World IPv6 Day @ Microsoft Christopher Palmer and Dave Thaler – Windows Networking IETF 81 1.
Some Internet Topics: Horizontals, the IETF, and IPv6
-
Upload
internet-society -
Category
Internet
-
view
92 -
download
0
Transcript of Some Internet Topics: Horizontals, the IETF, and IPv6
www.internetsociety.org
Some Internet Topics: Horizontals, the IETF, and IPv6Olaf M. Kolkman Chief Internet Technology Officer [email protected]
Central Asia Internet Symposium - 10 December 2014
The Internet: Different Players at Different Layers
2
Central Asia Internet Symposium - 10 December 2014
• Application Layer: Applications use IP for connectivity
• The Network Access Layer: Components in the Network Access Layer deliver IP connectivity
• The IP Layer: provides a coherent mapping between the layers
• (IP=Internet Protocol)
4
Central Asia Internet Symposium - 10 December 2014
Application Layer
• Applications are what the users care about
• Most people conceive the utility of the various applications as the Internet
• E-mail and WWW are just two applications, albeit successful ones
• Business, voice and face communication, entertainment such as videos and games
5
Central Asia Internet Symposium - 10 December 2014
Network Layer
• The layer that provides the IP to the customers
• The Internet is made up out of many independently operated networks that all provide some level of network access
• The network exchange IP packets between each other
6
Central Asia Internet Symposium - 10 December 2014
Highly competitive
A EUR80 fiber cross connect:
Internet Exchange traffic:
Backbone traffic Western Europe:
Transatlantic traffic, wholesale:
Internet Transit, wholesale:
Internet Transit, retail:
Broadband Internet, consumer:
National Ethernet service:
3G mobile data, national:
GSM voice call, national:
3G mobile data, roaming low:
3G mobile data, roaming high:
GSM voice call, roaming:
SMS Text Messages:
SMS Text Messages, roaming:
$0.01
$0.25*
$0.50
$1
$2
$15
$50
$180
$11,400
$483,840
$834,000
$3,127,500
$3,338,496
$210,000,000
$1,166,400,000
The Price of Bandwidth, in bulk, per Mbps
8
Commodity
Table courtesy of Remco van Mook, Equinix
Western Europe, early-mid 2011 (based on 10Gbps or 300GB)
Central Asia Internet Symposium - 10 December 2014
Inter net-working and working Internet
9
Voluntary
adoption of
technologybottom-up innovation
Different Players at Different Layers
Functional Interoperability
Collaboration where needed
Competition
where possible
Central Asia Internet Symposium - 10 December 2014
How do Standards Play a Role?
12
Browsing The Web802.11 IEEE TCP/IP IETFURI IETF BGP IETFNAT Propriet HTTP IETFCSS W3C PNG IETFHTML W3C/ISO MPEG ISO/IECXML W3C ADSL ITU-T
Interoperability
Standardization
the Internet way
Details on:http://open-stand.org
Cooperation
Adherence to Principles
Collective Empowerment
Availability
Voluntary Adoption
driver for innovation
Borderless commerce
1. Cooperation Respectful cooperation between standards organizations, whereby each respects the autonomy, integrity, processes, and intellectual property rules of the others.
2. Adherence to Principles Adherence to the five fundamental principles of standards development:
• Due process. Decisions are made with equity and fairness among participants. No one party dominates or guides standards development. Standards processes are transparent and opportunities exist to appeal decisions. Processes for periodic standards review and updating are well defined.
• Broad consensus. Processes allow for all views to be considered and addressed, such that agreement can be found across a range of interests.
• Transparency. Standards organizations provide advance public notice of proposed standards development activities, the scope of work to be undertaken, and conditions for participation. Easily accessible records of decisions and the materials used in reaching those decisions are provided. Public comment periods are provided before final standards approval and adoption.
• Balance. Standards activities are not exclusively dominated by any particular person, company or interest group.• Openness. Standards processes are open to all interested and informed parties.
3. Collective Empowerment Commitment by affirming standards organizations and their participants to collective empowerment by striving for standards that:
• are chosen and defined based on technical merit, as judged by the contributed expertise of each participant;• provide global interoperability, scalability, stability, and resiliency;• enable global competition;• serve as building blocks for further innovation; and• contribute to the creation of global communities, benefiting humanity.
4. Availability Standards specifications are made accessible to all for implementation and deployment. Affirming standards organizations have defined procedures to develop specifications that can be implemented under fair terms. Given market diversity, fair terms may vary from royalty-free to fair, reasonable, and non-discriminatory terms (FRAND).
5. Voluntary Adoption Standards are voluntarily adopted and success is determined by the market.
Cooperation
Adherence to Principles
Collective Empowerment
Availability
Voluntary Adoption
The Internet Engineering Task Force isa loosely self-organized group of peoplewho contribute to the engineering andevolution of Internet technologies. It is the principal body engaged in the development of new Internet standardspecifications.
RFC4677
The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.
IETF Trust
IETF UniverseRFC Editor
IASAIAD IAOC
IESGArea Area Area Area Area Area
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
working
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
working
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
workinggroup
IETF Secretariat
INT
RTG
TSV
OPS
RAI
About Packets
About creating the paths for the packets
About managing the networks
About the use of the paths to provide the end-to-end experience
AboutReal Time Applications
APS About Application Protocols used on the Internet
SEC
About Security Protocols (cross area)
Central Asia Internet Symposium - 10 December 2014
Original(artwork:((Ericson,(IETF91(Host(presenta:on(
IPv4(address(availability(
Poof(
22
Change: Global Growth of Connected Endpoints
Central Asia Internet Symposium - 10 December 201423
https://www.google.com/intl/en/ipv6/statistics.html#tab=ipv6-adoption
5% and growing faster than IPv4 Internet
Central Asia Internet Symposium - 10 December 201427
Changing Expectations: trust
User trust in networks, devices, and transac1ons essen1al in driving social and commercial interac1on
Security, Stability, Confiden1ality, Integrity, Resiliency and Scalability are tools to achieve trust
Statistics, Web Traffic
• HTTPS increased 4% to 17% from 2008 to 2014, for all web traffic (Source: IIJ)
Pain Points and Hot Debates
• There is no single reason behind the increasing use of encryption, but the change has a real impact on the world
• Operator business models, technical solutions for various things, censorship will be harder (both good and bad kind), …
• All this will cause friction
• Motives of players are not fully aligned
Reality Check• “Everything is in the clear” approach is clearly unworkable
• Encryption will reduce the number of parties that see traffic
• But not eliminate them — content provider, browser vendor, CAs, proxy provider, corporate IT department, …
• World still moves ahead on a voluntary basis on what technology is chosen and on what technology a particular party can adopt
• Surveillance shifts, not eliminated
• Useful technical things done in different ways, not eliminated
• Some potential bad outcomes to avoid —- MITMs, regulation limiting security, fragmentation, device control, …
Central Asia Internet Symposium - 10 December 2014
Acknowledgement
• Network topology map from ‘The Opte Project’ • Various Hourglass models produced using the Open
Source Blender, ‘Klootindustries’ CC Atribution license • Jari Arkko for the slides on the use on encryption • Logos and Trademarks from the respective companies
33