* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 02-evolution2
TCP congestion control wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Network tap wikipedia , lookup
Computer security wikipedia , lookup
Computer network wikipedia , lookup
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Airborne Networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Distributed firewall wikipedia , lookup
Internet protocol suite wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Lecture 2 - Internet evolution (part 2) D.Sc. Arto Karila Helsinki Institute for Information Technology (HIIT) [email protected] 11.09.2012 M.Sc. Mark Ain Helsinki Institute for Information Technology (HIIT) [email protected] T-110.6120 – Special Course in Future Internet Technologies 1 Evolutionary approaches Architectural 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. DNS (~1982) EGP (precursor to BGP, ~1982) TCP congestion control (mid-late 1980’s) CIDR (~1993) NAT (early 1990’s) IPv6 (first RFC 1995, Internet standard 1998) IPSEC (1995) Mobile IP (~1996) MPLS (~1996) DiffServ / IntServ (~1998) HIP (~1999, first RFC 2006) BGPSec (mid 2000s) DNSSec (~2004, first deployed at root level ~2010) 11.09.2012 2 Network Address Translation (NAT) – 4 types Problem: address space exhaustion 11.09.2012 3 Network Address Translation (NAT) – 4 types 11.09.2012 4 Network Address Translation (NAT) – 4 types 11.09.2012 5 Network Address Translation (NAT) – 4 types NAT is ugly, breaks E2E… but it works. 11.09.2012 6 IPv6 Problem: address space exhaustion IPv6 was born in 1995 after long work There are over 30 IPv6-related RFCs The claimed improvements in IPv6 are: Large 128-bit address space Stateless address auto-configuration Multicast support Mandatory network layer security (IPSEC) Simplified header processing by routers Efficient mobility (no triangular routing) Extensibility (extension headers) Jumbo packets (up to 4 GB) 11.09.2012 7 IPv6 Major operating systems and many ISPs support IPv6 The use of IPv6 is slowly increasing in Europe and North America but more rapidly in Asia In China, CERNET 2 runs IPv6, interconnecting 25 points of presence in 20 cities with 2.5 and 10 Gbps links IPv6 really only solves the exhaustion of Internet address space 11.09.2012 8 IPv6 ? Planned Actual 11.09.2012 9 IPSec Problem: security IPSec is the IP-layer security solution of the Internet to be used with IPv4 and IPv6 Authentication Header (AH) only protects the integrity of an IP packet Encapsulating Security Payload (ESP) also ensures confidentiality of the data IPSec works within a Security Association (SA) set up between two IP addresses ISAKMP (Internet Security Association and Key Management Protocol) is a very complicated framework for SA mgmt 11.09.2012 10 Encapsulating Security Payload (IPv4) Original IPv4 Header Security Parameter Index (SPI) Sequence Number Coverage of Authentication ESP Header UDP/TCP Header Coverage of Confidentiality ESP Payload Data Padding Pad Len Next Hdr Authentication Data ESP Trailer 11.09.2012 11 Encapsulating Security Payload (IPv6) Original IPv6 Header Hop-by-Hop Extensions Security Parameter Index (SPI) Sequence Number Coverage of Authentication End-to-End Extensions UDP/TCP Header Coverage of Confidentiality ESP Header ESP Payload Data Padding Authentication Data ESP Trailer 11.09.2012 12 Mobile IPv4 Problem: mobility Basic concepts: Mobile Node (MN) Correspondent Node (CN) Home Agent (HA) Foreign Agent (FA) Care-of-Address (CoA) The following can be problematic: Firewalls and ingress filtering Triangular routing 11.09.2012 13 Mobility Example:Mobile IP Triangular Routing Ingress filtering causes problems for IPv4 (home address as source), IPv6 uses CoA so not a problem . Solutions: Correspondent (reverse tunnelling) or Host route optimization Foreign agent left out of MIPv6. No special support needed with IPv6 autoconfiguration DELAY! Foreign Agent Home Agent Care-of-Address (CoA) Mobile Host Source: Professor Sasu Tarkoma 11.09.2012 14 Ingress Filtering Packet from mobile host is deemed "topologically incorrect“ (as in source address spoofing) Correspondent Host Home Agent With ingress filtering, routers drop source addresses that are not consistent with the observed source of the packet Source: Professor Sasu Tarkoma 11.09.2012 15 Reverse Tunnelling Correspondent Host Firewalls and ingress