Network Neutrality - Columbia University

Download Report

Transcript Network Neutrality - Columbia University

Principles and Lessons for a New
Internet and 4G Wireless Networks
Prof. Henning Schulzrinne
Dept. of Computer Science
Columbia University
May 2007
WWIC (Coimbra, Portugal)
1
Overview
• Interest in revising Internet architecture
– What didn’t we think of the first time
– What has made the Internet successful
– Built-in vs. bolted on
•
•
•
•
User issues: what bothers users
Internet infrastructure: the plumbing
Network management
Talking meta: research and standardization
May 2007
WWIC (Coimbra, Portugal)
2
Outline
•
•
•
•
•
Applications and upper layers
Internet protocol infrastructure
Network management
Network standards
Networking research
May 2007
WWIC (Coimbra, Portugal)
3
The three Cs of Internet applications
grossly simplified...
communications
research
focus
May 2007
commerce
community
what users care about
WWIC (Coimbra, Portugal)
5
Killer Application
• Carriers looking for killer application
– justify huge infrastructure investment
– “video conferencing” (*1950 – †2000)
– ?
• “There is no killer application”
– Network television block buster  YouTube hit
– “Army of one”
– Users create their own custom applications that are important to
them
– Little historical evidence that carriers (or equipment vendors) will
find that application if it exists
• Killer app = application that kills the carrier
May 2007
WWIC (Coimbra, Portugal)
6
Internet transition: applications
• Moving analog applications to Internet
– digitization of communication largely completed
• Extending reach of application
– mobile devices
– vehicles
• Broadening access
– Minitel: SNCF had train schedule service
– web: anybody can have a blog
• Allowing customization and creation
– web pages to code modules
May 2007
WWIC (Coimbra, Portugal)
7
Completing the migration of comm. applications
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Qui ckTime™ and a
TIFF (U ncompr essed) decompressor
are needed to see thi s pi cture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
May 2007
QuickTi me™ and a
TIFF ( Uncompressed) decompressor
are needed to see thi s pi ctur e.
WWIC (Coimbra, Portugal)
8
Migration of applications
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTi me™ and a
TIFF ( Uncompressed) decompressor
are needed to see thi s pi ctur e.
Qui ckTime™ and a
TIFF (U ncompr essed) decompressor
are needed to see thi s pi cture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTi me™ and a
T IFF (Uncom pressed) decom pressor
are needed to see t his pict ure.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
May 2007
text, still
images
audio
video
synchronous
IM
VoIP
video
conferencing
asynchronous
email
email,
voicemail
YouTube
WWIC (Coimbra, Portugal)
9
Building Internet applications
80% care
about this
level
extensible CMS,
Wiki
(Drupal, Mambo, Joomla, ...)
Ruby on Rails, Spring, ...
Ajax, SOAP
PHP, Java w/libraries
Java RMI, HTTP
C/C++ with sockets
taught in
Networking
101
custom protocols on UDP, TCP
May 2007
WWIC (Coimbra, Portugal)
10
User issues (guesses)
•
•
•
•
Lack of trust
– small mistakes  identity gone
– can’t tell when one has “lost the wallet”
– waste time on spam, viruses, worms, spyware, …
Lack of reliability
– 99.5% instead of 99.999%
– even IETF meeting can’t get reliable 802.11 connectivity
Lack of symmetry
– asymmetric bandwidth: ADSL
– asymmetric addressing: NAT, firewalls  client(-server) only, packet
relaying via TURN or p2p
Users as “Internet mechanics”
– why does a user need to know whether to use IMAP or POP?
– navigate circle of blame
May 2007
WWIC (Coimbra, Portugal)
11
Left to do: glue protocols
• Lots of devices and services
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
– cars
– household
– environment
• Generally, stand-alone
– e.g., GPS can’t talk to camera
• Home
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
– home control networks have generally
failed
• cost, complexity
• Environment
– “Internet of things”
– tag bus stops, buildings, cars, ...
