How To Design A Network For A Network (Netnet)



Similar documents
Protocols. Packets. What's in an IP packet

Computer Networks Vs. Distributed Systems

Does reality matter?: QoS & ISPs

Computer Networking Networks

Chapter 5. Data Communication And Internet Technology

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Internet Architecture

CSE 3461 / 5461: Computer Networking & Internet Technologies

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

1.264 Lecture 37. Telecom: Enterprise networks, VPN

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Communications and Computer Networks

Chapter 12 Supporting Network Address Translation (NAT)

Internet Routing. Review of Networking Principles

IP Telephony and Network Convergence

Overview of TCP/IP. TCP/IP and Internet

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

MPLS and IPSec A Misunderstood Relationship

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

The OSI and TCP/IP Models. Lesson 2

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Introduction to computer networks and Cloud Computing

WAN Technology. Heng Sovannarith

Network Security TCP/IP Refresher

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Impact of enum and IP telephony

Terms VON. VoIP LAN WAN CODEC

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

November Defining the Value of MPLS VPNs

Communication Systems Internetworking (Bridges & Co)

Overview of Computer Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Introduction Chapter 1. Uses of Computer Networks

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Review: Lecture 1 - Internet History

The OSI Model: Understanding the Seven Layers of Computer Networks

Basic Network Configuration

Architecture and Performance of the Internet

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Objectives of Lecture. Network Architecture. Protocols. Contents

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 9 Integrating Security Services into Communication Architectures

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Today. Finishing up inter-domain routing. Review of end-to-end forwarding. How we build routers. Economics of peering/settlement

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Computer Networks and the Internet

CORPORATE NETWORKING

MANAGEMENT INFORMATION SYSTEMS 8/E

IT Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

SIP Trunking The Provider s Perspective

Course 4: IP Telephony and VoIP

Enterprise Edge Communications Manager. Data Capabilities

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Network Considerations for IP Video

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Address Resolution Protocol (ARP)

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

The End To End Internet

Interactive telecommunication between people Analog voice

Mobile office opportunities

Transport and Network Layer

Release the full potential of your Cisco Call Manager with Ingate Systems

Introduction To Computer Networking

CSCI Topics: Internet Programming Fall 2008

Secured Voice over VPN Tunnel and QoS. Feature Paper

Internet Ideal: Simple Network Model

Data Communication Networks and Converged Networks

Zarządzanie sieciami telekomunikacyjnymi

Computer Networks CS321

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Top-Down Network Design

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Access Control: Firewalls (1)

Advanced Internetworking

Overview - Using ADAMS With a Firewall

CPS221 Lecture: Layered Network Architecture

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Private Industry Role in Next Generation Internet. Bob Aiken. NGI Project Leader DOE er.doe..doe.gov Large Scale Networking Working Group June 1997

Компјутерски Мрежи NAT & ICMP

VoIP Solutions Guide Everything You Need to Know

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Overview - Using ADAMS With a Firewall

Internet Packets. Forwarding Datagrams

Transcription:

Internet Architectural Philosophy and the New Business Reality Scott Bradner Harvard University arch - 1 Topics architecture (as design philosophy) key decisions architecture (as reality) and then there is money arch - 2 1

Background multiple unrelated efforts (early to mid 1960 s) packet switching theory: (Kleinrock( Kleinrock) ) 1961 day dreaming: (Licklider( Licklider s Galactic Network) 1962 make use of remote expensive computers: (Roberts) 1964 survivable infrastructure for voice and data: (Baron) 1964 ARPANET (late 1960 s) Roberts ARPANET paper 1967 RFP for Interface Message Processor won by BBN 1968 four ARPANET hosts by 1969 public demo and email in 1972 arch - 3 Fundamental Goal of Internet Protocols multiplexed utilization of existing networks different administrative boundaries multiplexing via packets networks interconnected with packet switches called gateways (now called routers) note: international in scope did not want to build a new global network too expensive too limiting arch - 4 2

