Rethink the design of the Internet CSCI 780, Fall 2005.

Slides:



Advertisements
Similar presentations
Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker * 7 December 2004 MIT Computer Science and AI Lab.
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Chapter 19 Network Layer: Logical Addressing Stephen Kim.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Internet as convergence live delayed interpersonal mass telephone mail television newspaper ip telephone listservweb-cast.
IPNL: A NAT-Extended Internet Architecture Francis & Gummadi Riku Honkanen.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
1 Chapter Overview IP (v4) Address IPv6. 2 IPv4 Addresses Internet Protocol (IP) is the only network layer protocol with its own addressing system and.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Chapter 19 Network Layer: Logical Addressing
Middleboxes & Network Appliances EE122 TAs Past and Present.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 “Vision for Trustworthy Computing”, Bill Gates, 15 Jan 2002 “…now, when we face a choice between adding features and resolving security issues, we need.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Sharing a single IPv4 address among many broadband customers
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. IP version 6 Asst. Prof. Chaiporn Jaikaeo,
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
Network Layer: Logical Addressing. Address Space Notations Classful Addressing Classless Addressing Network Address Translation (NAT) Topics Discussed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Network Protocols Chapter 5 (TCP/IP Suite Book): IPv4 Addresses
Addressing IP v4 W.Lilakiatsakun. Anatomy of IPv4 (1) Dotted Decimal Address Network Address Host Address.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
CCNP Network Route IPV-6 Part-I IPV6 Addressing: IPV-4 is 32-BIT, IPV-6 is 128-BIT IPV-6 are divided into 8 groups. Each is 4 Hex characters. Each group.
LNA and DOA Aditya Akella 3/11/2010. A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Network Security1 – Chapter 6 – NAT and Security Network Address Translation (NAT) is useful: –Hide internal private IP addresses –Conserve routable IP.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Preserve and Enhance: Balancing Goals for the Internet APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APRICOT Kuala Lumpur – 2004.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
Analysis and recommendation for the ULA usage draft-liu-v6ops-ula-usage-analysis-00 draft-liu-v6ops-ula-usage-analysis-00 Bing Liu(speaker), Sheng Jiang.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
NETWORK LAYER.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Can we save the OPEN Internet? with focus on The Two-Port Internet Problem and what to do about it Terry Gray Designated Prophet of Doom University of.
The Internet by Manny San Miguel
Network Layer IP Address.
CCNA4-1 Chapter 7-1 IP Addressing Services Scaling Networks With Network Address Translation (NAT)
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Multicast in Information-Centric Networking March 2012.
On Firewalls Fred Baker and Paul Hoffman draft-ietf-opsawg-firewalls-01.txt.
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Naming Dave Andersen. Lecture warning ● Think “lots of in-class paper discussion” today.
شركت ارتباطات زيرساخت آبان 1393
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
4.3 Network Layer Logical Addressing
Network Address Translation
IPv6 / IP Next Generation
An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
Introducing To Networking
Stateless Source Address Mapping for ICMPv6 Packets
Chapter 19 Network Layer: Logical Addressing
Security Protocols in the Internet
Transport Layer Systems Firewalls and NAT
מנחה: דר ניסים צורי ישראל דורי בקשי שגיא
Presentation transcript:

Rethink the design of the Internet CSCI 780, Fall 2005

E2E argument is great Complexity of core network is reduced, easy to upgrade Generality of network makes new applications easy to add Increases applications ’ reliability

Moving away from E2E Operation in an untrustworthy world Enforce ‘ good ” behavior More demanding applications Streaming audio and video ISP service differentiation Enhanced service is limited to one ISP Third-party involvement Interpose between the two ends Less sophisticated users

Technical responses Different forms of E2E argument Core (in the network) Edge (on or attached to the network) Modify the end-host Sometimes it does not work More functions to the network Firewall, traffic filter NAT box Packet labels (marking)

Trends at application layer Insert intermediary into data path due to performance or security reasons Anonymizing senders Content (layer-7) filtering Content caches (Web proxy, CDN) Application requirements become more complex

Current Internet is changing Rise of new players Commercial ISPs (Internet Service Providers) Tussle between ISPs Erosion of trust Security issues (global communication with local trust)

Two tenets valued but disobeyed Each Internet entity has a global identifier that allows others to reach it Network elements should not violate network layering

Middle-box violates tenets Network address translator (NAT) Pros: expands the IPv4 address space; address isolation Cons: p2p fails to work; layer violation; complicate new protocol or application design;

Private IP address IANA (Internet Assigned Numbers Authority) has reserved three blocks of the IP address space for private internets: (10/8 prefix) (172.16/12 prefix) ( /16 prefix)  First is a single class A network number, second block is a set of 16 contiguous class B network numbers, third block is a set of 256 contiguous class C network numbers.

Delegation-oriented architecture (DOA) Goal: retain the functionality of middle- box, but eliminate their dangerous side- effect Approach: Provide a globally unique identifier in a flat namespace (160-bit EIDs) Explicit delegation