoc/index.php?page
whatis
11History of the IETF
12Originally supporting Research Networks
- Dates
- Started 1986
- Non-US participation by 1988
- First non-US meeting Vancouver, August 1990
- Constituents
- Originally US Government only
- Added NSFNET (NRN), education, research
- Eventually added vendors
- The government left
- International participation
13Characterizing the community
- Semi-homogenous
- People largely knew and trusted each other
- Netiquette
- Anti-social behavior drew direct and public
censure as impolite - Key interest
- Making the Internet interesting and useful for
themselves and their friends.
14IETF Mission Statement
- Make the Internet Work
- Whatever it takes
- But what is the Internet?
- IPv4? IPv6? MPLS?
- Applications like WWW? Mail? VoIP?
15Historical principles
- End to End principle
- Robustness principle
- Rough Consensus and Running Code
- Institutionalized altruism
- Trust
- Highly relational
- Principle of least surprise
- Openness
- Anti-kings
- Achieving right results because they are right
16Now supporting all IP-based Networks
- Constituents
- Researchers
- Network Operators
- ISP, NRN, Enterprise
- Vendors (large percentage of attendees)
- Interactions with various governments
- Fully international participation
17Characterizing the community
- Heterogeneous
- Business reasons for involvement
- Netiquette
- Expectation of safe environment
- More based on rules than personal
- Key interest
- Defining technology to use or to sell
18Present principles
- Business agenda
- Business relationships rather than personal
relationships - Political process
- Managed Trust Trust but verify
- Intellectual Property Issues
- About protecting ideas, not sharing them
- Civil servants as leaders
19IETF in a maze of twisty passages all different
20What makes IETF hard?
- Lack of trust
- Community sees leaders as a cabal
- Leaders see community that designs for narrow
scope of applicability or misses key issues - Opaque processes promote questions
- RFC Editor
- Secretariat
- Internet Assigned Number Authority
- Internet Engineering Steering Group
- Internet Architecture Board
21What makes IETF hard?
- Consensus process
- Lack of comment interpreted as consent, but may
mean loss of interest - Expectation that the working group or the
IETF should do something - IETF composed of people, and people do the work
22The possibilities are exciting
23Specific issues IETF is dealing with
24Status of change efforts within the IETF
- Structural discussion organized in two phases
- Identify what the problems are (the Problem WG)
- Address the problems
- Multiple efforts, with individual lifetimes,
control patterns and agendas. - Document management processes key to managing
work flow
25IETF Mission a shared viewpoint?
- The logical response to this
- formulate the IETF's mission in terms that the
community can agree with. - The Problem WG design team working on a proposal
- What is needs to say
- The IETF makes the Internet work
- The internet consists of SOHO, Enterprise, and
provider networks
26Effective Engineering Practices
- Engineering practices not necessarily well
designed - Proposals
- COACH BOF explored possible practices, but no
clear proposals - SIRS experiment seeks to get experienced review
27Handling Large and/or Complex Problems
- Thought across areas and in architecture
required. - IAB responsible for architectural thought
- SIRS experiment intended to bring more cross-area
review. - No current activity focused on changing how we
handle large and/or complex problems.
28Three stage standards hierarchy not (properly)
utilized
- Most of todays internet runs on
- Proposed Standards
- First stage standards
- Not necessarily tested for interoperability
- Best Current Practices
- Policies
- Informational documents
- Example PPPOE
29Workload Exceeds the Number of Fully Engaged
Participants
- Suggestions to increase motivation for
participants have been floated. - But perhaps this is OK?
30IETF Management Structure vs. Complexity of the
IETF
- IESG task seems to have accreted too much effort
- Management and Quality Assurance
- An Advisory Committee discussing business
relationships
31Education issues
- Concern
- Working Group process does not always lead to
closure - IETF Participants and Leaders Inadequately
Prepared - Closure is often reachable if desired
- Not obvious that it is always desired
32The EDU Team
- Training programs
- Working Group Chairs
- Documents Editors
- EDU Team trains
- It doesnt generally suggest changes
33The IESG is rapidly approaching a solution
34Sounds like bad news
- Not really
- The IETF is just deciding what it wants to be
when it grows up - Quite a bit of good work going on there
- Other groups of interest
- NANOG, Apricot, RIPE, etc
- Many others
35What is next for the Internet?
36High-end research backbones
- Combining IP routing and optical routing in
overlay networks - Designer networks for research purposes
- Production networks for applications
- What parts of network to research?
- Routing (IP, Optical)
- Applications
- IPv6-based
37Production Backbone
38Research Backbone
39Optical Network
(2)
(2)
(2)
(2)
(6)
(2)
(2)
(6)
(6)
(3)
(3)
(2)
(2)
(4)
(2)
(2)
(2)
(2)
(2)
40Proposed UN-FAO Growing Connection Ghana
384 KBPS Or E1
Internet
Long distance IEEE 802.11
Database.library.de
Village.school.gh several PCs Router
Village.school.gh several PCs Router
Village.school.gh several PCs Router
40
40
40
41Manet looks at a mobile infrastructure
- Enterprise infrastructure network
- Connects roaming devices which themselves form
the infrastructure - Neighbor relationships change randomly in routing
- Not appropriate as backbone
- Fundamental issue
- Not can I find the addressed device/prefix in my
network, but - Is there a usable route to the addressed
device/prefix.
41
41
41
42Todays Client/Server access control
- We trust people to access servers and do limited
operations on them - As a result, we limit our applications by the
power of the servers we run them on
42
42
42
43Peer-peer access control model
- Let everyone talk
- Distributed computing
- Peer computers to perform function, not server
- Central Authentication/ Authorization
- Access control
- Accountability
43
43
43
44What needs to change?
- Effective prophylactic security
- Addressing systems behind firewalls
- Firewall ? Network Address Translator
- Secure Firewall Traversal
- Next-generation-Kerberos style interaction
control servers - Good point-to-point application software and
models (Freenet/KaZaA?)
45As new IP communications services and devices
become available, they may stimulate new demand
and increase VoIP traffic flows beyond the growth
rates characteristic of the traditional voice
telephony market. the total market may reach
six percent of the world's forecasted
international traffic for the calendar year 2001
Telegeography 2002
45
45
45
46Voice/Video on IP networks
Billing/ Authorization
Control Plane
Data Path
47Video on Demand
Internet Router located in the POP
Video-on-demand Server located in the POP
100-baseT to Home Carrying multiple Video streams
plus Voice and data
48Growing Up
- Profitability
- User-friendly applications
- Manageable applications and networks
- Convergence
49Growing PainsThe Internet in Adolescence
- Fred Baker
- ISOC Chairman of the Board