May 2007
WWIC (Coimbra, Portugal)
12
Left to do: event notification
• notify (small) group of users when something of interest happens
–
–
–
–
–
presence = change of communications state
email, voicemail alerts
environmental conditions
vehicle status
emergency alerts
• kludges
– HTTP with pending response
– inverse HTTP --> doesn’t work with NATs
• Lots of research (e.g., SIENA)
• IETF efforts starting
– SIP-based
– XMPP
May 2007
WWIC (Coimbra, Portugal)
13
GEOPRIV and SIMPLE architectures
rule
maker
DHCP
XCAP
(rules)
target
presentity
caller
May 2007
publication
interface
PUBLISH
INVITE
location
server
presence
agent
notification
interface
location
recipient
GEOPRIV
watcher
SIP
presence
SUBSCRIBE
NOTIFY
INVITE
WWIC (Coimbra, Portugal)
callee
SIP
call
14
Configuration complexity
• 65% of attacks exploit mis-configured systems
• Human error accounts for 48% of wide area network outages
– Yankee Group 2002: operator error is the largest cause of failures and
largest contributor to time to repair; in two of the three (surveyed) ISPs,
configuration errors are the largest category of operator errors.
• 45% WAN operations cost attributed to component configuration
– Yankee Group, 1998
• Although setup (of the trusted computing base) is much simpler than
code, it is still complicated, it is usually done by less skilled people,
and while code is written once, setup is different for every
installation. So we should expect that it’s usually wrong, and many
studies confirm this expectation. (B. Lampson)
May 2007
WWIC (Coimbra, Portugal)
15
Open issues: Configuration
•
•
Ideally, applications should
only need a user name and
some credential
– password, USB key, host
identity (MAC address),
…
More than DHCP: device
needs to get
– application services
• SMTP, IMAP, POP, ...
• security variations
– policy information (“sorry,
no video”)
– user data (address book)
May 2007
• Multiple sources of
configuration information
– local network
– application service
provider
• Configuration information
may change dynamically
– event notification
• Needs to allow no-touch
deployment of thousands
of devices
WWIC (Coimbra, Portugal)
16
Mobile systems - reality
GPS
•
idea: special purpose (phone) --> universal
communicator
–
•
idea is easy...
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
mobile equipment: laptop + phone
–
•
•
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
sufficiently different UI and capabilities
location data
we all know the ideal (converged) cell phone
difficulty is not technology, but integration
and programmability
–
–
–
–
(almost) each phone has a different flavor of
OS
doesn’t implement all functionality in Java
APIs
no dominant vendor (see UNIX/Linux vs.
Microsoft)
external interfaces crippled or unavailable
•
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
e.g., phone book access
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (Uncompress ed) dec ompres sor
are needed to s ee this pic ture.
May 2007
WWIC (Coimbra, Portugal)
17
Outline
•
•
•
•
•
Applications and upper layers
Internet protocol infrastructure
Network management
Network standards
Network research
May 2007
WWIC (Coimbra, Portugal)
18
What has made the Internet successful?
•
36 years  approaching mid-life crisis  time for selfreflection
–  next generation suddenly no longer finds it hip
•
Transparency in the core
– new applications (web, VoIP, games)
•
Narrow interfaces
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
– socket interface, resolver
• HTTP and SMTP messaging as applications
– prevent change leakage
•
Low barrier to entry
– L2: minimalist assumptions
– technical: basic connectivity is within
– economical: below $20?
•
Commercial off-the-shelf systems
– scale: compare 802.11 router vs. cell base station
May 2007
WWIC (Coimbra, Portugal)
19
What has gone wrong?
•
•
•
•
•
Familiar to anybody who has an old house…
Entropy
– as parts are added, complexity and interactions increase
Changing assumptions
– trust model: research colleagues  far more spammers and phishers
than friends
• AOL: 80% of email is spam
– internationalization: internationalized domain names, email character
sets
– criticality: email research papers  transfers $B and dial “9-1-1”
– economics: competing providers
• “Internet does not route money” (Clark)
Backfitting
– had to backfit security, I18N, autoconfiguration, …
 Tear down the old house, gut interior or more wall paper?
May 2007
WWIC (Coimbra, Portugal)
20
In more detail…
• Deployment problems
– loss of transparency (NATs, deep-packet inspection, ...)
•
•
•
•
Layer creep
Simple and universal wins
Scaling in human terms
Cross-cutting concerns, e.g.,
– CPU vs. human cycles
• we optimize the $100 component, not the $100/hour labor
– introspection
– graceful upgrades
– no policy magic
May 2007
WWIC (Coimbra, Portugal)
21
Internet design principles
Original DARPA Internet Design principle
The Internet must support multiplexed utilization of existing
interconnected networks.
Internet communications must continue despite loss of networks
or gateways.
