August 03 1 1 Wont get.fooled again One outlook for 2004 and beyond Geoff Huston Chief Internet Scientist Telstra Geoff Huston Chief Internet Scientist.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

MCT620 – Distributed Systems
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Cost Management ACCOUNTING AND CONTROL
The Internet Five Year Plan Geoff Huston February 2003.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
Stacking it Up Experimental Observations on the operation of Dual Stack Services in todays Network Geoff Huston APNIC R&D February
Policy Aspects of the Transition to IPv6 Geoff Huston Chief Scientist, APNIC.
ARIN Public Policy Meeting
An Internet Outlook Geoff Huston October So far, the Internet has made an arbitrary number of good and bad decisions in the design of networking.
Technology Directions for IP Infrastructure GH 3/7/00.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Views of Technology Futures An Internet Perspective Geoff Huston Internet Society October 2000.
End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
Internet Issues One outlook for 2003 and beyond Geoff Huston Chief Internet Scientist Telstra.
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC APNIC 24, September 2007.
1 OpenFlow + : Extension for OpenFlow and its Implementation Hongyu Hu, Jun Bi, Tao Feng, You Wang, Pingping Lin Tsinghua University
Security Issues In Mobile IP
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
ActionDescription 1Decisions about planning and managing the coast are governed by general legal instruments. 2Sectoral stakeholders meet on an ad hoc.
1. 2 Why are Result & Impact Indicators Needed? To better understand the positive/negative results of EC aid. The main questions are: 1.What change is.
Multi-service Architecture: Evolution of Network Architecture Keith Knightson Khalid Ahmad Carrier Data Networks Nortel Networks, Canada IP-Networking/Mediacom.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Ivan Gaboli, Virgilio Puglia.
Communicating over the Network
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
1 Chapter One Introduction to Computer Networks and Data Communications.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Mobile IP. 2 N+I_2k © 2000, Peter Tomsu 02_mobile_ip Evolution of Data Services Mobile IP GSM GPRS CDMA Other Cellular Circuit Switched Data Today Packet.
Chapter 10 Money, Interest, and Income
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Johan Garcia Karlstads Universitet Datavetenskap 1 Datakommunikation II Signaling/Voice over IP / SIP Based on material from Henning Schulzrinne, Columbia.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Target Costing If you cannot find the time to do it right, how will you find the time to do it over?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
Chapter 9: Subnetting IP Networks
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 10 A Monetary Intertemporal Model: Money, Prices, and Monetary Policy.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Internet Evolution and IPv6 Paul Wilson APNIC. 2 Overview Where is IPv6 today? –In deployment –In the industry Do we actually need it? –If so, why and.
Some Observations on CGNs Geoff Huston Chief Scientist APNIC.
May Won’t get.fooled again One outlook for 2003 and beyond Geoff Huston Chief Internet Scientist Telstra Geoff Huston Chief Internet Scientist.
Won’t Get.Fooled Again Geoff Huston, APNIC NANOG 35.
1 Internet Evolution and IPv6 Paul Wilson APNIC. 2 Overview Where is IPv6 today? –Address space deployment –Compared with IPv4 Do we actually need IPv6?
Public Policy Issues in the Communications and Infrastructure Services Policy area Geoff Huston APNIC June 2011.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
6. Next Generation Networks A. Transition to NGN B
1 Convergence ? Geoff Huston Research Scientist APNIC.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC November 2007.
SANOG-7 Internet Evolution and IPv6 Paul Wilson Geoff Huston APNIC.
Electronic Commerce Semester 1 Term 1 Lecture 6. Predicting the Future of the IAP Market In the future, four organisational and technology trends will.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Telecommunications, the Internet, and Wireless Technology.
Looking Forward Geoff Huston APNIC 20. There are many ways of predicting the future….
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Association of Competitive Telecom Operators IPv6 & TELCOs Workshop On IPv6 New Delhi 21 st July 2009.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Internet Evolution and IPv6
Geoff Huston Research Scientist APNIC
Geoff Huston, APNIC NANOG 35
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

August Wont get.fooled again One outlook for 2004 and beyond Geoff Huston Chief Internet Scientist Telstra Geoff Huston Chief Internet Scientist Telstra

