Future Internet Architectures
#1

[attachment=10480]
Summary of the paper
Blumenthal, M. S. and Clark, D. D. 2001. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world. In Communications Policy in Transition: the internet and Beyond Mit Press Telecommunications Policy Research Conference Series. MIT Press, Cambridge, MA, 91-139.
Where we are ?
• The end to end arguments are not offered as an absolute.
• There are functions that can only be implemented in the core of the network even if the end to end arguments state that one should resist this approach if possible,
– issues of efficiency and performance may motivate core located features.
• Features that enhance popular applications can be added to the core of the network in such a way that they do not prevent other applications from functioning.
• The bias toward movement of function “up” from the core and “out” to the edge node has served very well as a central Internet design principle,
– the functions implemented “in” the Internet—by the routers that forward packets—have remained rather simple and general. The bulk of the functions that implement specific applications, have been implemented in software on the computers attached to the “edge” of the Net.
Moving Away from End-to-End
• The core of the network provides a very general data transfer service, which is used by all the different applications running over it.
• Over the last few years, a number of new requirements have emerged for the Internet and its applications:
– Operation in an untrustworthy,
– More demanding applications,
– ISP service differentiation,
– The rise of third-party involvement,
– Less sophisticated users.
• No one of these trends is by itself powerful enough to transform the Internet from an end to end network to a network with centralized function, the fact that they all might motivate a shift in the same direction could herald a significant overall change in the shape of the Net.
• Conventional understanding of the “Internet philosophy”:
– freedom of action,
– user empowerment,
– end-user responsibility for actions undertaken, and
– lack of controls “in” the Net that limit or regulate what users can do.
• The end to end arguments fostered that philosophy because they enabled the freedom to innovate, install new software at will, and run applications of the user’s choice.
• End-to-end presuppose relationships
– between communicating parties at the ends,
– between parties at the ends and the providers of their network/Internet service, and
– of either end-users or ISPs with a range of third parties that might take an interest in either of the first two types of relationship.
• Preservation of the end-to-end arguments’ implications
– If, in a given jurisdiction, there are political or managerial goals to be met,
– meeting them should be supported by technology and policies at higher levels of the system of network-based technology,
– not by mechanisms “in” the network.
Examples of Requirements in Today’s Communication
• New requirements for controls and protections in today’s communication:
– Users communicate but don’t trust,
– Users communicate but desire anonymity,
– End-parties distrust their software and hardware,
– The ends vs. the middle: Third-party rights,
– One party forces interaction on another,
– Multiway communication.
• We need set of principles that interoperate with each other:
– some built on the end-to-end model,
– some on a new model of network-centered function.
• When evolving the set of principles, it is important to remember that:
– the end to end arguments revolved around requirements that could be implemented correctly at the end-points,
– if implementation inside the network is the only way to accomplish the requirement, then an end to end argument isn't appropriate in the first place.
• Technical responses
• The different forms of the end to end arguments.
• Modify the end-node.
• Adding functions to the core
– Firewalls, Traffic filters, Network address translation elements: (NAT boxes).
• Design Issues: Adding mechanisms to the core
– Imposing a Control Element,
– Revealing or Hiding the Content.
– Labels on information.
• Design of applications: The end-to-end argument at a higher level
– Anonymizing message forwarders,
– Helpful content filtering,
– Content caches.
– More complex application parties
– Public-Key Certificates.
Conclusions
• Efforts to put more functions inside the network jeopardize generality and flexibility as well as historic patterns of innovation. A new principle is that elements that implement invisible or hostile functions to the end-to-end application have to be “in” the network.
• The original Internet user was technical and benefited from the flexibility and empowerment of the end to end approach, today’s consumer approaches the Internet and systems like other consumer electronics and services.
• Low prices and ease of use are becoming more important than ever, suggesting growing appeal of bundled and managed offerings over do it yourself technology. Less work by consumers may imply less control over what they can do on the Internet and who can observe what they do.
• Of all the changes that are transforming the Internet, the loss of trust may be the most fundamental. Trust issues arise at multiple layers:
– within Internet-access (e.g., browser) and application software (some of which may trigger Internet access),
– Within activities that access content or effect transactions out at remote sites,
– within communications of various kinds with strangers, and
– within the context of access networks.
• Growth in societal use and dependence on the Internet:
– induces calls for accountability,
– creating pressures to constrain what can happen at end-points or to track behavior, potentially from within the network.
More complex application requirements are leading to the design of applications that depend on trusted third parties to mediate between end users.
• Perhaps the most insidious threat to the end to end arguments, and thus to flexibility, is that commercial investment will go elsewhere, in support of short-term opportunities better met by solutions that are not end to end, but based on application-specific servers and services “inside” the network.
• In time some new network will appear, perhaps as an overlay on the Internet, which attempts to re-introduce a context for unfettered innovation.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: future of the internet seminar topics, arguments for keeping, future of internet full seminar report, future of the internet, future of internet seminar report, future of the internet paper presentation seminar, how to motivate the,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  money pad the future wallet electronics seminars 15 13,875 22-10-2016, 10:34 AM
Last Post: jaseela123d
Star Internet Telephony Policy in INDIA Computer Science Clay 3 3,302 21-09-2014, 06:10 PM
Last Post: Guest
  High Performance DSP Architectures computer science crazy 1 8,150 12-12-2012, 12:18 PM
Last Post: seminar details
Exclamation Internet Access via TV cable Network pritam 14 19,549 08-12-2012, 03:50 PM
Last Post: seminar details
  ADDING INTELLIGENCE TO INTERNET USING SATELLITES seminar projects crazy 6 6,454 03-12-2012, 03:06 PM
Last Post: seminar details
Thumbs Down Internet Traffic Management projectsofme 2 2,432 14-11-2012, 12:10 PM
Last Post: seminar details
  A Multi-Dimensional Approach to Internet Security ( Download Full Seminar Report ) computer science crazy 3 3,980 01-11-2012, 12:55 PM
Last Post: seminar details
  A Quick Introduction to Voice over Internet Protocol (VoIP) computer girl 0 1,332 09-06-2012, 05:50 PM
Last Post: computer girl
  The Awakening Internet computer girl 0 951 06-06-2012, 11:28 AM
Last Post: computer girl
  Internet Protocol Version 6 nit_cal 3 2,252 14-03-2012, 12:09 PM
Last Post: seminar paper

Forum Jump: