SlideShare a Scribd company logo
1 of 18
Download to read offline
Future of the Internet
Open Research Topics

2009.11.16




Dr. Eric W. Burger
SVP and CTO / Neustar, Inc.
Chairman of the Board of Directors / SIP Forum
Member of the Board of Trustees / Internet Society
Chair-elect (2010) Committee on Communications
  Policy / IEEE-USA

1                                © 2009, Neustar Inc.
2009.11.16


 Evolution of Importance of the Internet
 The Internet is No Longer a Toy




Research → Entertainment   → B2C → B2B →           Critical Infrastructure

          Infrastructure Reliability & Security and
              Support of Complex Applications

 2                          © 2009, Neustar Inc.
2009.11.16




Where Do Applications Come From?




3              © 2009, Neustar Inc.
2009.11.16




What is a Good Internet Application?




• Sometimes you need complexity
• Sometimes you sell complexity
• Usually, simplicity rules

4                        © 2009, Neustar Inc.
2009.11.16




Future Internet Scenarios




5                © 2009, Neustar Inc.
2009.11.16




Research at Neustar




      6           © 2009, Neustar Inc.
2009.11.16




What is the Internet?

    The Internet is Mobile                          Implications
                                       •  Device is mobile
                                       •  Device is first a phone
                                       •  Phone identifies owner
                                       •  Content adaptation and low-power
                                          consumption factors in design




7                            © 2009, Neustar Inc.
2009.11.16




Identity
• Cryptographic identity management
    »  Classic   Computer Science problems
• Human factors and identity
    »  How  do people want to refer to each other?
    »  Usernames
    »  National identity strings
    »  Telephone number (mobile)

• Separating identity and location from IP Address
    »  IETF   HIP, LISP



8                             © 2009, Neustar Inc.
2009.11.16




Peer-to-Peer
• Optimizing user experience and operator expenses
• P2P applications need to know network topology
• Operators know network topology
• P2P applications and operators do not trust each
  other
• How to share information?
    »  IETF ALTO   work group




9                               © 2009, Neustar Inc.
2009.11.16




Network as Critical Infrastructure
• Securing the DNS
     »  DNSSEC,    others
• Securing BGP
     »  RPKI,   others
• Identifying new architectures for Internet
  infrastructure
     »  Meet critical infrastructure requirements
     »  Keep end-to-end, innovation-driving aspects of Internet




10                            © 2009, Neustar Inc.
2009.11.16




Internet of Things
• Movement to connect everything
     »  Homes   and content
     »  Enterprises and content
     »  People

• Sophistication of node
     »  Highperformance computer
     »  RFID tag on commodity

• Connection to network
     »  Direct – wired
     »  Direct – wireless
     »  Gateway

11                            © 2009, Neustar Inc.
2009.11.16




Internet of Things: Scale
• Millions (today) to thousand millions (near future)
• Impacts
     »  Addressing  infrastructure
     »  Naming infrastructure
     »  Routing infrastructure

• Capability of nodes far less than current nodes
     »  Power  – impacts CPU and networking
     »  Size – impacts interconnect and circuit complexity
     »  Intermittent activity – may not always be on

• Research Questions

12                              © 2009, Neustar Inc.
2009.11.16




Internet of Things: Privacy and Control
• Exposing in-home usage can expose user’s habits
• Safety and security impacts: stalking via location
  exposure
• Need to collect, use, process data; at same time
  need to protect, hide, control data
     »  Policy   enforcement
• I want to remotely turn on my light
• I do not want you to remotely turn off my light
• Electric car catastrophe in the making
• Research Questions

13                             © 2009, Neustar Inc.
2009.11.16




Internet of Things: Critical Infrastructure
• Smart Grid initiatives in Northern Europe, Middle East,
  South America, Asia, North America
• Network becomes national security domain
• Only true security is physical security
• But, most of the ultimate value of Smart Grid is
  interconnection to the Internet
     »  User self-monitoring
     »  User control
     »  Future, end-to-end applications not envisioned

