Internet Protocols and Innovation John C Klensin John C Klensin and Associates

Slides:



Advertisements
Similar presentations
Fall IM2000 Industry Perspective Presence: The Best Thing that Ever Happened to Voice Jonathan Rosenberg Chief Scientist.
Advertisements

1 10/3/03 Protocol Problems and Architectural Issues Steven M. Bellovin AT&T Labs – Research
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Intermediate 2 Computing
Enabling Secure Internet Access with ISA Server
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Internet Governance Fred Baker Internet Maintenance, Coordination, and Development.
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Introduction to Research: The Internet
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
The Internet Useful Definitions and Concepts About the Internet.
Sept 23, 2004CS573: Network Protocols and Standards D – Expedited Traffic Network Protocols and Standards Autumn
Searching and Researching the World Wide: Emphasis on Christian Websites Developed from the book: Searching and Researching on the Internet and World Wide.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Basics.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Basics Dayton Metro Library Place photo here August 10, 2015.
IDK0040 Võrgurakendused I Building a site: Publicising Deniss Kumlander.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
1 Revised: April 29, What is a Web Domain?  A HOSTNAME that identifies one or more IP addresses (web servers)  IP address (Internet Protocol)
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Web server and web browser It’s a take and give policy in between client and server through HTTP(Hyper Text Transport Protocol) Server takes a request.
Internationalized Domain Names Technical Review and Policy Implications John C Klensin APTLD Manila 23 February 2009.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Mr C Johnston ICT Teacher
IT 210 The Internet & World Wide Web introduction.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Lecturer: Ghadah Aldehim
TCOM 515 Lecture 6.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
G053 – Lecture 09 Domain Names Mr C Johnston ICT Teacher
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Accessing E-DRIVER File for the first time Critical Steps to Assuring Success O nline S afety & C ompliance E lectronic R eporting System.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Kyung Hee University Chapter 18 Domain Name System.
Interdomain multicast routing with IPv6 Stig Venaas University of Southampton Jerome Durand RENATER Mickael Hoerdt University Louis Pasteur - LSIIT.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Guide to web safety for Key Stage 1. Being safe on the internet is really important. If you follow these rules at all times you can still have lots of.
NATIONAL AGENCY FOR EDUCATION Check the Source! - Web Evaluation
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IDNAbis and Security Protocols or Internationalization Issues with Short Strings John C Klensin SAAG – 26 July 2007.
1 Chapter Overview Modems The Internet and Web Browsers.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
Role Of Network IDS in Network Perimeter Defense.
8 88 CHAPTER The Internet, the Web, and Electronic Commerce.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
By: The Immigrants :D I mean the Mexican and the Colombian I mean Daniel and Felipe.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Chapter 13 Network Address Translation
GCE Applied ICT G053: Lesson 09 Domain Names
Addresses on the Web.
Net 323 D: Networks Protocols
Unit 4: Data Communication
Firewalls Routers, Switches, Hubs VPNs
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
DoH! Peter Van Roste GAC/ccNSO meeting - ICANN 64
Presentation transcript:

Internet Protocols and Innovation John C Klensin John C Klensin and Associates

Innovation – Key to Internet Progress New protocols and applications introduced regularly –Some for special uses or economic sectors –Some in the hope of being the next killer app Historically, no centralized or regulatory impediment to doing this. Should not have one organization as the gatekeeper for progress, even in minor ways.

Using DNS Names, not Addresses Better for users Better for understanding More stable as ISPs change or sites make multihoming arrangements But: Makes the DNS part of the critical infrastructure

Innovation as Economic Driver New applications can breed new companies and developments Should avoid centralizing key functions, requiring approval or changes for a new protocol or application. Most network traffic today is web, , and maybe file- sharing. But… There is little or no usage on port N is relevant only if we dont care about tomorrows application. Very important for new applications that the infrastructure – including the DNS – behave predictably.

An Application and the DNS Can it depend on getting no domain if no registration? –yes for 250+ top level domains –no for a few For those few, can it depend on specific behavior to detect the situation? –With fixes for wildcards, depends on which domain, which tables, where one asks from –Reset, timeout, or answer – different behavior in different domains (and each has legitimate –non- wildcard– meanings)

Impact on Applications Writers and Users Makes it difficult or impossible to –Write new code, or keep old code working, acceptably and predictably –At least without a table of domains and their behavior Tables of domains and behavior –another workaround –Inhibit the successful deployment of new top-level domains These are subtle technical issues, but ones that have a direct impact on the user experience… and, potentially, on the economy.

A Registry-database Directory without Infrastructure Impact If one wanted to support a directory based on a registry database, it could be done by a naming convention, without a wildcard – ?? ?? – ?? Users must be trained either way –To make typing errors –To use the naming convention But no wildcard or other infrastructure-threatening tricks. This is, at this point, a technical suggestion only – there might be economic or policy issues that would make it problematic.

Internationalization Move now underway to add characters to DNS other than those used for English Important to many populations, but new opportunities for consumer confusion for everyone. Examples – user sees link or URL in browser line, thinks it is something else. –eBay problem: worse with EBAY.com? (is that really єβαy?) –USA.net (is that really in Thai?) Best solution appears to be prohibition of some combinations, not requiring eBay to register all 32 (or more) names. Wildcard causes unregistered names to map to search site.

With all these problems… it is amazing the thing works at all Internet is incredibly robust against many types of abuse –Not just the ability to get the bits through under stress –Misconfigured systems often work acceptably anyway, and produce good diagnostics when they dont (even though configuration errors should not occur). –Configuration programs select defaults based on names or environments that usually work (although this is not a good idea without several precautions). – –and fax and voice over the Internet– actually are fairly secure and private as long as you can trust the sending system, the receiving one, and the ISP(s) in between

That Robustness Depends On Very stable infrastructure, including predictable responses to unexpected conditions Very conservative behavior about what one sends in response to queries or other actions The principle of conservatism about what is sent is a part of every Internet standard protocol, even if not explicitly stated with each one. That a behavior is defined does not make its use reasonable, appropriate, or even permitted.

Ultimately This discussion is Not about preventing innovation But about continuing to enable it for new applications