Internet Protocols Design Philosophy ordered set of 2nd-level goals 1/ survivability in the face of failure 2/ support multiple types of communications service 3/ accommodate a variety of network types 4/ permit distributed management of resources 5/ cost effective 6/ low effort to attach a host 7/ account for use of resources note: no performance (QoS( QoS) ) or security goals not all goals have been met management & accounting functions are limited arch - 5 Packets! basic decision: use packets not circuits Kleinrock s work showed packet switching to be a more efficient switching method packet (a.k.a. datagram) Dest Addr Src Addr payload self contained handled independently of preceding or following packets contains destination and source internetwork address may contain processing hints (e.g. QoS tag) no delivery guarantees net may drop, duplicate, or deliver out of order reliability (where needed) is done at higher levels arch - 6 3

Routing sub parts of the network are connected together by computers that forward packets toward destination these computers are called routers routers use destination address in packet to make forwarding decision routers exchange reachability information with other routers to build tables of next hops toward specific local networks exchange of reachability information done with routing protocol arch - 7 Unreliability can be Important basic decision: offer an unreliable service 1st idea was to only have TCP (a reliable service) problems not good for voice & video data has to be delivered in time - retransmission for reliability causes too great a delay not good for all applications e.g. a debugger has to work in lossy environment retransmission algorithm may vary with application thus: split IP & TCP and add UDP IETF just added SCTP arch - 8 4

A Quote the lesson of the Internet is that efficiency is not the primary consideration.. Ability to grow and adapt to changing requirements is the primary consideration. This makes simplicity and uniformity very precious indeed. Bob Braden arch - 9 Networks as Generic design requirement of working over: existing networks & a wide variety of networks minimum set of assumptions about network reasonable size packets, reasonable but not perfect delivery reliability, network-wide addressing, way to get error messages back to source, no assumption of in- order packet delivery smart wires are not much of a help e.g. X.25 (reliable delivery) e.g. ATM (QoS( functions) thus it is easy to use new types of networks assuming they are not too helpful (feature rich) arch - 10 5

End-to-End Argument 1981 paper by Saltzer,, Reed & Clark smart networks do not help adding functions into network can be redundant since actual function is end-to-end e.g. encryption, data reliability also harder to change with new technology also see Lampson Hints for Computer System Design e2e argument projected to mean no per-session knowledge or state in the network but some soft-state (auto refreshed) may be OK network should be transparent to end-to-end applications arch - 11 Ease of Experimentation With e2e easier to experiment in an e2e environment if the network is transparent then only nodes involved are the end nodes note that an end node could be a 3rd party server no need to get permission to experiment cheaper to experiment can do much smaller scale experiments - down to 2 nodes than core-based services WWW an example of what can be done arch - 12 6

Economic Driver? Mark Gaynor Harvard PHD thesis define market uncertainty as MU how well do you know what the customer wants low MU means customer wants are known e.g. voice service no opportunity to be better than competitor high MU means customer wants are not known e.g. future IP-enabled voice service opportunity to better match customer wants than competitor does arch - 13 Economic Driver, contd. low MU commodity service provide most efficient way - frequently centralized high MU need to experiment to try to match customer want note: if only one company figures it out they dominate the market easier to experiment on edges i.e. e2e is a innovation friendly model even if its more expensive to provide service to ends arch - 14 7

Smart vs. Stupid Networks phone network technology: self-named Intelligent Network (IN) many network-based services admission control, number translation, accounting,... Isenberg s Rise of the Stupid Network compared phone network s Intelligent Network to Internet Isenberg s s basic messages: network (i.e. carrier) -based services slow to change voice is not all there is carrier gets in the way just deliver the bits works arch - 15 But!! a stupid network is a commodity service the price of a commodity service is driven by the stupidest vendor hard to make money delivering commodity services new network infrastructure is very expensive $ fiber optic cables (with installation) & hardware access rights can also be very expensive e.g. wireless spectrum licenses carriers need something else to make money common dream is that services or content will save the day may be a false dream arch - 16 8

