[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Addressing reality: an architectural response to real-world demands on the evolving Internet

Published: 27 August 2003 Publication History

Abstract

A system as complex as the Internet can only be designed effectively if it is based on a core set of design principles, or tenets, that identify points in the architecture where there must be common understanding and agreement. The tenets of the original Internet architecture [6] arose as a response to the technical, governmental, and societal environment of internetworking's earliest days, but have remained central to the Internet as it has evolved. In light of the increasing integration of the Internet into the social, economic, and political aspects of our lives, it is worth revisiting the underlying tenets of what is becoming a central element of the world's infrastructure.This paper examines three key tenets that we believe should guide the evolution of the Internet in its next generation and beyond. They are: design for change, controlled transparency, and the centrality of the tussle space. [8] Our purpose is not to present these ideas as new, but rather to propose that they should be elevated to central tenets of the evolving architecture of the Internet, and explore the ramifications of doing so. The paper first examines the tenets somewhat abstractly, and then in more detail by studying their relation to several design choices needed for a complete architecture. We conclude with a discussion of the relationship between the network architecture and the applications it serves.

References

[1]
I. Baldine, H. Perros, G. Rouskas, D. Stevenson, JumpStart: A Just-in-Time Signaling Architecture for WDM Burst-Swtiched Networks, Proc. Networking 2002.]]
[2]
Y. Bernet, The Complementary Roles of RSVP and Differentiated Services in the Full-Service QOS Network, IEEE Communications Magazine, Vol. 38, No. 2, February, 2000.]]
[3]
R. Bush, FidoNet: technology, tools, and history, Communications of the ACM, Vol. 36, No. 8, August 1993.]]
[4]
B. Carpenter, Internet Transparency, RFC 2775, February 2000.]]
[5]
W. Cheswick and S. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker (1sted.), Addison Wesley, 1994.]]
[6]
D. D. Clark, Design Principles of the Internet Architecture, Proc. ACM SIGCOMM 1988, Stanford, CA, USA, August 1988.]]
[7]
D. D. Clark and D. Tennenhouse, Architectural Consideration for a New Generation of Protocols, Proc. ACM SIGCOMM 1990, Philadelphia, PA, USA, September 1990.]]
[8]
D. D. Clark, J. Wroclawski, K. Sollins, R. Braden, Tussle in Cyberspace: Defining Tomorrow's Internet, Proc. ACM SIGCOMM 2002, Pittsburgh, PA, USA, August 2002. Also to appear. IEEE/ACM Transactions on Networks.]]
[9]
M. E. Crovella, A. Bestavros, Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, IEEE/ACM Transactions on Networking, Vol. 5 No. 6, December 1997, pp 835--836.]]
[10]
L. Daigle, D. van Gulik, R. Iannela, P. Faltstrom, URN Namespace Definition Mechanisms, RFC 2611, June, 1999.]]
[11]
A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry, Epidemic Algorithms for Replicated Database Maintenance, Proc. Sixth Symposium on Principles of Distributed Computing, Vancouver, B. C., Canada, August 1987, pages 1--12.]]
[12]
Dept. of Defense, Trusted Computer Systems Evaluation CriteriaDoD 5200.28-STD, August 15, 1983. (Also known as the "Orange Book".)]]
[13]
FidoNet Web Site, http://www.fidonet.org]]
[14]
M. Handley, C. Kreibich and V. Paxson, Network Intrusion Detection, Evasion, Traffic Normalization and End-to-End Protocol Semantics, Proc. USENIX Security Symposium 2001.]]
[15]
S. Kent, C. Lynn, K. Seo, Secure Border Gateway Protocol (S-BGP), IEEE JSAC, Vol. 18 No. 4, April 2000, pp. 582--592.]]
[16]
P. V. Mockapetris, Domain names - concepts and facilities, RFC 1034, Nov. 1, 1987.]]
[17]
P. V. Mockapetris, Domain names - implementation and specification, RFC 1035, Nov. 1, 1987.]]
[18]
R. Moskowitz, unpublished documents on the Host Identity Payload Architecture, 2001. Currently the work only exists as Internet Drafts.]]
[19]
National Research Council, Committee on Information Systems Trustworthiness, Trust in Cyberspace, National Academy Press, 1999.]]
[20]
J. Postel, ed., Internet Protocol, RFC 791, Std 5, September 1981.]]
[21]
J. S. Quarterman and J. C. Hoskins, Notable Computer Networks, Communications of the ACM, Vol. 29 No. 10, ACM, October 1986, pp. 932--970.]]
[22]
C. Qiao and M. Yoo, Optical Burst Switching (OBS) - A New Paradigm for an Optical Internet, Journal of High Speed Networks, 1999.]]
[23]
J. Saltzer, D. Reed, D. Clark, End-to-End Arguments in System Design, ACM Transactions on Computer Systems, Vol. 2 No. 4, November 1984, pp. 277--288.]]
[24]
K. Sollins, Architectural Principles of Uniform Resource Name Resolution, RFC 2276, January, 1998.]]
[25]
K. Sollins and L. Massinter, Functional Requirements for Uniform Resource Names, RFC 1737, December, 1994.]]
[26]
J. Turner, Terabit Burst Switching, Journal of High Speed Networks, 1999.]]
[27]
A. Vahdat, M. Dahlin, T. Anderson, A. Aggarwal, Active Names: Flexible Location and Transport of Wide-Are Resources, Proc. 2ndUsenix Symposium on Internet Technologies and Systems, October, 1999.]]
[28]
W. Willinger, M. Taqqu, R. Sherman, D. Wilson, Self-Similarity Through High Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level, Proc. ACM SIGCOMM 1995, Cambridge, MA, USA, August 1995, pp. 100--113.]]

