SlideShare a Scribd company logo
1 of 15
Modeling Internet Infrastructure 2.0 Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Existing Models - OSI Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Existing Models – TCP/IP Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Layer 3.5 of the OSI Model TCP/UDP TCP/UDP HIP HIP IPSEC IPSEC IP IP Authentication Layer Authentication Layer ESP Payload: not encrypted, not authenticated Gurtov;  Host Identity Protocol (HIP); Wiley, 2008; pg 131. Richard Paine (richard.h.paine@gmail.com) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages
Need New Network Model ,[object Object],[object Object],[object Object],[object Object],[object Object],Current Examples New Examples DHCP DNS 802.11 Beacons Query Authorization OASIS HIP End-to-End Security Current Examples PHY MAC NETWORK IPSEC New Examples 802.11 Handoff 802.21 Handoff HIP End-to-End Security Current Examples SSL Databases Directories New Examples MetaData Secure Datastores MetaData Access Points (MAP) IF-MAP Current Examples OASIS New Examples HIP End-to-End Security MetaData Undefined Negotiation Protocol Current Examples Databases Directories Active Directory New Examples MetaData Secure Datastores MetaData Access Points Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)
Additional Three Layers of Model Abstraction Current Examples New Examples Current Examples New Examples Current Examples New Examples ,[object Object],[object Object],[object Object],Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)
New Functional 8 Layer Network Model Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
End-to-End Security Model Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session Application OS-Session Application Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc.
Modem Level Discovery Modem Modem IP Infrastructure Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Note: Similar to 802.11k’s Neighbor Report (names around the immediate network) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media
OS-Interworking  and OS-Session Connection Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc.
Description Available to All Layers Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Negotiation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Configuration Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Initiation, Maintenance, and Discontinuation of Operation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Conclusion ,[object Object],[object Object],[object Object],Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)

More Related Content

What's hot

Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoTAltoros
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513Alexander Doré
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesZivaro Inc
 
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTUREAPPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURECisco Russia
 
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Mustafa Kuğu
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...Sumo Logic
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Application Centric Infrastructure (ACI)
Application Centric Infrastructure  (ACI)Application Centric Infrastructure  (ACI)
Application Centric Infrastructure (ACI)Cisco IT
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website Blockchain Council
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Aci presentation
Aci presentationAci presentation
Aci presentationJoe Ryan
 

What's hot (18)

Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513
 
I psecurity
I psecurityI psecurity
I psecurity
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner Capabilities
 
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTUREAPPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURE
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Application Centric Infrastructure (ACI)
Application Centric Infrastructure  (ACI)Application Centric Infrastructure  (ACI)
Application Centric Infrastructure (ACI)
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Blockchain spreads
Blockchain spreadsBlockchain spreads
Blockchain spreads
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Aci presentation
Aci presentationAci presentation
Aci presentation
 

Similar to Infrastructure2.0 Model Proposal 1 19 10

Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
Fundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyFundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyRockwell Automation
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technologysoftconsystem
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System      IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System IRJET Journal
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
 
Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Capgemini
 

Similar to Infrastructure2.0 Model Proposal 1 19 10 (20)

Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Fundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyFundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network Technology
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technology
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System      IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Fundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technologyFundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technology
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
Matrix
MatrixMatrix
Matrix
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0
 

More from Infrastructure 2.0

More from Infrastructure 2.0 (7)

Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
Application Mobility - Lightning Talk
Application Mobility - Lightning TalkApplication Mobility - Lightning Talk
Application Mobility - Lightning Talk
 
OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010
 
Cloud APIs Overview Tucker
Cloud APIs Overview   TuckerCloud APIs Overview   Tucker
Cloud APIs Overview Tucker
 
Intercloud Registry
Intercloud RegistryIntercloud Registry
Intercloud Registry
 
20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation
 
Lighthouse 20100120
Lighthouse 20100120Lighthouse 20100120
Lighthouse 20100120
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Infrastructure2.0 Model Proposal 1 19 10

  • 1. Modeling Internet Infrastructure 2.0 Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 2. Existing Models - OSI Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 3. Existing Models – TCP/IP Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 4. Layer 3.5 of the OSI Model TCP/UDP TCP/UDP HIP HIP IPSEC IPSEC IP IP Authentication Layer Authentication Layer ESP Payload: not encrypted, not authenticated Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131. Richard Paine (richard.h.paine@gmail.com) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages
  • 5.
  • 6.
  • 7. New Functional 8 Layer Network Model Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 8. End-to-End Security Model Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session Application OS-Session Application Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc.
  • 9. Modem Level Discovery Modem Modem IP Infrastructure Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Note: Similar to 802.11k’s Neighbor Report (names around the immediate network) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media
  • 10. OS-Interworking and OS-Session Connection Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc.
  • 11. Description Available to All Layers Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 12. Negotiation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 13. Configuration Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 14. Initiation, Maintenance, and Discontinuation of Operation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 15.