Key-2 (Roberts) Evolution of the Internet - SharkFest

Download Report

Transcript Key-2 (Roberts) Evolution of the Internet - SharkFest

Internet Evolution
Dr. Lawrence Roberts
CEO, Founder, Anagran
1
The Beginning of the Internet
ARPANET became the Internet
• 1965 – MIT- 1st Packet Experiment -Roberts
• 1967 - Roberts to ARPA – Designs ARPANET
• 1969 – ARPANET Starts – 1st Packet Network
• 1971 – ARPANET Grows to 18 nodes
ARPANET 1971
Roberts at MIT Computer
• 1983 – TCP/IP installed on ARPANET – Kahn/Cerf
• 1986 – NSF takes over network - NSFNET
• 1991 – Internet opened to commercial use
2
Internet Early History
“Internet”
100,000
Name first used- RFC 675
Roberts term at ARPA
Kahn term at ARPA
Cerf term at ARPA
Hosts or Traffic in bps/10
10,000
SATNET - Satellite to UK
Aloha-Packet Radio
PacketRadioNET
Spans US
DNS
1,000
TCP/IP Design
100
Ethernet
EMAIL
FTP
NCP
TCP/IP
Hosts
Traffic
10
ICCC Demo
X.25 – Virtual Circuit standard
1
1969
1971
1973
1975 1977
1979
1981
1983
1985
1987
3
Original Internet Design
It was designed for Data
File Transfer and Email main activities
Constrained by high cost of memory
–
–
–
–
–
–
–
Only Packet Destination Examined
No Source Checks
No QoS
No Security
Best Effort Only
Voice Considered
Video not feasible
ARPANET July 1977
Not much change since then
4
Changing Use of Internet
Major changes in Network Use
Voice
Video
Totally moving to packets
– Low loss, low delay required
Totally moving to packets
– Low loss, low delay jitter required
Emergency Services
Security
No Preference Priority
Cyberwar is now a real threat
TCP unfairness – multiple flows (P2P, Clouds, …)
– Congests network – 5% of users take 80% of capacity
5
Internet Traffic
Grown 1012 since 1970
World Internet Traffic - History
10000
1000
P2P
100
PetaBytes per month
10
1
0.1
0.01
0.001
Normal Traffic
0.0001
0.00001
TCP
0.000001
0.0000001
0.00000001
0.000000001
1970
ARPANET
1975
1980
NSFNET
1985
1990
COMMERICAL
1995
2000
2005
In 1999 P2P applications discovered using multiple flows could give them
more capacity and their traffic moved up to 80% of the network capacity
6
Where will the Internet be in the next decade
% World Population On-Line
Total Traffic PB/month
Traffic per User GB/month
GB/mo/user Developed areas
GB/mo/user Less Dev. areas
2008
22%
3,200
2.2
2.7
0.5
2018
99%
191,000
26
156
3
People in less developed areas will have more capacity than is available in
developed areas today!
