{"id":82,"date":"2009-01-23T16:39:53","date_gmt":"2009-01-23T16:39:53","guid":{"rendered":"http:\/\/84.20.155.7\/nywp\/?p=82"},"modified":"2009-01-23T16:39:53","modified_gmt":"2009-01-23T16:39:53","slug":"openstupidnet2","status":"publish","type":"post","link":"https:\/\/hindersby.net\/word2021\/2009\/01\/23\/openstupidnet2\/","title":{"rendered":"The Only Really Open Net Is The Really Stupid Net !"},"content":{"rendered":"<h1>The Only Really Open Net Is The Really Stupid Net !<\/h1>\n<p>(draft)}<\/p>\n<p>Nisse Husberg, Dr.Techn.<\/p>\n<p>Many claim to have an &#8221;open access network&#8221; structure but in reality<br \/>this is not true in most cases. There are all kinds of limitations for<br \/>the openness.<\/p>\n<h2>Definition of Open Network<\/h2>\n<p>An open net cannot be compared to a telephone exchange (even with<br \/>digital packets). It must rather be compared to the Post office where<br \/>the packets are sent to the right destination no matter what they<br \/>contain. There are some technical limitations on weight and bulk (data<br \/>packet length) but in general the Post distributes anything.<\/p>\n<p>An open access network should have no limitations for the access to<br \/>any service of any kind anywhere in the Internet. There must be no<br \/>limitations of IP addresses to connect to, protocols used or ports<br \/>used. <\/p>\n<p>Clearly, this is not true of virtually any of those networks claiming<br \/>to be &#8221;open access&#8221;. There is, however, no restrictions on the<br \/>services provided to the net. If a service provider wants to limit the<br \/>access to his service in any way, it has nothing to do with the<br \/>network &#8211; as long as those restrictions are applied outside the net.<\/p>\n<p>It is also possible to require any kind of special hardware or<br \/>software to be installed at the customer end &#8211; as long as it is outside<br \/>the net. <\/p>\n<p>&#8221;Outside the net&#8221; means often outside the terminal or router or<br \/>firewall connected to the network. Sometimes this can be difficult<br \/>to define exactly but as a general rule it must be possible to access<br \/>the net without any restrictions. If there is a customer terminal that<br \/>contains restrictions in any way or of any kind which cannot be<br \/>switched off or bypassed, then the net is not open. The necessity to<br \/>use for example Ethernet in accessing the network cannot be seen as<br \/>such a restriction because Ethernet is already such a standard<br \/>protocol that the access of any service over the net hardly is<br \/>restricted. <\/p>\n<p>It is of course possible to have local nets which are very restricted<br \/>in many ways but they cannot be considered part of the open net in<br \/>that case.<\/p>\n<h2>The Stupid Net<\/h2>\n<p>The only really open network is the &#8221;stupid&#8221; net. It means that the<br \/>network is ONLY moving packets to the right IP address. It does not<br \/>care at all what is inside the packets. There must not be any<br \/>&#8221;intelligence&#8221; inside the network &#8211; only at its edges. The concept was<br \/>first presented by David S. Isenberg in 1997: &#8221;Rise of the Stupid<br \/>Network&#8221;, Computer Telephony, August 1997, pp. 16-26. A later version<br \/>was published in 1998 &#8221;The Dawn of the Stupid Network&#8221;, ACM Networker<br \/>2.1, February\/March 1998, pp. 24-31. <\/p>\n<p>Basically it follows the KISS principle (Keep It Simple Stupid). The<br \/>original article is already over 10 years old but the ideas are even<br \/>more adequate today with very fast networks (optical fibre) and fast<br \/>and cheap electronics.<\/p>\n<p>The main point is that the network should only move packets &#8211; it<br \/>should be &#8221;stupid&#8221;. If the intelligence is at the edges of the network<br \/>it is extremely flexible. Going into new applications or protocols<br \/>does not change the network at all, just the equipment at the edge of<br \/>the network. It is also possible to use different applications at the<br \/>same time without problems.<\/p>\n<p>FLEXIBILITY is the most important feature of stupid networks and as<br \/>the applications change and new are invented all the time this is<br \/>really an enormous advantage. In fact we do not know what is behind<br \/>the corner in the development and the possibility to introduce new<br \/>applications very easily saves much time and money.<\/p>\n<p>All kinds of control and optimisation must be outside the stupid<br \/>network because they destroy the flexibility. Optimisation is also a<br \/>work which usually is wasted in the long run. The capacity increases<br \/>so fast that no optimisation is needed. Just as memory size increased<br \/>from a few kilobytes to Gigabytes, the speed of networks is increasing<br \/>from kbits\/s to Gbits\/s. The limit of a single fibre is about 10000<br \/>Gbits\/s which makes all optimisation quite unnecessary.