The Internet architecture must accommodate a variety of
networks.
did not anticipate
cyber attack,
exfiltration,
malicious control
cooperative
protocols --> insider
threat
The Internet must permit distributed management of its resources.
The Internet architecture must be cost effective.
The Internet architecture must permit host attachment with low
level of effort.
The resources used in the Internet architecture must be
accountable.
“permit-by-default”
instead of “deny-bydefault”
malicious use of
resources remains
anonymous &
untraceable
J Christopher Ramming, IAMANET briefing, April 2006, based on D. Clark, SIGCOMM 1998
May 2007
WWIC (Coimbra, Portugal)
22
Core goals for new networks
•
•
•
•
•
reliability
diagnosability
sustainability
adaptability
survivability
May 2007
WWIC (Coimbra, Portugal)
23
Survivability
• Real world: locks keep out the
honest
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
– until the police arrives
• Internet: assumption of lawlessness
– no global law enforcement
– carriers have little interest in policing
their users
• bots, spam
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
– must survive extended periods of
attacks
• From permit-by-default to deny-bydefault
May 2007
WWIC (Coimbra, Portugal)
24
Reliability
• From secondary medium to core
– Office without phone vs. without Internet
• Applications: 2 servers exponentially better than 1
– costs “only” doubles
– but most application protocols don’t fail over automatically
• examples: HTTP, IMAP, POP, NFS
• exceptions: SMTP, SIP
• Networks: 2 networks exponentially better than 1
– most (US) residences are served by 3 networks: DSL, cable,
cellular
– no good multi-homing technology that scales
– economics dubious - via neighbors?
May 2007
WWIC (Coimbra, Portugal)
25
The transformation of protocol stacks
Internet
ca. 1995
Internet
ca. 2005
application
presentation
session
application
application
SOAP
HTTP
transport
TCP
TCP
network
IP
IP-in-IP
IP
H. Zimmermann
ca. 1980
May 2007
link
802.3
physical
physical
WWIC (Coimbra, Portugal)
MPLS, PoE
PoS, ATM
physical
26
Cause of death for the next big thing
QoS
multicast
not manageable across competing
domains


not configurable by normal users (or
apps writers)

no business model for ISPs


no initial gain

80% solution in existing system

mobile
IP

active
networks
IPsec
IPv6
















(NAT)
increase system vulnerability
May 2007


WWIC (Coimbra, Portugal)


27
Simple wins (mostly)
•
•
Examples:
– Ethernet vs. all other L2 technologies
– HTTP vs. HTTPng and all the other hypertext attempts
– SMTP vs. X.400
– SDP vs. SDPng
– TLS vs. IPsec (simpler to re-use)
– no QoS & MPLS vs. RSVP
– DNS-SD (“Bonjour”) vs. SLP
– SIP vs. H.323 (but conversely: SIP vs. Jabber, SIP vs. Asterisk)
– the failure of almost all middleware
– future: demise of 3G vs. plain SIP
Efficiency is not important
– BitTorrent, P2P searching, RSS, …
May 2007
WWIC (Coimbra, Portugal)
28
Measuring complexity
•
•
•
Traditional O(.) metrics rarely helpful
– except maybe for routing protocols
Focus on parsing, messaging complexity
– marginally helpful, but no engineering metrics for trade-offs
No protocol engineering discipline, lacking
– guidelines for design
– learning from failures
• we have plenty to choose from – but hard to look at our own
(communal) failures
– re-usable components
• components not designed for plug-and-play
• “we don’t do APIs”  we don’t worry about whether a simple API
can be written that can be taught in Networking 101
May 2007
WWIC (Coimbra, Portugal)
29
Possible complexity metrics
•
new code needed (vs. reuse)  less likely to be buggy or have buffer
overflows
–
–
–
–
•
•
new identities and identifiers needed
number of configurable options + parameters
–
–
–
–
–
•
e.g., new text format almost the same
numerous binary formats
security components
necessary transition: bespoke  off-the-rack protocols
must be configured & can be configured (with interop impact)
discoverable vs. manual/unspecified
SIP experience: things that shouldn’t be configurable will be
RED experience: parameter robustness
mute programmer interop test: two implementations, no side channel
number of “left-to-local policy”
– DSCP confusion
•
start-up latency (“protocol boot time”)
– IPv4 DAD, IGMP
May 2007
WWIC (Coimbra, Portugal)
30
Democratization of protocol engineering
•
Traditional Internet application protocols (IETF et al.):
– one protocol for each type of application:
• SMTP for email, ftp for file transfer, HTTP for web access, POP for email
retrieval, NNTP for netnews, …
• slow protocol development process
• re-do security (authentication) for each
• each new protocol has its own text encoding
– similarity across protocols: SMTP-style headers
»
Content-Type: text/plain; charset="us-ascii"; format=flowed
– large parsing exposure  new buffer overflows for each protocol
•
Separate worlds:
– most of the new protocols in the real world based on WS
– IETF stuck in bubble of one-off protocols  more fun!
