computer networking
Download
Report
Transcript computer networking
COMPUTER NETWORKING
Trends
Dr. Arjan Durresi
Department of Computer and Information Science
Indiana University Purdue University
Indianapolis, USA
www.cs.iupui.edu/~durresi, [email protected]
IUPUI
2- Overview - 1
F12
Overview
Networking – tools to improve communications
Network Architecture
Evolution of Networking
Trends in Networking
Why we need a “new” Internet?
IUPUI
2- Overview - 2
F12
Communication
Exchange of Information (Communication),
makes possible the Human society and the
civilization
Improvements in communication - milestones
in the history of civilization
Language
Writing
Books
Electronic communication, Internet
IUPUI
2- Overview - 3
F12
IUPUI
Communication with computers
Tools created to increase and enhance our
capabilities:
Cars, Airplanes, Microscopes, Telescopes
Telegraph , Telephone to communicate
Computers born to store and process
information
Computers to communicate; Network - more
than two computers
Each epoch in human history is dominated by
one tool:
Industrial Revolution: Steam engine
Information Age: Computers and networks
The Internet is the universal medium of
communication
2- Overview - 4
F12
The Value of Networks
IUPUI
Metcalfe's law
The value of a network is
proportional to the square of
its nodes
2- Overview - 5
F12
Spectacular Progress
IUPUI
2- Overview - 6
F12
IT & Telecom Evolution
Wireless Sensor Nets
Telecom
Internet + Telecom
Cell Phones
Everywhere
(~2000)
The Virtual World
Global
Internet
(~2000)
virtualized via sensors & actuators
The Physical World
Information Tech
control
data
Global Internet for
data & telecom
Digital
Media
Convergence
(2000-2010)
Pervasive
Computing
(2015-)
IUPUI
2- Overview - 7
F12
IUPUI
2- Overview - 8
F12
The New Economy
IUPUI
Fundamental transformation in economy as businesses
and individuals capitalize on new technologies, new
opportunities, and national investments in computing,
information, and communication technologies
New telecommunication technologies have contributed
significantly to the New Economy
New product capabilities for businesses and
consumers
More efficient forms of industrial organization
made possible by cheaper and more efficient
communications
While telecom sector accounts for about one percent
of US economy, it is responsible for generating about
ten percent of the nation’s economic growth
How to sustain or improve on this factor of ten?
2- Overview - 9
F12
The New Economy
IUPUI
Bureau of Labor Statistics' "Occupational
Outlook Handbook 2010-11“ about networking
area:
2008 employment: 292,000
2018 employment: 447,800
Percentage increase: 53% – the highest
among technical carriers
2- Overview - 10
F12
Global IP Traffic Growth Exabytes,
2011–2016
IUPUI
2- Overview - 11
F12
Cisco Forecasts 56 Exabytes per
Month of IP Traffic in 2013
IUPUI
2- Overview - 12
F12
Internet Video Will Generate
Three Waves of Consumer
Internet Traffic Growth
IUPUI
2- Overview - 13
F12
Video
IUPUI
2- Overview - 14
F12
Internet Video Already
Generates More Traffic than
the Entire U.S. Backbone in
2000
IUPUI
2- Overview - 15
F12
Mobile Video
IUPUI
2- Overview - 16
F12
Mobile Cloud Adoption
IUPUI
Cloud Media Applications Multiply Smartphone
Traffic
2- Overview - 17
F12
Mobility
Laptops and Mobile Broadband Handsets Drive Traffic Growth
IUPUI
2- Overview - 18
F12
Mobility
Potential Growth in Data Traffic from a Single Mobile Subscriber
IUPUI
2- Overview - 19
F12
Is Technology only technical stuff ?
IUPUI
Technology depends on the Socio-technical System
Social, Political, Economic, Institutional
Not simply the rational product of scientists and
engineers.
