Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
The Future Internet: A clean-slate design? Nicholas Erho.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
NewArch: A new architecture for an Internet David D. Clark, Steve Bellovin, Bob Braden, Noel Chiappa, Ted Faber, Aaron Falk Mark Handley, Scott Shenker,
Chapter 12 Network Security.
Next Generation Internet CMPT 771 – Internet Architecture & Protocols Presented by: Bassam Almohammadi.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Disrupting the Disruption: The revenge of end to end David D. Clark March 2003.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Rethink the design of the Internet CSCI 780, Fall 2005.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Tussle in Cyberspace: Defining Tomorrow’s Internet by David D. Clark, John Wroclawski Karen R. Sollins, Robert Braden Offense: Ionut Trestian.
1 © 2006 Cisco Systems, Inc. All rights reserved. MS Network Symposium6 Thoughts on the MS Network Research Workshop Fred Baker.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
NET NEUTRALITY:THE TECHNICAL SIDE OF THE DEBATE A WHITE PAPER Author:Jon Crowcroft Speaker : 游文霖.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Network Neutrality By: Jacob Hansen CPE 401. Introduction What is network neutrality? Who wants to get rid of it? Why is it important? What is at stake?
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Tussel in Cyberspace Based on Slides by I. Stoica.
Economics and industry structure David D. Clark MIT July, 2012.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
NATs and UDP Victor Norman CS322 Spring NAPT Suppose we have a router doing NAT: half is the “public side”, IP address ; other half is.
Internet Basics Monopoly Concerns & Review TC 310 May 22, 2008.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Unit 3 Lesson 5 Technology Transfer and Patents. Big Idea Patents are catalysts of new technologies and businesses and they stimulate economic development.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Overview of Network Neutrality Kyle D. Dixon Senior Fellow & Director, Federal Institute for Regulatory Law & Economics The Progress & Freedom Foundation.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
1 NGN Evolution & its Overview Desire for a new platform: User requirements increased — MORE BANDWIDTH Technology growth — INTELLIGENT NODES, SWITCHES.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Critical Decisions, Myths & Lessons Learned in Networking What is important at the time may be only apparent with hindsight What seems important at the.
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
Application Architecture Internet Architecture David D. Clark MIT CSAIL September 2005.
Information-Centric Networks Section # 2.2: Internet Evolution Instructor: George Xylomenos Department: Informatics.
Incentives Alignment Whitepaper Progress since Athens.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
Securing Access to Data Using IPsec Josh Jones Cosc352.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Managing the (Traffic) Managers
Chapter 1 Communication Networks and Services
Presented by Muhammad Abu Saqer
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Dr. Konstantinos Komaitis
12 March 2007 PT 2 TRIS Copenhagen Meeting March 2007
Presentation transcript:

Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins and Robert Braden –ACM SIGCOMM, 2002 Main point –The current Internet has grown well beyond its intended use –Different stakeholders have conflicting interests This is the “tussle in cyberspace” –How can Internet evolution accommodate this tussle?

Information-Centric Networks02b-2 Introduction In the original Internet everyone had a common goal –Interconnect all the computers in the world This common goal no longer exists –Important and powerful players are at odds with each other Examples abound –Music exchange –Private communications –ISPs must compete and co-operate The Internet architecture must meet new requirements –This implies new design strategies –Handling tussles is a critical issue

Information-Centric Networks02b-3 Internet and society The Internet is an engineering artifact –It was designed to meet specific goals Societies are not engineered –They reflect conflicting interests The Internet needs to reflect society –Its technical architecture must reflect the tussles of society Stakeholders (good and bad) –Users running applications –Commercial ISPs –Private network providers –Governments and regulators –Intellectual property rights holders –Content providers

Information-Centric Networks02b-4 Principles The generic principle –Design for variation of outcome The tussle should take place within the design The design should not dictate the outcome Two more specific principles –Modularize along tussle boundaries Functions within a tussle space should be isolated Counter-example: use of copyrighted names in DNS Example: use of ToS bits for QoS instead of ports –Design for choice All parties should be able to express choices Example: choosing an SMTP server Choice requires configuration

Information-Centric Networks02b-5 Implications Choice often requires open interfaces Tussles often happen across interfaces –Tussle interfaces are not only about interoperability It matters if the consequences of choice is visible –Choices made in public may be different than secret choices Tussles have different flavors –The type of conflict may vary Tussles evolve over time –They are multi-round processes There is no such thing as value-neutral design –Tussles are shaped by designs Don’t assume that you design the answer!

Information-Centric Networks02b-6 Tussle spaces: Economics Economics –Provider vs. provider and provider vs. consumer –The drivers of investment are greed and fear Greed is obvious, fear is less so Specific examples of economic tussles –How can the design promote competition? Provider lock-in from IP addressing –A consumer should be able to easily move to another ISP –Addresses should not be confused with identities Value pricing –ISPs charge business and residential consumers differently –Should a residential customer hide a server behind a tunnel?

Information-Centric Networks02b-7 Tussle spaces: Economics Residential broadband access –Broadband access requires low level access to the cables –Open access forces telcos to open their networks –But then who would invest in optical fiber? Municipalities? –Optical fiber systems should be design for open access Competitive wide area access –Customers cannot choose their wide area providers They have to live with the choices of their ISPs –The Internet should support source routing at the provider level –But payments must also be considered in the design –Overlays may have role to play there

Information-Centric Networks02b-8 Tussle spaces: Trust Internet uses do not trust each other (with good reason!) –This has led to a proliferation of firewalls Whatever is not permitted, gets dropped –Firewalls violate the architecture and inhibit innovation But they respond to a genuine user need –Users should be able to indicate their control choices –Endpoints should not invest effort before verification –Third parties are also needed in many cases Banks, credit card companies, certificate agencies –Users should be able to explicitly select third party mediators –What about identities on the Internet? Probably no single solution is perfect Many users also value anonymity

Information-Centric Networks02b-9 Tussle spaces: Openness The open nature of the Internet has many benefits –Users can freely select servers and services –New application and uses spring up all the time But openness is not good for everyone –Openness means competition (fear!) Entrenched providers prefer closed systems –Vertical integration does not prevent openness A provider may have cables, access routers and services This does not require proprietary interfaces The critical issue is to allow innovation –We need transparent packet carriage –New protocols can evolve over this basic service

Information-Centric Networks02b-10 The future of the E2E arguments The E2E argument –The network should not do what can be done at the endpoints –Innovation: the network can work with many applications –Reliability: there are no scattered points of failure The Internet E2E principles are eroding –Loss of trust (firewalls) –ISP desire for control (application filtering) –Third party data capture (wiretapping) –Web optimizations (caches) There is simple way out of this –Accept that these things will happen –Think of how the design can accommodate them

Information-Centric Networks02b-11 Separation of policy and mechanism A good design should be policy-free –Provide mechanisms upon which policies can be built –Maybe too simplistic: are there value-neutral designs? The range of mechanisms available limits feasible policies! –Try to discover the value-neutral parts Lessons for designers –Many good ideas have failed (multicast, explicit QoS) –Remember that you need business drivers (greed and fear!) Greed: providers should get something out of their investment Fear: users should be able to choose a provider that made it –One should analyze and manage the tussles of a design Primary lesson: the Internet is part of our society –Its evolution requires also thinking about society