• re-use considered a disadvantage
• insular protocols that have local cult following (BEEP)
May 2007
WWIC (Coimbra, Portugal)
31
The transformation of protocol design
•
•
One application, one protocol  common infrastructure for new
application
Old model:
– RPC for corporate “one-off” applications
– custom protocols for common Internet-scale applications
•
Far too many new applications
– and not enough protocol engineers
– network specialist  application specialist
– new IETF application protocol design takes ~5 years
•
Many of the applications (email to file access) could be modeled as
RPC
custom
text
protocol
(ftp)
May 2007
ASN.1based
(SNMP,
X.400)
RFC 822 protocol
(SMTP, HTTP, RTSP,
SIP, …)
use XML for
protocol bodies
(IETF IM &
presence)
WWIC (Coimbra, Portugal)
SOAP and
other XML
protocols
32
Why are web services succeeding(*) after
RPC failed?
•
•
•
SOAP = just another remote procedure call mechanism
– plenty of predecessors: SunRPC, DCE, DCOM, Corba, …
– “client-server computing”
– all of them were to transform (enterprise) computing, integrate legacy
applications, end world hunger, …
Why didn’t they?
Speculation:
– no web front end (no three-tier applications)
– few open-source implementations
– no common protocol between PC client (Microsoft) and backend (IBM
mainframes, Sun, VMS)
– corporate networks local only (one site), with limited backbone bandwidth
May 2007
WWIC (Coimbra, Portugal)
(*) we hope
33
Time for a new protocol stack?
•
•
•
Now: add x.5 sublayers and overlay
– HIP, MPLS, TLS, …
Doesn’t tell us what we could/should do
– or where functionality belongs
– use of upper layers to help lower layers (security associations, authorization)
– what is innate complexity and what is entropy?
Examples:
– Applications: do we need ftp, SMTP, IMAP, POP, SIP, RTSP, HTTP, p2p
protocols?
– Network: can we reduce complexity by integrating functionality or re-assigning
it?
• e.g., should e2e security focus on transport layer rather than network
layer?
– probably need pub/sub layer – currently kludged locally (email, IM,
specialized)
May 2007
WWIC (Coimbra, Portugal)
34
NSF “Green Field” approach
•
•
US National Science Foundation (NSF) working on new funding thrust 
next-generation Internet
– idea: incremental components  new architecture
– vs. traditional “brown field” approach
Two major components
– GENI: large-scale experimental testbed for testing next-generation
ideas
• building on PlanetLab (hundreds of public-access servers)  p2p,
CDN, measurement infrastructures
• probably offers circuits (optical or virtual with bandwidth
guarantees)
• ~$300M (not yet allocated)
– FIND:
• regular research program within NETS ($15m)
• prepare architecture designs
May 2007
WWIC (Coimbra, Portugal)
35
NSF: FIND and GENI, cont’d
•
Fundamental notions:
– not constrained by existing Internet architecture
•
Difficulties:
–
–
–
–
not coordinated  too many moving pieces?
no single research team can do everything
point optimization: Internet for
benchmarks missing
•
•
•
•
•
how do you compare architectures?
are there quantifiable requirements?
are there metrics to compare different approaches?
user-related metrics?
Cynic’s prediction based on the past:
– IPv6: “you’ll get security, QoS, autoconfiguration, mobility, …”
– IPv4: “good ideas, I’ll do those, too”
May 2007
WWIC (Coimbra, Portugal)
36
(My) guidelines for a new Internet
•
Maintain success factors, such
as
– service transparency
– low barrier to entry
– narrow interfaces
•
New guidelines
– optimize human cycles, not
CPU cycles
– design for symmetry
– security built-in, not bolted-on
– everything can be mobile,
including networks
– sending me data is a privilege,
not a right
– reliability paramount
– isolation of flows
May 2007
•
New possibilities:
– another look at circuit switching?