• Impossible to keep separate: large enterprises will
  connect explicitly or implicitly
• Research Questions
14                              © 2009, Neustar Inc.
2009.11.16




Internet of Things: Signaling
• Need ubiquitous protocol for messaging, session
  establishment, control
     »  Works  across all network media
     »  Interoperates across different networks
     »  Has policy, security, privacy capabilities
     »  Small enough profile to run in embedded devices

• A leading option is SIP




15                           © 2009, Neustar Inc.
2009.11.16




SIP for Smart Grid
• Has all of the interoperability properties
     »  Remote   control of devices
       −  Stahl, 2001 – demonstration of SIP light bulb
       −  Burger, 2006 – demonstration and theory for any network
          interoperability

• Policy, security, and privacy
     »  Extantin protocol
     »  Not well adopted in today’s applications

• But, SIP is considered a very heavy protocol



16                                © 2009, Neustar Inc.
2009.11.16




SIP for PSTN versus SIP
• SIP envisioned as a small protocol to establish
  sessions using the Internet model
     »  End-to-end  principal
     »  Recognizing need for policy enforcement, location
        services, and impaired (NAT) networks: Proxy Element
• SIP “lost its way” when adopted as the protocol for
  next generation telephony signaling
     »  Specification  of 200 pages in 1999 is now well over 5,000
     »  Almost all of that is extensions
     »  Base protocol relevant for many uses other than
        telephony

17                            © 2009, Neustar Inc.
2009.11.16




Summary
• Evolution of Internet: we depend on it
• Neustar Internet research: how to make Internet
  dependable
• Internet of things: ripe area for research
• SIP and the Internet of things
• Future delivery of the Internet and governance
     »  You will be a user of the Internet
     »  You may be creating the new Internet
     »  You may be creating new uses for the Internet
     »  You may govern the Internet

• Keeping the Internet safe, secure, and available and at the
  same time keeping what made it the most important 20th
  century technology: the end-to-end principal
18                                 © 2009, Neustar Inc.

More Related Content

What's hot

Tech dev cssfounder.com
Tech dev cssfounder.comTech dev cssfounder.com
Tech dev cssfounder.comCss Founder
 
Hélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web ExperiencesHélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web ExperiencesAIC_UCD
 
VillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialogVillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialogDon Onwunumah
 
Cisco mortensen
Cisco mortensenCisco mortensen
Cisco mortensenCIRB_CIBG
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTINGHABEEB2193
 
Technology Development & Its Impacts
Technology Development & Its ImpactsTechnology Development & Its Impacts
Technology Development & Its ImpactsNARAYANANPACKIAM1
 
How to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of HeliumHow to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of HeliumProduct School
 
Hessen am is activity 5
Hessen am is activity 5Hessen am is activity 5
Hessen am is activity 5Hessen Am-is
 
Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Josef Noll
 
Trends in communication technology
Trends in communication technology Trends in communication technology
Trends in communication technology awe8some
 

What's hot (19)

Tech dev cssfounder.com
Tech dev cssfounder.comTech dev cssfounder.com
Tech dev cssfounder.com
 
Hélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web ExperiencesHélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web Experiences
 
5 g technology
5 g technology5 g technology
5 g technology
 
VillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialogVillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialog
 
Cisco mortensen
Cisco mortensenCisco mortensen
Cisco mortensen
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Technology Development & Its Impacts
Technology Development & Its ImpactsTechnology Development & Its Impacts
Technology Development & Its Impacts
 
How to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of HeliumHow to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of Helium
 
Hessen am is activity 5
Hessen am is activity 5Hessen am is activity 5
Hessen am is activity 5
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...
 
