Você está na página 1de 4

Submitted To: Dr.

Kashif Sharif
Submitted By: Maryam Jameela (012)
Class: MSIT-15

Towards the Future Internet Architecture, RFC


1287
Study the RFC and write a detailed note on, which
proposals/observations/processes have been implemented as they were
explained in this RFC, and which of them have been modified or
completely left out in todays computer communication systems

This RFC is based on joint session


held to discuss future internet
architecture. Some assumption were
made to look forward how they turned
into next 5 to 10 years. Since the
growth rate of internet is astonishingly
high this joint session of IESG and IAB
has great importance.
Four assumptions were made in the
beginning.

OSI and TCP/IP suite coexist in


future which proved to be wrong
in long run since OSI model is
nothing but theoretical model
while TCP/IP suite is the
practical implementation.
Internet will have diverse set of
technologies
and
protocols
which turned out to be right
since network as big as internet
cant have unified technology
and protocol set.
Internet will be a mix of public,
private, common carriers and
private lines network. Which is
true since internet is the mix of
intranets.
Internet architecture should be
able
to
scale
widely
to
accommodate the growth rate.

There were different proposals


and processes which were marked as
the points to be ponder on for the

evaluation of networks. Five major


concerns were as follows
1.
2.
3.
4.
5.

Routing and Addressing


Multiprotocol Architectures
Security Architecture
Traffic Control and State
Advanced Applications

Problems that were found related


to routing and addressing were usually
due to the major concern of the
growth. It has huge concerns of how in
future IP addresses wont be enough
or classes will ran out. Address spaces
wont be enough for future evolving
architecture.
Routing
protocol
/algorithms wont be able to work and
route over hops with routing based
upon network numbers.
Suggestion were proposed to
use
the
autonomous
system
aggregated addresses which help to
apply different policies over the AD
and
Autonomous
systems.
This
approach is used today widely. The
world
is
divided
into
many
autonomous system to make it easy to
regulate them. To deal with routing
there was a proposal to drive some
strategy to deal with special and
common routes. Extended IP formats
are used today to get unique address
in specific region instead of being
unique over the globe. The gateways
maps these addresses IPv6 is 64bit
address spaces is new generation of IP

addresses. Proposed actions were to


research over a timeline which
measures should be taken to get these
proposals implemented and derive
new routing algorithm and find out
new strategies to form IP addresses
and main focus is to design policy
based routing.
Multiple Protocol Architecture arises
various questions such as network
which is built over various protocol
suites how would we define internet
for
its larger community with IP
addresses and can send the email
over it without gateways is included in
the internet while in the new definition
which is widely imposed now is the
application context and domain name
systems and directories are new
definition of internet. Process based
multiprotocol model is a step towards
the uniformity which is hard to achieve
since single protocol stack is not
practically possible. The core internet
architecture is still the back bone of
network known as TCP/IP suite but it
still didnt provide uniformity. Physical
linking might have different protocol
stack but dont ensure interoperability.
Basically this part of proposal was to
deal with interoperability to handle it
over application to lower level. Basic
thing is to achieve communication
between
different
machine
or
communication protocols with shared
semantics
and
user
agents.
Hybridization and Integration is the
new hit of the market. Since the day
internet has started to grow there are
no ways to restrict it to some unified
architecture or model. So it has been
always
model
of
integrated
technologies, services and devices as
it was proposed and it is same as now.

Security Architecture is one


of the most interesting area of
evolution in past only military data
was
supposed
to
be
security
vulnerable while now privacy issues
have grown to serious crime threats.
There are cyber laws for privacy
violation so architecture is supposed
to be highly secure. It should be more
than protocols and cryptographic
techniques.
It
must
be
easily
understandable
by
the
communication community which is
ensured today with loads of cyber
laws. Security parameters are four link
level, subnet level, host level and
application
level.
All
of
these
parameters have different level of
security to be ensured such as email
privacy or session data control is
application level.
Applying security
over different parameter doesnt
ensure
security
over
all
other
parameters it assumed all other have
a secure mechanism.
Proposed
actions to ensure security such as
encryption as well as the security law
are security reference model, privacy
enhanced email, distributed system
security, host level security and
application
level
security.
These
actions have been taken and making
system secure in last 2 decades.
Traffic control and state is
area where evolving of internet
architecture
is
most
concerned.
Assumptions were to achieve traffic
control. Main architectural problem is
to provide performance support for
specific
subnet
traffic.
Technical
problems to be faced during setup
evolving internet architecture are
usually related to expandability of
internet, resource setup,
resource
binding vs route binding, alternative
multicast model, resource setup vs.

Inter AD routing, accounting . These


technical issues are still in the process
of deployment.
Advanced applications is
the idea to build application process
which are good enough to deal with
latest models of data exchange,
process
and
patterns.
These
applications are now designed since
we have better tools available to
construct them then we had two
decades back. These applications now
have a good standard set of data
formats to transfer different kind of
data. Data exchange methods are
used
widely
today
which
are
mentioned in paper some of them are
modified but are in use such as store
and forward , global file system (FTP),
inter process communication (Remote
Procedural Call and APIs) ,
data

broadcast
and database access.
Applications are supposed to handle
traffic control and state area in parallel
to ensure interoperability of the data
formats to be transferred over the
network to make its understandable
in the hybrid network and shared
semantics.
It is concluded that all five
areas are most important; suggestions
and actions proposed in paper were
serious
consideration
for
communication
and
engineering
societies.
These
societies
have
modified some of proposals but
implemented many of them. Not any
of the proposals are eliminated or
rejected directly most of these are
implemented or either in process of
implementation
with
some
modifications.

Você também pode gostar