Tracking the Internet into the 21st Century



Similar documents
Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Introduction Chapter 1. Uses of Computer Networks

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Kick starting science...

Computer Networks Vs. Distributed Systems

Network System Design Lesson Objectives

TCP/IP Protocol Suite. Marshal Miller Chris Chase

IT 3202 Internet Working (New)

Cisco Which VPN Solution is Right for You?

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications

Virtual Private Networks

Network Technologies

WAN Traffic Management with PowerLink Pro100

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

VLANs. Application Note

How Network Operators Do Prepare for the Rise of the Machines

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

ITL BULLETIN FOR JANUARY 2011

Virtual Privacy vs. Real Security

RIOT CONTROL The Art of Managing Risk for Internet of Things

Mobile Devices and Malicious Code Attack Prevention

New Products and New Features May, 2015

Hands on VoIP. Content. Tel +44 (0) Introduction

Detailed Description about course module wise:

IPv6, Perspective from small to medium ISP

AC750 Multi-Function Concurrent Dual-Band Wi-Fi Router

VPN. Date: 4/15/2004 By: Heena Patel

Software Defined Perimeter: Securing the Cloud to the Internet of Things

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

The Internet. On October 24, 1995, the FNC unanimously passed a resolution defining the term Internet.

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Firewalls CSCI 454/554

Full Digital Contents Distribution to the Home using IPv6

Cisco Advanced Services for Network Security

Applications that Benefit from IPv6

The Internet Introductory material.

Cisco ASA 5500 Series VPN Edition for the Enterprise

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

Current and Future Research into Network Security Prof. Madjid Merabti

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

How To Deliver High Quality Telephony Over A Network

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

What is Really Needed to Secure the Internet of Things?

Extending the Internet of Things to IPv6 with Software Defined Networking

IP Office Technical Tip

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Definition. A Historical Example

CSE 3461 / 5461: Computer Networking & Internet Technologies

IP Networking Untethered

Developing Network Security Strategies

BYOD: BRING YOUR OWN DEVICE.

Table of Contents. Cisco How Does Load Balancing Work?

PART D NETWORK SERVICES

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

diversifeye Application Note

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty

Chapter 4: Networking and the Internet

TDM services over IP networks

Pulse Secure Desktop Client

Introduction to Computer Networking: Trends and Issues

Portable Wireless Mesh Networks: Competitive Differentiation

Communications and Computer Networks

SVN5800 Secure Access Gateway

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

How To Make A Delay Tolerant Network (Dtn) Work When You Can'T Get A Signal From A Long Delay (Tcp/Ip) To A Long Time (Tokus) Or From A Short Delay (Ip) (Tko

The Ubiquitous Web, UPnP and Smart Homes

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Interplanetary Internet (IPN): An Architectural Definition

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

MOBILE VIDEO WITH MOBILE IPv6

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Industry Automation White Paper Januar 2013 IPv6 in automation technology

BroadCloud PBX Customer Minimum Requirements

Potential Thesis Topics in Networking

Transcription:

Tracking the Internet into the 21st Century Vint Cerf October 2008 1

Internet Evangelist at Work 2

Huge thanks to NANOG and its participants Invisible to most users 24 X 7 attention to reliability and availability Continual battles (viruses, worms, Trojan Horses, DOS attacks, spam) Cooperation among competitors for the benefit of the Net s users IPv6 Deployment Dual mode operation a big challenge Network management for IPv6 still immature IPv6 global connectivity a key target MCI Operations Anecdote (Cary, NC) 3

The Original ARPANET Dec 1969 940 #2 SRI #4 UTAH 360 #3 UCSB PDP 10 #1 UCLA Sigma 7 4

The ARPANET IMP 5

Packet Radio Van 6

Inside the PR Van 7

Inside the PR Van (2) 8

Intelsat IVA - Packet Satellite Network 9

First Three-Network Test of Internet November 22, 1977 10

Internet 1999 11

Internet - Global Statistics 2008 542 Million Hosts (ISC Jan 2008) 1,464 Million Users (InternetWorldStats.com, June 30, 2008) (approx. 3 B mobiles and 1 Billion PCs) 12

Regional Internet Statistics 6/30/08 Region Asia Europe North Am. LATAM/C Mid-East Oceania Africa TOTAL Internet Population 578.5 Mil. 384.6 Mil. 248.2 Mil. 139.0 Mil. 41.9 Mil. 20.2 Mil. 51.0 Mil. 1,463.6 Mil. % penetration 15.3 % 48.1 % 73.6 % 24.1 % 21.3 % 59.5 % 5.3 % 21.9 % 13