Trends in communication technology
Trends in communication technology Trends in communication technology
Trends in communication technology
 
Li-Fi Technology
Li-Fi Technology Li-Fi Technology
Li-Fi Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing Introduction
 
Pom ppt munira
Pom ppt  muniraPom ppt  munira
Pom ppt munira
 
Technologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukarTechnologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukar
 

Similar to The Future of the Internet: Open Research Topics

Mondial Telecom Cherry at Mobile Monday Brussels-
Mondial Telecom    Cherry at Mobile Monday Brussels-   Mondial Telecom    Cherry at Mobile Monday Brussels-
Mondial Telecom Cherry at Mobile Monday Brussels- Mobile Monday Brussels
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" John Loughney
 
Evolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future ServicesEvolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future Serviceswirelessmoves
 
Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008Roland Tritsch
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123ARCFIRE ICT
 
Sws lecture13
Sws lecture13Sws lecture13
Sws lecture13sundarnu
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2ifrieshe
 
Browser wars - the desktop strikes back
Browser wars - the desktop strikes backBrowser wars - the desktop strikes back
Browser wars - the desktop strikes backGlobal Micro Solutions
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Vishal Sharma, Ph.D.
 
Lost layer talk 2014
Lost layer talk 2014Lost layer talk 2014
Lost layer talk 2014ICT PRISTINE
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Lemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip SmetLemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip SmetFilip Smet
 
His.internet.50
His.internet.50His.internet.50
His.internet.50myrajendra
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Thingszdshelby
 

Similar to The Future of the Internet: Open Research Topics (20)

Mondial Telecom Cherry at Mobile Monday Brussels-
Mondial Telecom    Cherry at Mobile Monday Brussels-   Mondial Telecom    Cherry at Mobile Monday Brussels-
Mondial Telecom Cherry at Mobile Monday Brussels-
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
 
Evolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future ServicesEvolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future Services
 
Technology update
Technology updateTechnology update
Technology update
 
Technology update
Technology updateTechnology update
Technology update
 
Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123
 
Ch09
Ch09Ch09
Ch09
 
Sws lecture13
Sws lecture13Sws lecture13
Sws lecture13
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Browser wars - the desktop strikes back
Browser wars - the desktop strikes backBrowser wars - the desktop strikes back
Browser wars - the desktop strikes back
 
Mobile security
Mobile securityMobile security
Mobile security
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Lost layer talk 2014
Lost layer talk 2014Lost layer talk 2014
Lost layer talk 2014
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Lecture-1.pptx
Lecture-1.pptxLecture-1.pptx
Lecture-1.pptx
 
Lemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip SmetLemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip Smet
 
His.internet.50
His.internet.50His.internet.50
His.internet.50
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Things
 
Chap006
Chap006Chap006
Chap006
 

More from Neustar, Inc.

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler InsightsNeustar, Inc.
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceNeustar, Inc.
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsNeustar, Inc.
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeNeustar, Inc.
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra ExperienceNeustar, Inc.
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..Neustar, Inc.
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedNeustar, Inc.
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 

More from Neustar, Inc. (11)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

