SlideShare a Scribd company logo
Unreliable Internet Nick Wondra @ Cloudflare
Martin J. Levy @ Cloudflare
November 2017
Todays agenda
● Introduction (Tim Fong)
○ Why does the Internet sometime “misbehave” when it
comes to delivering applications?
○ What are some ways to solve this?
● Martin J. Levy (20 min)
○ The Internet and how it’s tied together
○ BGP and topology
○ Testing (example of tools and techniques)
● Nick Wondra (20 min)
○ Approaches to solve the problem
○ Examples of mechanisms in place
● Summary (5 min)
● Audience Q/A (10 min)
The Internet and how it’s tied together
Martin J. Levy
The Internet
● Technically – a somewhat complex subject
○ The Internet is a collection of networks
○ No network stands alone (all interconnected)
○ Robustness can be created
○ Multi-homing (more than one transit/path)
○ Peering between “like” networks
○ Diversity (physical and logical)
○ Nothing is static!
● Internet was developed for something different
● Many types of data (and data layers)
● TCP/UDP vs FTP/HTTP/SMTP vs TLS vs XML/JSON
The Internet - just how complex? (hint: very!)
This is the representation of
a single network (a medium
sized telco) and its
interconnections globally to
various other backbone
networks.
A full diagram would have
upwards of 60,000
independent networks
depicted on a single
diagram, which is hard to
follow.
Glueing the Internet together - BGP routing
● The IETF specified a protocol (BGP4) that can handle:
○ Massive routing tables
○ CIDR routing (ability to specify IP network address plus a network size)
○ IPv4 & IPv6
○ Rules for routing internally within a network
○ Rules for routing to an external network
○ Much more!
● BGP in real-life is used by every network on the Internet
○ Every destination on the globe exists within the BGP global routing tables
○ Everything is public, visible, exposed, and recorded
What works? What breaks? What’s the fix?
● There’s no steady state within the Internet
○ The path from A to Z is forever changing. Sometime for the better
○ The BGP routing protocol has to address many factors:
■ Physical interruptions (a fiber break)
■ Planned maintenance (upgrades to facilities or services)
■ Increases in capabilities - for example, a new undersea cable
■ Third party “hiccups”
○ Commercial agreements (and disagreements)
■ Purchasing from a different Internet service provider
■ Ending contracts and changing service providers
● What we do know is that it keeps our network engineers busy!
The Internet - it keeps on growing
A new undersea is laid
between the African
coast and the
Seychelles island
(replacing a satellite
connection)
The Internet - When it breaks, it breaks!
This is an example of what happens each-and-every day all
around the globe. The physical layer of the Internet is fragile.
All those bright spray-painted lines you see on a street (before
someone digs it up) is meant to stop this from happening.
It doesn’t!
Protocol stack - what’s above the physical layer
● Layers provide capabilities
○ Application - the end-users view
○ Transport - HTTP & TLS
○ Internet - IP and routing
○ Data link - that fiber in the ground
● Each layer has its possible failures
Physical
Data Link
Network
Transport
Session
Presentation
Application
OSI Network Model
Data Link
Internet
Transport
Application
The TCP/IP Model
Distance, Latency, Variable Paths, and more
150 msec
70 msec
230 msec
400 msec
● Speed of light
○ Very constant![1]
● Distance ~= Hops
○ Reliability decreases
● Variable paths
○ Redundancy .vs.
○ Non-deterministic
● Variable providers
○ Sometimes useful
[1] https://www.quora.com/What-is-precisely-the-speed-of-light-in-fiber-optics
Monitoring tools and more
● Beyond ping - or what’s really happening to your packets?
[1] http://bgp.he.net/
[2] http://atlas.ripe.net/
[3] http://stat.ripe.net/
Approaches to solve the problem
Nick Wondra
Change the model of the Internet?
● Address the content, not the server
○ Content centric networking, et al
○ Route requests based on content location
○ Content is decentralized, moves through the network
● Requires changes deep in the protocol stack
○ … but lots of investment built into current infrastructure
Change the core Internet protocols?
● Can we build a better BGP?
○ Low-level distance and performance metrics may not translate to
application performance
○ Many networks = many systems to change
● Can we build a better transport?
○ TCP and UDP deeply ingrained in end-user systems and network
middleboxes (firewalls, LBs, WAN optimizers, etc)
● Evolve new solutions on top of existing frameworks
○ Solve for problems in the malleable network layers
○ Example: TLS 1.3
■ More secure and faster (fewer RTTs)
○ Example: TCP+HTTP => UDP+QUIC
■ Speed: connection establishment, session multiplexing
■ Resilience: congestion control, forward error correction
■ Flexibility: connection migration
● The challenge is distribution
○ Clients and servers must opt-in
Evolution, not revolution
● Cloudflare has Points of Presence (PoPs) across the globe
○ PoPs close to every Internet user and server
○ Transit/peering with multiple networks at every PoP
○ Proxies 10% of all web requests
● Global Internet performance and reliability monitoring
○ Real-time feedback as data traverses the network
○ Can “test” network paths that BGP wouldn’t use
○ Use performance metrics that matter to web applications (TTFB,
response time)
Value of a large global network
Global footprint = path control
● Force routing paths by pinning to intermediate PoPs
150ms
200ms
● Evolution inside the network, transparent to client and server
Global footprint = distribution channel
TCP+HTTPTCP+HTTP UDP+QUIC
Summary
Nick Wondra & Martin J. Levy
Summary, Questions, and Thank You!
Martin J. Levy - Network Strategy
@Cloudflare
@mahtin
Nick Wondra - Systems Engineer
@Cloudflare
@nickwondra
Appendix
Additional Reading (via Cloudflare blog)
● Argo & Warp:
○ https://blog.cloudflare.com/argo/
○ https://blog.cloudflare.com/the-making-of-cloudflare-warp/
● Railgun:
○ https://blog.cloudflare.com/cacheing-the-uncacheable-cloudflares-railgun-
73454/
● Load Balancing:
○ https://blog.cloudflare.com/introducing-load-balancing-intelligent-failover-with-
cloudflare/
● TLS:
○ https://blog.cloudflare.com/introducing-tls-client-auth/

