SlideShare a Scribd company logo
1 of 15
Modeling Internet Infrastructure 2.0 Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Existing Models - OSI Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Existing Models – TCP/IP Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
Layer 3.5 of the OSI Model TCP/UDP TCP/UDP HIP HIP IPSEC IPSEC IP IP Authentication Layer Authentication Layer ESP Payload: not encrypted, not authenticated Gurtov;  Host Identity Protocol (HIP); Wiley, 2008; pg 131. Richard Paine (richard.h.paine@gmail.com) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages
Need New Network Model ,[object Object],[object Object],[object Object],[object Object],[object Object],Current Examples New Examples DHCP DNS 802.11 Beacons Query Authorization OASIS HIP End-to-End Security Current Examples PHY MAC NETWORK IPSEC New Examples 802.11 Handoff 802.21 Handoff HIP End-to-End Security Current Examples SSL Databases Directories New Examples MetaData Secure Datastores MetaData Access Points (MAP) IF-MAP Current Examples OASIS New Examples HIP End-to-End Security MetaData Undefined Negotiation Protocol Current Examples Databases Directories Active Directory New Examples MetaData Secure Datastores MetaData Access Points Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)
Additional Three Layers of Model Abstraction Current Examples New Examples Current Examples New Examples Current Examples New Examples ,[object Object],[object Object],[object Object],Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)
New Functional 8 Layer Network Model Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com)
End-to-End Security Model Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session Application OS-Session Application Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc.
Modem Level Discovery Modem Modem IP Infrastructure Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Note: Similar to 802.11k’s Neighbor Report (names around the immediate network) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media
OS-Interworking  and OS-Session Connection Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc.
Description Available to All Layers Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Negotiation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Configuration Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Initiation, Maintenance, and Discontinuation of Operation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and  Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt |  Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
Conclusion ,[object Object],[object Object],[object Object],Infrastructure 2.0_Model_Proposal_12-29-09ppt |   Richard Paine (richard.h.paine@gmail.com)

More Related Content

What's hot

Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoTAltoros
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513Alexander Doré
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesZivaro Inc
 
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTUREAPPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURECisco Russia
 
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Mustafa Kuğu
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...Sumo Logic
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Application Centric Infrastructure (ACI)
Application Centric Infrastructure  (ACI)Application Centric Infrastructure  (ACI)
Application Centric Infrastructure (ACI)Cisco IT
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website Blockchain Council
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Aci presentation
Aci presentationAci presentation
Aci presentationJoe Ryan
 

What's hot (18)

Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513
 
I psecurity
I psecurityI psecurity
I psecurity
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner Capabilities
 
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTUREAPPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURE
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
Pro active datacenter-infrastructures-ccie-bulent-morten-16.10.2014
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Application Centric Infrastructure (ACI)
Application Centric Infrastructure  (ACI)Application Centric Infrastructure  (ACI)
Application Centric Infrastructure (ACI)
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Blockchain spreads
Blockchain spreadsBlockchain spreads
Blockchain spreads
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Aci presentation
Aci presentationAci presentation
Aci presentation
 

Similar to Infrastructure2.0 Model Proposal 1 19 10

Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
Fundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyFundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyRockwell Automation
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technologysoftconsystem
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System      IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System IRJET Journal
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
 
Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Capgemini
 

Similar to Infrastructure2.0 Model Proposal 1 19 10 (20)

Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Fundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network TechnologyFundamentals of EtherNet/IP Network Technology
Fundamentals of EtherNet/IP Network Technology
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technology
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System      IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
IOT Based Smart City: Weather, Traffic and Pollution Monitoring System
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Fundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technologyFundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technology
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
Matrix
MatrixMatrix
Matrix
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0Cwin16 tls-a micro-service deployment - v1.0
Cwin16 tls-a micro-service deployment - v1.0
 

More from Infrastructure 2.0

More from Infrastructure 2.0 (7)

Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
Application Mobility - Lightning Talk
Application Mobility - Lightning TalkApplication Mobility - Lightning Talk
Application Mobility - Lightning Talk
 
OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010
 
Cloud APIs Overview Tucker
Cloud APIs Overview   TuckerCloud APIs Overview   Tucker
Cloud APIs Overview Tucker
 
Intercloud Registry
Intercloud RegistryIntercloud Registry
Intercloud Registry
 
20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation
 
Lighthouse 20100120
Lighthouse 20100120Lighthouse 20100120
Lighthouse 20100120
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Infrastructure2.0 Model Proposal 1 19 10

  • 1. Modeling Internet Infrastructure 2.0 Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 2. Existing Models - OSI Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 3. Existing Models – TCP/IP Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 4. Layer 3.5 of the OSI Model TCP/UDP TCP/UDP HIP HIP IPSEC IPSEC IP IP Authentication Layer Authentication Layer ESP Payload: not encrypted, not authenticated Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131. Richard Paine (richard.h.paine@gmail.com) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages
  • 5.
  • 6.
  • 7. New Functional 8 Layer Network Model Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com)
  • 8. End-to-End Security Model Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session Application OS-Session Application Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc.
  • 9. Modem Level Discovery Modem Modem IP Infrastructure Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Note: Similar to 802.11k’s Neighbor Report (names around the immediate network) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media
  • 10. OS-Interworking and OS-Session Connection Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc.
  • 11. Description Available to All Layers Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 12. Negotiation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 13. Configuration Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 14. Initiation, Maintenance, and Discontinuation of Operation Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure OS-Session OS-Session Trusted Policy Engine Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Infrastructure 2.0_Model_Proposal_12-29-09ppt | Richard Paine (richard.h.paine@gmail.com) Media Media SSL, TLS, etc. IPSec, HIP, SMA, etc. Application Application App.-Secured Payload
  • 15.