But!! (2) packets w/o circuits cause problems can not do guaranteed QoS can not control path packets take can not reserve capacity for application security control harder do not have logical wire back to source management harder can not see data patterns on the network finding non-catastrophic failures harder service provider interconnections harder no clean interface!qos lack of useful formal tools to describe performance arch - 17 Conceptualization Problem fundamental disconnect between Internet and phone people bell-heads vs. net-heads by their definition the Internet can not work and must be fixed - they will rescue us You can not build corporate network out of TCP/IP. IBM circa 1992 arch - 18 9

Traditional Phone Network circuits & smart network connection-oriented hard state in network devices fragile central resource control socialist? "for the good of all" applications in network arch - 19 e.g., phone switch end-to-end touch-tone signaling was a mistake predictable development path extended development cycle Internet packets & e2e soft state in network devices resilient competitive resource control capitalist? "individual initiative but too much selfishness hurts all must play by the same rules - but no enforcement the tragedy of the commons applications in hosts at edges (end-to-end) and in 3rd party servers anywhere on the net hard to predict developments chaos at the rate of Internet time arch - 20 10

More Conceptualization Problems service provided by 3rd parties - not only by carriers different from phone world a quote from an IETF telephony mailing list Hi Roy, I still don t t understand why it is a "users" choice where the "services" are executed - I would have thought that this would be networks choice arch - 21 Disjoint Control and Data Paths signaling and data paths in Internet may not coincide and paths vary over time telephony server signal data arch - 22 11

Circuits in the Internet do not seem to go away (MPLS) used for traffic engineering city-pair pipes maybe class of service city-pair pipes and customer connections finer grain (instance of application) use still pushed remember the fate of ATM circuit - used for trunks not flows QoS - ignored (ATM not end-to-end) link sharing - may make sense as the bearer service - did not make it arch - 23 IP as a Common Bearer Service Layer 4 Applications Electronic Mail Video Server Audio Server Remote Login Teleconferencing Fax Information Browsing Financial Services Image Server Interactive Education Layer 3 Middleware Services File Systems Security Privacy Name Servers Storage Repositories Service Directories Electronic Money Multisite Coordination Layer 2 Transport Services and Representation Standarards (fax, video, text, and so on) Open Bearer Service Interface Layer 1 ODN Bearer Servive Network Technology Substrate LANs Point-to-Point Circuits Frame Relay ATM Direct Broadcast Satellite arch - 24 Wireless Dial-up SMDS Modems FIGURE 2.1 A four-layer model for the Open Data Network From: Realizing the Information Future 12

Net is No Longer Transparent end-to-end argument says the net should be transparent i.e. packet not modified in transit (other than TTL) global-scope internetwork address i.e., packet goes to address in destination address field transparency now gone in some cases NATs,, firewalls, proxies, content caches, TCP reshapers replace addresses, intercept traffic, insert traffic other issues wiretapping, taxation, content filtering arch - 25 NAT/Firewall/Cache Issues can not trust IP address as end-to-end breaks IPSec,, not sure who you are talking to applications with addresses in data have to have application-specific support (ALG) in devices deploying new application requires approval of net manager dynamic port usage ALG must snoop on application traffic ALG must understand application logic new IETF effort to develop generic signaling may help some but will not make these devices transparent arch - 26 13

Trust-Free Environment original Internet architecture assumed a trustworthy environment no longer the case arch - 27 mistrust net itself (eavesdropping, reliability etc) mistrust that you are talking to the right end point e.g., proxy, redirect, spoofing (MAC & IP address) unsolicited correspondence (spam) anonymity hard to get mistrust own hardware and software 3rd parties insist on being in the middle filters, wiretapping, Summary of Architectural Points datagram-based network not circuit switched network of networks different parts under different management minimize per-session state in network some auto-refreshed state is OK end-to-end model maximizes flexibility network does not need to know what you are doing smart wires can get in the way e.g., nested control loops reliable delivery is an option not a requirement arch - 28 14