– knowledge and control
(“signaling”) planes?
– separate packet forwarding from
control
– better alignment of costs and
benefit
– better scaling for Internet-scale
routing
– more general services
WWIC (Coimbra, Portugal)
37
More “network” services
•
Currently, very specialized and limited
– packet forwarding
– DNS for identifier lookup
– DHCP for configuration
•
New opportunities
– packet forwarding with control
– general identifier storage and lookup
• both server-based and peer-to-peer
–
–
–
–
May 2007
SLP/Jini/UDDI service location  ontology-based data store
network file storage  for temporarily-disconnected mobiles
network computation  translation, relaying
trust services ( IRT trust paths work)
WWIC (Coimbra, Portugal)
38
Security
• More than just encryption!
• Need identity and role-based certificates
• May want reverse-path reachability (bank  customer)
asking
user
user
do I know this person? is he a am I connected to a
likely sender of spam?
“real” network or an
impostor?
is this really a bank?
network
is this a customer?
May 2007
network
WWIC (Coimbra, Portugal)
is this BGP route
advertisement
legitimate?
39
NGN or what’s wrong with 3G
• NGN = next-generation network
– roughly, 3G on landline
– really, ISDN 2.0 on packets
– SIP for signaling, IPv6
• Problems
– complexity: gateways to old world
– coupling: link-layer properties only available to certain
applications
• e.g., voice-specific link behavior (FEC, delay)
– closed: may be difficult to integrate with enterprise systems
• regular SIP phones may not work properly
May 2007
WWIC (Coimbra, Portugal)
40
What’s (my) 4G?
• Definition: fixes all the things that 3G got wrong...
– voice legacy (3G ~ B-ISDN)
– high cost
– system complexity
• Wireless as access network
– already happening: 3G-802.11 bridges
– application shouldn’t care about access mode or carrier --> more
applications
• But with discoverable and configurable path properties
– not a wireless-specific issue!
• May be less a technical than economics problem
– same bits, different value --> capture consumer surplus
May 2007
WWIC (Coimbra, Portugal)
41
Internet (re)engineering: summing up
•
Traditional protocol engineering
– “must do congestion control”
– “must do security”
– “must be efficient”
•
New module engineering
– must reduce operations cost
– out-of-the-box experience
– re-usable components
• most protocol design will be done by domain experts (cf. PHP vs. C++)
•
What would a clean-room design look like?
– keep what made Internet successful
– generalize & adjust to new conditions
May 2007
WWIC (Coimbra, Portugal)
42
Outline
•
•
•
•
•
User perspective
Internet protocol infrastructure
Network management
Network standards
Networking research
May 2007
WWIC (Coimbra, Portugal)
43
Network Management  Transition in cost balance
•
Total cost of ownership
– Ethernet port cost  $10
– about 80% of Columbia CS’s system support cost is staff cost
• about $2500/person/year  2 new PCs/year
• much of the rest is backup & license for spam filters 
•
•
Does not count hours of employee or son/daughter time
PC, Ethernet port and router cost seem to have reached
plateau
– just that the $10 now buys a 100 Mb/s port instead of 10 Mb/s
•
All of our switches, routers and hosts are SNMPenabled, but no suggestion that this would help at all
May 2007
WWIC (Coimbra, Portugal)
44
Circle of blame
probably packet
loss in your
Internet connection 
reboot your DSL modem
ISP
VSP
OS
must be a
Windows registry
problem  re-install
Windows
May 2007
probably a gateway fault
 choose us as provider
app
vendor
WWIC (Coimbra, Portugal)
must be
your software
 upgrade
45
Diagnostic undecidability
• symptom: “cannot reach server”
• more precise: send packet, but no response
• causes:
–
–
–
–
–
NAT problem (return packet dropped)?
firewall problem?
path to server broken?
outdated server information (moved)?
server dead?
• 5 causes  very different remedies
– no good way for non-technical user to tell
• Whom do you call?
May 2007
WWIC (Coimbra, Portugal)
46
VoIP user experience
•
Only 95-99.5% call attempt success
– “Keynote was able to complete VoIP
calls 96.9% of the time, compared with
99.9% for calls made over the public
network. Voice quality for VoIP calls on
average was rated at 3.5 out of 5,
compared with 3.9 for public-network
calls and 3.6 for cellular phone calls. And
the amount of delay the audio signals
experienced was 295 milliseconds for
VoIP calls, compared with 139
milliseconds for public-network calls.”
