NETWORK GROUP Internet Report an Examination of the NS/EP Implications of Internet Technologies

Total Page:16

File Type:pdf, Size:1020Kb

NETWORK GROUP Internet Report an Examination of the NS/EP Implications of Internet Technologies THE PRESIDENT’S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NETWORK GROUP Internet Report An Examination of the NS/EP Implications of Internet Technologies JUNE 1999 President’s National Security Telecommunications Advisory Committee INTERNET REPORT TABLE OF CONTENTS EXECUTIVE SUMMARY.................................................................................................ES-1 1.0 INTRODUCTION...........................................................................................................1 1.1 Background....................................................................................................................1 1.2 Purpose..........................................................................................................................1 1.3 Definitions .....................................................................................................................2 1.3.1 National Security and Emergency Preparedness Services.........................................2 1.3.2 Severe Disruption ....................................................................................................2 1.3.3 Reliability................................................................................................................2 1.3.4 Availability..............................................................................................................2 1.4 Approach .......................................................................................................................2 2.0 NS/EP OPERATIONS AND INTERNET TECHNOLOGIES......................................4 2.1 Background....................................................................................................................4 2.2 NS/EP Community’s Dependence on Dedicated TCP/IP Networks................................6 2.2.1 NIPRNET and SIPRNET.........................................................................................6 2.2.2 Joint Worldwide Intelligence Communications System............................................6 2.2.3 Intelink ....................................................................................................................7 2.2.4 Open Source Information System ............................................................................7 2.3 NS/EP Community’s Current Dependence on the Internet..............................................7 2.3.1 Remote Access ........................................................................................................8 2.3.2 Secure Web Sites.....................................................................................................8 2.3.3 Conclusion...............................................................................................................9 2.4 NS/EP Community’s Current Use of the Internet .........................................................10 2.4.1 National Communications System .........................................................................10 2.4.2 FEMA ...................................................................................................................10 2.4.3 DOD......................................................................................................................10 2.4.4 GSA ......................................................................................................................11 2.4.5 Other Agencies ......................................................................................................11 2.5 Future NS/EP Dependence on the Internet ...................................................................11 2.5.1 Evolving Technologies and Applications ...............................................................12 2.6 Critical Infrastructures’ Dependencies on the Internet and Consequent Impacts on NS/EP Operations .........................................................................................................15 2.6.1 Financial Infrastructure..........................................................................................16 2.6.2 Gas and Electric Power Industries..........................................................................16 2.6.3 Telecommunications Industry ................................................................................17 2.6.4 Medical Services ...................................................................................................18 INTERNET REPORT i President’s National Security Telecommunications Advisory Committee 2.6.5 Emergency Services...............................................................................................18 2.6.6 Conclusion.............................................................................................................18 2.7 Summary......................................................................................................................19 3.0 INTERNET OVERVIEW.............................................................................................20 3.1 Internet Terminology....................................................................................................20 3.2 Internet Functional Components...................................................................................20 3.3 Internet Infrastructure Operational Overview ...............................................................22 3.3.1 Interexchange Points..............................................................................................24 3.3.2 National Backbone Providers.................................................................................26 3.3.3 Regional Service Providers....................................................................................27 3.4 Interconnections...........................................................................................................27 3.5 Organizations Guiding Management and Development of Internet Architecture...........28 3.5.1 Internet Assigned Numbers Authority....................................................................28 3.5.2 National Science Foundation (NSF).......................................................................28 3.5.3 Network Solutions, Inc. (NSI) ...............................................................................28 3.5.4 Internet Engineering Task Force (IETF) ................................................................28 