diff options
Diffstat (limited to 'doc/rfc/rfc3869.txt')
-rw-r--r-- | doc/rfc/rfc3869.txt | 1683 |
1 files changed, 1683 insertions, 0 deletions
diff --git a/doc/rfc/rfc3869.txt b/doc/rfc/rfc3869.txt new file mode 100644 index 0000000..9572a7f --- /dev/null +++ b/doc/rfc/rfc3869.txt @@ -0,0 +1,1683 @@ + + + + + + +Network Working Group R. Atkinson, Ed. +Request for Comments: 3869 S. Floyd, Ed. +Category: Informational Internet Architecture Board + August 2004 + + + IAB Concerns and Recommendations + Regarding Internet Research and Evolution + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). + +Abstract + + This document discusses IAB concerns that ongoing research is needed + to further the evolution of the Internet infrastructure, and that + consistent, sufficient non-commercial funding is needed to enable + such research. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2 + 1.1. Document Organization. . . . . . . . . . . . . . . . . . 2 + 1.2. IAB Concerns . . . . . . . . . . . . . . . . . . . . . . 3 + 1.3. Contributions to this Document . . . . . . . . . . . . . 4 + 2. History of Internet Research and Research Funding. . . . . . . 4 + 2.1. Prior to 1980. . . . . . . . . . . . . . . . . . . . . . 4 + 2.2. 1980s and early 1990s. . . . . . . . . . . . . . . . . . 5 + 2.3. Mid-1990s to 2003. . . . . . . . . . . . . . . . . . . . 6 + 2.4. Current Status . . . . . . . . . . . . . . . . . . . . . 6 + 3. Open Internet Research Topics. . . . . . . . . . . . . . . . . 7 + 3.1. Scope and Limitations. . . . . . . . . . . . . . . . . . 7 + 3.2. Naming . . . . . . . . . . . . . . . . . . . . . . . . . 8 + 3.2.1. Domain Name System (DNS). . . . . . . . . . . . 8 + 3.2.2. New Namespaces. . . . . . . . . . . . . . . . . 9 + 3.3. Routing. . . . . . . . . . . . . . . . . . . . . . . . . 9 + 3.3.1. Inter-domain Routing. . . . . . . . . . . . . . 10 + 3.3.2. Routing Integrity . . . . . . . . . . . . . . . 11 + 3.3.3. Routing Algorithms. . . . . . . . . . . . . . . 12 + 3.3.4. Mobile and Ad-Hoc Routing . . . . . . . . . . . 13 + 3.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 13 + + + +Atkinson & Floyd Informational [Page 1] + +RFC 3869 Research Funding Recommendations August 2004 + + + 3.4.1. Formal Methods. . . . . . . . . . . . . . . . . 14 + 3.4.2. Key Management. . . . . . . . . . . . . . . . . 14 + 3.4.3. Cryptography. . . . . . . . . . . . . . . . . . 15 + 3.4.4. Security for Distributed Computing. . . . . . . 15 + 3.4.5. Deployment Considerations in Security . . . . . 15 + 3.4.6. Denial of Service Protection. . . . . . . . . . 16 + 3.5. Network Management . . . . . . . . . . . . . . . . . . . 16 + 3.5.1. Managing Networks, Not Devices. . . . . . . . . 16 + 3.5.2. Enhanced Monitoring Capabilities. . . . . . . . 17 + 3.5.3. Customer Network Management . . . . . . . . . . 17 + 3.5.4. Autonomous Network Management . . . . . . . . . 17 + 3.6. Quality of Service . . . . . . . . . . . . . . . . . . . 17 + 3.6.1. Inter-Domain QoS Architecture . . . . . . . . . 18 + 3.6.2. New Queuing Disciplines . . . . . . . . . . . . 19 + 3.7. Congestion Control . . . . . . . . . . . . . . . . . . . 19 + 3.8. Studying the Evolution of the Internet Infrastructure. . 20 + 3.9. Middleboxes. . . . . . . . . . . . . . . . . . . . . . . 21 + 3.10. Internet Measurement . . . . . . . . . . . . . . . . . . 21 + 3.11. Applications . . . . . . . . . . . . . . . . . . . . . . 22 + 3.12. Meeting the Needs of the Future. . . . . . . . . . . . . 22 + 3.13. Freely Distributable Prototypes. . . . . . . . . . . . . 23 + 4. Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . 23 + 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 23 + 6. Security Considerations. . . . . . . . . . . . . . . . . . . . 24 + 7. Informative References . . . . . . . . . . . . . . . . . . . . 24 + 8. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 29 + 9. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 30 + +1. Introduction + + This document discusses the history of funding for Internet research, + expresses concern about the current state of such funding, and + outlines several specific areas that the IAB believes merit + additional research. Current funding levels for Internet research + are not generally adequate, and several important research areas are + significantly underfunded. This situation needs to be rectified for + the Internet to continue its evolution and development. + +1.1. Document Organization + + The first part of the document is a high-level discussion of the + history of funding for Internet research to provide some historical + context to this document. The early funding of Internet research was + largely from the U.S. government, followed by a period in the second + half of the 1990s of commercial funding and of funding from several + governments. However, the commercial funding for Internet research + has been