Technology makes sense when seen as part of the
society
Examples:
Automobile engines: Internal combustion vs. steam
Network technologies:
OSI vs. TCP/IP vs. ATM, Ethernet vs. Token
Ring, ISDN vs. fax
Future: Quality of Service mechanisms over the
Internet
Future Internet
2- Overview - 20
F12
Success Factors for New Services
Technology not the only factor in success of a new
service
Three factors considered in new telecom services
Market
New
Service
Can there be
demand for the
service?
Technology
Can it be
implemented costeffectively?
Is the service
allowed?
Regulation
IUPUI
2- Overview - 21
F12
*Market
IUPUI
The network effect: usefulness of a service increases
with size of community
Metcalfe's Law: usefulness is proportional to the
square of the number of users
Phone, fax, email, ICQ, …
Economies of scale: per-user cost drops with
increased volume
Cell phones, PDAs, PCs
Efficiencies from multiplexing
S-curve: growth of new service has S-shaped curve,
challenge is to reach the critical mass
2- Overview - 22
F12
*The S Curve
Service Penetration & Network Effect
Telephone: T=30 years
Automobile: T=30 years
city-wide & inter-city links
roads
Others
Fax
Cellular & cordless phones
Internet & WWW
Napster and P2P
T
IUPUI
2- Overview - 23
F12
IUPUI
2- Overview - 24
F12
*The S Curve
Capability
Third class of
invention
Second class of
invention
Initial class of
invention
Time
(b)
IUPUI
2- Overview - 25
F12
Gartner Hype Cycle 2013
IUPUI
2- Overview - 26
F12
The Bubble
Networking
Spending
Dot Coms
CLECs
Y2K
1997 1998 1999 2000 2001
IUPUI
Sidgmore: Internet Traffic doubling every 40 days, 30
days, … Over-projection data networking equipment
Nearly 1/3 of all tech IPOs over the last 21 years
happened in 1999 and 2000. Source:Morgan Stanely/Chi at Opticomm
CLEC - Competitive Local Exchange Carrier
ILEC - Incumbent Local Exchange Carriers
2- Overview - 27
F12
Regulation & Competition
Telegraph & Telephone originally monopolies
Extremely high cost of infrastructure
Profitable, predictable, slow to innovate
Competition feasible with technology advances
Long distance cost plummeted with optical
tech
Alternative local access through cable,
wireless
Radio spectrum: auctioned vs. unlicensed
Basic connectivity vs. application provider
Tussle for the revenue-generating parts
IUPUI
2- Overview - 28
F12
*Standards
New technologies very costly and risky
Standards allow players to share risk and
benefits of a new market
Reduced cost of entry
Interoperability and network effect
Compete on innovation
Completing the value chain
Chips, systems, equipment vendors,
service providers
Example
802.11 wireless LAN products
IUPUI
2- Overview - 29
F12
*Standards Bodies
IUPUI
Internet Engineering Task Force
Internet standards development
Request for Comments (RFCs): www.ietf.org
International Telecommunications Union
International telecom standards
IEEE 802 Committee
Local area and metropolitan area network standards
Industry Organizations
MPLS Forum, WiFi Alliance, World Wide Web
Consortium
2- Overview - 30
F12
*Dealing with Network
Complexity
Network complexity:
Many technologies with different features
Not all standards are compatible, from different
organizations
Multiple technologies to interconnect the
networks
No single underlying theory that explains the
relationship among the parts
How to learn about the networking ?
Focus on the concepts, go beyond the details
When needed is easy to go from concepts to
details
Concepts are “borrowed” among technologies.
IUPUI
2- Overview - 31
F12
Cave Persons of 2050
IUPUI
2- Overview - 32
F12
Success of the Internet
IUPUI
2- Overview - 33
F12
*Scalability – The holy Grail
of Networking
If you can scale, everything else must be working
Mike O’Dell, Chief Technologist, UUNET
No machine has complete information about
the system state.