3.5.5 Internet Architecture Board (IAB) .........................................................................29 3.5.6 Internet Society......................................................................................................29 3.5.7 International Telecommunication Union (ITU) ......................................................29 4.0 INTERNET VULNERABILITIES AND FAILURE IMPLICATIONS .....................30 4.1 Vulnerabilities: Management ......................................................................................30 4.1.1 IP Parameters and Addresses .................................................................................31 4.1.2 Domain Name System (DNS)................................................................................32 4.2 Vulnerabilities: Infrastructure Components .................................................................33 4.2.1 Interexchange Points (IXP)....................................................................................33 4.2.2 Routers..................................................................................................................34 4.2.3 ISP Infrastructure ..................................................................................................35 4.2.4 Software ................................................................................................................36 4.3 Malicious Exploitation of Internet Vulnerabilities ........................................................37 4.4 Procedural Errors .........................................................................................................38 4.5 Natural Hazards ...........................................................................................................39 4.6 Trends..........................................................................................................................39 5.0 INTERNET INITIATIVES AND EVOLVING TECHNOLOGIES...........................42 5.1 Introduction .................................................................................................................42 5.2 Internet2 and NGI ........................................................................................................42 5.3 Internet2 ......................................................................................................................42 5.3.1 Internet2 Goals ......................................................................................................43 5.3.2 Internet2 Architecture............................................................................................43 INTERNET REPORT ii President’s National Security Telecommunications Advisory Committee CONTINUED 5.3.3 Internet2 and NS/EP ..............................................................................................45 5.4 Next Generation Internet..............................................................................................46 5.4.1 NGI Goals .............................................................................................................47 5.4.2 NGI Architecture...................................................................................................48
Recommended publications
  • Integration of Mobile Technology Into Museum Education: a Discussion of the State of the Art Mark P
    Seton Hall University eRepository @ Seton Hall Theses Spring 5-2011 Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art Mark P. Diemer Seton Hall University Follow this and additional works at: https://scholarship.shu.edu/theses Recommended Citation Diemer, Mark P., "Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art" (2011). Theses. 26. https://scholarship.shu.edu/theses/26 INTEGRATION OF MOBILE TECHNOLOGY Il INTO MUSEUM EDUCATION: A DISCUSSION 1 OF THE STATE OF THE ART i 1 I by I Mark P. Diemer I A thesis submitted in partial fulfillment of the requirements for the degree of I Master of Arts in Museum Professions j I I Seton Hall University May 2011 I I ! 1 i I I I Copy © Mark P. Diemer, 2011. All Rights Reserved. I No part of this document may be reproduced in any form without written permission of the author. Copyrights to images are owned by other copyright holders and should not be reproduced under any circumstances. TIlls document as shown is not for publication and was produced in satisfaction of thesis I requirements. I I I I ,! } ! l I; Seton Hall University Abstract Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art by Mark P. Diemer 'lnesi" Advisor: Dr. Petra Chu Museum Professions Program Approval: This thesis is an attempt to examine the current state of mobile technology use in museum education programs. Mobile technology is fast becoming the communications and learning medium of choice.
    [Show full text]
  • Netscape Guide by Yahoo!
    Netscape Guide By Yahoo! Now Available New Customizable Internet Information and Navigation Service Launched by Netscape and Yahoo! SANTA CLARA, CA and MOUNTAIN VIEW, CA -- April 29, 1997 -- Yahoo! Inc. (NASDAQ: YHOO) and Netscape Communications Corporation (NASDAQ: NSCP) today launched Netscape Guide by Yahoo!, a new personalized Internet navigation service designed to provide Internet users with a central source of sites, news and events on the Web. The Guide features customizable sections for several popular information categories, including Business, Finance, Entertainment, Sports, Computers & Internet, Shopping and Travel. Yahoo! plans to expand the service with additional categories in the future, including local information. Netscape Guide by Yahoo! replaces the Destinations section of the Netscape Internet Site and is immediately accessible through Netscape's Internet site (http://home.netscape.com), from the "Guide" button on the Netscape Communicator toolbar and from the "Destinations" button on Netscape Navigator 3.0. Users accessing Destinations will be automatically directed to Netscape Guide by Yahoo!. "Netscape Guide by Yahoo! gives Internet users quick and easy access to the most popular information areas on the Web, all from one central location," said Jeff Mallett, Yahoo!'s senior vice president of business operations. "It also provides Web content providers and advertisers a unique opportunity to reach targeted and growing audiences." "Accessible to the more than four million daily visitors to the Netscape Internet site and the over 50 million users of Netscape client software, Netscape Guide by Yahoo! will direct users to the online sites, news and information they need," said Jennifer Bailey, vice president of electronic marketing at Netscape.