reduced due to the recent economic downturn. + + + + +Atkinson & Floyd Informational [Page 2] + +RFC 3869 Research Funding Recommendations August 2004 + + + The second part of the document provides an incomplete set of open + Internet research topics. These are only examples, intended to + illustrate the breadth of open research topics. This second section + supports the general thesis that ongoing research is needed to + further the evolution of the Internet infrastructure. This includes + research on the medium-time-scale evolution of the Internet + infrastructure as well as research on longer-time-scale grand + challenges. This also includes many research issues that are already + being actively investigated in the Internet research community. + + Areas that are discussed in this section include the following: + naming, routing, security, network management, and transport. Issues + that require more research also include more general architectural + issues such as layering and communication between layers. In + addition, general topics discussed in this section include modeling, + measurement, simulation, test-beds, etc. We are focusing on topics + that are related to the IETF and IRTF (Internet Research Task Force) + agendas. (For example, Grid issues are not discussed in this + document because they are addressed through the Global Grid Forum and + other Grid-specific organizations, not in the IETF.) + + Where possible, the examples in this document point to separate + documents on these issues, and only give a high-level summary of the + issues raised in those documents. + +1.2. IAB Concerns + + In the aftermath of September 11 2001, there seems to be a renewed + interest by governments in funding research for Internet-related + security issues. From [Jackson02]: "It is generally agreed that the + security and reliability of the basic protocols underlying the + Internet have not received enough attention because no one has a + proprietary interest in them". + + That quote brings out a key issue in funding for Internet research, + which is that because no single organization (e.g., no single + government, software company, equipment vendor, or network operator) + has a sense of ownership of the global Internet infrastructure, + research on the general issues of the Internet infrastructure are + often not adequately funded. In our current challenging economic + climate, it is not surprising that commercial funding sources are + more likely to fund that research that leads to a direct competitive + advantage. + + The principal thesis of this document is that if commercial funding + is the main source of funding for future Internet research, the + future of the Internet infrastructure could be in trouble. In + addition to issues about which projects are funded, the funding + + + +Atkinson & Floyd Informational [Page 3] + +RFC 3869 Research Funding Recommendations August 2004 + + + source can also affect the content of the research, for example, + towards or against the development of open standards, or taking + varying degrees of care about the effect of the developed protocols + on the other traffic on the Internet. + + At the same time, many significant research contributions in + networking have come from commercial funding. However, for most of + the topics in this document, relying solely on commercially-funded + research would not be adequate. Much of today's commercial funding + is focused on technology transition, taking results from non- + commercial research and putting them into shipping commercial + products. We have not tried to delve into each of the research + issues below to discuss, for each issue, what are the potentials and + limitations of commercial funding for research in that area. + + On a more practical note, if there was no commercial funding for + Internet research, then few research projects would be taken to + completion with implementations, deployment, and follow-up + evaluation. + + While it is theoretically possible for there to be too much funding + for Internet research, that is far from the current problem. There + is also much that could be done within the network research community + to make Internet research more focused and productive, but that would + belong in a separate document. + +1.3. Contributions to this Document + + A number of people have directly contributed text for this document, + even though, following current conventions, the official RFC author + list includes only the key editors of the document. The + Acknowledgements section at the end of the document thanks other + people who contributed to this document in some form. + +2. History of Internet Research and Research Funding + +2.1. Prior to 1980 + + Most of the early research into packet-switched networks was + sponsored by the U.S. Defense Advanced Research Projects Agency + (DARPA) [CSTB99]. This includes the initial design, implementation, + and deployment of the ARPAnet connecting several universities and + other DARPA contractors. The ARPAnet originally came online in the + late 1960s. It grew in size during the 1970s, still chiefly with + DARPA funding, and demonstrated the utility of packet-switched + networking. + + + + + +Atkinson & Floyd Informational [Page 4] + +RFC 3869 Research Funding Recommendations August 2004 + + + DARPA funding for Internet design started in 1973, just four years + after the initial ARPAnet deployment. The support for Internet + design was one result of prior DARPA funding for packet radio and + packet satellite research. The existence of multiple networks + (ARPAnet, packet radio, and packet satellite) drove the need for + internetworking research. The Internet arose in large measure as a + consequence of DARPA research funding for these three networks -- and + arise only incidentally from the commercially-funded work at Xerox + PARC on Ethernet. + +2.2. 1980s and early 1990s + + The ARPAnet converted to the Internet Protocol (IP) on January 1, + 1983, approximately 20 years before this document was written. + Throughout the 1980s, the U.S. Government continued strong research + and development funding for Internet technology. DARPA continued to + be the key funding source, but was supplemented by other DoD (U.S. + Department of Defense) funding (e.g., via the Defense Data Network + (DDN) program of the Defense Communication Agency (DCA)) and other + U.S. Government funding (e.g., U.S. Department of Energy (DoE) + funding for research networks at DoE national laboratories, (U.S.) + National Science Foundation (NSF) funding for academic institutions). + This funding included basic research, applied research (including + freely distributable prototypes), the purchase of IP-capable + products, and operating support for the IP-based government networks + such as ARPAnet, ESnet, MILnet, the NASA Science Internet, and + NSFnet. + + During the 1980s, the U.S. DoD desired to leave the business of + providing operational network services to academic institutions, so + funding for most academic activities moved over to the NSF during the + decade. NSF's initial work included sponsorship of CSnet in 1981. + By 1986, NSF was also sponsoring various research projects into + networking (e.g., Mills' work on Fuzzballs). In the late 1980s, NSF + created the NSFnet backbone and sponsored the creation of several NSF + regional networks (e.g., SURAnet) and interconnections with several + international research networks. NSF also funded gigabit networking + research, through the Corporation for National Research Initiatives + (CNRI), starting in the late 1980s. It is important to note that the + NSF sponsorship was focused on achieving core NSF goals, such as + connecting scientists at leading universities to NSF supercomputing + centers. The needs of high-performance remote access to + supercomputers drove the overall NSFnet performance. As a side + effect, this meant that students and faculty at those universities + enjoyed a relatively high-performance Internet environment. As those + students graduated, they drove both commercial use of the Internet + and the nascent residential market. It is no accident that this was + the environment from which the world wide web emerged. + + + +Atkinson & Floyd Informational [Page 5] + +RFC 3869 Research Funding Recommendations August 2004 + + + Most research funding outside the U.S. during the 1980s and early + 1990s was focused on the ISO OSI networking project or on then-new + forms of network media (e.g., wireless, broadband access). The + European Union was a significant source of research funding for the + networking community in Europe during this period. Some of the best + early work in gigabit networking was undertaken in the UK and Sweden. + +2.3. Mid-1990s to 2003 + + Starting in the middle 1990s, U.S. Government funding for Internet + research and development was significantly reduced. The premise for + this was that the growing Internet industry would pay for whatever + research and development that was needed. Some funding for Internet + research and development has continued in this period from European + and Asian organizations (e.g., the WIDE Project in Japan [WIDE]). + Reseaux IP Europeens [RIPE] is an example of market-funded networking + research in Europe during this period. + + Experience during this period has been that commercial firms have + often focused on donating equipment to academic institutions and + promoting somewhat vocationally-focused educational projects. Many + of the commercially-funded research and development projects appear + to have been selected because they appeared likely to give the + funding source a specific short-term economic advantage over its + competitors. Higher