(InformationWeek, July 11, 2005)
•
•
Mid-call disruptions common
Lots of knobs to turn
– Separate problem: manual configuration
May 2007
WWIC (Coimbra, Portugal)
47
Traditional network management model
X
SNMP
“management from the center”
May 2007
WWIC (Coimbra, Portugal)
48
Old assumptions, now wrong
•
Single provider (enterprise, carrier)
– has access to most path elements
– professionally managed
•
Problems are hard failures & elements operate correctly
– element failures (“link dead”)
– substantial packet loss
•
Mostly L2 and L3 elements
– switches, routers
– rarely 802.11 APs
•
Problems are specific to a protocol
– “IP is not working”
•
Indirect detection
– MIB variable vs. actual protocol performance
•
End systems don’t need management
– DMI & SNMP never succeeded
– each application does its own updates
May 2007
WWIC (Coimbra, Portugal)
49
Management
what causes the
most trouble?
network understanding
fault location
configuration
we’ve only
succeeded
here
element inspection
May 2007
WWIC (Coimbra, Portugal)
50
Managing the protocol stack
media
RTP
UDP/TCP
IP
May 2007
echo
gain problems
VAD action
protocol problem
playout errors
protocol problem
authorization
asymmetric conn
(NAT)
SIP
TCP neg. failure
NAT time-out
firewall policy
no route
packet loss
WWIC (Coimbra, Portugal)
51
Types of failures
• Hard failures
– connection attempt fails
– no media connection
– NAT time-out
• Soft failures (degradation)
– packet loss (bursts)
• access network? backbone? remote access?
– delay (bursts)
• OS? access networks?
– acoustic problems (microphone gain, echo)
May 2007
WWIC (Coimbra, Portugal)
52
Examples of additional problems
• ping and traceroute no longer works reliably
– WinXP SP 2 turns off ICMP
– some networks filter all ICMP messages
• Early NAT binding time-out
– initial packet exchange succeeds, but then TCP binding is
removed (“web-only Internet”)
• policy intent vs. failure
– “broken by design”
– “we don’t allow port 25” vs. “SMTP server temporarily
unreachable”
May 2007
WWIC (Coimbra, Portugal)
53
Proposal: “Do You See What I See?”
• Each node has a set of active and passive measurement tools
• Use intercept (NDIS, pcap)
– to detect problems automatically
• e.g., no response to HTTP or DNS request
– gather performance statistics (packet jitter)
– capture RTCP and similar measurement packets
• Nodes can ask others for their view
– possibly also dedicated “weather stations”
• Iterative process, leading to:
– user indication of cause of failure
– in some cases, work-around (application-layer routing)  TURN
server, use remote DNS servers
• Nodes collect statistical information on failures and their likely
causes
May 2007
WWIC (Coimbra, Portugal)
54
Architecture
“not working”
(notification)
inspect protocol requests
orchestrate tests
contact others
request diagnostics
(DNS, HTTP, RTCP, …)
ping 127.0.0.1
can buddy reach our
resolver?
“DNS failure for 15m”
notify admin
(email, IM, SIP events, …)
May 2007
WWIC (Coimbra, Portugal)
55
Failure detection tools
• STUN server
– what is your IP address?