August Boom and Bust… Is nothing new… –1637 – tulip mania takes hold and the price of tulip bulbs escalates to fantastic levels –1719 Banque Royale – John Law introduces the French crown to the magical mysteries of bank credit and paper money. At this point the word millionaire entered our vocabulary. But by 1720 the Parisian crowd were less than impressed with Laws sharp dealings as the French economy collapsed utterly –1847 – the great British Railway Boom and subsequent bust Is nothing new… –1637 – tulip mania takes hold and the price of tulip bulbs escalates to fantastic levels –1719 Banque Royale – John Law introduces the French crown to the magical mysteries of bank credit and paper money. At this point the word millionaire entered our vocabulary. But by 1720 the Parisian crowd were less than impressed with Laws sharp dealings as the French economy collapsed utterly –1847 – the great British Railway Boom and subsequent bust

August Oh What A Boom! There is no doubt that the Internet boom was as euphoric, as imaginative and as inspired as any other boom –Just remember the Tshirts…… There is no doubt that the Internet boom was as euphoric, as imaginative and as inspired as any other boom –Just remember the Tshirts……

August Anything was possible

August Even Internet Toasters

August And the old ways of doing things were ridiculed

August But the spectre of a bust was lurking just around the corner

August Its a post-dot-boom-and-bust world The Internet boom has been pretty mild by comparison with booms in gold, oil, rail, shipping, ice and, of course, tulips. The peak of the Internet boom saw stock indices peak at times their longer-term value The Internet boom has been pretty mild by comparison with booms in gold, oil, rail, shipping, ice and, of course, tulips. The peak of the Internet boom saw stock indices peak at times their longer-term value

August Its a post-dot-boom-and-bust world After: Gartner Innovation Enthusiasm Mania Elation Intensity Time Disillusion Cynicism Panic Depression Overreaction Reality 2003

August Today

August So… What have we learned from all this?

August Today ISPs can no longer operate a rapid expansion-based business model –Current business models are tending to use a common theme of service consolidation –Market share is now an increasingly important metric –There is now a highly competitive market for Internet-based service provision ISPs can no longer operate a rapid expansion-based business model –Current business models are tending to use a common theme of service consolidation –Market share is now an increasingly important metric –There is now a highly competitive market for Internet-based service provision

August Today Attention is now concentrating on the basic aspects of the Internet service model: –Dependability and integrity –Utility –Price Competitiveness Relatively less focus on: –Value-add service models –Quality and Selective Performance Outcomes –Innovative applications and services Attention is now concentrating on the basic aspects of the Internet service model: –Dependability and integrity –Utility –Price Competitiveness Relatively less focus on: –Value-add service models –Quality and Selective Performance Outcomes –Innovative applications and services

August From Optimism to Conservatism Weve learned once more that optimism alone is no substitute for knowledge and capability That business plans require more than an animated slide pack That the business of communications is not a recent one and not a small one – and it does not change overnight every night Weve learned once more that optimism alone is no substitute for knowledge and capability That business plans require more than an animated slide pack That the business of communications is not a recent one and not a small one – and it does not change overnight every night

August From Optimism to Conservatism A conservative period of steady expansion rather than explosive growth –Investment programs need to show assured and competitively attractive financial returns across the life cycle of the program –Existing investments cannot be discarded at whim –Reduced investment risk implies reduced levels of innovation and experimentation in service models –Accompanied by greater emphasis on service robustness and reliability –Combinations of communication services with additional services to create value-added service bundles A conservative period of steady expansion rather than explosive growth –Investment programs need to show assured and competitively attractive financial returns across the life cycle of the program –Existing investments cannot be discarded at whim –Reduced investment risk implies reduced levels of innovation and experimentation in service models –Accompanied by greater emphasis on service robustness and reliability –Combinations of communication services with additional services to create value-added service bundles

