IPv6 Deployment: Dealing with Dependencies

Similar documents
Internet 101. The Technical Roots of Internet Governance. Marco Hogewoning and Chris Buckridge External Relations RIPE NCC

CS4700/5700: Network fundamentals

Introduction to Networks (2) Networked Systems 3 Lecture 2

LECTURE WK4 NETWORKING

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Lecture 2: Internet Architecture

Network Layer (1) Networked Systems 3 Lecture 8

Introduction to TCP/IP networking

Chapter 3: Network Protocols and Communications

CSCI-GA Operating Systems. Networking. Hubertus Franke

ITU and IoT. Update on SG20 s March 2017 Meeting. Marco Hogewoning May 2017 RIPE 74

Modern Internet architecture, technology & philosophy Advanced Internet Services Dept. of Computer Science Columbia University

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

Summary of Data Communications

Hands-On Network Security: Practical Tools & Methods

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Evolving Corporate Networks and the Business Case for SD-WAN

Chapter 2 Network Architectures A global view

Local Area Networks; Ethernet

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

Introduction to computer networking

Packet Switching, Layer Models and Protocol Suites

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC

Operating Systems CS 571

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

How to Really Secure the Internet

Internet Architecture and Experimentation

Introduction to networking 2/28/18

Outline : Computer Networking. Objectives. Who s Who? Administrivia. Layering. L-1 Intro to Computer Networks

CSE 461 Midterm Winter 2018

MEBS Utilities services M.Sc.(Eng) in building services Faculty of Engineering University of Hong Kong

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Protocols and Layers. Networked Systems (H) Lecture 2

Bisnode View Why is it so damn hard to piece together information across the enterprise?

Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks

Programmation système

The SD-WAN security guide

ECE 4400:427/527 - Computer Networks Spring 2017

Strategies, approaches and ethical considerations

Network+ Guide to Networks, Seventh Edition Chapter 1, Solutions

Introduction to TCP/IP

15-744: Computer Networking. L-1 Intro to Computer Networks

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Hierarchical Protocol Architecture

Making Security Agile

Need For Protocol Architecture

Need For Protocol Architecture

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Business model-driven 5G deployment

System Programming. Introduction to computer networks

C18: Network Fundamentals and Reliable Sockets

How to deal with large numbers (millions) of entities in a system? IP devices in the internet (0.5 billion) Users in P2P network (millions)

CSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park

Lecture 10: Protocol Design

CS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 Time: 1hour May 2nd, 2013

Advanced Security and Forensic Computing

Parts of a Network. app. router. link. host. Computer Networks 2

Computer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014.

Design Principles : Fundamentals of Computer Networks Bill Nace

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

Network Architecture Models

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

CSCD 433/533 Advanced Networks

5. Technology Applications

Chapter 1 Introduction

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Internet Design Principles

CompTIA Network+ Study Guide Table of Contents

WHAT IS AN INTERNET BACKBONE? And what makes a good one?

Review. Review. Review. How to Send a Message over a Network? LAN LAN. LAN Routing Addressing Reliable Data Transfer Congestion Control LAN

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Copyleft 2005, Binnur Kurt. Objectives

Networks Fall This exam consists of 10 problems on the following 13 pages.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Assignment - 1 Chap. 1 Wired LAN s

KINGS COLLEGE OF ENGINEERING

How to Stay Safe on Public Wi-Fi Networks

Chapter 2 Architectures. Software Architectures

Network Layering CS 118

DEUTSCHE TELEKOM TERASTREAM: A NETWORK FUNCTIONS VIRTUALIZATION (NFV) USING OPENSTACK

Osi Reference Model And Explain The Various Layers And Its Applications

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Fundamentals of Telecommunication Networks (ECP 602)

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

BIG MON CONTROLLERS BIG MON ANALYTICS NODE. Multi-Terabytes L2-GRE 1/10/25/40/100G ETHERNET SWITCH FABRIC. Optional BIG MON BIG MON SERVICE NODES

Chapter 2 Layer Architecture of Network Protocols. School of Info. Sci. & Eng. Shandong Univ.

