Accusation: With the unprecedented development of science and technology today, why is it IPover something, and not other things such as ATMover? As the carrier of the network, what does IP bring to users?
Public trial: Low-cost, rich service bearing mode and constantly innovating or developing technology are all descriptions of IP as a bearing network, but these are only superficial phenomena of IP. In fact, one of the most important responsibilities of IP as a bearer network is that it acts as a "language" that integrates services (applications) and technologies. In order to achieve the basic goal of "interoperability" in the initial stage, network technology is realized by various means. Due to the limitation of technology, environment and business development mode, its extension develops in parallel according to its own laws. In this way, its technology itself has become an obstacle to its own development. With the accelerated development of the network, users demand that the network bearer technology must be open, so IP technology has become the final intersection of these technologies. As a standard "language", different technologies and services are integrated through IP, and any technology and service can be extended through IP as a "common carrier". IP is the real "transformation" of bearer technology, and IP can override "everything".
The second original sin is when the application runs out of network resources.
Accusation: Objectively speaking, the limitation of network resources is due to the solidification of its space, which can not meet the growing network applications. The contradiction between solidification and growth leads to network exhaustion.
Public trial: the availability of network resources has always been the "eternal pain in the heart" of network carriers. How to solve the contradiction between "quantity" and "quality" in high bandwidth has become a realistic problem.
For network operators, network equipment is extensible first, and then optional. Capacity expansion means that the architecture of the equipment itself is designed according to the architecture of 10G, which can improve the application requirements of users, improve the overall network bandwidth without changing the equipment, and solve the network resource pressure brought to users by the change of "quantity". When the problem of "quantity" is solved, it is necessary to use controllable intelligent technologies such as ACL to realize the controllable application of services within 10G bandwidth. This selective support ability can ensure the "network quality" under high bandwidth. Only in this way can we ensure the "quantitative change" and "qualitative change" of network life at the same time and better provide the carrying capacity of the network.
The third original sin is that the scale of the network is limited by the current technical situation.
Guilt: the development of the network is limited by the scale, and the scale development of the network is limited by the technology. However, technology itself is unpredictable in the process of self-creation and self-improvement. So, how is the scale of the network subject to technology?
Public trial: From the perspective of space, IP address has become the bottleneck of network scale development, and its distribution mode will also affect routing efficiency and business development. Simply assigning private addresses to terminals, if not carefully planned, may also have technical problems of multi-level traversal.
Because most of the traditional network devices use solidified and non-programmable ASIC technology to carry services efficiently, although the efficiency is improved, the overall flexibility is abandoned. The programmability of NP technology can support new services and technologies to the greatest extent without changing the form of the equipment itself. For example, if the address of IPv4 is insufficient, we can provide a dual-stack model of IPv4 and IPv6 by changing NP microcode, which can provide effective support for current IPv4, and can also expand some services that apply IPv6 to avoid the "island" of IPv4 and IPv6 applications and technologies caused by the essential differences between the two technologies. At the same time, after the technology and application of IPv6 are mature, all business applications of IPv6 can be realized by modifying NP microcode.
The Conflict of Fertility Concepts in The Fourth Original Sin
Guilt: When the network enters commercial operation, the development of the network begins to "transform" from the origin, and the conflict of ideas has begun to restrict the development of the network.
Public trial: The development of network bearer is not smooth sailing, and it is bound to be restricted by many conditions. However, the conceptual limitation is the most insurmountable gap in the development of the network. Since the commercial operation of the network, people have paid more attention to the professionalism and systematicness of the network. However, the inherent "defects" of the Internet (poor self-restraint evolution behavior) make the business model of the network "difficult to walk". Many operating networks have developed for many years, but it is still difficult to "successfully break through" from the inherent operating mode of Internet networks. In this way, the differences in network concepts make network vendors call for professional and systematic solutions in the process of network development, so as to give full play to the advantages of the Internet network and show the charming style of the network itself.
