The World Trend of Next Generation Internet Technologies Shigeki Goto Waseda University 1 January 23, 2014 Institut Teknologi Bandung
Dec 25, 2015
The World Trend of Next Generation
Internet Technologies
Shigeki GotoWaseda University
1
January 23, 2014Institut Teknologi Bandung
How to understand new and old technologies?
• There is no royal road for learning.• There is no single principle for understanding
the Internet at present and in the future.
• Computer Science has started with a negative result by Alan Turing.There are certain functions which cannot be computed mechanically.
21912--1954
dualism1. Binary opposition
e.g. good/bad, mental/physical, sun/moon
2. State of two parts
3. Complementally, conflict
3
logicalphysical
List of dualism approach1. Wireless vs. Wired2. Circuit switch vs. Packet3. Centralized vs. Distributed4. Do-it-yourself vs. Cloud5. End-to-end vs. Hop-by-hop6. De jure vs. De facto7. Open vs. Trust8. Array vs. Tree9. Serial vs. parallel10. Synchronous vs. Asynchronous11. Fixed length vs. Variable length, and more 4
1. Wireless vs. Wired
• Wireless technology has been used for long distance communications.Marconi (1874—1937)
• Wire was first used to feed music program to healthy people at home.Butapest, Hungaly
• Now, we use fiber for backbone, wireless for local access.
5
6
Hybrid wireless network -- Cellular and WiFi --
Cellular
WLAN1
WLAN2
WLAN N
…Cellular
WLAN1WLAN2
…
WLAN N
Queuing model for multiple WiFi stations
© Masaki Fukushima
2. Circuit vs. Packet
• ARPAnet was born in UCLA , California.• Most professors were not willing to participate
in an ARPA project, because they know the technology.
• Computers were slow. They could not process the packets in a timely manner.
• One theorist, Prof Leonard Kleinrock, has accepted the invitation.
• ARPAnet is the initial stage of the Internet.7
Packet is the right selection?
• IP packet (or datagram) • Series of packets (or train)
A flow is a series of packets which shares the same source and destination IP addresses, port numbers, and the protocol indicator.
• Flow is used for measurement of routers.• Flow is also used as an object of flow control.
OpenFlow
9
Future Internet
10
Reduce Power Consumption (Dai Mochinaga, 2013)
•Packet switching needs 17.52 TWh/yr in 2030. (estimated)
•Hybrid approach by packet and optical circuit switch67.7% down (5.67 TWh/year in 2030)
•With CDN 22.2% down (13.6 TWh/year in 2030)
•Optical circuit for backbone network 48.4% down (9.04 TWh/year in 2030)
3. Centralized vs. Distributed• Background of ARPAnet
Vietnam WarThere is no single point of failure.The Internet is a typical example of distributed computing. Is it turue?
• Apparently it looks physically distributed.There is a certain logical center.E.g. DNS, domain names (tree structure)OpenFlow switch is welcomed by network operator because they can control switches remotely.
11SDN, Software Defined Network
12
“ ”
jp
ac
waseda
info
org…
goto
piano
arpa
ietf
www
in-addr
133
90
18
10
int
ip6
…
DNS is a distributed database with a single ultimate root
root
piano.goto.info.waseda.ac.jp
Logical root is unique in the
world.
4. Do-it-yourself vs. Cloud• Plain old public telephone service (POTS)
smart networkSwitching units can do everything.Phone sets are terminals.
• The Internetstupid networkPCs and smart phones perform most of jobs.Network is a pipe.
• Cloud computing (cloud)Depend on other people or systemsWe do not know who they are.Your application software is not yours. 14
New idea of application set fingerprint• Smart phones can be identified by
installed application set
15© Fukumoto, Waseda Univ.
16
How many fingerprints?
• Found several tens of thousands of fingerprints
• Variation is enough to identify smart phone units
1
10
100
1,000
1 10 100 1,000 10,000
Fre
quen
cy
Distinct Fingerprints
44,248fingerprin
ts
The result shows that the distribution has an extremely long tail and 92.2% of the smart phone users have a unique application set fingerprint.
Big Data
© Hu Yao
5. End-to-end vs. Hop-by-hop• TCP is based on end-to-end principle.
IP addresses indicate source and destination.Ethernet (MAC) controls link by link.
• ICN/CCN/NDN takes hop-by-hop approach.PURSUIT in Europe has end-to-end functions.
• Logical or virtual level attracts our interests.It is also meaningful to understand the physical layer which is the basis of our communications.
17
18
Architecture of CCN routers
Source node
Destination node
Router
Routing table Packet
(address)
IP-based network
address outgoing link
FIB Pendin
g Interest Table
CCN (Content-Centric Networking)
Interest(data name)
Data
DataConsumer
DataSource
CCN Router
Content Store
name cached data
name incoming link
name outgoing link
Like URLFuture
Internet
© Masaki Fukushima
19
Content-Centric Network (CCN)
Content-Centric Network (CCN): trustworthy information dissemination and retrievalwith cache memories/storages
CCN is one prospective approach for designing future network.
© Hu Yao
20
Content-Centric Network (CCN)• Two basic data structures
– Interest– Data
• Content Store (CS)– to cache Data packets
• Pending Interest Table (PIT)– to store pending Interest requests
• Forwarding Information Base (FIB)– to store forwarding rules
An excellent design of FIB is essential both for Interest and Data packets transfer in CCN.
ConsumerConsumer ProviderProvider
Face 0 Face 1
Face 2
Interest
CCN node
Data
FIB
PIT
CSCS
Data
Interest
© Hu Yao
6. De jure vs. De facto• IETF is a Standardizing body for the Internet
A typical example of de facto standardIt is also called forum standard.
• Slogan of IETFrough consensus and running codeIt is not necessary to get a majority of votes.
• Standard Document RFC (Request for Comments)It is sometimes neglected( initial value of TTL)There published a poem of a meeting. 22
Japanese students worked hard.
Many stories behind the scene of Internationalized Domain Names (IDN)Published in 2006. 23
7. Open vs. Trust• Commercial Internet is allowed for CIX, Commercial
Internet Exchange in 1990. (January, 1991)• It was a failure that the Internet was
commercialized as was.• There was no anonymous users in old ARPAnet.
ARPAnet directory has been published until 1983.(D)ARPA was not happy with free terminals at a landing of a staircase at Stanford University.
• EncryptionAuthentication
24
25
1. User attempts to access Shibboleth-protected resource on SP site application server.2, 3, 4. User is redirected to a Where Are You From (WAYF) server, where the user indicates their
home site (IdP).5. User is redirected to the Handle Service at their IdP.6, 7 User authenticates at their IdP, using local credentials.8. Handle service generates unique ID (Handle) and redirects user to Service Provider site's
Assertion Consumer Service (ACS). ACS validates the supplied assertion, creates a session, and transfers to Attribute Requestor (AR).
9, 10. AR uses the Handle to request attributes from the IdP site's Attribute Authority. The attribute authority responds with an attribute assertion subject to attribute release policies; SP site uses attributes for access control and other application-level decisions.
SPIdP ユーザAuthentication in Internet2Shibboleth
No private informationOnly the attributes are needed
Gaku-nin in Japan
8. Array vs. List (Tree)• Most programming languages have data types:
Array, Matrix, Vector, Table• Preferable language in Artificial Intelligence
List ( Symbolic Programming Language: LISP)• LISP can handle with variable structures:
UNIX files and directories, Domain Names, Decision Tree
26
Tree