These core Internet protocols are gradually changing

These core Internet protocols are gradually changing

The Internet we are familiar with used to mainly use IPv4 protocol routing packets, TCP protocol connections, SSL/TLS encrypted connections, DNS query hosts, and HTTP application protocols. Mark Nottingham, co-chair of the HTTP and QUIC working groups of the IETF, said that the commonly used Internet protocols have been changing in the past few years:

  • HTTP/2's multiplexing allows a single TCP connection to send many requests, and it uses TLS/1.2 encryption, shielding encryption algorithms that are considered insecure.
  • TLS 1.3 has reached the latest stage of standardization. Don't be confused by its incremental name. It is actually a completely new version of TLS that modifies the handshake and uses dynamically changing key exchanges instead of static key exchanges. This design has caused concerns among network operators and suppliers because they cannot intercept and view encrypted traffic. TLS 1.3 does not support technologies that can intercept traffic.
  • TCP is an in-order delivery protocol. The loss of a packet will affect the delivery of subsequent packets. The QUIC protocol attempts to solve this problem. It was developed by Google and has now been handed over to IETF. It is expected to be standardized in 2018. Google has already deployed QUIC in its Chrome browser and website.
  • QUIC was originally developed as an HTTP-over-UDP use case, and encryption is also required. There is no unencrypted QUIC. It uses TLS 1.3 to establish session keys. Because it is based on UDP, the session information and metadata exposed in the TCP connection are encrypted in QUIC. Another new protocol is DOH, DNS over HTTP.

<<:  Various technical measures to eliminate data center hot spots

>>:  AI and blockchain: What kind of sparks will the collision of these two popular technologies create?

Recommend

These router phenomena must have troubled you. Take a look and learn more

Does the row of indicator lights on your router o...

What problems do HTTP/1, HTTP/2, and HTTP/3 solve?

What problems does each generation of HTTP solve?...

In-depth analysis of the operation results of Go Channel in each state

Hello everyone, I am Fisherman. Channel is a uniq...

Analyzing the core technology behind 5G: beamforming

Virtual reality, drones, and autonomous driving, ...

Amid COVID-19, have we neglected border security?

[[342703]] The coronavirus pandemic has triggered...

What role does Wi-Fi-6 play in the field of industrial IoT?

5G technology has enough advantages to support so...

Ericsson: Global 5G users will exceed 580 million by the end of the year

According to foreign media, Ericsson recently rel...

On the "Kung Fu" of IT Operation and Maintenance

One day, Master Ma was walking on the street and ...