Internet Host Growth 1981-2008 1000000000 100000000 10000000 1000000 100000 10000 1000 100 10 1 hosts 14 Aug-81 Aug-82 Aug-83 Aug-84 Aug-85 Aug-86 Aug-87 Aug-88 Aug-89 Aug-90 Aug-91 Aug-92 Aug-93 Aug-94 Aug-95 Aug-96 Aug-97 Aug-98 Aug-99 Aug-00 Aug-01 Aug-02 Aug-03 Aug-04 Aug-05 Aug-06 Aug-07

15

IPv4 runout diagram (Geoff Huston) http://www.potaroo.net/tools/ipv4/index.html 16

Mobility and Mobiles 3 Billion Mobiles and counting (15% Internet enabled) Text/Web Access Payment systems Innovative interfaces - Note I/O discovery Navigation systems GPS, Galileo?, Mobile Tower triangulation, Bldg Announcements? Geo-location based services 17

Internet-enabled Devices 18

An Internet of Things Programmable Java, Python, etc. Examples: WebTV, Personal Digital Assistants, Mobiles,Video games, Picture Frames, Washing Machines, Surf Board! Refrigerator (and the bathroom scales) Automobiles Internet-enabled wine corks (also note new quantum theory of wine: Schrödinger s wine bottle) Internet-enabled socks (clothing) Universal Remote Controls Sensor Networks 19

20

21

22

23

Near Term Changes in Internet non-latin Character Domain Names Original Domain Name Design: A-Z, a-z, 0-9, - New UNICODE character sets Cyrillic, Chinese, Japanese, Korean, Devanagri (Hindi ),Thai, Greek, Introduction of IPv6 in parallel with IPv4 Digitally-signed Domain Names (for integrity) Influx of Mobile Applications (Note Android) New Browser from Google: Chrome Significant growth of Social Networking applications 24

IPTV Streaming and Downloading ipod and vpod behaviors? Mixing of all media as IP packets Ancillary information access Downloaded texts, programs, videos, audio, captions Advertising material Screen Control (icons, widgets) Multiple streams to multiple displays (beauty of packet switching) Online interaction while viewing Group commentary Advertising and product information 25

Internet Research Problems Security at all levels Internet Erlang formulas QOS debates (smart routers?) Internationalized Domain Names (cctlds & GTLDs) Distributed Algorithms Presence (multi-level) Mobility, persistence (processes, connections, references) Multihoming Multipath routing Broadcast utilization Mesh and Sensor networks Virtualization (net, storage, processing) 26

Internet Research Problems - 2 Authentication, Identity, Authorization Multi-core Processor Algorithms Delay and Disruption Tolerance Integration of Applications (e.g. drag/drop gadgets in calendar) Intellectual Property Protection (tracking rights, enforcement) Governance: - Law Enforcement - Policy Development - Homologation - Facilitation of ecommerce - Privacy and confidentiality Role of Layering 27

Internet Research Problems - 3 Mobile operation Dynamic joining (new IP address?, Authentication?) Dynamic Routing (Dynamic Topology) Persistent connection (ID at TCP/UDP/RTP layer?) Interplanetary Long-Haul Architecture (RFC 4838) Licklider Transport Protocol (LTP) Bundle Protocol (RFC 5050) Delayed Binding of Identifiers Email-like behavior 28

Challenges of the Digital Age Intellectual property treatment Digital material is easy to copy and distribute Semantic Web Complex objects that can only be rendered via computer 3D interactive objects Complex spreadsheets Interactive environments BIT ROT! Preserving interpretive programs (Windows 3000 and PPT 1997) And the operating systems that run them And the hardware that run the operating systems For thousands of years!! 29

Google Sky 30

InterPlaNetary Internet 31

32

33

34

35

36

Interplanetary Internet: InterPlaNet (IPN) Planetary internets Interplanetary Gateways Interplanetary Long-Haul Architecture (RFC 4838) Licklider Transport Protocol (LTP) Bundle Protocol (RFC 5050) Delayed Binding of Identifiers Email-like behavior TDRSS and NASA in-space routing Delay and Disruption Tolerant Protocols Tactical Mobile applications (DARPA) Civilian Mobile applications (SameNet!) Deep Impact Testing October 2008 Space Station Testing 2009 37

End-to-end information flow across the solar system Layered architecture for evolvability and interoperability IP-like protocol suite tailored to operate over long round trip light times Integrated communications and navigation services 38