    [Show full text]
  • Configuring DNS
    Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses. Note You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource record type AAAA is used to map a domain name to an IPv6 address. The IP6.ARPA domain is defined to look up a record given an IPv6 address. • Finding Feature Information, page 1 • Prerequisites for Configuring DNS, page 2 • Information About DNS, page 2 • How to Configure DNS, page 4 • Configuration Examples for DNS, page 13 • Additional References, page 14 • Feature Information for DNS, page 15 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
    [Show full text]
  • Adopting Encrypted DNS in Enterprise Environments
    National Security Agency | Cybersecurity Information Adopting Encrypted DNS in Enterprise Environments Executive summary Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocol addresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNS over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authentication with a client’s DNS resolver. It is useful to prevent eavesdropping and manipulation of DNS traffic. While DoH can help protect the privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networks unless they allow only their chosen DoH resolver to be used. Enterprise DNS controls can prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration. Using DoH with external resolvers can be good for home or mobile users and networks that do not use DNS security controls. For enterprise networks, however, NSA recommends using only designated enterprise DNS resolvers in order to properly leverage essential enterprise cybersecurity defenses, facilitate access to local network resources, and protect internal network information. The enterprise DNS resolver may be either an enterprise-operated DNS server or an externally hosted service. Either way, the enterprise resolver should support encrypted DNS requests, such as DoH, for local privacy and integrity protections, but all other encrypted DNS resolvers should be disabled and blocked.
    [Show full text]
  • IE 5.5 and Netscape 4.75 - Why Upgrade? ..Page 1
    In This Issue . IE 5.5 and Netscape 4.75 - Why Upgrade? ..page 1 WindowsME for Home Computing ..…..…..page 1 Critical Updates are Essential ……..……….page 1 Win 95/98 Web Browser Upgrade.…………page 2 Permanent LRC Stations…………...……….page 2 cc:Mail is Retiring ……..…………..………..page 2 The newsletter for IPFW computer users Information Technology Services October 2000 Courses & Resources…………….……….….page 2 IE 5.5 and Netscape for Home 4.75 - Why Upgrade? Computing Campus surfers should update their browsers to the Microsoft recently released its upgrade to Windows 98 latest versions of Netscape and Internet Explorer (IE). for home computing — Windows Millennium (WindowsMe). Windows users may do so by the following instructions on Follett's IPFW Bookstore is now offering the CD to students, page 2. Macintosh users may obtain the instructions for faculty, and staff as part of IU's licensing agreement with creating an alias for either or both programs from the Help Microsoft. Is the upgrade for you? Windows Millennium Desk (e-mail: [email protected]). includes: Very basic digital media editing tools Why upgrade? In general, obtaining the latest 4 IE 5.5 (also downloadable for Windows 98) version of your favorite browser helps ensure that you have 4 4 Media Player 7 (also downloadable for Windows 98) the most capable and secure browser for today's Web If you have no compelling need for the above features environment. Specifically, the newest and most significant or if you take the time to do wnload IE 5.5 and/or Media Player 7 features of each include: for Windows 98, you may want to skip this upgrade.
    [Show full text]
  • The Internet and "Telecommunications Services," Universal Service Mechanisms, Access Charges, and Other Flotsam of the Regulatory System
    The Internet and "Telecommunications Services," Universal Service Mechanisms, Access Charges, and Other Flotsam of the Regulatory System Jonathan Weinbergt In troduction .............................................................................................. 2 11 I. B ackground ...................................................................................... 2 14 A . InternetA rchitecture................................................................ 215 B . Telephone Regulation .............................................................. 217 1. The Federal-State Divide ................................................. 218 2. Comp uter II ...................................................................... 220 3. The 1996 Telecommunications Act ................................. 222 II. The Internet and Universal Service Mechanisms ............................ 225 A. The Report to Congress on Universal Service ......................... 225 B. The Breakdown of the Telecommunications/InformationService D istinction................................................................................ 227 C. Why the Telecommunications/InformationService D istinction Doesn't Work ........................................................ 232 D. Universal Service Redux .......................................................... 234 III. The Internet and Access Charges .................................................... 239 A . The Status Q uo ......................................................................... 239 B . Beyond the
    [Show full text]
  • Telecommunication Provider 5Linx Accessline Communications ACN Communications Services, Inc
