Successfully reported this slideshow.

Some Internet Topics: Horizontals, the IETF, and IPv6

1

Share

Loading in …3
×
1 of 35
1 of 35

More Related Content

Related Books

Free with a 14 day trial from Scribd

See all

Related Audiobooks

Free with a 14 day trial from Scribd

See all

Some Internet Topics: Horizontals, the IETF, and IPv6

  1. 1. www.internetsociety.org Some Internet Topics: Horizontals, the IETF, and IPv6 Olaf M. Kolkman Chief Internet Technology Officer kolkman@isoc.org
  2. 2. Central Asia Internet Symposium - 10 December 2014 The Internet: Different Players at Different Layers 2
  3. 3. Central Asia Internet Symposium - 10 December 20143
  4. 4. Central Asia Internet Symposium - 10 December 2014 • Application Layer: Applications use IP for connectivity • The Network Access Layer: Components in the Network Access Layer deliver IP connectivity • The IP Layer: provides a coherent mapping between the layers • (IP=Internet Protocol) 4
  5. 5. Central Asia Internet Symposium - 10 December 2014 Application Layer • Applications are what the users care about • Most people conceive the utility of the various applications as the Internet • E-mail and WWW are just two applications, albeit successful ones • Business, voice and face communication, entertainment such as videos and games 5
  6. 6. Central Asia Internet Symposium - 10 December 2014 Network Layer • The layer that provides the IP to the
 customers • The Internet is made up out of many independently operated networks that all provide some level of network access • The network exchange IP packets between each other 6
  7. 7. Central Asia Internet Symposium - 10 December 2014 Network of Networks… 7 Serving different markets
  8. 8. Central Asia Internet Symposium - 10 December 2014 Highly competitive A EUR80 fiber cross connect: Internet Exchange traffic: Backbone traffic Western Europe: Transatlantic traffic, wholesale: Internet Transit, wholesale: Internet Transit, retail: Broadband Internet, consumer: National Ethernet service: 3G mobile data, national: GSM voice call, national: 3G mobile data, roaming low: 3G mobile data, roaming high: GSM voice call, roaming: SMS Text Messages: SMS Text Messages, roaming: $0.01 $0.25* $0.50 $1 $2 $15 $50 $180 $11,400 $483,840 $834,000 $3,127,500 $3,338,496 $210,000,000 $1,166,400,000 The Price of Bandwidth, in bulk, per Mbps 8 Commodity Table courtesy of Remco van Mook, Equinix Western Europe, early-mid 2011 (based on 10Gbps or 300GB)
  9. 9. Central Asia Internet Symposium - 10 December 2014 Inter net-working and working Internet 9 Voluntary adoption of technology bottom-up innovation Different Players at Different Layers FunctionalInteroperability Collaborationwhere needed Competition where possible
  10. 10. Collaborationwhere needed
  11. 11. Central Asia Internet Symposium - 10 December 2014 The Internet and Standards 11
  12. 12. Central Asia Internet Symposium - 10 December 2014 How do Standards Play a Role? 12 Browsing The Web 802.11 IEEE TCP/IP IETF URI IETF BGP IETF NAT Propriet HTTP IETF CSS W3C PNG IETF HTML W3C/ISO MPEG ISO/IEC XML W3C ADSL ITU-T Interoperability
  13. 13. Standardization the Internet way Details on: http://open-stand.org Cooperation Adherence toPrinciples Collective Empowerment Availability VoluntaryAdoption driver for innovation Borderless commerce
  14. 14. 1. Cooperation Respectful cooperation between standards organizations, whereby each respects the autonomy, integrity, processes, and intellectual property rules of the others. 2. Adherence to Principles Adherence to the five fundamental principles of standards development: • Due process. Decisions are made with equity and fairness among participants. No one party dominates or guides standards development. Standards processes are transparent and opportunities exist to appeal decisions. Processes for periodic standards review and updating are well defined. • Broad consensus. Processes allow for all views to be considered and addressed, such that agreement can be found across a range of interests. • Transparency. Standards organizations provide advance public notice of proposed standards development activities, the scope of work to be undertaken, and conditions for participation. Easily accessible records of decisions and the materials used in reaching those decisions are provided. Public comment periods are provided before final standards approval and adoption. • Balance. Standards activities are not exclusively dominated by any particular person, company or interest group. • Openness. Standards processes are open to all interested and informed parties. 