Infrastructure2.0 Model Proposal 1 19 10

931 views

Published on

The presentation takes the Mark Cummings functional model and maps it to a communications stack model with its attendant metadata and associated policies.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
931
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Infrastructure2.0 Model Proposal 1 19 10

  1. 1. Modeling Internet Infrastructure 2.0 Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  2. 2. Existing Models - OSI Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  3. 3. Existing Models – TCP/IP Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  4. 4. Layer 3.5 of the OSI Model TCP/UDP TCP/UDP HIP HIP IPSEC IPSEC IP IP Authentication Layer Authentication Layer ESP Payload: not encrypted, not authenticated Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131. Richard Paine (richard.h.paine@gmail.com) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages
  5. 5. Need New Network Model <ul><li>Discovery </li></ul><ul><li>Connection </li></ul><ul><li>Description </li></ul><ul><li>Negotiation </li></ul><ul><li>Configuration </li></ul>Current Examples New Examples DHCP DNS 802.11 Beacons Query Authorization OASIS HIP End-to-End Security Current Examples PHY MAC NETWORK IPSEC New Examples 802.11 Handoff 802.21 Handoff HIP End-to-End Security Current Examples SSL Databases Directories New Examples MetaData Secure Datastores MetaData Access Points (MAP) IF-MAP Current Examples OASIS New Examples HIP End-to-End Security MetaData Undefined Negotiation Protocol Current Examples Databases Directories Active Directory New Examples MetaData Secure Datastores MetaData Access Points Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  6. 6. Additional Three Layers of Model Abstraction Current Examples New Examples Current Examples New Examples Current Examples New Examples <ul><li>Initiation of Ops </li></ul><ul><li>Maintence of Ops </li></ul><ul><li>Cessation of Ops </li></ul>Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  7. 7. New Functional 8 Layer Network Model Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  8. 8. End-to-End Security Model Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session Application OS-Session Application Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc.
  9. 9. Modem Level Discovery Modem Modem IP Infrastructure Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Note: Similar to 802.11k’s Neighbor Report (names around the immediate network) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media
  10. 10. OS-Interworking and OS-Session Connection Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc.
  11. 11. Description Available to All Layers Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  12. 12. Negotiation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  13. 13. Configuration Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  14. 14. Initiation, Maintenance, and Discontinuation of Operation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  15. 15. Conclusion <ul><li>New Model Proposed for Internet 2.0 that includes InterCloud </li></ul><ul><li>Identity for Internet 2.0 </li></ul><ul><li>Security for Internet 2.0 </li></ul>Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)

×