• ping and traceroute
• Transport-level liveness and QoS
– open TCP connection to port
– send UDP ping to port
– measure packet loss & jitter
• TBD: Need scriptable tools with dependency
graph
media
RTP
UDP/TCP
– initially, we’ll be using ‘make’
• TBD: remote diagnostic
– fixed set (“do DNS lookup”) or
– applets (only remote access)
May 2007
WWIC (Coimbra, Portugal)
IP
56
Failure statistics
• Which parts of the network are most likely to fail
(or degrade)
–
–
–
–
–
–
access network
network interconnects
backbone network
infrastructure servers (DHCP, DNS)
application servers (SIP, RTSP, HTTP, …)
protocol failures/incompatibility
• Currently, mostly guesses
• End nodes can gather and accumulate statistics
May 2007
WWIC (Coimbra, Portugal)
57
Outline
•
•
•
•
•
User perspective
Internet protocol architecture
Network management
Network standards
Networking research
May 2007
WWIC (Coimbra, Portugal)
58
The role of standards
• Most users won’t see network improvements until
standard emerges
– gatekeeper
• Exceptions
– De-facto standards (Microsoft)
– TCP enhancements -- via OS
– Some new tools (Skype)
May 2007
WWIC (Coimbra, Portugal)
59
Standards Work
•
•
Old approach
– standards group goes to Geneva
– Input: dinners
– Output: PowerPoint
– software groups convert finished standard into products (maybe)
New approach
– standards contributors directly develop (or supervise) libraries,
prototypes and other tools
• possibly in conjunction with academic research groups
– early, pre-completion feedback
– rapid early release  possible early implementation IPR
– train development staff
– participate in interop testing
May 2007
WWIC (Coimbra, Portugal)
60
SIP, SIPPING & SIMPLE –00 drafts
80
70
60
50
SIP
SIPPING
SIMPLE
40
30
20
10
0
1999 2000 2001 2002 2003 2004 2005 2006
includes draft-ietf-*-00 and draft-personal-*-00
May 2007
WWIC (Coimbra, Portugal)
61
RFC publication
14
12
10
8
SIP
SIPPING
SIMPLE
6
4
2
0
May 2007
2001
2002
2003
2004
2005
WWIC (Coimbra, Portugal)
2006
62
Trouble in Standards Land
•
Proliferation of transition standards: 2.5G,
2.6G, 3.5G, …
– true even for emergency calling…
•
Splintering of standardization efforts
across SDOs
OASIS
W3C
ISO (MPEG)
– primary:
• IEEE, IETF, W3C, OASIS, ISO
data
exchange
IETF
L2.5-L7
protocols
IEEE
L1-L2
– architectural:
• PacketCable, ETSI, 3GPP, 3GPP2, OMA,
UMA, ATIS, …
data
formats
– specialized:
• NENA
3GPP
• SIP Forum, IPCC, …
May 2007
WWIC (Coimbra, Portugal)
PacketCable
– operational, marketing:
63
IETF issues
•
SIP WGs: small number (dozen?)
of core authors (80/20)
– some now becoming managers…
– or moving to other topics
•
IETF: research  engineering 
maintenance
•
Stale IETF leadership
– often from core equipment
vendors, not software vendors or
carriers
•
fair amount of not-invented-here
syndrome
• late to recognize wide usage of
XML and web standards
• late to deal with NATs
• security tends to be per-protocol
(silo)
– many groups are essentially
maintaining standards written a
decade (or two) ago
• DNS, IPv4, IPv6, BGP, DHCP;
RTP, SIP, RTSP
• constrained by design choices
made long ago
– often dealing with transition to
hostile & “random” network
– network ossification
May 2007
– some efforts such as SAML and
SASL
•
tendency to re-invent the wheel in
each group
WWIC (Coimbra, Portugal)
64
IETF issue: timeliness
•
Most drafts spend lots of time in 90%complete state
–
–
lack of energy (moved on to new -00)
optimizers vs. satisfiers
•
•
–
–
•
multiple choices that have noncommensurate trade-offs
SIP request history: Feb. 2002 – May
2005 (RFC 4244)
Session timers: Feb. 1999 – May 2005
(RFC 4028)
Resource priority: Feb. 2001 – Feb
2006 (RFC 4412)
New framework/requirements phase
adds 1-2 years of delay
Three bursts of activity/year, with
silence in-between
–
May 2007
occasional interim meetings
IETF meetings are often not
productive
– most topics gets 5-10 minutes 
lack context, focus on minutiae
– no background  same people as
on mailing list
– 5 people discuss, 195 people read
email
Notorious examples:
–
•
•
•
No formal issue tracking
– some WGs use tools, haphazardly
•
Gets worse over time:
– dependencies increase,
sometimes undiscovered
– backwards compatibility issues
– more background needed to
contribute
WWIC (Coimbra, Portugal)
65
Outline
•
•
•
•
•
User perspective
Internet protocol infrastructure
Network management
Network standards
Networking research
May 2007
WWIC (Coimbra, Portugal)
67
Lifecycle of technologies
COTS
(e.g., GPS)
traditional technology propagation:
IM, digital photo
military
opex/capex
doesn’t
matter;
expert
support
Can it be done?
May 2007
corporate
capex/opex
sensitive,
but
amortized;
expert
support
Can I afford it?
WWIC (Coimbra, Portugal)
consumer
capex
sensitive;
amateur
Can my mother use it?