The Future of the Internet: Open Research Topics

  • 1. Future of the Internet Open Research Topics 2009.11.16 Dr. Eric W. Burger SVP and CTO / Neustar, Inc. Chairman of the Board of Directors / SIP Forum Member of the Board of Trustees / Internet Society Chair-elect (2010) Committee on Communications Policy / IEEE-USA 1 © 2009, Neustar Inc.
  • 2. 2009.11.16 Evolution of Importance of the Internet The Internet is No Longer a Toy Research → Entertainment → B2C → B2B → Critical Infrastructure Infrastructure Reliability & Security and Support of Complex Applications 2 © 2009, Neustar Inc.
  • 3. 2009.11.16 Where Do Applications Come From? 3 © 2009, Neustar Inc.
  • 4. 2009.11.16 What is a Good Internet Application? • Sometimes you need complexity • Sometimes you sell complexity • Usually, simplicity rules 4 © 2009, Neustar Inc.
  • 6. 2009.11.16 Research at Neustar 6 © 2009, Neustar Inc.
  • 7. 2009.11.16 What is the Internet? The Internet is Mobile Implications •  Device is mobile •  Device is first a phone •  Phone identifies owner •  Content adaptation and low-power consumption factors in design 7 © 2009, Neustar Inc.
  • 8. 2009.11.16 Identity • Cryptographic identity management »  Classic Computer Science problems • Human factors and identity »  How do people want to refer to each other? »  Usernames »  National identity strings »  Telephone number (mobile) • Separating identity and location from IP Address »  IETF HIP, LISP 8 © 2009, Neustar Inc.
  • 9. 2009.11.16 Peer-to-Peer • Optimizing user experience and operator expenses • P2P applications need to know network topology • Operators know network topology • P2P applications and operators do not trust each other • How to share information? »  IETF ALTO work group 9 © 2009, Neustar Inc.
  • 10. 2009.11.16 Network as Critical Infrastructure • Securing the DNS »  DNSSEC, others • Securing BGP »  RPKI, others • Identifying new architectures for Internet infrastructure »  Meet critical infrastructure requirements »  Keep end-to-end, innovation-driving aspects of Internet 10 © 2009, Neustar Inc.
  • 11. 2009.11.16 Internet of Things • Movement to connect everything »  Homes and content »  Enterprises and content »  People • Sophistication of node »  Highperformance computer »  RFID tag on commodity • Connection to network »  Direct – wired »  Direct – wireless »  Gateway 11 © 2009, Neustar Inc.
  • 12. 2009.11.16 Internet of Things: Scale • Millions (today) to thousand millions (near future) • Impacts »  Addressing infrastructure »  Naming infrastructure »  Routing infrastructure • Capability of nodes far less than current nodes »  Power – impacts CPU and networking »  Size – impacts interconnect and circuit complexity »  Intermittent activity – may not always be on • Research Questions 12 © 2009, Neustar Inc.
  • 13. 2009.11.16 Internet of Things: Privacy and Control • Exposing in-home usage can expose user’s habits • Safety and security impacts: stalking via location exposure • Need to collect, use, process data; at same time need to protect, hide, control data »  Policy enforcement • I want to remotely turn on my light • I do not want you to remotely turn off my light • Electric car catastrophe in the making • Research Questions 13 © 2009, Neustar Inc.
  • 14. 2009.11.16 Internet of Things: Critical Infrastructure • Smart Grid initiatives in Northern Europe, Middle East, South America, Asia, North America • Network becomes national security domain • Only true security is physical security • But, most of the ultimate value of Smart Grid is interconnection to the Internet »  User self-monitoring »  User control »  Future, end-to-end applications not envisioned • Impossible to keep separate: large enterprises will connect explicitly or implicitly • Research Questions 14 © 2009, Neustar Inc.
  • 15. 2009.11.16 Internet of Things: Signaling • Need ubiquitous protocol for messaging, session establishment, control »  Works across all network media »  Interoperates across different networks »  Has policy, security, privacy capabilities »  Small enough profile to run in embedded devices • A leading option is SIP 15 © 2009, Neustar Inc.
  • 16. 2009.11.16 SIP for Smart Grid • Has all of the interoperability properties »  Remote control of devices −  Stahl, 2001 – demonstration of SIP light bulb −  Burger, 2006 – demonstration and theory for any network interoperability • Policy, security, and privacy »  Extantin protocol »  Not well adopted in today’s applications • But, SIP is considered a very heavy protocol 16 © 2009, Neustar Inc.
  • 17. 2009.11.16 SIP for PSTN versus SIP • SIP envisioned as a small protocol to establish sessions using the Internet model »  End-to-end principal »  Recognizing need for policy enforcement, location services, and impaired (NAT) networks: Proxy Element • SIP “lost its way” when adopted as the protocol for next generation telephony signaling »  Specification of 200 pages in 1999 is now well over 5,000 »  Almost all of that is extensions »  Base protocol relevant for many uses other than telephony 17 © 2009, Neustar Inc.
  • 18. 2009.11.16 Summary • Evolution of Internet: we depend on it • Neustar Internet research: how to make Internet dependable • Internet of things: ripe area for research • SIP and the Internet of things • Future delivery of the Internet and governance »  You will be a user of the Internet »  You may be creating the new Internet »  You may be creating new uses for the Internet »  You may govern the Internet • Keeping the Internet safe, secure, and available and at the same time keeping what made it the most important 20th century technology: the end-to-end principal 18 © 2009, Neustar Inc.