Rethink the design of the Internet

Download Report

Transcript Rethink the design of the Internet

Rethink the design of the
Internet
CSCI 780, Fall 2005
E2E argument is great



Complexity of core network is reduced,
easy to upgrade
Generality of network makes new
applications easy to add
Increases applications’ reliability
Moving away from E2E

Operation in an untrustworthy world


More demanding applications


Enhanced service is limited to one ISP
Third-party involvement


Streaming audio and video
ISP service differentiation


Enforce ‘good” behavior
Interpose between the two ends
Less sophisticated users
Technical responses

Different forms of E2E argument



Modify the end-host


Core (in the network)
Edge (on or attached to the network)
Sometimes it does not work
More functions to the network



Firewall, traffic filter
NAT box
Packet labels (marking)
Trends at application layer

Insert intermediary into data path due
to performance or security reasons




Anonymizing senders
Content (layer-7) filtering
Content caches (Web proxy, CDN)
Application requirements become more
complex
Current Internet is changing

Rise of new players



Commercial ISPs (Internet Service
Providers)
Tussle between ISPs
Erosion of trust

Security issues (global communication with
local trust)
Two tenets valued but
disobeyed


Each Internet entity has a global
identifier that allows others to reach it
Network elements should not violate
network layering
Middle-box violates tenets

Network address translator (NAT)

Pros:



expands the IPv4 address space;
address isolation
Cons:



p2p fails to work;
layer violation;
complicate new protocol or application design;
Private IP address

IANA (Internet Assigned Numbers Authority)
has reserved three blocks of the IP address
space for private internets:




10.0.0.0 - 10.255.255.255 (10/8 prefix)
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
First is a single class A network number, second block is a set of
16 contiguous class B network numbers, third block is a set of
256 contiguous class C network numbers.
Delegation-oriented
architecture (DOA)


Goal: retain the functionality of middlebox, but eliminate their dangerous sideeffect
Approach:


Provide a globally unique identifier in a flat
namespace (160-bit EIDs)
Explicit delegation