Fifth, the streaming media service with prominent original sin faces the embarrassment of IP bearer network.
Guilt: In the face of the rapid growth of streaming media business, IP puts forward a stricter test for bearer technology.
Public trial: IPQoS system includes integrated service model (IntServ) and differentiated service model (DiffServ). Combined with the current situation of network technology and construction level, DiffServ-based traffic engineering combined with fast rerouting technology is a QoS guarantee method for real-time services. This method is combined with QoS evolution strategy. DiffServ service can be realized on the bearer network first, and the service quality can be guaranteed by using excess bandwidth and DiffServ when there are not many media services on the backbone network in the early stage. With the increase of business load, traffic engineering will be started to supervise and divert traffic to avoid network congestion and provide a basis for future network upgrade.
Facing the current situation of network bearing, the realization of end-to-end QoS needs three parts: one is to provide the basic management functions of QoS based on the QoS guarantee of each network entity, including queue scheduling, traffic supervision and traffic shaping; Secondly, signaling technology is used to coordinate end-to-end network entities to negotiate QoS in message provision, and then establish a user network traffic model, and determine the proportion of users occupying network resources through authentication.
The sixth original sin is that the efficiency of network application stops the bandwidth convergence of metropolitan area network.
Guilt: In the rapid development of the network, the construction of metropolitan area network has entered a new peak, and the bandwidth convergence of metropolitan area network began to worsen the wound of insufficient network bandwidth resources.
Public trial: there is a "black hole" in the planning of MAN in the early stage of construction. Planners only care about the relationship between interconnection and input cost, and there is no strict definition of the efficiency of service carrying.
Although the application scale of the network is expanding, the openness of the network determines that the essence of its network resource exhaustion is occupied by too many useless broadcasts and viruses, and the convergence of metropolitan area network bandwidth is tantamount to adding insult to injury. The situation of network convergence can not be solved overnight, and it can only be rectified through the gradual adjustment of resources. For broadcasting and viruses in MAN, most users control network resources through ACL, which can effectively curb useless information. However, a large number of ACL access control in MAN makes every packet in network traffic compare with CPU, which leads to the decline of the processing capacity of network equipment and can not guarantee the processing efficiency of services. Based on this phenomenon, by providing hardware devices such as QoS and TCAM in the network equipment, the high quality and high efficiency of the network can be realized, and QoS ensures the high quality of services in the network. TCAM technology completely liberates the occupation of CPU by a large number of ACL access control, and its one-time table lookup hit mechanism and high-speed hardware table lookup ability improve the bearing efficiency of the whole network.
Whether closed or open, security is not an easy thing.
Guilt: The development of network is a hierarchical evolutionary process. When the network solves the survival problem of interconnection, the security problem of the network has become the main focus now.
Trial: The mechanism of the Internet is to make it more open. When people enjoy the network feast brought by "openness", it also attracts attacks or interference from hackers or virus programs, so the security problems faced by the network can never be regarded as child's play.
Based on the above phenomenon, it is necessary to "implement relative closure in an open environment". On the one hand, VPN strategy is deployed on IP bearer network by using MPLS technology, which is an independent logical network. At the same time, an independent logical network supporting MPLSVPN is resource management is established. On the other hand, various access technologies can be used to expand the coverage of data services, requiring access networks to achieve user isolation at the link layer. The technologies that can be adopted are VLAN, L2TP and PPPoE, and MPLSVPN is introduced to realize the integrated security channel of access and bearer.
For the network, people have experienced the stage from trying to use it to completely relying on it, and the network is gradually evolving into an indispensable life for people. When people turn from myth worship to rational inquiry, the network also goes down the altar and faces the world with its true face. This paper hopes to discuss the "seven deadly sins" carried by the network, put forward the development coordinates of limiting the network, and expect to complete its revolutionary process through evolution, and the network will inevitably develop in the direction of "smarter and more convenient". At this time, we can't help but sigh: when the network has "intelligence", it can fly without wings!