1 An Introduction to the future of the Internet (part 1) David Clark MIT CSAIL July 2012.

Slides:



Advertisements
Similar presentations
Architectural issues for network-layer identifiers Stefan Savage Dept of Computer Science & Engineering UC San Diego.
Advertisements

IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC APNIC 24, September 2007.
Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
1 Designing a future Internet: Architecture and requirements David Clark MIT CSAIL August 2008.
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
FIND John Wroclawski USC ISI IEEE CCW - October 2005 Good Morning.
Re-factoring grid computing for usability Bruce Beckles University of Cambridge Computing Service.
Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
Gallup Q12 Definitions Notes to Managers
Internetworking II: MPLS, Security, and Traffic Engineering
Chapter 1  Introduction 1 Chapter 1: Introduction.
Modularity and Applications David Clark MIT July, 2012.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
SDN and Openflow.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Chapter 12 Network Security.
CAP 252 Lecture Topic: Requirement Analysis Class Exercise: Use Cases.
Next Generation Internet CMPT 771 – Internet Architecture & Protocols Presented by: Bassam Almohammadi.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Security Forum 2001John Kristoff - DePaul University1 Network Firewalls John Kristoff DePaul University Chicago, IL
1 Steve Chenoweth Tuesday, 10/18/11 Week 7, Day 2 Right – One view of the layers of ingredients to an enterprise security program. From
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Tussle in Cyberspace: Defining Tomorrow’s Internet by David D. Clark, John Wroclawski Karen R. Sollins, Robert Braden Offense: Ionut Trestian.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.
“It’s not our differences that divide us, it’s our judgments about each other that do.” (Meg Wheatly)
Chapter 8 Hypothesis testing 1. ▪Along with estimation, hypothesis testing is one of the major fields of statistical inference ▪In estimation, we: –don’t.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Security David D. Clark July, Aspects of security Attacks on the network Routing, supply chain Attacks on communication Confidentiality and integrity.
Understanding cooperative innovation David Clark MIT CFP November, 2012.
1 The Internet today and tomorrow: social implications of evolving technology David Clark MIT CSAIL November 2008.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Economics and industry structure David D. Clark MIT July, 2012.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
IssueTimingActivity Starter10 minutesThink / Pair / Share, Which of these AfL strategies do you do most frequently – least frequently, which do you think.
Constructing a Reasoned Argument argument.ppt
Today’s Lecture Covers < Chapter 6 - IS Security
P2P SIP Names & Security Cullen Jennings
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Essay and Report Writing. Learning Outcomes After completing this course, students will be able to: Analyse essay questions effectively. Identify how.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
1 The Internets we did not build David Clark MIT CSAIL November 2008.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC November 2007.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Longevity: Designs that last David D. Clark MIT CSAIL July, 2012.
The Project – Spreadsheet Specification Items to include in your Spreadsheet Specification 1)Scenario relating to the Spreadsheet part of the system 2)Problems.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
SOCIAL MEDIA FINAL PRESENTATION. PROJECT SUMMARY Our job was to making a working social stream that incorporated all social medias for FSU, FSU CCI, and.
Defining a future network: An international research agenda David Clark MIT CFP MIT Communications Futures Program Bi-annual meeting, May 30-31, 2007 Philadelphia,
Multimedia & Mobile Communications Lab.
Application Architecture Internet Architecture David D. Clark MIT CSAIL September 2005.
NSIS and Mobility Layer Split & Framework Issues Robert Hancock NSIS Interim Meeting – Columbia University February 2003.
Presented by: Dr. Munam Ali Shah
Incentives Alignment Whitepaper Progress since Athens.
Hostway Confidential & Proprietary Introduction to Web Hosting.
Project Management Enabling Quality Marien de Wilde, PMP April 2007.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
It’s time to think about the user!
Physical Architecture Layer Design
Tradeoff Analysis of Strategies for System Qualities
IS4680 Security Auditing for Compliance
Presentation transcript:

1 An Introduction to the future of the Internet (part 1) David Clark MIT CSAIL July 2012

2 The Internet is a success So why would we want to rethink its design? It’s not the data plane. Packets have proven their generality, and we have polished the data forwarding function for years. It is not that some broad class of application is unsupported. Application designers have shown the broad utility of the Internet (within some limits). The issues are centered in the broader context within which the Internet is positioned. Need to consider a broad range of requirements.

