Tussel in Cyberspace Based on Slides by I. Stoica.

Slides:



Advertisements
Similar presentations
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Advertisements

End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
INTRODUCTION TO NETWORK VIRTUALIZATION Mosharaf Chowdhury Member, eNVy Project Wednesday, May 14, 2008 University of Waterloo - eNVy 1.
Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
Answering the Three Economic Questions
Cross-Border Infrastructure: A Toolkit Policy Harmonization Session on Regulation & Accountability Max Bradford Castalia The views expressed here are those.
Towards an ‘easy office’ : ICT and Telecom : a Lovestory ! Michel De Maeyer Marketing Manager Small Business Customers.
OASIS Reference Model for Service Oriented Architecture 1.0
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
NewArch: A new architecture for an Internet David D. Clark, Steve Bellovin, Bob Braden, Noel Chiappa, Ted Faber, Aaron Falk Mark Handley, Scott Shenker,
The state of home networks CSE481M: Home Networking Capstone March 30 th, 2011.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Tussle in Cyberspace: Defining Tomorrow’s Internet by David D. Clark, John Wroclawski Karen R. Sollins, Robert Braden Offense: Ionut Trestian.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
Bandwidth on Demand Dave Wilson DW238-RIPE
HISP-to-HISP Discussion May 13, HISP Definition What is a HISP? An organization that provides security and transport services for directed exchange.
Cloud Brokers and the Health Industry Andrea Bilobrk.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
6. Next Generation Networks A. Transition to NGN B
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
This project is implemented through the CENTRAL EUROPE Programme co-financed by the ERDF. Manager Coordinating Brownfield Redevelopment Activities
Morteza Yousefi University of Science & Technology of Mazandaran Network Virtualization 1 of 22 Network Virtualization.
Voice over Internet Services and Privacy. Agenda Problem Description Scope Recommendations.
Questions about broadband What do we do about broadband services? –Why didn’t the ILECs deploy DSL faster? Could regulation be to blame? –How do we get.
The Market System Chapter 4. Market systems characteristics Private individuals own most land and firms Private individuals own most land and firms The.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
HUGHES PROPRIETARY II1HNS /23/2015 STANDARD INTERFACE FOR SATELLITE IP NETWORKS E. Laborde Hughes Network Systems, Inc. Germantown, MD
1 Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Choosing the Route To Traveler Information Systems Deployment by ITS America ATIS Committee USDOT ITS Joint Program Office Washington State Transportation.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar (University of Pennsylvania) Andrew Odlyzko, Zhi-Li Zhang (University.
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
 The End to the Means › (According to IBM ) › 03.ibm.com/innovation/us/thesmartercity/in dex_flash.html?cmp=blank&cm=v&csr=chap ter_edu&cr=youtube&ct=usbrv111&cn=agus.
Information-Centric Networks Section # 2.2: Internet Evolution Instructor: George Xylomenos Department: Informatics.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
Incentives Alignment Whitepaper Progress since Athens.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
3/9/20161 Select the Appropriate Strategic Approaches for Managing Conflict (LO 3) the role of communication in resolving conflict. the role of communication.
Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Managing the (Traffic) Managers
Sell Global, Feel Local by Leveraging eShopWorld
12 March 2007 PT 2 TRIS Copenhagen Meeting March 2007
IPv4 Allocation Implications
Internet Interconnection
Fundamental Concepts and Models
EASTERN MEDITERRANEAN UNIVERSITY DEPARTMENT OF INDUSTRIAL ENGINEERING IENG314 OPERATIONS RESEARCH II SAMIR SAMEER ABUYOUSSEF
Chapter 9: Setting the list or quoted price
End of the Internet Predicted!
Presentation transcript:

Tussel in Cyberspace Based on Slides by I. Stoica

2 Key Question  How can we as researchers/engineers influence the evolution of the Internet again?

3 How to Answer this Question  Understand the new realities and try to predict where the Internet is heading to  Two approaches: -The days when all players had a common goal are gone, and that the new environment where different players have often conflicting goals is here to stay -Internet should provide only one basic service: connectivity for which there is no business model, hence treat the Internet as a publicly supported & controlled utility

4 Tussles  The process by which players with different interests act to achieve those interests  Accept the reality that the players have often conflict interests and try to leverage or at least accommodate it

5 Design Principles  Design for variation in outcome not for a particular outcome -Modularize the design along tussle boundaries -Design for choice

6 Modularize along Tussle Boundaries  Functions that are within a tussle space should be logically separated from functions outside of that space  Examples -DNS, QoS

7 Design for Choice  Design protocols such that to allow parties to express preferences about the parties they interact with  Examples -Mail server

8 Design Implications  Design open interfaces – allow different parties to compete providing the same interface  Desirable properties of open interfaces -Visible exchange of value  allow parties with compatible interests (e.g., provider/customer) to achieve equilibrium -Exposure of cost of choice  allow parties to make “intelligent” choices -Visible (or not) of choices made  realize that choices made public can be different from choices made in secret -Tools to isolate and resolve faults/failures

9 Economics  Goal: create premises for investment  Drivers of investment: greed and fear -Greed: invest in the hope to maximize revenues -Fear driven by the competition, which in turn is driven by the ability of customers to have choices

10 Examples  Lock-in from IP addressing -Solution: made it easy for a host to change addresses and use multiple addresses  Value pricing -Solution: aid consumers to bypass the controls of the producers  Residential broadband access -Solution: design residential access facility that supports competition. Who is going to deploy this facility?  Competitive wide area access -Solution: allow consumers to control the path of their packets at the level of providers. Need payment mechanisms?

11 Trust  Users should be able to choose with whom to interact, and the level of transparency they offer to other users  Question: who is controlling the policy? Users or network administrators?  We cannot fully address this question but we should -Provide maximum flexibility to users in setting policies -Allow users to select third party entities to mediate the interaction (e.g., PKI)  Recognize that technical solutions are note enough! -E.g., how to avoid eavesdropping?

12 Openness  We need to strive for open interfaces  lead to competition, innovation  In Internet this means simple service, i.e., transparent packet carriage  allow to deploy new protocols without having to modify the network

13 Important Side Discussions  Mechanisms vs. policies  The role of identity  The future of end-to-end arguments

14 Internet as Public Utility  Assumption: Internet should provide basic connectivity  no business model for this  Conclusions/Solutions: -Evolve internet into a publicly supported & controlled utility (e.g., postal system, power grid distribution, public roads) -Grant monopoly, subject to regulatory contracts Universal service  reach everyone Common carriage  common interface No bundled services

15 Discussion…