AND WHAT MAKES A GOOD ONE?

NETWORK SECURITY ITEC 435

IT Essentials (ITE v5.0 & v5.02) Chapter 6 Exam Answers 100% 2016

Transcription:

IPv6 Deployment: Dealing with Dependencies Marco Hogewoning External Relations Officer marcoh@ripe.net

IPv6 Requires Changes Somewhere else 2 You need to be able to exchange IPv6 traffic Applications you use need to support IPv6 You want people to start using it This all introduces dependencies

The Internet is a Network 3 Links exist between the different layers - Vertically - Horizontally Changes in one element can effect others that are part of a single (value) chain - Strict separation only exists in theory The Internet is a communications network - Everything you do will effect at least one other party - If you change, your peer has to change as well

The Hour Glass Model 4 Application Presentation Session Transport Network Data link Physical (OSI model) Email, websites, online services, instant messaging SMTP, HTTP, H.264 TCP, UDP IPv4, IPv6 Ethernet, 3G, Wifi Undersea cables, optical fibre

Value Lies in Multiple Directions 5 Email, websites, online services, instant messaging open api Email, websites, online services, instant messaging SMTP, HTTP, H.264 open standards SMTP, HTTP, H.264 Value Chain TCP, UDP IPv4, IPv6 peering TCP, UDP IPv4, IPv6 Value Chain Ethernet, 3G, Wifi roaming Ethernet, 3G, Wifi Undersea cables, optical fibre location sharing Undersea cables, optical fibre

Vertical: Customer Relationships 6 Business to Business (B2B) - You buy services to run your service Business to Consumer (B2C) - Retail - Customer buys your service to access other services - This also include cross-sector B2B - Internet as a tool Traditional model, driven by customer demand - Money is exchanged based on delivery of sevice

Horizontal: Where is the Money? 7 It is complicated: - Relationships often only exist informally - Relationships are not always that visible - There might not be a direct relationship at all The money is made somewhere else - Most of the money is in the vertical chain - Horizontal chain is often considered a cost Or considered a threat to own business

Where is the Value? 8 The value of a telecommunications network is proportional to the square of the number of connected users of the system. Metcalfe s law

The Cost of Making Changes 9 Making a change will cost money - New tools (hardware, software) - New skills (learning material, access to training) - Lots of time You need a Return on Investment (ROI) - Making a change means taking a risk - Cost recovery needs to be: Predictable Reliable Fast

10 Deploying IPv6 means making a change

IPv6: Waiting for Somebody Else 11 Dependencies exist in both directions Vertical value: - My hardware does not support IPv6 - My customers are not asking for it Horizontal value: - There is no content - There are no users Isn t this all about money?

Breaking the Circle 12 Somewhere somebody needs to take the first step - IPv6 unfortunately lacks first mover advantage The direct result of Metcalfe s law - Cost involved might turn it into a disadvantage Can we find a way of helping them? - Limiting their risk? - Limiting their cost? - Provide them with some ROI?

Which Direction to Develop? 13 We know the money flows vertically, but is that also where the value is? - Without the horizontal links, can we still make money? Can we remove the disadvantage? - Create a level playing field by all moving together

Mutual Benefit 14 There is no money to be made by deploying IPv6 It has to come indirectly by growing the network - More users - More applications - More service providers IPv6 enables the market to grow - You will grow with it

Coordinate with Each Other 15 Work with your colleagues to align efforts - Make sure the IPv6 network gets big really fast Increases cost recovery speed Increases the net value of the network - Put pressure in the vertical chain More people asking for IPv6 support

A Final Word on IPv4 16 The current value lies with IPv4-20+ years of first mover advantage Network is much bigger Everything is tried and tested It has two fundamental problems - The network has stopped growing - The cost of running IPv4 will only go up Where is your ROI on that?

17 When you are on an IPv4 only network, the only value you see is on IPv4 (that doesn t mean there isn t anything else)

Questions? 18