More Related Content

Similar to Keeping the Internet Fast and Resilient for You and Your Customers

Computer network (7)
Computer network (7)Computer network (7)
Computer network (7)
NYversity
 
Unit 1 Introduction (1).pptx
Unit 1 Introduction (1).pptxUnit 1 Introduction (1).pptx
Unit 1 Introduction (1).pptx
YashikaAsrani
 
SPDY @Zynga
SPDY @ZyngaSPDY @Zynga
SPDY @Zynga
Mike Belshe
 
Uber mobility - High Performance Networking
Uber mobility - High Performance NetworkingUber mobility - High Performance Networking
Uber mobility - High Performance Networking
Dhaval Patel
 
Networks Have Layers - Understanding The OSI Model
Networks Have Layers - Understanding The OSI ModelNetworks Have Layers - Understanding The OSI Model
Networks Have Layers - Understanding The OSI Model
Brandon Checketts
 
Hadoop Networking at Datasift
Hadoop Networking at DatasiftHadoop Networking at Datasift
Hadoop Networking at Datasifthuguk
 
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom PasekaInternet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom Paseka
MyNOG
 
SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0
Mike Belshe
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
GLC Networks
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
Queue Type on Mikrotik
Queue Type on MikrotikQueue Type on Mikrotik
Queue Type on Mikrotik
GLC Networks
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
GÉANT TURN pilot
GÉANT TURN pilotGÉANT TURN pilot
GÉANT TURN pilot
Mihály Mészáros
 
Network Statistics for OpenFlow
Network Statistics for OpenFlowNetwork Statistics for OpenFlow
Network Statistics for OpenFlow
Miro Cupak
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to Expert
Abhishek Sagar
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
GLC Networks
 
University of Delaware - Improving Web Protocols (early SPDY talk)
University of Delaware - Improving Web Protocols (early SPDY talk)University of Delaware - Improving Web Protocols (early SPDY talk)
University of Delaware - Improving Web Protocols (early SPDY talk)
Mike Belshe
 
MTCNA Intro to routerOS
MTCNA Intro to routerOSMTCNA Intro to routerOS
MTCNA Intro to routerOS
GLC Networks
 
Bits and bytes of networking
Bits and bytes of networkingBits and bytes of networking
Bits and bytes of networking
Deborah Akuoko
 
Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1
GLC Networks
 

Similar to Keeping the Internet Fast and Resilient for You and Your Customers (20)