3. Collective Empowerment Commitment by affirming standards organizations and their participants to collective empowerment by striving for standards that: • are chosen and defined based on technical merit, as judged by the contributed expertise of each participant; • provide global interoperability, scalability, stability, and resiliency; • enable global competition; • serve as building blocks for further innovation; and • contribute to the creation of global communities, benefiting humanity. 4. Availability Standards specifications are made accessible to all for implementation and deployment. Affirming standards organizations have defined procedures to develop specifications that can be implemented under fair terms. Given market diversity, fair terms may vary from royalty-free to fair, reasonable, and non-discriminatory terms (FRAND). 5. Voluntary Adoption Standards are voluntarily adopted and success is determined by the market. Cooperation Adherence toPrinciples Collective Empowerment Availability VoluntaryAdoption
  15. 15. Central Asia Internet Symposium - 10 December 2014 The IETF 15
  16. 16. The Internet Engineering Task Force is
 a loosely self-organized group of people
 who contribute to the engineering and
 evolution of Internet technologies.
 It is the principal body engaged in the
 development of new Internet standard
 specifications.
 RFC4677
  17. 17. The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.
  18. 18. IETF Trust IETF Universe RFC Editor IASA IAD IAOC IESG Area Area Area Area Area Area working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working group working group working group working group working group working group working group working group working group working group IETF Secretariat
  19. 19. INT RTG TSV OPS RAI About Packets About creating the paths for the packets About managing the networks About the use of the paths to provide the end-to-end experience About
 Real Time Applications APS About Application Protocols used on the Internet SEC About Security Protocols (cross area)
  20. 20. Central Asia Internet Symposium - 10 December 2014 IETF Technology and the Internet 20
  21. 21. Central Asia Internet Symposium - 10 December 201421 IPv6
  22. 22. Central Asia Internet Symposium - 10 December 2014 Original(artwork:(( Ericson,(IETF91(Host(presenta:on( IPv4(address(availability( Poof( 22 Change: Global Growth of Connected Endpoints
  23. 23. Central Asia Internet Symposium - 10 December 201423 https://www.google.com/intl/en/ipv6/statistics.html#tab=ipv6-adoption 5% and growing faster than IPv4 Internet
  24. 24. Central Asia Internet Symposium - 10 December 201424 http://6lab.cisco.com/stats/
  25. 25. Central Asia Internet Symposium - 10 December 201425 Encryption
  26. 26. Central Asia Internet Symposium - 10 December 201426
  27. 27. Central Asia Internet Symposium - 10 December 201427 Changing Expectations: trust User  trust  in  networks,   devices,  and  transac1ons   essen1al  in  driving  social   and  commercial   interac1on Security,  Stability,   Confiden1ality,   Integrity,  Resiliency   and  Scalability  are   tools  to  achieve  trust  
  28. 28. Statistics, Web Traffic • HTTPS increased 4% to 17% from 2008 to 2014, for all web traffic (Source: IIJ)
  29. 29. Pain Points and Hot Debates • There is no single reason behind the increasing use of encryption, but the change has a real impact on the world • Operator business models, technical solutions for various things, censorship will be harder (both good and bad kind), … • All this will cause friction • Motives of players are not fully aligned
  30. 30. Reality Check • “Everything is in the clear” approach is clearly unworkable • Encryption will reduce the number of parties that see traffic • But not eliminate them — content provider, browser vendor, CAs, proxy provider, corporate IT department, … • World still moves ahead on a voluntary basis on what technology is chosen and on what technology a particular party can adopt • Surveillance shifts, not eliminated • Useful technical things done in different ways, not eliminated • Some potential bad outcomes to avoid —- MITMs, regulation limiting security, fragmentation, device control, …
  31. 31. Central Asia Internet Symposium - 10 December 201431 BGP SIP DNSSEC PKIX HTTP TLS RTP
  32. 32. Central Asia Internet Symposium - 10 December 2014 Questions? 32
  33. 33. Central Asia Internet Symposium - 10 December 2014 Acknowledgement • Network topology map from ‘The Opte Project’ • Various Hourglass models produced using the Open Source Blender, ‘Klootindustries’ CC Atribution license • Jari Arkko for the slides on the use on encryption • Logos and Trademarks from the respective companies 33
  34. 34. Central Asia Internet Symposium - 10 December 201434
  35. 35. Central Asia Internet Symposium - 10 December 2014 Backup Slides 35

×