1. Leaving the Dark Ages
of Networking Behind:
Welcome to the RINAssiance!
John Day
Boston University
VTC2020 Workshop on
New Network Architecture
Powering Internet-of-Things
Nov 2020
A good architect suffers from
the topologists vision defect:
Can’t tell a coffee cup from a donut!
15. Software Engineering Question
• There is this module:
• There is a need to partition it into two modules. The question is along
what lines does one partition it?
• One could partition it one way, but it breaks an internal function:
• Or along different lines, which doesn’t break anything,
• Which one do you choose?
• Then Why Didn’t They Do that with TCP?!
47. How Does It Work?
Security
• Do What the Model Tell Us:
• Application only knows Destination Application name and its local port.
• The layer ensures that Source has access to the Destination
– Application must ensure Destination is who it purports to be.
• All members of the layer are authenticated within policy.
• Minimal trust: Only that the lower layer will deliver something to someone.
• PDU Protection can provide protection from eavesdropping, etc.
– Complete architecture does not require a security connection, a la IPsec.
• The DIF is a securable container. DIF is secured not each component separately.
Port:=Allocate(Dest-Appl, params)
Access Control
Exercised
49. How Does It Work?
The Internet and ISPs
• The Internet floats on top of ISPs, a “e-mall.”
– One in the seedy part of town, but an “e-mall”
– Not the only emall and not one you always have to be connected to.
Public Internet
ISP 1 ISP 2 ISP 3
50. How Does It Work?
The Internet and ISPs
• But there does not need to be ONE e-mall.
– Notice all the layers are private. Public layers are a form of private.
Public Internet
ISP 1 ISP 2 ISP 3
Internet Rodeo Drive
Utility SCADA
My Net
Facebook Boutique
Internet Mall of America
51. This Won’t Make Some Happy
• Suppose an ISP has its own e-mall and
• forms an alliance with a few CDNs and Data Centers,
• To give the ISP access to ~80% of the most popular destinations within its e-mall.
• For the rest, create a new Special DIF for customer.
• Among other things notice the implication for security:
• An attack has to come either from:
» The Customer’s Network
» The ISP,
» CDN or Data Center or
» A Special DIF.
• An “Internet” is a Non-Sequitor
CDN ISP 2 DC
My Provider’s E-Mall
A Special DIF
A Wall-less Garden?
56. From There, It is a Short Step to This
• A traditional OS is a heterogeneous DAF that includes the peripherals.
– Wherever they are.
• Somehow this is much different once you look at the picture.
OS - DAF
Printer Disk
Laptop
System
57. Not Just a Network Model
• A Layer is a Distributed Application that Does IPC
• That Forced Us to Answer: What is a Distributed Application?
• We now are working with a Unified Model for
Printer
USB
-DIF
WiFi
-DIF
OS - DAF
Disk
Laptop
Operating Systems
IRM
Distributed
Applications
IRM
Networks
Task
sched
Mem
Mngt
IPC
Tasks
Application Processes
58. What About IoT!?
Major New Requirements!
• Huh? I just showed you. We have been doing IoT for 35 years.
– Worked out the architecture in 1984.
– Network Management is IoT with a Particular Set of Object Models
– For IoT, We just swap in other Object Models and DAFs with DAF-
Application Management.
• (We still have to manage the network. It was just the null case.)
• But New Lower Layer Protocols are needed:
– We have surveyed 20+ IoT data transfer protocols all can be done by
minor changes of policy. (Actually, their similarity was surprising!)
• But Different Application Protocols are needed!
– Different Object Models are needed and consistency across related object
models is needed, but not new application protocols.
– This is a much faster path to product. Changing object models is much
easier than building new protocols.
59. What About IoT?
• But there Will Be 10s of Millions of new Devices on the Net!!
– Yes. So What? Not a big deal. Stop and think.
– Someone is going to install and own those devices. They are not going to make
them widely available on the Public Internet. They are going to be a private
subnet. 100K, 500K devices? Well within the range of what we do now.
– Owners might make some information available, but not the devices.
• New policies, new DIFs, but a different architecture is not necessary.
– Reminder about architecture:
– The Difference between an Architecture and Something Built to that
Architecture, which are you doing?
• All of the hype right now about IoT,
• Serves one purpose and one purpose alone:
• To create barriers to entry to competitors and to lock-in customers.
60. “But You Can’t
Replace the WHOLE Internet!”
• Wish I had a dollar for every time I have heard that!
– What are they putting in the water these days?
• They told us we would never replace the PSTN or IBM’s SNA.
– Even in the late 1980s, people said data would never exceed voice. (!!)
• Who cares if it is replaced? Perhaps never. Does it matter?
– You have already seen the transition plan.
• The Internet is just another e-mall: A good place to test malware,
conduct cyberwarfare, steal credit cards, find drug dealers, sacrifice your
privacy, etc. . . . . . All sorts of useful things!
• We build over it, under it, around it. Use it for what you want.
• We build other e-malls along side it.
– Give people a choice, after all competition is good, right?
62. There is Much More,
And Much More to Discover!
• An Invitation: Come explore it with us.
– There is much to explore:
• You probably have a lot of questions. That is because I left out a lot.
• How it applies to different environments, especially wireless.
• Start with Patterns in Network Architecture, Prentice Hall
– Then the “Reference Model” (4 sections) and
– Check out related work at
– At www.pouzinsociety.org or ict-pristine.eu
– www.irati.eu or ict-arcfire.eu
Welcome to the RINAissance!