68
Science vs. Engineering
•
•
Computer Science has identity crisis: applied math, experimental science
or engineering?
Applied math
– general abstractions & elegant models
– reality only a distant motivator
– metric: can it be published in J Applied Probability?
•
Experimental science
–
–
–
–
–
•
Engineering
–
–
–
–
•
emphasis on general insights
measurements & models
often reflective: “analyze Gnutella structure”
point solutions
metric: does it fit Small World and is it self-similar? is it optimal?
emphasis on real-world impact
constrained by existing large systems
system solutions: needs to play nice with rest of the world
metrics: scalability, cost, maintainability, implementability
Honesty about what we’re doing
May 2007
WWIC (Coimbra, Portugal)
69
Traditional research
• Inspired by physics or chemistry
• Physics: Theory  experiment  lab bench  prototype
 (semiconductor) product
– Communications: Research  advanced development 
development
• Necessary for hardware
• Dubious for software-intensive systems
– rewrite several times (if not forgotten)
– less qualified each time
– BL example: Unix
May 2007
WWIC (Coimbra, Portugal)
70
Who’s the customer?
• Goals may not be identical
– Equipment vendors: preserve investment, confirm earlier choices
• ATM, SS7
– Carrier: preserve product differentiation, business model,
customer lock-in, monopoly rent, …
• walled gardens, WAP, AAA, DRM, IMS, …
– Consumer: fashion, functionality, cost
• search engines, WiFi, MP3, Skype, web hosting, …
• Easier for some organizations
– e.g., Google: direct customer is advertiser, but revenue driven by
page views  consumer
May 2007
WWIC (Coimbra, Portugal)
71
Good ideas
•
•
•
Myth: Good ideas will win
– “Build a better mousetrap and the world will beat a path to your door.”
(Ralph Waldo Emerson)
– modern version: IEEE 802.11 will dig through IEEE Infocom
proceedings to find your master paper
– even most Sigcomm papers have had no (engineering) impact
Myth: Just ahead of its time – it will take 10 years to have impact
– reality: most papers either have immediate impact or none, ever
Mediocre ideas with commitment win over brilliant ideas without
– particularly if part of a larger system
– cost of understanding ideas
– possible encumbrances (patents)
–  researchers need to accompany their “children” through teenage
years
May 2007
WWIC (Coimbra, Portugal)
72
Translation into Practice
• Relay model
–
–
–
–
research  advanced development  product
information loss rate of 95%?
lack of sense of ownership
hand-off: original owners have moved on to next project
• Google model
–
–
–
–
May 2007
repeated, continuous refinement
public beta
no separate “research”
still has problems with polish & completion
WWIC (Coimbra, Portugal)
73
Impact of networking research
• Very low publication-to-impact ratio
• Brilliant idea, magically transformed into reality
– by somebody else
• Research as point scoring
–
–
–
–
May 2007
publication count
citation by other papers, also without impact
read mostly by other researchers
goal: graduate/get tenure
WWIC (Coimbra, Portugal)
74
Why do good ideas fail?
• Research: O(.), CPU overhead
– “per-flow reservation (RSVP) doesn’t scale”  not
the problem
– at least now -- routinely handle O(50,000) routing
states
• Reality:
QoS
– deployment costs of any new L3 technology is
probably billions of $
– coordination costs
quality-ofservice
IEEE
10,377
12,876
ACM
3,487
4,388
• The QoS problem is a lawyer problem, not an
engineering problem
• Cost of failure:
– conservative estimate (1 grad student year = 2
papers)
– 10,000 QoS papers @ $20,000/paper  $200
million
May 2007
WWIC (Coimbra, Portugal)
75
Aside: The Hockeystick Problem
utility
1.0
complexity
security risks
bandwidth
May 2007
WWIC (Coimbra, Portugal)
adoption
76
Conclusion
• 2nd systems economics problems, not just technology
• Challenges are in reliability and maintainability, rather than
performance or packet-loss & jitter QoS
• Is networking research becoming like civil engineering: large,
important infrastructure, but resistant to fundamental change?
• Existing management tools of limited use to most enterprises and
end users
• Transition to “self-service” networks
– support non-technical users
• As a community, need to learn more from our collective and
individual mistakes…
– Need series “The design mistakes in [(formerly) popular system
or protocol]”
May 2007
WWIC (Coimbra, Portugal)
77