Cited By

View all
  • (2012)Techno-Economic Aspects of Information-Centric NetworkingJournal of Information Policy10.5325/jinfopoli.2.2012.262:1(26-50)Online publication date: 1-Jan-2012
  • (2012)Techno-Economic Aspects of Information-Centric NetworkingJournal of Information Policy10.5325/jinfopoli.2.2012.00262(26-50)Online publication date: 1-Jan-2012
  • (2012)Architecting for edge diversityProceedings of the 8th international conference on Emerging networking experiments and technologies10.1145/2413176.2413179(13-24)Online publication date: 10-Dec-2012
  • Show More Cited By

Index Terms

  1. Addressing reality: an architectural response to real-world demands on the evolving Internet

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 33, Issue 4
    October 2003
    93 pages
    ISSN:0146-4833
    DOI:10.1145/972426
    Issue’s Table of Contents
    • cover image ACM Conferences
      FDNA '03: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
      August 2003
      100 pages
      ISBN:1581137486
      DOI:10.1145/944759
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 August 2003
    Published in SIGCOMM-CCR Volume 33, Issue 4

    Check for updates

    Author Tags

    1. Architectural principles
    2. application support
    3. architecture design
    4. design for change
    5. security
    6. transparency
    7. tussle

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)87
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)Techno-Economic Aspects of Information-Centric NetworkingJournal of Information Policy10.5325/jinfopoli.2.2012.262:1(26-50)Online publication date: 1-Jan-2012
    • (2012)Techno-Economic Aspects of Information-Centric NetworkingJournal of Information Policy10.5325/jinfopoli.2.2012.00262(26-50)Online publication date: 1-Jan-2012
    • (2012)Architecting for edge diversityProceedings of the 8th international conference on Emerging networking experiments and technologies10.1145/2413176.2413179(13-24)Online publication date: 10-Dec-2012
    • (2011)A Comprehensive Long-Term Evaluation on BGP Performance2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5962883(1-6)Online publication date: Jun-2011
    • (2011)Distributed Data Mining with Differential Privacy2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5962863(1-5)Online publication date: Jun-2011
    • (2011)Economically Viable Support for Internet Mobility2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5962682(1-6)Online publication date: Jun-2011
    • (2011)Policy-based mobility in heterogeneous networksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-011-0103-x4:3(331-338)Online publication date: 30-Dec-2011
    • (2010)Policy Based Mobility Support in Heterogeneous NetworksProceedings of the 2010 13th International Conference on Network-Based Information Systems10.1109/NBiS.2010.110(265-272)Online publication date: 14-Sep-2010
    • (2009)iMarkProceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management10.5555/1688933.1688987(335-342)Online publication date: 1-Jun-2009
    • (2009)iMark: An identity management framework for network virtualization environment2009 IFIP/IEEE International Symposium on Integrated Network Management10.1109/INM.2009.5188833(335-342)Online publication date: Jun-2009
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media