Machines make decisions based only on local
information.
Failure of one machine does not ruin the
system.
IUPUI
2- Overview - 34
F12
The N 2 Problem
For N users to be fully connected directly
Requires N(N – 1)/2 connections
Requires too much space for cables
Inefficient & costly since connections not always on
1
N = 1000
N(N – 1)/2 = 499500
2
N
4
IUPUI
3
2- Overview - 35
F12
Computer Network Evolution
Overview
1950s: Telegraph technology adapted to computers
1960s: Dumb terminals access shared host computer
SABRE airline reservation system
1970s: Computers connect directly to each other
ARPANET packet switching network
TCP/IP internet protocols
Ethernet local area network
1980s & 1990s: New applications and Internet growth
Commercialization of Internet
E-mail, file transfer, web, P2P, . . .
Internet traffic surpasses voice traffic
IUPUI
2- Overview - 36
F12
Store-andforward
Packet Switching
To interconnect many computers
Statistical multiplexing – more efficient than
time-division multiplexing
ARPNET late 1960s
The network is peripheral
IUPUI
2- Overview - 37
F12
Local Area Networks
Emergence of LANs
Ethernet 10Mbps, 100Mbps, 1Gbps, 10Gbps
Ethernet everywhere: LAN and WAN
IUPUI
2- Overview - 38
F12
*Internet Architecture
Defined
by Internet Engineering Task
Force (IETF)
Hourglass Design
FTP
HTTP
NV
TFTP
UDP
TCP
IP
NET 1
IUPUI
NET 2
…
2- Overview - 39
NET n
F12
*Internet Protocol IP
Hour-glass model:
Glue of the Internet,
Everything over IP, and IP over everything
The single common language
Implemented at both hosts and routers
Accommodating heterogeneity
Minimalist approach. Best effort datagram service
One of the main reasons of the Internet’s success
TCP,UDP
IP
ATM,Ethern.
IUPUI
2- Overview - 40
F12
*Elements of Computer
Network Architecture
IUPUI
Congestion control inside the network
Internetworking across multiple networks using routers
Segmentation and reassembly of messages into packets
at the ingress to and egress from a network or
internetwork
End-to-end transport protocols for process-to-process
communications
Applications that build on the transfer of messages
between computers.
Intelligence is at the edge of the network.
2- Overview - 41
F12
*Packet vs. Circuit Switching
IUPUI
Architectures appear and disappear over time
Telegraph (message switching)
Telephone (circuit switching)
Internet (packet switching)
Trend towards packet switching at the edge
IP enables rapid introduction of new
applications
New cellular voice networks packet-based
IP supports real-time voice and telephone
network will gradually be replaced
However, large packet flows easier to manage
by circuit-like methods
2- Overview - 42
F12
*Network Architecture
Evolution
Telegraph Networks
Message switching & digital transmission
Telephone Networks
Circuit Switching
Analog transmission → digital transmission
Mobile communications
Internet
Packet switching & computer applications
Future Internet ?
IUPUI
2- Overview - 43
F12
Internet Generations
Internet 1.0 (1969 -1989)
Research Project
RFC1 – April 1969
ARPA project started a few years earlier
IP, TCP, UDP
Mostly researchers
Industry was busy with proprietary
protocols SNA, DECnet, AppleTalk, XNX
IUPUI
2- Overview - 44
F12
Internet 1.0
IUPUI
The pioneering research of Paul Baran in the 1960s, who
envisioned a communications network that would survive a major
enemy attacked.
2- Overview - 45
F12
Internet 1.0
IUPUI
A sketch of the packet switching network in the
United Kingdom proposed by Donald Davies, a pioneer
in networking in the 1960s.