Users in developed areas could see 3-10 hours of video per day (HD or SD)
Requires a 60 times increase in capacity (Moore’s Law increase)
7
Network Change Required
Fairness
– Multi-flow applications (P2P) overload access networks
Network Security
– Need User Authentication and Source Checking
Emergency Services
– Need Secure Preference Priorities
Cost & Power
– Growth constrained to Moore’s law & developed areas
Quality & Speed
– Video & Voice require lower jitter and loss, consistent speed
8
– TCP stalls slow interactive applications like the web
Technology Improvement – Flow Management
Historically, congestion managed by queues and discards
– Creates delay, jitter, and random losses
– TCP flow rates vary widely, often stall
– UDP can overload, if so all flows hurt
Alternatively, flows can be rate controlled to fill link
–
–
–
–
Keep table of all flows, measure output, assign rates to each flow
Rate control TCP flows to avoid congestion but maintain utilization
Limit total fixed rate flow utilization by rejecting excessive requests
Assign rate priorities to flows to insure fairness and quality
Flow Management requires less power, size, & cost
– There are 14 times as many packets as flows
– Flows have predictable rate and user significance
9
Flow Management Architecture
Flow State Memory
Assign Rate, QoS, Output
Port, & Class
Input
Switch
Processors
Output
Discard
Rate of Each Flow Controlled
at Input
Traffic measured on both the output port
and in up to 4000 Classes
Flows measured and policed at input
Unique TCP rate control – Fair and precise rate/flow
Rates controlled based on utilization of both output port and class
All traffic controlled to fill output at 90%+
No output queue – Minimal delay
Voice and video protected to insure quality
10
Flow Rates Control with Intelligent Flow Delivery (IFD)
Discard 1 packet
Fair Rate
Instead of random discards in an output queue:
Anagran controls each flows rate at the input
IFD does not ever discard if the flow stays below the Fair Rate
If the flow rate exceeds a threshold, one packet is discarded
Then the rate is watched until the next cycle and repeats
This assures the flow averages the Fair Rate
The flow then has low rate variance (s=.33) and does not stall
11
IFD Eliminates TCP Stalls, Equalizes Rates
Normal Network
With Flow Management
 Rates often stall
 Peak utilization high
 Response time is slow
 Jumble hurts Video & Voice
 No stalled flows
 Less peak utilization
 3 times faster response times
 Video and Voice protected
12
Above graphs are actual data captures
Impact of Flow Management at Network Edge
Web access three times faster
TCP stalls eliminated – all requests complete
Voice quality protected – no packet loss, low delay
Video quality protected – no freeze frame, no artifact
Critical apps can be assigned rate priority
When traffic exceeds peak trunk capacity:
– Eliminates the many impacts of congestion
– Smooth slowdown of less critical traffic
– Voice and video quality maintained
13
Fairness - In the beginning
A flow was a file transfer, or a voice call
The voice network had 1 flow per user
– All flows were equal (except for 911)
– Early networking was mainly terminal to
computer
– Again we had 1 flow (each way) per user
– No long term analysis was done on fairness
It was obvious that under congestion:
Users are equal
thus
Equal Capacity per Flow
was the default design
14
Fairness - Where is the Internet now?
The Internet is still equal capacity per flow under congestion
Computers, not users, now generate flows today
– Any process can use any number of flows
– P2P takes advantage of this using 10-1000 flows
P2P
FTP
Congestion typically occurs at the Internet edge
–
–
–
–
Here, many users share a common capacity pool
TCP generally expands until congestion occurs
This forces equal capacity per flow
Then the number of flows determines each users capacity
The result is therefore unfair to users who paid the same
15
1,000 Users
10 Mbps peak rate
Typical Home Network Access
100 Kbps Average / User
100 Mbps
INTERNET
Internet Service Providers provision for average use
Average use today is about 100 Kbps per subscriber
Without P2P all users would usually get the peak TCP rate
With >0.5% P2P users, average users see much lower rates
16
Internet Traffic Recently
Since 2004, total traffic has increased 90% per year, about average
– P2P has increased 91% per year – Consuming most of the capacity growth
– Normal traffic has only increased 22% per year –Significantly slowdown from past
Since P2P slows other traffic 5:1, users can only do 1/5 as much
This may account for the normal traffic growth being about 1/3 what it
should be with normal growth
World Internet Traffic - History
3500
PetaBytes per month
3000
2500
2000
1500
P2P
1000
500
0
2000
Normal Traffic
2002
2004
2006
17
2008
Deep Packet Inspection (DPI) Fails to Stop P2P
DPI currently main defense – but recently has problems with encrypted P2P
– Studies show it detects < 75% of P2P – reducing the P2P users from 5% to 1.3%