    Telecommunication Provider 5Linx Accessline Communications ACN Communications Services, Inc. AmeriVision Communications, Inc. dba Affinity 4 and Lifeline Communications Airnex Communications, Inc. Allvoi Americatel Corporation ANPI Business, LLC fka Zone Telecom, LLC AT Conference, Inc. AT&T Corp. BA Telecom, Inc. BBG Communications, Inc. Billing Concepts, Inc. (Refered us to AT&T as provider) Birch Telcom of the West Inc. dba Birch Communications BullsEye Telecom Cbeyond Communications LLC Century Link Communications Cincinnati Bell Any Distance Consumer Cellular Convergia Cox California Telecom, LLC Cricket Communications, Inc./AT&T Mobility Earthlink Business, LLC ‐ Earthlink, LLC ‐ Earthlink, Inc. Enhanced Communications Network INC. E. / Everything Wireless First Communications Flash Wireless Globalstar USA LLC Granite Telecommunications LLC GreatCall, Inc. dba Jitterbug IBM Global Network Systems IDT Domestic Telecom inContact, Inc. Intellicall Operator Services Intelafone LLC Intermedia Voice Services I‐Wireless LDMI Telecommunications, Inc. Level 3 Communications LightYear Network Solutions Lingo, Inc Los Angeles SMSA Limited Partnership Matrix Telecom, Inc. Mitel Net Solutions Page 1 of 2 Telecommunication Provider MCI Communications Services, Inc. Mpower Communications Corp. Network Innovations New Cingular Wireless PCS LLC NTT Docomo USA Nextel of California nexVortex, Inc. Nobel Tel, LLC OnStar LLC Ooma, Inc. Opex Communications, Inc. Pacific Bell Telephone Company PAETEC Communications Payment One Corp Phone.com, Inc. Pioneer Telephone PNG Telecommunications, Inc. Primus Telecommunications Ready Wireless SBC Long Distance, LLC Securus Technologies, Inc. Sonic Telecom, LLC Sprint Communications Company, L.P. Sprint Nextel/Spectrum Sprint Telephony PCS, LP Talk America, Inc. Telscape Communications, Inc. TING Globalinx Enterprise, Inc. fka Tri‐M Communications, Inc. T‐Mobile West LLC Metro PCS California, LLC Total Call International, Inc.
    [Show full text]
  • Growth of the Internet
    Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] Preliminary version, July 6, 2001 Abstract The Internet is the main cause of the recent explosion of activity in optical fiber telecommunica- tions. The high growth rates observed on the Internet, and the popular perception that growth rates were even higher, led to an upsurge in research, development, and investment in telecommunications. The telecom crash of 2000 occurred when investors realized that transmission capacity in place and under construction greatly exceeded actual traffic demand. This chapter discusses the growth of the Internet and compares it with that of other communication services. Internet traffic is growing, approximately doubling each year. There are reasonable arguments that it will continue to grow at this rate for the rest of this decade. If this happens, then in a few years, we may have a rough balance between supply and demand. Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] 1. Introduction Optical fiber communications was initially developed for the voice phone system. The feverish level of activity that we have experienced since the late 1990s, though, was caused primarily by the rapidly rising demand for Internet connectivity. The Internet has been growing at unprecedented rates. Moreover, because it is versatile and penetrates deeply into the economy, it is affecting all of society, and therefore has attracted inordinate amounts of public attention. The aim of this chapter is to summarize the current state of knowledge about the growth rates of the Internet, with special attention paid to the implications for fiber optic transmission.
    [Show full text]
  • CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16
    CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16 Network Security I Objectives ▪ Understand – Architecture of the Internet protocol suite (TCP/IP) ▪ CSE123 in 20mins – Common weaknesses in networking protocols – Available mitigations and their limitations Review: Internet Protocol Suite ▪ Application Layer – Examples: SMTP, FTP, SSH, HTTP, etc. ▪ Transport Layer: Port-addressed host-to-host communications (on LAN or WAN). – User Datagram Protocol (UDP): single packet transmission with no reliability or ordering mechanisms. – Transmission Control Protocol (TCP): connection establishment, reliable transmission, and flow-control. ▪ Internet Layer (IP): Fragmentation, reassembly, and end-to-end (across network boundaries) routing of data packets. – Provides a uniform interface that hides the underlying network topology. ▪ Link Layer: Transmission of data frames within a local network (without intervening routers). – Example: Ethernet ▪ Physical Layer: Transmission of raw bits (rather than logical data packets) over a physical data link connecting network nodes. – Example: 100BASE-T – [Technically not part of the Internet Protocol Model, but is still there] Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP Protocol Stack by Example ▪ ROUGHLY, what happens when I click on a URL while UCSD’s network? My computer www.yahoo.com Application Layer (HTTP) ▪ Turn click into HTTP GET request GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … Application Layer (Name Resolution) ▪ Where is www.yahoo.com? What’s the address for www.yahoo.com My computer Oh, you can find it at 64.58.76.177 132.239.9.64 Local DNS server 132.239.51.18 Transport Layer (TCP) ▪ Break message into packets (TCP segments) ▪ Should be delivered reliably & in-order GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … 3 yahoo.c 2 p://www.