2- Overview - 46
F12
Internet 1.0
IUPUI
A rough sketch map of the possible topology of
ARPANET by Larry Roberts. The map was drawn in the
late 1960s as part of the planning for the network
2- Overview - 47
F12
Internet 1.0 - 2.0
IUPUI
2- Overview - 48
F12
Internet Generations
IUPUI
Internet 2.0 (1989 – Present) – Commerce –
New Requirements
Security RFC1108 n 1989
Inter-domain routing: OSPF, BGP
IP Multicasting
Address Shortage, IPv6
Congestion Control, Quality of Service…
VoIP, P2P, Skype…
2- Overview - 49
F12
Historical Maps of Computer
Networks
IUPUI
http://www.cybergeography.org/atlas/historical.html
The pioneering research of Paul Baran in the 1960s,
who envisioned a communications network that would
survive a major enemy attacked.
Donald Davies, a pioneer in networking in the 1960s
A good book Where Wizards Stay Up Late: The
Origins of the Internet, by Katie Hafner and Matthew
Lyon
2- Overview - 50
F12
Why a new Internet?
May you live in interesting times
IUPUI
The existing Internet Architecture is reaching its
limits.
New technologies, mobility, security, demand for new
services
The research community is thinking to design it from
the scratch, using what we know now.
National Science Foundation is planning a $300M+
research and infrastructure program on GENI ⇒ Most
of the networking researchers will be working on
GENI for the coming years
“Global Environment for Networking Innovations” or
GENI
2- Overview - 51
F12
Future of the Internet
The next killer application is …
IUPUI
2- Overview - 52
F12
IUPUI
2- Overview - 53
F12
IUPUI
2- Overview - 54
F12
Smartphone > PC Shipments Within 2 Years, Global –
Implies Very Rapid Evolution of Internet Access
Global Unit Shipments of Desktop PCs + Notebook PCs vs. Smartphones, 2005 – 2013E
700
2012E: Inflection Point
Smartphones > Total PCs
600
500
400
300
Annual Unit Shipments (MM)
200
100
0
2005
2006
2007
2008
2009E
2010E
2011E
Desktop PCs
Notebook PCs
Smartphones
2012E
2013E
Note: Notebook PCs include Netbooks. Source: IDC, Gartner, Morgan Stanley Research estimates.
IUPUI
2- Overview - 55
F12
5
Global Mobile Data Growth Today is
Similar to Global Internet Growth in
the Late 1990s
IUPUI
2- Overview - 56
F12
Device Diversification
IUPUI
2- Overview - 57
F12
One-Quarter of Mobile Users Will
Own Two or More Mobile-Connected
Devices by 2016
IUPUI
By the end of 2012, the number of mobile-connected devices
will exceed the number of people on earth, and by 2016
there will be 1.4 mobile devices per capita.
2- Overview - 58
F12
Comparison of Global Device Unit
Growth and Global Mobile Data
Traffic Growth
IUPUI
2- Overview - 59
F12
Traffic Offload from Mobile
Networks to Fixed Networks
IUPUI
22 Percent of Total Mobile Data Traffic will
be Offloaded in 2016
2- Overview - 60
F12
Machine-to-Machine Traffic to Increase
22-Fold Between 2011 and 2016
IUPUI
2- Overview - 61
F12
*Trends in Network Evolution
IUPUI
It’s all about services
Building networks involves huge expenditures
Services that generate revenues drive the network
architecture
Current trends
Mobility
Packet switching vs. circuit switching
Multimedia applications
More versatile signaling
End of trust
Many service providers and overlay networks
Networking is a business
2- Overview - 62
F12
End of Trust
Security Attacks
Spam
Denial of Service attacks
Viruses
Impersonators
Firewalls & Filtering
Control flow of traffic/data from Internet
Protocols for privacy, integrity and
authentication
IUPUI
2- Overview - 63
F12
Servers & Services
IUPUI
Many Internet applications involve interaction
between client and server computers
Client and servers are at the edge of the Internet
SMTP, HTTP, DNS, …
Enhanced services in telephone network also involve
processing from servers
Caller ID, voice mail, mobility, roaming, . . .
These servers are inside the telephone network
Internet-based servers at the edge can provide
same functionality
In future, multiple service providers can coexist and
serve the same customers
2- Overview - 64
F12
The right Trade off in Networking
Need
Complexity
Cost
IUPUI
User is the King => Pays the bill
What does the user really need?
Killer applications are key for the success of a
particular technology
In today’s Internet the driving need is
connectivity
Email and web browser – killer applications,
which don’t need more QOS
Future Internet, new applications + more QOS ?
2- Overview - 65
F12
Operations, Administration,
Maintenance, and Billing
IUPUI
Communication like transportation networks
Traffic flows need to be monitored and controlled
Tolls have to be collected
Roads have to be maintained
Need to forecast traffic and plan network growth
Highly-developed in telephone network
Entire organizations address OAM & Billing
Becoming automated for flexibility & reduced cost
Under development for IP networks
2- Overview - 66
F12
Transmission Technology
Relentless improvement in transmission
High-speed transmission in copper pairs
DSL Internet Access
Higher call capacity in cellular networks
Lower cost cellular phone service
Enormous capacity and reach in optical fiber
Plummeting cost for long distance telephone
Faster and more information intensive
applications
IUPUI
2- Overview - 67
F12
Processing Technology
IUPUI
Relentless improvement in processing & storage
Moore’s Law: doubling of transistors per integrated
circuit every two years
RAM: larger tables, larger systems
Digital signal processing: transmission, multiplexing,
framing, error control, encryption
Network processors: hardware for routing, switching,
forwarding, and traffic management
Microprocessors: higher layer protocols and
applications
Higher speeds and higher throughputs in network
protocols and applications
2- Overview - 68
F12
Software Technology
Greater functionality & more complex systems
TCP/IP in operating systems
Java and virtual machines
New application software
Middleware to connect multiple applications
Adaptive distributed systems
IUPUI
2- Overview - 69
F12
Grid Computing
IUPUI
Allows users to share data, software, and computation power
over fiber optics networks
SETI (Search for Extraterrestrial Intelligence)
About 500,000 people have downloaded the program,
generating an amount of computing power that would have
cost $100 million to purchase
“Holy Grid” – where everything is connected to everything,
running common software, able to tackle a wide range of
problems
Autonomic Computing – where integrated computer systems are
not only able to self-protecting, self-configuring, and selfhealing, but also come closer to self-managing.
Pervasive Computing – where sensors embedded in a variety of
devices and products would gather and analyze data.
Soon trillion of sensors
With telecommunication firms becoming more dependent on
information technology, and vice versa, the two industries are
becoming more interwined.
2- Overview - 70
F12
*Cloud Computing
Cloud Computing: Use of compute resources
that are dynamically made available based on a
request for a service provided by that cloud
Rent recourses
IUPUI
2- Overview - 71
F12
IUPUI
2- Overview - 72
F12
Economics of Cloud Computing
IUPUI
2- Overview - 73
F12
IUPUI
2- Overview - 74
F12
IUPUI
2- Overview - 75
F12
IUPUI
2- Overview - 76
F12
*
IUPUI
2- Overview - 77
F12
IUPUI
2- Overview - 78
F12
The Problem with Cloud
IUPUI
2- Overview - 79
F12
*Cloud Networking
Intra Cloud Networking
Inter Cloud Networking
Google
Data Center
Google
Data Center
Google
Data Center
Google’s WAN
Internet
Access
ISP
Access
ISP
End User Hosts
End User Hosts
Fig. 1: Example of a private WAN for service delivery
IUPUI
2- Overview - 80
F12
*Communication Network
Architecture
Network architecture: the plan that specifies
how the network is built and operated
Architecture is driven by the network
services
Overall communication process is complex
Network architecture partitions overall
communication process into separate
functional areas called layers
Next we will trace evolution of three network
architectures: telegraph, telephone, and
computer networks
IUPUI
2- Overview - 81
F12
Telegraphs & Long-Distance
Communications
Approaches to long-distance communications
Courier: physical transport of the message
Messenger pigeons, pony express, FedEx
Telegraph: message is transmitted across a
network using signals
Drums, beacons, mirrors, smoke, flags,
semaphores…
Electricity, light
Telegraph delivers message much sooner
IUPUI
2- Overview - 82
F12
Optical (Visual) Telegraph
IUPUI
Claude Chappe invented optical
telegraph in the 1790’s
Semaphore mimicked a person with
outstretched arms with flags in each
hand
Different angle combinations of arms
& hands generated hundreds of
possible signals
Code for enciphering messages kept
secret
Signal could propagate 800 km in 3
minutes!
