Lecture 4: 15th October 2019 Flashcards
Design considerations of protocols and systems
What is the hourglass model?
The modelling of protocols that operate the Internet, with IP being the only internetworking layer protocol that exists, forming its “waist” in the middle.
What are the advantages of IP being the only interworking protocol?
allows for heterogeneity by abstracting the lower layers; easy to develop for - only 1 interface; simple service, provisioning, and maintenance; common functionality
What is opex?
operational expenditure = maintenance, wages, office rental
What is capex?
capital expenditure = one-time costs such as buying a server or datacentre warehouse
What functionality is added to the interworking layer?
multicast transmissions, QoS, VoIP, etc
What are the consequences of adding functioanlity to the inrterworking layer?
increased complexity, num service interfaces, maintenance overhead, and reduced interoperability
What are the two chocies for interworking protocols and the differences between them?
IPv4 and IPv6. v4 fully deployed, v6 partially. v6 uses 128 bit addresses vs 32 bit in v4. v6 supports QoS.
What is IPSec?
IPSec = IP security = a suite of protocols that provide data authentication, integrity, and confidentiality across an IP network - in IP packets.
What is tunelling?
A tunneling protocol is a communications protocol that allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network (such as the Internet) through a process called encapsulation. It can be done with encryption.
Can be one protocol over another (IPv6 over IPv4 if IPv6 unavailable from ISP) or for security with a VPN.
What does it mean to say that there are a break and mismatch in the waist of the hourglass model?
There is a break in the end-to-end principle of the Internet caused by NAT and ALGs such as middleboxes
What are ALGs?
ALG = Application-Level Gateway = a conceptual network security component that is implemented by a firewall proxy server that augments a firewall or NAT employed in a computer network to improve the network’s security.
ALGs map between different protocols implementing the same functionality, e.g. a company’s internal email service to external SMTP servers.
What is NAT?
Network address translation = a technique that maps multiple local IP addresses on a local network to one or more global IP addresses that send, receive, and route the traffic of the local addresses to and from the Internet.
What are middleboxes?
An intermediary networking device that performs functions other than the normal functions of a router on IP packets between their sender and receiver.
What is the end-to-end principle of the Internet?
A design concept in computer networking that specifies that application-specific features reside solely in the communicating end nodes of the network, and not in intermediary nodes, such as gateways and routers, that exist to establish the connection.
How do middleboxes break the end-to-end principle?
They can perform application-specific functionality outside of the hosts at each endpoint.
What are the problems with IPv6?
slow deployment rate; problems interoperating with v4 => forced to change network and app interfaces; doubles maintenance; increases use of tunneling (e.g. to get v6 or v6 features over v4 if ISP doesn’t provide directly)
What are the differences between the common services at the core IP network and transport layer?
Common services in the core network for IP:
– Connectionless, packet/datagram service.
– Packet forwarding.
– Routing.
– No end-to-end state to avoid “fate-sharing”.
Transport layer common services with TCP:
– Reliable, ordered byte-stream for applications.
– Flow control for receiver.
– Congestion control for network.
– Can survive network faults/route changes
How is UDP seen today, particularly with QUIC?
UDP seen as an “interface on to IP”. The official position for QUIC is that UDP is not a transport protocol. It’s debated, but some people see it as a mix between a transport and session protocol.
Why does keeping to the end-to-end principle make it hard to implement security and privacy?
It’s hard to decide which layer should implement security and privacy. Can’t be the network layer, as not all comms need secure transfer. The app layer would seem best as it knows from its state whether to encrypt. So it would encrypt a stream to the transport layer (via session where applicable). But the app layer needs to use IP addresses which can easily be used to identify and locate users, resulting in a loss of privacy.
What is the plane model?
A central part of SDN, the modelling of different network functions as being in separate “planes”; the three planes are the data plane (routing), control plane (making routing tables), and management (device config, maintenance, and monitoring) plane. The management plane is the least important.
What is the data plane?
The parts of a computer network responsible for moving user traffic to its next hop along its path, according to logic and instructions from the control plane, which decides where traffic is sent (i.e. paths and next hops).
What is the data plane aka?
user plane and forwarding plane
What is the control plane?
The parts of a computer network responsible for deciding where traffic is sent. It defines routing and forwarding tables and the network topology. The routing tables it defines are used by the data plane to move packets to their next hop.