filtering no longer a problem Two-way tunneling leads to overhead and increased congestion DELAY! Router Home Agent Mobile Host Care-of-Address (CoA) Source: Professor Sasu Tarkoma 11.09.2012 16 Mobile IPv6 Route Optimization CH sends packets using routing header Correspondent Host Secure tunnel (ESP) Home Agent First, a Return Routability test to CH. CH sends home test and CoA test packets. When MH receives both, It sends the BU with the Kbm key. Router MH sends a binding update to CH when it receives a tunnelled packet. Mobile Host Source: Professor Sasu Tarkoma 11.09.2012 17 Differences btw MIPv6 and MIPv4 In MIPv6 no FA is needed (no infrastructure change) Address auto-configuration helps in acquiring CoA MH uses CoA as the source address in foreign link, so no problems with ingress filtering Option headers and neighbor discovery of IPv6 protocol are used to perform mobility functions 128-bit IP addresses help deployment of mobile IP in large environments Route optimization is supported by header options Source: Professor Sasu Tarkoma 11.09.2012 18 Extension Headers CN to MN MN to CN MH Upper Layer headers Data Mobility Header MH Type in Mobility Header: Binding Update, Binding Ack, Binding Err, Binding refresh MN, HA, and CN for Binding Source: Chittaranjan Hota, Computer Networks II lecture 22.10.2007 11.09.2012 19 (G)MPLS Problems: scalable transport, QoS, resource usage, business incentives etc. (Generalized) Multi-Protocol Label Switching Layer 2.5 protocol High-performance transport of any layer 3 protocol over any layer 2 data link over any layer 1 medium Routing via short path labels (path switching) Layer 2 and layer 3 services (e.g. PtP and PtMP VPN) Routing implemented in hardware (i.e. switching); much faster than IP longest-prefix matching 11.09.2012 20 (G)MPLS 11.09.2012 21 QoS Problem: need better traffic control, satisfy business incentives, better services etc. 11.09.2012 22 DiffServ Differentiated Services (DiffServ, RFC 2474) redefines the ToS octet of the IPv4 packet or Traffic Class octet of IPv6 as DS Allows operators to control treatment of packets but does not guarantee any particular level of service or policy adherence across network boundaries. The first 6 bits of the DS field are used as Differentiated Services Code Point (DSCP) defining the Per-Hop Behavior of the packet DiffServ is stateless (like IP) and scales Service Profiles can be defined by ISP for customers and by transit providers for ISPs DiffServ is very easily deployable and could enable well working VoIP and real-time video Unfortunately, it is not used between operators 11.09.2012 23 IntServ Integrated Services Unlike DiffServ, IntServ reserves network resources and attempts to guarantee conditions of network flow end-to-end However, the process is complex, resource intensive, and requires supportive cooperating routers across all AS’s from source to sink. 11.09.2012 24 HIP Problems: mobility, security, multihoming, IPv4/IPv6 interoperation etc. Host Identity Protocol (HIP, RFC4423) defines a new global Internet name space The Host Identity name space decouples the name and locator roles, both of which are currently served by IP addresses The transport layer now operates on Host Identities instead of IP addresses The network layer uses IP addresses as pure locators (not as names or identifiers) 11.09.2012 25 HIP Architecture 11.09.2012 26 HIP HIs are self-certifying (public keys) HIP is a fairly simple technique based on IPSEC ESP and HITs (128-bit HI hashes) HIP is ready for large-scale deployment See http://infrahip.hiit.fi for more info 11.09.2012 27 Base exchange • Based on SIGMA family of key exchange protocols Select precomputed R1. Prevent DoS. Minimal state kept at responder! Does notstandard protect against replay Diffieattacks. authenticated Initiator solve puzzle Responder Hellman key exchange for session key generation I1 HIT , HIT or NULL R1 HIT , [HIT , puzzle, DH , HI ] I2 [HIT , HIT , solution, DH ,{HI }] R2 I R I R I R R R sig I I sig [HIT , HIT , authenticator] I R sig verify, authenticate, replay protection User data messages ESP protected TCP/UDP, no explicit HIP header 11.09.2012 28 HIP Mobility Mobility is easy – retaining the SA for ESP 11.09.2012 29 HIP in Combining IPv4 and IPv6 An early demo seen at L.M. Ericsson Finland (source: Petri Jokela, LMF) IPv4 access network WWW Proxy HIP