2- Overview - 83
F12
Electric Telegraph
IUPUI
William Sturgeon Electro-magnet (1825)
Electric current in a wire wrapped around a piece
of iron generates a magnetic force
Joseph Henry (1830)
Current over 1 mile of wire to ring a bell
Samuel Morse (1835)
Pulses of current deflect electromagnet to
generate dots & dashes
Experimental telegraph line over 40 miles (1840)
Signal propagates at the speed of light!!!
Approximately 2 x 108 meters/second in cable
2- Overview - 84
F12
Electric Telegraph Networks
Electric telegraph networks exploded
Message switching & Store-and-Forward
operation
Key elements: Addressing, Routing,
Forwarding
Optical telegraph networks disappeared
Message
Message
Message
Source
Message
Switches
IUPUI
2- Overview - 85
Destination
F12
*Elements of Telegraph
Network Architecture
IUPUI
Digital transmission
Text messages converted into symbols (dots/dashes,
zeros/ones)
Transmission system designed to convey symbols
Multiplexing
Framing needed to recover text characters
Message Switching
Messages contain source & destination addresses
Store-and-Forward: Messages forwarded hop-byhop across network
Routing according to destination address
2- Overview - 86
F12
Bell’s Telephone
Alexander Graham Bell (1875) working on harmonic
telegraph to multiplex telegraph signals
Discovered voice signals can be transmitted directly
Microphone converts voice pressure variation
(sound) into analogous electrical signal
Loudspeaker converts electrical signal back into
sound
Telephone patent granted in 1876
Bell Telephone Company founded in 1877
Signal for “ae” as in cat
Microphone
sound
IUPUI
Loudspeaker
analog
electrical
signal
2- Overview - 87
sound
F12
Bell’s Sketch of Telephone
IUPUI
2- Overview - 88
F12
Evolution of Networks
In 1890 simple telephone networks with
manually operated switches – circuit switching
Operators replaced by mechanical switches
and 100 years later by electronic switches
IUPUI
Electronic switches and exchange control
information using the common channel
signaling (CCS)
2- Overview - 89
F12
Circuit Switching
Patchcord panel switch invented in 1877
Operators connect users on demand
Establish circuit to allow electrical current
to flow from inlet to outlet
Only N connections required to central office
1
N
N–1
3
IUPUI
2
2- Overview - 90
F12
*Hierarchical Network Structure
Toll
CO = central office
Tandem
Tandem
CO
CO
CO
CO
CO
Telephone subscribers connected to local CO (central
office) Tandem & Toll switches connect CO’s
IUPUI
2- Overview - 91
F12
Computer Connection Control
A computer controls connection in telephone switch
Computers exchange signaling messages to:
Coordinate set up of telephone connections
To implement new services such as caller ID, voice mail, . . .
To enable mobility and roaming in cellular networks
“Intelligence” inside the network
A separate signaling network is required
Computer
IUPUI
Switch connects
Inlets to Outlets
2- Overview - 92
...
...