Key Decisions a few key decisions brought us here to the Internet of today but there was no way to predict where we are now unplanned parenthood arch - 29 10 Decisions That Made a Difference support existing networks datagram-based creating the router function split TCP and IP DARPA fund Berkeley to add TCP/IP to UNIX CSNET and CSNET/ARPANET deal NSF require TCP/IP on NSFnet ISO turn down TCP/IP NSF Acceptable Use Policy (AUP( AUP) minimal regulation arch - 30 15

Internet Architecture #1 goal of original Internet protocols was to deal with a network of networks not a single type of network not under one management networks interconnected at datagram level no session-aware logic at interconnections bi-lateral interconnection agreements customer - buy transit service to the Internet peer - cost sharing connection to a network and its customers arch - 31 Customer Interconnection one network pays another for access to the Internet paying network can be Internet service provider (ISP) or enterprise only as useful as resulting coverage Metcafe s Law : : value of network increases by square of the number of reachable nodes customer can move business to another network if they do not like the service may have to renumber to preserve addressing topology arch - 32 16

Peering business decision no current regulations it can be cost effective for two networks to interconnect sharing the costs of the links interconnection can be at public peering points or using dedicated links between networks but only see other network and their customers not the other network s s other peers must peer with all large networks to get the Internet or be a customer to another network (or networks) arch - 33 Multi-Homing one network (ISP or enterprise) can connect to more than one other network for redundancy and reliability called multi-homed causes some complexity in the routing setup arch - 34 17

Public Peering Points 3 originally designated by National Science Foundation (NSF) as part of the breakup of the NSFnet now many local peering points around the world but telcom costs can discourage use in some countries cheaper to get lines to US than within country level-2 interconnect like an local area network (e.g. an Ethernet) i.e. not involved in IP-level routing arch - 35 Private Peering two ISPs can agree to interconnect sharing costs you buy and run one line, I ll I buy and run another peering list normally private ISPs have minimum criteria before peering will be considered some publish the criteria criteria normally include minimum level of interconnect traffic, traffic balance, backbone size, geographic scope, competent network operations center arch - 36 18

Tier 1 ISPs some big ISPs are referred to as Tier 1 ISPs no real externally verifiable definition general concept: an ISP that gets most of not all of its connectivity from peering, not by being a transit customer i.e. a Tier 1 ISP is one that is connected to the other Tier 1 ISPs arch - 37 Interconnection Pattern no explicit network hierarchy assumed no specific pattern to ISP interconnections other than that peering tends to be between networks of the same basic size but not always - can have business reasons for mismatch peering and transit connections can appear random notes: most traffic does not flow through Tier 1 ISPs many lower-level interconnections hard (impossible) to know relative sizes of ISPs arch - 38 19

Current Internet Architecture you are here arch - 39 Money but who is going to make money at that? that? John McQuillan how is the carrier supported? we do not know how to route money money Dave Clark carrier wants a piece of the action e.g., WAP, AT&T proposal is content king? factoid: total US movie revenue ~= 2 weeks of US phone charges arch - 40 20

imode: : A Model? DoCoMo s s imode service more than 30 million subscribers 9.6Kb data service 50,000 imode compatible sites DoCoMo works with less than 10% of them does billing, runs servers etc rest are on their own key decision: open access ( NOT WAP!) makes service more attractive DoCoMo charges monthly fee and for data transferred arch - 41 More on Money QoS does not seem to be a useful charging base differentiated by application is an intelligence test railroads in US used to do this (Rhode Island Line ) not enough will fail the test and then there is all that fiber do municipalities have a role? arch - 42 21

A Bit More on Money what happened to that $ trillion anyway? few infrastructures pay for themselves the Internet is not an exception is there a difference now that the fiber is free? arch - 43 Last Word Internet too important to fail (?) what about ISPs (can you say KPNQuest?) will there be anyone left standing other than the telcos? what can they see from their point of view? will you be able to say Internet and business model in the same sentence? without a no in between arch - 44 22

What s s Next? arch - 45 23