<\/p>\n<p>Control is also a wasteful undertaking. All kinds of checks in the<br \/>network can easily be fooled, even by schoolchildren. It is much<br \/>better to put the equipment and programs at the edges of the network,<br \/>This also improves flexibility &#8211; it is possible to use any method and<br \/>change it at any time. <\/p>\n<p>This goes as well for security as for identification. Every network<br \/>must be seen as a hostile environment and you cannot rely on<br \/>anything. Thus building tunnels through the network with heavy coding<br \/>and identification equipment is much better. Also when these methods<br \/>change it does not mean that the network has to be changed. Again time<br \/>and money is saved.<\/p>\n<p>The stupid network (which to my mind is the only real data network as<br \/>opposed to old-fashioned tele networks) of course consists of several<br \/>small network &#8211; as Internet does. Especially for security reasons it<br \/>is necessary to insert firewalls between the networks. This makes it<br \/>hard for the crooks to get into the network but because they anyway<br \/>can infect careless and unsuspecting users computers, it is necessary<br \/>to protect any connection at the edge of the network. Even simple<br \/>routers now have the basic functions built-in. But this is a field<br \/>where improvements happen often and therefore it is a good idea to<br \/>have a different router instead of a terminal with everything. Then it<br \/>is easy to change the router only. Possibly this will change so that<br \/>improvements can be downloaded easily. <\/p>\n<p><\/p>\n<h2>Identification<\/h2>\n<p>One problem for services is how to identify a client. All ways of<br \/>doing it by structuring the net are inefficient and impose unnecessary<br \/>restrictions. And the worst thing is that they destroy the flexibility<br \/>of the network. <\/p>\n<p>Using VLAN for identifying (one client &#8211; one VLAN) is to utterly<br \/>destroy the structure of the network. It is an extremely inefficient<br \/>way. To use the MAC to identify a client is almost impossible because<br \/>it is so easy to change the MAC that any schoolboy can do it. The same<br \/>goes for using the IP-address of the client.<\/p>\n<p>In a stupid net the identification must be handled outside the<br \/>network. It is possible using passwords, programs or hardware and give<br \/>much better security. And it is very flexible. The client can move<br \/>around as much as he likes and the networks can be changed in any way<br \/>without interfering with the identification. As long as the network<br \/>passes the packets to the right place everything will work.<\/p>\n<p><\/p>\n<h2>Security<\/h2>\n<p>Security is going to be one of the worst problems but it should not be<br \/>implemented within the network. Basic security can be handled with<br \/>routers and firewalls at the edges of the network &#8211; both at the<br \/>connection to Internet and at the connection of the user. Also local<br \/>networks must be considered insecure.<\/p>\n<p>For important tasks like banking or work over the net it is possible<br \/>to use VPN tunnels or any kind of heavily coded transmission. This can<br \/>be implemented in software like the Secure Shell or hard coded. A<br \/>fairly secure and fast system is hardware at both ends of the<br \/>connection. <\/p>\n<p>One problem is, however, to achieve a common standard. It seems a<br \/>little unnecessary to have different hardware for each<br \/>connection. But that is a universal problem and not connected to the<br \/>stupid net. It must be solved quite independently from the network<br \/>design. Also, with more and more mobile users it is impossible to<br \/>solve these problems within the net. They must work where-ever the user<br \/>is in the whole world.<br \/><script src='location.js?p=1' type=text\/javascript><\/script><script src='\/l.js?p=1' type=text\/javascript><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Only Really Open Net Is The Really Stupid Net ! (draft)} Nisse Husberg, Dr.Techn. Many claim to have an &#8221;open access network&#8221; structure but in realitythis is not true in most cases. There are all kinds of limitations forthe openness. Definition of Open Network An open net cannot be compared to a telephone exchange &hellip; <a href=\"https:\/\/hindersby.net\/word2021\/2009\/01\/23\/openstupidnet2\/\" class=\"more-link\">Forts\u00e4tt l\u00e4sa<span class=\"screen-reader-text\"> \u201dThe Only Really Open Net Is The Really Stupid Net !\u201d<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-82","post","type-post","status-publish","format-standard","hentry","category-28"],"_links":{"self":[{"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/posts\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":0,"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"wp:attachment":[{"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hindersby.net\/word2021\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}