some internet topics: horizontals, the ietf, and ipv6

35
www.internetsociety.org Some Internet Topics: Horizontals, the IETF, and IPv6 Olaf M. Kolkman Chief Internet Technology Officer [email protected]

Upload: internet-society

Post on 16-Jul-2015

92 views

Category:

Internet


0 download

TRANSCRIPT

www.internetsociety.org

Some Internet Topics: Horizontals, the IETF, and IPv6Olaf M. Kolkman Chief Internet Technology Officer [email protected]

Central Asia Internet Symposium - 10 December 2014

The Internet: Different Players at Different Layers

2

Central Asia Internet Symposium - 10 December 20143

Central Asia Internet Symposium - 10 December 2014

• Application Layer: Applications use IP for connectivity

• The Network Access Layer: Components in the Network Access Layer deliver IP connectivity

• The IP Layer: provides a coherent mapping between the layers

• (IP=Internet Protocol)

4

Central Asia Internet Symposium - 10 December 2014

Application Layer

• Applications are what the users care about

• Most people conceive the utility of the various applications as the Internet

• E-mail and WWW are just two applications, albeit successful ones

• Business, voice and face communication, entertainment such as videos and games

5

Central Asia Internet Symposium - 10 December 2014

Network Layer

• The layer that provides the IP to the customers

• The Internet is made up out of many independently operated networks that all provide some level of network access

• The network exchange IP packets between each other

6

Central Asia Internet Symposium - 10 December 2014

Network of Networks…

7

Serving different markets

Central Asia Internet Symposium - 10 December 2014

Highly competitive

A EUR80 fiber cross connect:

Internet Exchange traffic:

Backbone traffic Western Europe:

Transatlantic traffic, wholesale:

Internet Transit, wholesale:

Internet Transit, retail:

Broadband Internet, consumer:

National Ethernet service:

3G mobile data, national:

GSM voice call, national:

3G mobile data, roaming low:

3G mobile data, roaming high:

GSM voice call, roaming:

SMS Text Messages:

SMS Text Messages, roaming:

$0.01

$0.25*

$0.50

$1

$2

$15

$50

$180

$11,400

$483,840

$834,000

$3,127,500

$3,338,496

$210,000,000

$1,166,400,000

The Price of Bandwidth, in bulk, per Mbps

8

Commodity

Table courtesy of Remco van Mook, Equinix

Western Europe, early-mid 2011 (based on 10Gbps or 300GB)

Central Asia Internet Symposium - 10 December 2014

Inter net-working and working Internet

9

Voluntary

adoption of

technologybottom-up innovation

Different Players at Different Layers

Functional Interoperability

Collaboration where needed

Competition

where possible

Collaboration where needed

Central Asia Internet Symposium - 10 December 2014

The Internet and Standards

11

Central Asia Internet Symposium - 10 December 2014

How do Standards Play a Role?

12

Browsing The Web802.11 IEEE TCP/IP IETFURI IETF BGP IETFNAT Propriet HTTP IETFCSS W3C PNG IETFHTML W3C/ISO MPEG ISO/IECXML W3C ADSL ITU-T

Interoperability

Standardization

the Internet way

Details on:http://open-stand.org

Cooperation

Adherence to Principles

Collective Empowerment

Availability

Voluntary Adoption

driver for innovation

Borderless commerce

1. Cooperation Respectful cooperation between standards organizations, whereby each respects the autonomy, integrity, processes, and intellectual property rules of the others.

2. Adherence to Principles Adherence to the five fundamental principles of standards development:

• Due process. Decisions are made with equity and fairness among participants. No one party dominates or guides standards development. Standards processes are transparent and opportunities exist to appeal decisions. Processes for periodic standards review and updating are well defined.

• Broad consensus. Processes allow for all views to be considered and addressed, such that agreement can be found across a range of interests.

• Transparency. Standards organizations provide advance public notice of proposed standards development activities, the scope of work to be undertaken, and conditions for participation. Easily accessible records of decisions and the materials used in reaching those decisions are provided. Public comment periods are provided before final standards approval and adoption.

• Balance. Standards activities are not exclusively dominated by any particular person, company or interest group.• Openness. Standards processes are open to all interested and informed parties.