August Security Focus Weve learned that we cannot operate global networks based on informal trust models Its likely that we will see a highly visible security focus for the next few years, due to: –Increased end-user awareness of vulnerabilities and weaknesses and a desire for more secure and trustable services –Increased public sector agency awareness of the vulnerabilities of the Internet communications environment and its consequences –A response based on increased technology effort in dismantling aspects of the Internets distributed trust model and attempting to replace it with negotiated conditional trust –Expect encryption and authentication at many levels of the IP protocol suite Weve learned that we cannot operate global networks based on informal trust models Its likely that we will see a highly visible security focus for the next few years, due to: –Increased end-user awareness of vulnerabilities and weaknesses and a desire for more secure and trustable services –Increased public sector agency awareness of the vulnerabilities of the Internet communications environment and its consequences –A response based on increased technology effort in dismantling aspects of the Internets distributed trust model and attempting to replace it with negotiated conditional trust –Expect encryption and authentication at many levels of the IP protocol suite

August Security Issues Weve learned that we need to understand more about what stakeholders want from the Internet in terms of security Many components of IP are not anywhere near secure enough: –DNS –Routing –Transport –Addressing –Data Plane / Control Plane distinction –Content Vulnerabilities are just about everywhere Weve learned that we need to understand more about what stakeholders want from the Internet in terms of security Many components of IP are not anywhere near secure enough: –DNS –Routing –Transport –Addressing –Data Plane / Control Plane distinction –Content Vulnerabilities are just about everywhere

August Security Issues The list of outstanding issues include: –How can users identify each other? –How can users identify network-based services and validate the integrity of such services before entrusting them with data? –How can the network protect itself from abuse and attack? –How can users protect themselves from abuse and attack? –What are a users obligations and responsibilities? –How can abusers be identified? And whose role is it? –What is the role of the ISP? Neutral common carrier? Trusted intermediary? Enforcement point? Time to get working! The list of outstanding issues include: –How can users identify each other? –How can users identify network-based services and validate the integrity of such services before entrusting them with data? –How can the network protect itself from abuse and attack? –How can users protect themselves from abuse and attack? –What are a users obligations and responsibilities? –How can abusers be identified? And whose role is it? –What is the role of the ISP? Neutral common carrier? Trusted intermediary? Enforcement point? Time to get working!

August Convergence and Multiple Networks Weve learned that IP is not the panacea of communications protocols Recognise IPs strengths and weaknesses –IP is not a network resource management architecture IP allows adaptable traffic sessions to operate extremely efficiently over wired networks IP is not the optimal approach to support: mobile wireless traffic resource management requirements IP is not strong in supporting: real time traffic under localized congestion events various forms of traffic engineering applications Weve learned that IP is not the panacea of communications protocols Recognise IPs strengths and weaknesses –IP is not a network resource management architecture IP allows adaptable traffic sessions to operate extremely efficiently over wired networks IP is not the optimal approach to support: mobile wireless traffic resource management requirements IP is not strong in supporting: real time traffic under localized congestion events various forms of traffic engineering applications

August Convergence and Multiple Networks Whats the desired model here? –Adaptive response networks supporting non-adpative application transport sessions Or –Best effort networks supporting cooperative adaptive transport sessions So far, the efforts in IP have obtained the greatest leverage through using adaptive applications through a common base best effort network. There are no real signs that this model is changing in the coming few years Whats the desired model here? –Adaptive response networks supporting non-adpative application transport sessions Or –Best effort networks supporting cooperative adaptive transport sessions So far, the efforts in IP have obtained the greatest leverage through using adaptive applications through a common base best effort network. There are no real signs that this model is changing in the coming few years

August Bandwidth Abundance Weve learned that when you eliminate one choke point in a system you expose others Dense Wave Division Multiplexing is lifting per-strand optical capacity –from 2.5Gbps to 6.4Tbps (640 wavelengths, each of 10Gbps per lambda) per optical strand The major long haul communications routes worldwide are more than amply provisioned with IP bandwidth –The shift from demand-pull to supply-overhang is impacting the business stability of the long haul communications supply market. The network choke points are shifting to the access domain, not the long haul elements Weve learned that when you eliminate one choke point in a system you expose others Dense Wave Division Multiplexing is lifting per-strand optical capacity –from 2.5Gbps to 6.4Tbps (640 wavelengths, each of 10Gbps per lambda) per optical strand The major long haul communications routes worldwide are more than amply provisioned with IP bandwidth –The shift from demand-pull to supply-overhang is impacting the business stability of the long haul communications supply market. The network choke points are shifting to the access domain, not the long haul elements