Computer network (7)
Computer network (7)Computer network (7)
Computer network (7)
 
Unit 1 Introduction (1).pptx
Unit 1 Introduction (1).pptxUnit 1 Introduction (1).pptx
Unit 1 Introduction (1).pptx
 
SPDY @Zynga
SPDY @ZyngaSPDY @Zynga
SPDY @Zynga
 
Uber mobility - High Performance Networking
Uber mobility - High Performance NetworkingUber mobility - High Performance Networking
Uber mobility - High Performance Networking
 
Networks Have Layers - Understanding The OSI Model
Networks Have Layers - Understanding The OSI ModelNetworks Have Layers - Understanding The OSI Model
Networks Have Layers - Understanding The OSI Model
 
Hadoop Networking at Datasift
Hadoop Networking at DatasiftHadoop Networking at Datasift
Hadoop Networking at Datasift
 
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom PasekaInternet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom Paseka
 
SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
 
Queue Type on Mikrotik
Queue Type on MikrotikQueue Type on Mikrotik
Queue Type on Mikrotik
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
 
GÉANT TURN pilot
GÉANT TURN pilotGÉANT TURN pilot
GÉANT TURN pilot
 
Network Statistics for OpenFlow
Network Statistics for OpenFlowNetwork Statistics for OpenFlow
Network Statistics for OpenFlow
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to Expert
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
University of Delaware - Improving Web Protocols (early SPDY talk)
University of Delaware - Improving Web Protocols (early SPDY talk)University of Delaware - Improving Web Protocols (early SPDY talk)
University of Delaware - Improving Web Protocols (early SPDY talk)
 
MTCNA Intro to routerOS
MTCNA Intro to routerOSMTCNA Intro to routerOS
MTCNA Intro to routerOS
 
Bits and bytes of networking
Bits and bytes of networkingBits and bytes of networking
Bits and bytes of networking
 
Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1Automatic Backup via FTP - Part 1
Automatic Backup via FTP - Part 1
 

More from Cloudflare

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
Cloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Cloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
Cloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
Cloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Cloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Cloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
Cloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
Cloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 

More from Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Keeping the Internet Fast and Resilient for You and Your Customers