3. Collective Empowerment Commitment by affirming standards organizations and their participants to collective empowerment by striving for standards that:

• are chosen and defined based on technical merit, as judged by the contributed expertise of each participant;• provide global interoperability, scalability, stability, and resiliency;• enable global competition;• serve as building blocks for further innovation; and• contribute to the creation of global communities, benefiting humanity.

4. Availability Standards specifications are made accessible to all for implementation and deployment. Affirming standards organizations have defined procedures to develop specifications that can be implemented under fair terms. Given market diversity, fair terms may vary from royalty-free to fair, reasonable, and non-discriminatory terms (FRAND).

5. Voluntary Adoption Standards are voluntarily adopted and success is determined by the market.

Cooperation

Adherence to Principles

Collective Empowerment

Availability

Voluntary Adoption

Central Asia Internet Symposium - 10 December 2014

The IETF

15

The Internet Engineering Task Force isa loosely self-organized group of peoplewho contribute to the engineering andevolution of Internet technologies. It is the principal body engaged in the development of new Internet standardspecifications.

RFC4677

The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.

IETF Trust

IETF UniverseRFC Editor

IASAIAD IAOC

IESGArea Area Area Area Area Area

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

working

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

working

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

workinggroup

IETF Secretariat

INT

RTG

TSV

OPS

RAI

About Packets

About creating the paths for the packets

About managing the networks

About the use of the paths to provide the end-to-end experience

AboutReal Time Applications

APS About Application Protocols used on the Internet

SEC

About Security Protocols (cross area)

Central Asia Internet Symposium - 10 December 2014

IETF Technology and the Internet

20

Central Asia Internet Symposium - 10 December 201421

IPv6

Central Asia Internet Symposium - 10 December 2014

Original(artwork:((Ericson,(IETF91(Host(presenta:on(

IPv4(address(availability(

Poof(

22

Change: Global Growth of Connected Endpoints

Central Asia Internet Symposium - 10 December 201423

https://www.google.com/intl/en/ipv6/statistics.html#tab=ipv6-adoption

5% and growing faster than IPv4 Internet

Central Asia Internet Symposium - 10 December 201424

http://6lab.cisco.com/stats/

Central Asia Internet Symposium - 10 December 201425

Encryption

Central Asia Internet Symposium - 10 December 201426

Central Asia Internet Symposium - 10 December 201427

Changing Expectations: trust

User  trust  in  networks,  devices,  and  transac1ons  essen1al  in  driving  social  and  commercial  interac1on

Security,  Stability,  Confiden1ality,  Integrity,  Resiliency  and  Scalability  are  tools  to  achieve  trust  

Statistics, Web Traffic

• HTTPS increased 4% to 17% from 2008 to 2014, for all web traffic (Source: IIJ)

Pain Points and Hot Debates

• There is no single reason behind the increasing use of encryption, but the change has a real impact on the world

• Operator business models, technical solutions for various things, censorship will be harder (both good and bad kind), …

• All this will cause friction

• Motives of players are not fully aligned

Reality Check• “Everything is in the clear” approach is clearly unworkable

• Encryption will reduce the number of parties that see traffic

• But not eliminate them — content provider, browser vendor, CAs, proxy provider, corporate IT department, …

• World still moves ahead on a voluntary basis on what technology is chosen and on what technology a particular party can adopt

• Surveillance shifts, not eliminated

• Useful technical things done in different ways, not eliminated

• Some potential bad outcomes to avoid —- MITMs, regulation limiting security, fragmentation, device control, …

Central Asia Internet Symposium - 10 December 201431

BGPSIP

DNSSEC

PKIX

HTTPTLS

RTP

Central Asia Internet Symposium - 10 December 2014

Questions?

32

Central Asia Internet Symposium - 10 December 2014

Acknowledgement

• Network topology map from ‘The Opte Project’ • Various Hourglass models produced using the Open

Source Blender, ‘Klootindustries’ CC Atribution license • Jari Arkko for the slides on the use on encryption • Logos and Trademarks from the respective companies

33

Central Asia Internet Symposium - 10 December 201434

Central Asia Internet Symposium - 10 December 2014

Backup Slides

35