August Broadband Last Mile An steady continuation of the shift to a pervasive broadband access model for IP –Gradual phase out of modems as the dominant IP access device Here are many externalities that determine the speed of this trend –Industry concentration on deployment of fibre, coax and DSL based last mile networks Associated with this is the need to deploy higher speed last mile access switching systems – allow concentration and switching of user traffic across a shared last-mile high capacity access system An steady continuation of the shift to a pervasive broadband access model for IP –Gradual phase out of modems as the dominant IP access device Here are many externalities that determine the speed of this trend –Industry concentration on deployment of fibre, coax and DSL based last mile networks Associated with this is the need to deploy higher speed last mile access switching systems – allow concentration and switching of user traffic across a shared last-mile high capacity access system

August Technology – IPv4 Were learning that we might be stuck with making IPv4 work for longer than we thought V4 remains the overwhelmingly dominant protocol choice for the Internet today –32 bit (4G) address space 46% allocated 29% deployed 5%- 10% utilization density achieved Consumption at a rate of 32M addresses p.a. Were learning that we might be stuck with making IPv4 work for longer than we thought V4 remains the overwhelmingly dominant protocol choice for the Internet today –32 bit (4G) address space 46% allocated 29% deployed 5%- 10% utilization density achieved Consumption at a rate of 32M addresses p.a.

August Scaling the Network - The IPv4 View Use DHCP to undertake short term address recycling Use NATs to associate clients with temporary ( ) bit aliases Use IP encapsulation to use the outer IP address for location and the inner IP address for identity And just add massive amounts of middleware –Use helper agents to support server-side initiated transactions behind NATS –Use application level gateways to drive applications across disparate network domains –Use walled gardens of functionality to isolate services to particular network sub-domains Use DHCP to undertake short term address recycling Use NATs to associate clients with temporary ( ) bit aliases Use IP encapsulation to use the outer IP address for location and the inner IP address for identity And just add massive amounts of middleware –Use helper agents to support server-side initiated transactions behind NATS –Use application level gateways to drive applications across disparate network domains –Use walled gardens of functionality to isolate services to particular network sub-domains

August Scaling the Network Or change the base protocol

August Scaling the Network - The IPv6 View Extend the address space so as to be able to uniquely address every connected device at the IP level Remove the distinction between clients and servers Use an internal 64/64 bit split to contain location and identity address components Remove middleware and use clear end-to-end application design principles Provide a simple base to support complex service-peer networking services Extend the address space so as to be able to uniquely address every connected device at the IP level Remove the distinction between clients and servers Use an internal 64/64 bit split to contain location and identity address components Remove middleware and use clear end-to-end application design principles Provide a simple base to support complex service-peer networking services

August Technology – IPv6 Remember that silicon is a volume industry This is an issue for high volume deployments including: –GPRS mobile –Pocket IP devices –Consumer devices IPV6 appears to offer reasonable technology solutions that preserve IP integrity, reduce middleware dependencies and allow full end-to-end IP functionality for a device-rich world Remember that silicon is a volume industry This is an issue for high volume deployments including: –GPRS mobile –Pocket IP devices –Consumer devices IPV6 appears to offer reasonable technology solutions that preserve IP integrity, reduce middleware dependencies and allow full end-to-end IP functionality for a device-rich world Sony DCRTRV950

August Technology and Architecture Both IPv4 and IPv6 use overloaded semantics for and address –Who (end-point identification) –Where (locator) –How (forwarding token) Are there benefits in using a split-approach? –E.g. end-to-end transport sessions using end identifiers, mapping a session to locators in packet headers Somehow, in the next few years, we need to encompass a world of prolific silicon with simple scaleable solutions Both IPv4 and IPv6 use overloaded semantics for and address –Who (end-point identification) –Where (locator) –How (forwarding token) Are there benefits in using a split-approach? –E.g. end-to-end transport sessions using end identifiers, mapping a session to locators in packet headers Somehow, in the next few years, we need to encompass a world of prolific silicon with simple scaleable solutions

August Wireless In theory –IP makes minimal assumptions about the nature of the transmission medium. IP over wireless works well. In practice –high speed TCP over wireless solutions only works in environments of low radius of coverage and high power –TCP performance is highly sensitive to packet loss and extended packet transmission latency 3G IP-based wireless deployments will not efficiently interoperate with the wired IP Internet without adaptive media gateways –Likely 3G deployment scenario of wireless gateway systems acting as transport-level bridges, allowing the wireless domain to use a modified TCP stack that should operate efficiently in a wireless environment is different –And is now well established In theory –IP makes minimal assumptions about the nature of the transmission medium. IP over wireless works well. In practice –high speed TCP over wireless solutions only works in environments of low radius of coverage and high power –TCP performance is highly sensitive to packet loss and extended packet transmission latency 3G IP-based wireless deployments will not efficiently interoperate with the wired IP Internet without adaptive media gateways –Likely 3G deployment scenario of wireless gateway systems acting as transport-level bridges, allowing the wireless domain to use a modified TCP stack that should operate efficiently in a wireless environment is different –And is now well established

August Voice over IP Were learning that voice has more dimensions than just emulating simple carriage of a voice signal The technology is getting better… –Load-sensitive codecs that adjust their signal rate to the current delay / loss characteristics –Abundant trunk bandwidth circumvents the need for detailed QoS in the network core –Solutions available to map between the telephone address domain and the Internet address domain (ENUM) –Intertwining hand-held devices into phone + PDA But many practical technology, regulatory and business issues remain on the VOIP path…. Were learning that voice has more dimensions than just emulating simple carriage of a voice signal The technology is getting better… –Load-sensitive codecs that adjust their signal rate to the current delay / loss characteristics –Abundant trunk bandwidth circumvents the need for detailed QoS in the network core –Solutions available to map between the telephone address domain and the Internet address domain (ENUM) –Intertwining hand-held devices into phone + PDA But many practical technology, regulatory and business issues remain on the VOIP path….

August Services and Middleware Were learning that you cant completely separate various service platforms from the network WWW caching technologies is maturing with the addition of a more generic approach to include aspects of: –Interception technologies –Open pluggable edge service technologies Service provision and IP Anycast to create improved resiliency for critical infrastructure elements Directory technologies and mapping of disparate protocol and services domains into the IP world The shift in focus in identity domains from how to a persistent version of what Public Key Certificate structures to support integrity of referential operations –Are as needed now more than ever! Were learning that you cant completely separate various service platforms from the network WWW caching technologies is maturing with the addition of a more generic approach to include aspects of: –Interception technologies –Open pluggable edge service technologies Service provision and IP Anycast to create improved resiliency for critical infrastructure elements Directory technologies and mapping of disparate protocol and services domains into the IP world The shift in focus in identity domains from how to a persistent version of what Public Key Certificate structures to support integrity of referential operations –Are as needed now more than ever!

August What have we learned? That the Internet is not infinitely elastic and some things just cannot fly no matter how much thrust is put behind it That social change often takes far longer than technology change That the Internet may not be the best entertainment medium today – but its a remarkable exchange medium That an efficient, ubiquitous and communications infrastructure is a valuable national and global asset That building communications infrastructure is one thing, using it to best effect is another. Both aspects require care and attention. That this is a technology-intensive activity with much that we still have to learn That the Internet is not infinitely elastic and some things just cannot fly no matter how much thrust is put behind it That social change often takes far longer than technology change That the Internet may not be the best entertainment medium today – but its a remarkable exchange medium That an efficient, ubiquitous and communications infrastructure is a valuable national and global asset That building communications infrastructure is one thing, using it to best effect is another. Both aspects require care and attention. That this is a technology-intensive activity with much that we still have to learn

August So what can we expect? My personal list of expectations for the next few years: –No repeat of boom and bust –Conservative business objectives with conservative returns –Continued levels of regulatory interest to ensure that public objectives are being achieved –Continued expansion of the underlying infrastructure –Industry sector members with longer term objectives phrased more modestly than may have been the case in the past five years –In other words……. My personal list of expectations for the next few years: –No repeat of boom and bust –Conservative business objectives with conservative returns –Continued levels of regulatory interest to ensure that public objectives are being achieved –Continued expansion of the underlying infrastructure –Industry sector members with longer term objectives phrased more modestly than may have been the case in the past five years –In other words…….

August Meet the new economy. Same as the old economy. The classic The Who song, written by Pete Townshend, Won't Get Fooled Again was first recorded in early It was released as a single and on the Who's Next album in August This song formed the climax of their stage set. This song is about the same age as the Internet.

August Thank You