the evolution of networking: ipv6

23
Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking The Evolution of Networking: IPv6 Where do you want your network to go tomorrow? To see detailed notes check the notes page of this slide show.

Upload: networksguy

Post on 29-May-2015

337 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking

The Evolution of Networking: IPv6

Where do you want your network to go tomorrow?

To see detailed notes check the notes page of this slide show.

Page 2: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Introduction

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 3: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 4: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 5: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

• Looks in registry (Host Cache) to determine Seed Supernodes

• Send UDP packets to specified HC IP addresses and ports

• Wait 5 seconds• Attempt TCP connection to

specified HC IP addresses and ports

• Attempt TCP connection to specified HC IP addresses over port 80

• Attempt TCP connection to specified HC IP addresses IP addresses over port 443

• If none of these work cycle through all of them 5 more times

• Assuming connection made, test local workstation to determine available bandwidth and available CPU

• If results are within specified (unpublished) parameters, report back to central servers that this machine is available to be a Supernode

• Start encrypting traffic

Applications: Skype

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 6: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications

Skype:

Networks that don’t provide security services to applications:

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 7: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications: Barrier to EntrySome applications simply die because lack of end to end make it too difficult to work.

“The time has come to lower the curtain on Speak Freely. No further development or maintenance will be done, and no subsequent releases will be forthcoming. The Internet of the near future will be something never contemplated when Speak Freely was designed, inherently hostile to such peer-to-peer applications.”

Speak FreelyEnd of Life Announcement

John Walker January 15th, 2004

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 8: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications: Flipping the Paradigm

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 9: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Applications: Summary

Applications are negatively impacted by IPv4

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 10: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Seamless Networks

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 11: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Networks Today

Network

Network Network

10.1.1.X

10.1.1.X 10.1.1.X

IP Address ConflictsFirewall RestrictionsSlow networksSingle Points of failureIslands of identity

Shadow accountsRigidityInflexibilityOverhead

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 12: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Seamless Networks

Network

Network Network

Application Application

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 13: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Seamless Networks

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

9 minute video clip called “Road Tunnel Fire Rescue with Wireless Sensor Networks” was shown here and may be accessed at:

http://www.youtube.com/watch?v=RU21YO6XF_o

Page 14: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Seamless networks cannot exist without IPv6

Page 15: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Security

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 16: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Security: IPsec

IPv6 is no more secure than IPv4

IPv6 is no less secure than IPv4

IPv6 can be deployed in a more secure manner than IPv4

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 17: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Security: Training

Security models will change

Security Architects/Engineers need v6 training

Training needs will be extensive for senior architects – allocate training funds

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 18: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Peer-to-Peer

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 19: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Peer to Peer isn’t evil

Peer to Peer ≠ Napster or Kazaa

These are just ‘early adopters’

Can be managed and leveraged in your organization

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Page 20: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Current Data Flow

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Single Point of FailureBandwidth ChokepointClients need connectivity

Saturates slow linksLong transfer timesScheduling can miss machines

Page 21: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Peer to Peer Data Flow

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

Highly availableDistributed distributionDisconnected networks

Leverages fastest networksFaster distributionSelf healing

AuthenticationDistributed SecurityManaged Applications

Page 22: The Evolution of Networking: IPv6

Sean Siler, IPv6 Program Manager, Microsoft The Evolution of Networking: IPv6

Closing Remarks

IntroductionApplications

Seamless Networking

SecurityPeer to PeerClosing/Q&A

SEAN SILERPROGRAM MANAGER FOR IPV6 [email protected]

Page 23: The Evolution of Networking: IPv6

© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.