  • 1. Unreliable Internet Nick Wondra @ Cloudflare Martin J. Levy @ Cloudflare November 2017
  • 2. Todays agenda ● Introduction (Tim Fong) ○ Why does the Internet sometime “misbehave” when it comes to delivering applications? ○ What are some ways to solve this? ● Martin J. Levy (20 min) ○ The Internet and how it’s tied together ○ BGP and topology ○ Testing (example of tools and techniques) ● Nick Wondra (20 min) ○ Approaches to solve the problem ○ Examples of mechanisms in place ● Summary (5 min) ● Audience Q/A (10 min)
  • 3. The Internet and how it’s tied together Martin J. Levy
  • 4. The Internet ● Technically – a somewhat complex subject ○ The Internet is a collection of networks ○ No network stands alone (all interconnected) ○ Robustness can be created ○ Multi-homing (more than one transit/path) ○ Peering between “like” networks ○ Diversity (physical and logical) ○ Nothing is static! ● Internet was developed for something different ● Many types of data (and data layers) ● TCP/UDP vs FTP/HTTP/SMTP vs TLS vs XML/JSON
  • 5. The Internet - just how complex? (hint: very!) This is the representation of a single network (a medium sized telco) and its interconnections globally to various other backbone networks. A full diagram would have upwards of 60,000 independent networks depicted on a single diagram, which is hard to follow.
  • 6. Glueing the Internet together - BGP routing ● The IETF specified a protocol (BGP4) that can handle: ○ Massive routing tables ○ CIDR routing (ability to specify IP network address plus a network size) ○ IPv4 & IPv6 ○ Rules for routing internally within a network ○ Rules for routing to an external network ○ Much more! ● BGP in real-life is used by every network on the Internet ○ Every destination on the globe exists within the BGP global routing tables ○ Everything is public, visible, exposed, and recorded
  • 7. What works? What breaks? What’s the fix? ● There’s no steady state within the Internet ○ The path from A to Z is forever changing. Sometime for the better ○ The BGP routing protocol has to address many factors: ■ Physical interruptions (a fiber break) ■ Planned maintenance (upgrades to facilities or services) ■ Increases in capabilities - for example, a new undersea cable ■ Third party “hiccups” ○ Commercial agreements (and disagreements) ■ Purchasing from a different Internet service provider ■ Ending contracts and changing service providers ● What we do know is that it keeps our network engineers busy!
  • 8. The Internet - it keeps on growing A new undersea is laid between the African coast and the Seychelles island (replacing a satellite connection)
  • 9. The Internet - When it breaks, it breaks! This is an example of what happens each-and-every day all around the globe. The physical layer of the Internet is fragile. All those bright spray-painted lines you see on a street (before someone digs it up) is meant to stop this from happening. It doesn’t!
  • 10. Protocol stack - what’s above the physical layer ● Layers provide capabilities ○ Application - the end-users view ○ Transport - HTTP & TLS ○ Internet - IP and routing ○ Data link - that fiber in the ground ● Each layer has its possible failures Physical Data Link Network Transport Session Presentation Application OSI Network Model Data Link Internet Transport Application The TCP/IP Model
  • 11. Distance, Latency, Variable Paths, and more 150 msec 70 msec 230 msec 400 msec ● Speed of light ○ Very constant![1] ● Distance ~= Hops ○ Reliability decreases ● Variable paths ○ Redundancy .vs. ○ Non-deterministic ● Variable providers ○ Sometimes useful [1] https://www.quora.com/What-is-precisely-the-speed-of-light-in-fiber-optics
  • 12. Monitoring tools and more ● Beyond ping - or what’s really happening to your packets? [1] http://bgp.he.net/ [2] http://atlas.ripe.net/ [3] http://stat.ripe.net/
  • 13. Approaches to solve the problem Nick Wondra
  • 14. Change the model of the Internet? ● Address the content, not the server ○ Content centric networking, et al ○ Route requests based on content location ○ Content is decentralized, moves through the network ● Requires changes deep in the protocol stack ○ … but lots of investment built into current infrastructure
  • 15. Change the core Internet protocols? ● Can we build a better BGP? ○ Low-level distance and performance metrics may not translate to application performance ○ Many networks = many systems to change ● Can we build a better transport? ○ TCP and UDP deeply ingrained in end-user systems and network middleboxes (firewalls, LBs, WAN optimizers, etc)
  • 16. ● Evolve new solutions on top of existing frameworks ○ Solve for problems in the malleable network layers ○ Example: TLS 1.3 ■ More secure and faster (fewer RTTs) ○ Example: TCP+HTTP => UDP+QUIC ■ Speed: connection establishment, session multiplexing ■ Resilience: congestion control, forward error correction ■ Flexibility: connection migration ● The challenge is distribution ○ Clients and servers must opt-in Evolution, not revolution
  • 17. ● Cloudflare has Points of Presence (PoPs) across the globe ○ PoPs close to every Internet user and server ○ Transit/peering with multiple networks at every PoP ○ Proxies 10% of all web requests ● Global Internet performance and reliability monitoring ○ Real-time feedback as data traverses the network ○ Can “test” network paths that BGP wouldn’t use ○ Use performance metrics that matter to web applications (TTFB, response time) Value of a large global network
  • 18. Global footprint = path control ● Force routing paths by pinning to intermediate PoPs 150ms 200ms
  • 19. ● Evolution inside the network, transparent to client and server Global footprint = distribution channel TCP+HTTPTCP+HTTP UDP+QUIC
  • 20. Summary Nick Wondra & Martin J. Levy
  • 21. Summary, Questions, and Thank You! Martin J. Levy - Network Strategy @Cloudflare @mahtin Nick Wondra - Systems Engineer @Cloudflare @nickwondra
  • 23. Additional Reading (via Cloudflare blog) ● Argo & Warp: ○ https://blog.cloudflare.com/argo/ ○ https://blog.cloudflare.com/the-making-of-cloudflare-warp/ ● Railgun: ○ https://blog.cloudflare.com/cacheing-the-uncacheable-cloudflares-railgun- 73454/ ● Load Balancing: ○ https://blog.cloudflare.com/introducing-load-balancing-intelligent-failover-with- cloudflare/ ● TLS: ○ https://blog.cloudflare.com/introducing-tls-client-auth/

Editor's Notes

  1. NOTES: