Rethink the design of the Internet
Download
Report
Transcript Rethink the design of the Internet
Rethink the design of the
Internet
CSCI 780, Fall 2005
E2E argument is great
Complexity of core network is reduced,
easy to upgrade
Generality of network makes new
applications easy to add
Increases applications’ reliability
Moving away from E2E
Operation in an untrustworthy world
More demanding applications
Enhanced service is limited to one ISP
Third-party involvement
Streaming audio and video
ISP service differentiation
Enforce ‘good” behavior
Interpose between the two ends
Less sophisticated users
Technical responses
Different forms of E2E argument
Modify the end-host
Core (in the network)
Edge (on or attached to the network)
Sometimes it does not work
More functions to the network
Firewall, traffic filter
NAT box
Packet labels (marking)
Trends at application layer
Insert intermediary into data path due
to performance or security reasons
Anonymizing senders
Content (layer-7) filtering
Content caches (Web proxy, CDN)
Application requirements become more
complex
Current Internet is changing
Rise of new players
Commercial ISPs (Internet Service
Providers)
Tussle between ISPs
Erosion of trust
Security issues (global communication with
local trust)
Two tenets valued but
disobeyed
Each Internet entity has a global
identifier that allows others to reach it
Network elements should not violate
network layering
Middle-box violates tenets
Network address translator (NAT)
Pros:
expands the IPv4 address space;
address isolation
Cons:
p2p fails to work;
layer violation;
complicate new protocol or application design;
Private IP address
IANA (Internet Assigned Numbers Authority)
has reserved three blocks of the IP address
space for private internets:
10.0.0.0 - 10.255.255.255 (10/8 prefix)
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
First is a single class A network number, second block is a set of
16 contiguous class B network numbers, third block is a set of
256 contiguous class C network numbers.
Delegation-oriented
architecture (DOA)
Goal: retain the functionality of middlebox, but eliminate their dangerous sideeffect
Approach:
Provide a globally unique identifier in a flat
namespace (160-bit EIDs)
Explicit delegation