CN Internet HIP MN IPv6 access network Music Server 11.09.2012 30 BGPSec and DNSSec Problem: security (within two critical architectural solutions) BGP Security Extensions: Authentication of inter-AS BGP data via Resource Public Key Infrastructure (RPKI) i.e. digital signatures Does NOT provide confidentiality or guaranteed availability Provides limited protection against certain misorigination attacks Not widely implemented 11.09.2012 31 BGPSec and DNSSec DNS Security Extensions: Authentication and integrity (of DNS query results) via digital signatures Does NOT provide confidentiality or guaranteed availability Protects against e.g. cache poisoning and other forgeries Not widely implemented 11.09.2012 32 Key limitations, solutions, underlying ossifications Limitation(s) Name-address translation Solution(s) DNS Key underlying ossification(s) Network vs. human-friendly naming dichotomy Scalability, routing inflexibility, combined addressing and transport TCP/IP, MPLS Endpoint-centrism Rigid core protocol stack Congestion TCP congestion control Lack of built-in protocol-independent QoS Rigid core protocol stack Traffic control BGP, IGPs + EGPs Endpoint-centrism Send-receive communication paradigm Address space exhaustion CIDR, NAT, DHCP etc. IPv4 Mobility, multihoming MIP, HIP Endpoint-centrism Rigid core protocol stack QoS Diffserv + Intserv Lack of built-in protocol-independent QoS Rigid core protocol stack Security Various (e.g. DNSSec, BGPSec, and many Endpoint-centrism Send-receive communication paradigm others!) Rigid core protocol stack 11.09.2012 33 Evolutionary approaches Application-level Scalable content delivery 1. 1. 2. 3. Security (confidentiality, anonymity, authentication etc.) 2. 1. 2. 3. 4. 5. 6. 7. 3. DHTs (~2001) P2P networks CDNs (e.g. Akamai) Asymmetric crypto (e.g. RSA ~1977 or ~1973, DH ~1976) PGP (~1991) SSL/TLS (mid-1990’s, late-1990’s) PKI (1990’s) VPNs E.g. PPTP (~1999) Wireless security e.g. WPA/WPA2/EAP (late 1990’s and beyond) Tor (mid 2000’s) Cloud computing 11.09.2012 34 Distributed Hash Table (DHT) Distributed Hash Table (DHT) is a service for storing and retrieving key-value pairs There is a large number of peer machines Single machines leaving or joining the network have little effect on its operation DHTs can be used to build e.g. databases (new DNS), or content delivery systems BitTorrent is using a DHT The real scalability of DHT is still unproven All of the participating hosts need to be trusted (at least to some extent) 11.09.2012 35 DHT The principle of Distribute Hash Table (source: Wikipedia) 11.09.2012 36 Overlay Routing In overlay routing the topology is formed over an underlying (usually IP) network DHTs are examples of overlay routing DHT techniques can be utilized e.g. in implementing non-hierarchical rendezvous An example of DHT-based solutions is the Content Addressable Network (CAN) CAN is based on a d-dimensional Cartesian space, each node having a coordinate zone that it is responsible for 27/1/2010 37 CAN A two-dimensional example 27/1/2010 38 Chord Ring Greedy forwarding (cmp w/ ROFL) 27/1/2010 39 Pastry DHT An example with hexadecimal identifiers 27/1/2010 40 P2P networks & CDNs Napster, Gnutella, BitTorrent (also utilizes DHT) etc. Akamai CDN 11.09.2012 41 Security Confidentiality, anonymity, authentication etc. 1. 2. 3. 4. 5. 6. 7. Asymmetric crypto (e.g. RSA ~1977 or ~1973, Diffie-Hellman ~1976) PGP (~1991) SSL/TLS (mid-1990’s, late-1990’s) PKI (1990’s) VPNs e.g. PPTP (~1999) Wireless security e.g. WPA/WPA2/EAP (late 1990’s and beyond) Tor (mid 2000’s) 11.09.2012 42 Cloud computing Computing resources are delivered via the network “x”aaS i.e. “x” as a service E.g. software, storage, processing etc. Goal is to achieve resourcefulness and efficiency via computing economies of scale Examples: Amazon, Apple, Google etc. 11.09.2012 43 For next week… READ (lecture 3): M. Handley. 2006. Why the Internet only just works. BT Technology Journal 24, 3 (July 2006), 119-129. DOI=10.1007/s10550-006-0084-z http://dx.doi.org/10.1007/s10550-006-0084-z READ (lecture 4): Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. 2009. Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09). ACM, New York, NY, USA, 1-12. DOI=10.1145/1658939.1658941 http://doi.acm.org/10.1145/1658939.1658941 11.09.2012 44 Thank you for your attention! Questions? Comments? 11.09.2012 45