    [Show full text]
  • Multimedia, Internet, On-Line
    Section IV: Multimedia, the Internet, and On-Line Services High-End Digital Video Applications Larry Amiot Electronic and Computing Technologies Division Argonne National Laboratory The emphasis of this paper is on the high-end applications Internet and Intranet that are driving digital video. The research with which I am involved at Argonne National Laboratory is not done on dig- The packet video networks which currently support many ital video per se, but rather on how the research applications applications such as file transfer, Mbone video (talking at the laboratory drive its requirements for digital video. The heads), and World Wide Web browsing are limiting for high- paper will define what digital video is, what some of its com- quality video because of the low throughput one can achieve ponents are, and then discuss a few applications that are dri- via the Internet or intranets. Examples of national packet ving the development of these components. The focus will be switched networks developed in the last several years include on what digital video means to individuals in the research the National Science Foundation Network (NSFNet). The and education community. Department of Energy had its own network called ESNET, and the National Aeronautics and Space Administration The Digital Video Environment (NASA) had a network as well. Recently, the NSFNet was de- commissioned, and commercial interests are now starting to In 1996, a group of people from several universities in the fill that void. Research and education communities are find- Midwest and from Argonne formed a Video Working Group. ing, however, that this new commercial Internet is too re- This body tried to define the areas of digital video of impor- stricting and does not meet their throughput requirements; it tance to their institutions.
    [Show full text]
  • Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Maller of ) ) Global Crossing Limited and Level 3 ) Communications, Inc., Application for ) Consent to Transfer Control ofAuthority to ) Provide Global facilities-Based and Global ) IB Docket No. I 1-78 Resale International Telecommunications ) Services and ofDomestic Common Carrier ) Transmission Lines, Pursuant to Section 214 ) of the Communications Act, as Amended ) ) Level 3 Communications, Inc., Petition for ) Declaratory Ruling Under Section 31 0(b)(4) ) Ofthe Communications Act of 1934, as ) AJnended ) DECLARATION OF MARCELLUS NIXON I. My name is Marcellus I ixon. I am the Director ofIP Network Planning at XO Communications, LLC. (XO). My business address is 13865 Sunrise Valley Drive, Hcrndon, VA 20171. 2. I have bcen employed at XO since 2002, initially as an IP Network Engineer. I have been in my current position as Dircctor ofIP Network Planning since 2008. My career with IP nctworks began in the US Army. I have also held networking positions with the NASD and internet MCT. I hold a Bachelor ofInterdisciplinary Studies from the University of Virginia. 3. In my current position, I am responsible for all strategic aspects of IP network planning, and I am the peering coordinator for XO. In that capacity, I manage relationships with other Tier I and lower tier Internet Backbone Providers (lI3Ps), including detennining wbere peering occurs, evaluating network arcbitecture needs such as capacity requirements, routing requirements, and the impact of technological changes on the peering arrangement. I also am responsible for negotiating interconnection (peering) agreements. To date, I have negotiated on behalf ofXO forty-seven (47) peering agreements.
    [Show full text]
  • Networking and the Internet
    Networking and Today’s lecture the Internet History of the Internet How the Internet works Lecture 4 – COMPSCI111/111G S2 2018 Network protocols The telephone WWII and the Cold War 1876: first successful bi-directional Computer technology played an important role transmission of clear speech in code-breaking during WW2 by Alexander Bell and Thomas Watson Cold War between US and USSR led to a technology and arms race Peaked with the launch of Sputnik in 1957 1958: Advanced Research Projects Agency (ARPA) 1940: first successful transmission established of digital data through over telegraph wires by George Stibitz April 1969: construction of ARPANET begins, a packet-switching network Circuit-switching network Packet-switching network Nodes are connected physically via a central Data is broken into packets, which are then sent node on the best route in the network Used by the telephone network Each node on the route sends the packet onto its next destination, avoiding congested or broken Originally, switchboard operators had to nodes manually connect phone calls, today this is done electronically B A ARPANET ARPANET in 1977 October 1969: ARPANET is completed with four nodes 1973: Norway connects to ARPANET via satellite, followed by London via a terrestrial link ARPANET ARPANET to the Internet 1983: TCP/IP implemented in ARPANET Networks similar to ARPANET sprang up around the USA and in other countries 1990: ARPANET is formally decommissioned 1984: domain name system (DNS) implemented 1985: NSFNET was established 1989: Waikato University connects to NSFNET 1991: World Wide Web (WWW) created at CERN (European Organization for Nuclear Research) by Tim Berners-Lee 1995: NSFNET is retired WWW vs Internet Internet growth The Internet is a global system of interconnected computer networks.
    [Show full text]