Signaling
Voice
F12
Elements of Telephone
Network Architecture
IUPUI
Digital transmission & switching
Digital voice; Time Division Multiplexing
Circuit switching
User signals for call setup and tear-down
Route selected during connection setup
End-to-end connection across network
Signaling coordinates connection setup
Hierarchical Network
Decimal numbering system
Hierarchical structure; simplified routing; scalability
Signaling Network
Intelligence inside the network
2- Overview - 93
F12
Feature
1 Energy
Efficiency
2 Mobility
Today vs. Future
Today
Always-on
Mostly
stationary
computers
3 ComputerMulti-user
Human
systems,
Relationship Machine to
machine
4 End
Single
Systems
computers
IUPUI
2- Overview - 94
Future
Green, Mostly off
Mostly mobile
objects
Multi-system user
Personal comm.
Systems
Globally distributed
systems
F12
Today vs. Future
Feature
5 Protocol
Symmetry
Today
Future
Communication Unequal: PDA vs.
between equals, Google, Asymmetric
Symmetric
6 Design Goal Research,
Trusted
systems
Commerce, No trust,
Map to organizational
structure
7 Ownership
Hierarchy of
ownerships,
administrations,
communities
IUPUI
No concept of
ownership
2- Overview - 95
F12
Today vs. Future
8
Feature
Sharing
9
Today
Sharing,
Interference,
QoS Issues
Packets
Switching
units
10 Applications Email and
Web
IUPUI
2- Overview - 96
Future
Sharing and Isolation,
Critical
Infrastructures
Packets, Circuits,
Wavelengths, …
Information retrieval,
Distributed
Computing and
Storage, Data
diffusion
F12
Security Mechanisms
IUPUI
Not a single silver bullet
Develop multiple layers of defense
Employ as many layers of defense as needed – risk,
resource profiles
Castle, moat, drawbridge, mountain-top lookout,
perimeter wall, inner wall, ruler decoy etc.
Firewall, resource managers, app. Level security,
logging, antivirus, remote backups, egress filters…
2- Overview - 97
F12
Castle Solution – Extremely Unscalable
IUPUI
2- Overview - 98
F12
Security Mechanisms
Normally, not a single silver bullet
Develop multiple layers of defense
Employ as many layers of defense as needed –
risk, resource profiles
Castle, moat, drawbridge, mountain-top
lookout, perimeter wall, inner wall, ruler decoy
etc.
Firewall, resource managers, app. Level
security, logging, antivirus, remote backups,
egress filters…
Update the patches …Many patches might be
the sign that the problems are deeper.
Learn from real life security.
IUPUI
2- Overview - 99
F12
Today Security
IUPUI
Authentication is applied sometime only at the
destination
The attacker can abuse with network
resources
Network resources (routers, etc.) become
unknowingly attacker’s collaborators by
routing his malicious traffic
Destination protection becomes an
extremely unscalable problem - each
destination could be under attack from a
very large number of attackers
2- Overview - 100
F12
Security Analogy
IUPUI
2- Overview - 101
F12
Maginot Line
IUPUI
Line of concrete fortifications, which France
constructed along its borders with Germany
and Italy.
There are 142 ouvrages, 352 casemates, 78
shelters, 17 observatories and around 5,000
blockhouses over all of the Maginot Line.
2- Overview - 102
F12
Maginot Line
German Invasion
Attacking on May 10, German forces were
well into France within five days and they
continued to advance until May 24, when
they stopped near Dunkirk.
When the Allied forces invaded in June 1944
the Line, now held by German defenders, was
again largely bypassed.
IUPUI
2- Overview - 103
F12
Two Security Philosophies
“Super Protection”–expensive, unscalable, could be broken.
Prevention power of punishment
IUPUI
2- Overview - 104
F12
Summary
Networking – tools to improve communications
Network Architecture: The new Hot Topic
Evolution of Networking
Trends in Networking: Users are King
Design the new Internet based on what we
know now
IUPUI
2- Overview - 105
F12