3 Issues to consider Security Availability and resilience Economic viability Better management Meet society’s needs Longevity Support for tomorrow’s computing Exploit tomorrow’s networking Support tomorrow’s applications Fit for purpose (it works…)

In the beginning We really had no idea what we were doing. A lot we got right (perhaps surprising…) A lot was almost an accident. We did not understand: How to write a standard Dynamics of control Correct system modularity 4

Now We know a lot more About requirements, design methods and mechanisms. Requirements have gotten a lot more complex Many more interests ask to be served. Daunting complexity Not just a technical problem 5

Warning Computer scientists like to talk about mechanism and performance. (I am somewhat critical of this…) Forwarding schemes: 54 and counting. This set of talks is more about requirements and design approaches. I will discuss mechanism, but as illustration. 6

7 Outline of these lectures Look at some of these important objectives What is wrong with the network of today? Why is it worth considering alternative designs? Describe some emerging proposals and approaches Sometimes conflicting, sometimes clear. (Sometimes my personal point of view.) So wander between requirements and mechanism. Mechanism is easier to think about. Requirements are more fundamental.

8 Designing the future Explicit projects in US and EU to think about an Internet for the future. Ask what our global network of 15 years from now should be. US: FIND (Future Internet Design) and FIA (Future Internet Architecture) Nebula, MobilityFirst, Named Data Networking, Expressive Internet Architecture (XIA), ChoiceNet EU: Framework projects PSIRP, PURSUIT, 4WARD, Haggle, Trilogy…

Why take a longer view? Two ways to pick research topics: Look at the problems of today and try to fix them. Sometimes called “incremental”, which is NOT a bad word or a bad way to proceed. Describe a goal: where are we trying to get? An objective imposes a bias on forward progress. Sometimes called “clean slate”, which is often mis- understood. Not a rejection of the present, nor a demand for a fork-lift replacement of the current network. 9

10 Issues to consider Security Availability and resilience Economic viability Better management Meet society’s needs Longevity Support for tomorrow’s computing Exploit tomorrow’s networking Support tomorrow’s applications Fit for purpose (it works…)

11 What was that list?? Those were not requirements. They are a wish list. Desiderata An aide-memoire It is a big jump from any of these items to the design of mechanism. And that is a big issue.

12 Design methodology We must think about the process of moving from objectives to specific requirements to mechanisms and architecture. If the problem is too big to consider at once, must modularize the design process. Beware an over-dependence on layering. That list of issues represents a broad set of criteria: Not just the “traditional”: performance/optimization, generality, new technology Implies a multi-dimensional assessment of new ideas. Implies tradeoff and balancing. We understand a lot more now than we did in This current work should be based on methodical design, analysis, theory.

13 Security Use as a first example of a requirement. Hard and important. Why is the problem so hard? We don’t agree on the definition of good security A balance among stake-holders. We want different outcomes in different contexts. We cannot correct the insecurity of end-nodes. Old ideas: (good ideas, but not why we thought.) Confidentiality, integrity, availability How does this relate to firewalls, VPNs? After the fact--not a part of the network

14 A different modularity Attacks on the network Routing, supply chain Attacks on communication Confidentiality and integrity addressed with encryption. Availability?? The central objective of networks. What else? Attacks on the host Infiltration (can lead to most anything) So either prevent infiltration or limit its consequences. Denial of service A special case of availability. Information assurance. Sign the information, not the connection. National security

Who is responsible? Attacks on the network. The network. Attacks on communication. Confidentiality and integrity can be delegated to end-nodes. (contested) Availability is a shared responsibility. Attacks on hosts. A contested space: end-node, network, application designer, user. DDoS. A contested space. Information assurance Unclear once you get deeply into it. National security. 15

An ugly situation Everybody says we need better security, but. No agreement as to what that really means. No agreement as to which actors play which role in producing it. Security is an emergent property of a running system Depends on architecture, mechanism, allocation of responsibility, operational issues. Most of my security friends design mechanisms. Much easier—does not make your head hurt… 16

Doing better next time? The hypothesis of the future Internet research agenda is that we could do a better job if we freed ourselves from the constraints of the present. Do we actually know enough to do that? What do we actually know about the fundamentals of network architecture, and its relation to these broad set of requirements? 17