Presentation is loading. Please wait.

Presentation is loading. Please wait.

What Makes for a Successful Protocol? Presented By: Nigel Medforth.

Similar presentations


Presentation on theme: "What Makes for a Successful Protocol? Presented By: Nigel Medforth."— Presentation transcript:

1 What Makes for a Successful Protocol? Presented By: Nigel Medforth

2 Agenda  What is a successful protocol?  Success Dimensions  Initial Success Factors  “Wildly” Successful Protocols  “Wild” Success Factors  What is a failed protocol?  Mitigating failure

3 What is a Successful Protocol? A protocol is considered successful if: A protocol is considered successful if:  It meets the original design specifications  It is “widely deployed” Dependant on the desired deployment scope Dependant on the desired deployment scope E.g., TCP, BGP, DHCP, NAT, etc… E.g., TCP, BGP, DHCP, NAT, etc…

4 Success Dimensions

5 Initial Success Factors 1.Positive Net Value  Potential Costs  Hardware costs  Operational interference  Training  Business model impact  Potential benefits  Lowers existing costs  Provides new desired features  Provides incremental improvements

6 Initial Success Factors

7 Other Initial Success Factors 2.Allows Incremental Deployment 3.Open code availability 4.No usage restrictions 5.Open specification availability 6.Open maintenance processes 7.Good technical design

8 “Wildly” Successful protocols

9 “Wildly” Successful Protocols Greatly exceeds its intended scale and/or purpose; Greatly exceeds its intended scale and/or purpose; Does not affect initial success Does not affect initial success E.g., HTTP, IPv4, ARP E.g., HTTP, IPv4, ARP

10 “Wild” Success Factors 1.Extensible 2.No hard scalability bounds 3.Threads sufficiently mitigated

11 Downside of “Wild” Success Undesirable side effects when adding new features Undesirable side effects when adding new features Performance problems Performance problems Design limitations Design limitations High value target for hackers High value target for hackers

12 Case of WEP Stream cipher algorithm using RC4 Stream cipher algorithm using RC4 RC4 is a well-known but proprietary algorithm RC4 is a well-known but proprietary algorithm Many attacks exist, culminating with a method published in 2007 to break a 104 bit key within 40,000 packets (~60 seconds) Many attacks exist, culminating with a method published in 2007 to break a 104 bit key within 40,000 packets (~60 seconds) Yet this is still considered successful. Yet this is still considered successful.http://eprint.iacr.org/2007/120.pdf

13 Case of WEP Initial Success Factors: Initial Success Factors:  Positive net value: yes; provided security  Incremental deployability: yes  Open code availability: no, due to RC4  No usage restrictions: no  Open maintenance process: yes  Good technical design: no Wild success factors: Wild success factors:  Extensible: no  No hard scalability bounds: no  Threats sufficiently mitigated: no

14 What is a Failed Protocol? No mainstream implementation No mainstream implementation No deployment No deployment No use No use Typically takes 5 to 10 years to determine Typically takes 5 to 10 years to determine

15 Mitigating Failure Address a critical and imminent problem Address a critical and imminent problem Provide a “killer app” with low development costs Provide a “killer app” with low development costs Provide value for an existing unmodified applications Provide value for an existing unmodified applications Reduce purpose and/or scope Reduce purpose and/or scope Provide incentives Provide incentives

16 Questions?


Download ppt "What Makes for a Successful Protocol? Presented By: Nigel Medforth."

Similar presentations


Ads by Google