Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Evolution of Networking: IPv6

479 views

Published on

  • Be the first to comment

  • Be the first to like this

The Evolution of Networking: IPv6

  1. 1. The Evolution of Networking: IPv6 Where do you want your network to go tomorrow? To see detailed notes check the notes page of this slide show.
  2. 2. Introduction Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  3. 3. Applications Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  4. 4. Applications Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  5. 5. <ul><li>Looks in registry (Host Cache) to determine Seed Supernodes </li></ul><ul><li>Send UDP packets to specified HC IP addresses and ports </li></ul><ul><li>Wait 5 seconds </li></ul><ul><li>Attempt TCP connection to specified HC IP addresses and ports </li></ul><ul><li>Attempt TCP connection to specified HC IP addresses over port 80 </li></ul><ul><li>Attempt TCP connection to specified HC IP addresses IP addresses over port 443 </li></ul><ul><li>If none of these work cycle through all of them 5 more times </li></ul><ul><li>Assuming connection made, test local workstation to determine available bandwidth and available CPU </li></ul><ul><li>If results are within specified (unpublished) parameters, report back to central servers that this machine is available to be a Supernode </li></ul><ul><li>Start encrypting traffic </li></ul>Applications: Skype Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  6. 6. Applications <ul><li>Skype: </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A Networks that don’t provide security services to applications:
  7. 7. Applications: Barrier to Entry <ul><li>Some applications simply die because lack of end to end make it too difficult to work. </li></ul><ul><li>“ The time has come to lower the curtain on Speak Freely. No further development or maintenance will be done, and no subsequent releases will be forthcoming. </li></ul><ul><li>The Internet of the near future will be something never contemplated when Speak Freely was designed, inherently hostile to such peer-to-peer applications.” </li></ul><ul><li>Speak Freely </li></ul><ul><li>End of Life Announcement </li></ul><ul><li>John Walker </li></ul><ul><li>January 15th, 2004 </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  8. 8. Applications: Flipping the Paradigm Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  9. 9. Applications: Summary <ul><li>Applications are negatively impacted by IPv4 </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  10. 10. Seamless Networks Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  11. 11. Networks Today 10.1.1.X 10.1.1.X 10.1.1.X IP Address Conflicts Firewall Restrictions Slow networks Single Points of failure Islands of identity Shadow accounts Rigidity Inflexibility Overhead Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A Network Network Network
  12. 12. Seamless Networks Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A Network Network Network Application Application
  13. 13. Seamless Networks Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A 9 minute video clip called “Road Tunnel Fire Rescue with Wireless Sensor Networks” was shown here and may be accessed at: http://www.youtube.com/watch?v=RU21YO6XF_o
  14. 14. Seamless networks cannot exist without IPv6
  15. 15. Security Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  16. 16. Security: IPsec <ul><li>IPv6 is no more secure than IPv4 </li></ul><ul><li>IPv6 is no less secure than IPv4 </li></ul><ul><li>IPv6 can be deployed in a more secure manner than IPv4 </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  17. 17. Security: Training <ul><li>Security models will change </li></ul><ul><li>Security Architects/Engineers need v6 training </li></ul><ul><li>Training needs will be extensive for senior architects – allocate training funds </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  18. 18. Peer-to-Peer Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  19. 19. Peer to Peer isn’t evil <ul><li>Peer to Peer ≠ Napster or Kazaa </li></ul><ul><li>These are just ‘early adopters’ </li></ul><ul><li>Can be managed and leveraged in your organization </li></ul>Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A
  20. 20. Current Data Flow Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A Single Point of Failure Bandwidth Chokepoint Clients need connectivity Saturates slow links Long transfer times Scheduling can miss machines
  21. 21. Peer to Peer Data Flow Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A Highly available Distributed distribution Disconnected networks Leverages fastest networks Faster distribution Self healing Authentication Distributed Security Managed Applications
  22. 22. Closing Remarks Introduction Applications Seamless Networking Security Peer to Peer Closing/Q&A SEAN SILER PROGRAM MANAGER FOR IPV6 DEPLOYMENT SEAN.SILER @ MICROSOFT.COM
  23. 23. © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

×