– As P2P adds encryption, DPI detection misses 25% already and encryption growing
– Remainder of P2P simply adds more flows, again filling capacity to congestion
Upstream Capacity Usage
Asym etric DSL ISP
25
Mbps
20
15
Wasted
10
P2P Users
Ave. Users
5
0
No Regulation
DPI Filtering
Equalization
Result – Even ½ % P2P still overload the upstream channel
– This slows the Average Users acknowledgements which limits their downstream usage
User Equalization based on flow rate management solves problem
18
A New Fairness Rule
Inequity in TCP/IP – Currently equal capacity per flow
– P2P has taken advantage of this, using 10-1000 flows
– This gives the 5% P2P users 80-95% of the capacity
– P2P does not know when to stop until it sees congestion
Instead we should give equal capacity for equal pay
– This is simply a revised equality rule – similar users get equal capacity
– This tracks with what we pay
– If network assures all similar users get equal service, file sharing will find the
best equitable method – perhaps slack time and local hosts
This is a major worldwide problem
– P2P is not bad, it can be quite effective
– But, without revised fairness, multi-flow applications can take capacity away
from other users, dramatically slowing their network use
19
– It then becomes an arms race – who can use the most flows
P2P Control with Flow Management
Normal & P2P Traffic - Before & After Anagran Control
Traffic %
Measured from a University Wireless Area
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
5:48
P2P
Normal
Control Off
5:52
5:57
Control On
6:01
6:05
Time (AM)
6:09
6:13
6:17
These are actual measurements showing the effect of controlling P2P traffic as a class
In this case, all P2P was limited to a fixed capacity, then equalized for fairness
P2P was reduced from 67% to 1.6%
Normal traffic then increased by 4:1
20
Why is it Important to Change Fairness Rule?
P2P is attractive and growing rapidly
It cannot determine its fair share itself
The network must provide the fair boundary
Without fairness, normal users will slow down and stall
Multi-flow applications will be misled on economics
–
–
–
–
Today most P2P users believe their peak capacity is theirs
They do not realize they may be slowing down other users
The economics of file transfer are thus badly misjudged
This leads to globally un-economic product decisions
User equality will lead to economic use of communications
21
Network Security
Wireshark users know the value of watching communication
Today the network is open and unchecked
All security is based on “flawless” computer systems
This needs to change - the network must help
Finding Bots is best done watching network traffic
Knowing who is trying to connect can help stop penetration
Allocating high priority capacity requires authentication
– Emergency services, critical services, paid services
High value services need authentication, not passwords
– On-line banking, credit transactions, etc.
22
Authentication Security Program
New DARPA project will allow users to be authenticated
The network can insure source IP address is not faked
The network can assign user based priorities
– Emergency services needs priority
– Corporations have priority applications
The recipient can know who is trying to connect
– Filter out request from un-authenticated sources
– Control application access to specific users
Today security is based on fixing all computer holes
Network assistance greatly reduces the threat
23
DARPA Secure Authentication Program
Each Flow Start:
Each Flow Start: SH
SH = Secure Hash (Identifies
checked by NC using Key
user when hashed with Key)
SH sent to NC
NC
Sender
NC
NC
Each Flow Start: User can
be checked with AAA using SH
Receiver
NC
First Packet: NC checks user via
SH with AAA, get Key & priority
User Log-in: NC identifies
self to AAA, gets SH & Key
AAA Server
NC=Network Controller
• Network finds users priority & QoS info from AAA server
• Receiver can check user ID if allowed & reject flow if desired
• Intermediate NC’s can also check users priority & QoS
• Result: Users ID securely controls network access & priority
24
The New Network Edge – Flow Management
Flow Management at the ISP edge can:
– Insure fairness – equal capacity for equal pay
– Eliminate overload problems (TCP stalls and video artifact)
– Add authentication security to network
All these benefits at much lower cost & power vs. DP
40 Gbps capacity in 1 RU with Anagran
25
Summary
Today’s IP Networks need improvement
Fairness is poor – 5% of users take 80% of capacity
– The cause is the old rule of equal capacity per flow
– This needs to change to equal capacity for equal pay
Response time and QoS suffer from random discards
– Web access suffers from unequal flow rates, TCP stalls
– Video suffers from packet loss and TCP stalls
– Voice suffers from packet loss and excessive delay
Security could be improved if network did authentication
– Avoid unknown users penetrating computers
– Permit priority for emergency workers, critical apps
Flow Management allows these improvements at lower26cost