risk, more innovative research proposals + generally have not been funded by industry. A common view in Silicon + Valley has been that established commercial firms are not very good + at transitioning cutting edge research into products, but were + instead good at buying small startup firms who had successfully + transitioned such cutting edge research into products. + Unfortunately, small startup companies are generally unable + financially to fund any research themselves. + +2.4. Current Status + + The result of reduced U.S. Government funding and profit-focused, + low-risk, short-term industry funding has been a decline in higher- + risk but more innovative research activities. Industry has also been + less interested in research to evolve the overall Internet + architecture, because such work does not translate into a competitive + advantage for the firm funding such work. + + The IAB believes that it would be helpful for governments and other + non-commercial sponsors to increase their funding of both basic + research and applied research relating to the Internet, and to + sustain these funding levels going forward. + + + + + +Atkinson & Floyd Informational [Page 6] + +RFC 3869 Research Funding Recommendations August 2004 + + +3. Open Internet Research Topics + + This section primarily discusses some specific topics that the IAB + believes merit additional research. Research, of course, includes + not just devising a theory, algorithm, or mechanism to accomplish a + goal, but also evaluating the general efficacy of the approach and + then the benefits vs. the costs of deploying that algorithm or + mechanism. Important cautionary notes about this discussion are + given in the next sub-section. This particular set of topics is not + intended to be comprehensive, but instead is intended to demonstrate + the breadth of open Internet research questions. + + Other discussions of problems of the Internet that merit further + research include the following: + [CIPB02,Claffy03a,Floyd,NSF03a,NSF03b]. + +3.1. Scope and Limitations + + This document is NOT intended as a guide for public funding agencies + as to exactly which projects or proposals should or should not be + funded. + + In particular, this document is NOT intended to be a comprehensive + list of *all* of the research questions that are important to further + the evolution of the Internet; that would be a daunting task, and + would presuppose a wider and more intensive effort than we have + undertaken in this document. + + Similarly, this document is not intended to list the research + questions that are judged to be only of peripheral importance, or to + survey the current (global; governmental, commercial, and academic) + avenues for funding for Internet research, or to make specific + recommendations about which areas need additional funding. The + purpose of the document is to persuade the reader that ongoing + research is needed towards the continued evolution of the Internet + infrastructure; the purpose is not to make binding pronouncements + about which specific areas are and are not worthy of future funding. + + For some research clearly relevant to the future evolution of the + Internet, there are grand controversies between competing proposals + or competing schools of thought; it is not the purpose of this + document to take positions in these controversies, or to take + positions on the nature of the solutions for areas needing further + research. + + + + + + + +Atkinson & Floyd Informational [Page 7] + +RFC 3869 Research Funding Recommendations August 2004 + + + That all carefully noted, the remainder of this section discusses a + broad set of research areas, noting a subset of particular topics of + interest in each of those research areas. Again, this list is NOT + comprehensive, but rather is intended to suggest that a broad range + of ongoing research is needed, and to propose some candidate topics. + +3.1.1. Terminology + + Several places in this document refer to 'network operators'. By + that term, we intend to include anyone or any organization that + operates an IP-based network; we are not using that term in the + narrow meaning of commercial network service providers. + +3.2. Naming + + The Internet currently has several different namespaces, including IP + addresses, sockets (specified by the IP address, upper-layer + protocol, and upper-layer port number), Autonomous System (AS) + number, and the Fully-Qualified Domain Name (FQDN). Many of the + Internet's namespaces are supported by the widely deployed Domain + Name System [RFC-3467] or by various Internet applications [RFC-2407, + Section 4.6.2.1] + +3.2.1. Domain Name System (DNS) + + The DNS system, while it works well given its current constraints, + has several stress points. + + The current DNS system relies on UDP for transport, rather than SCTP + or TCP. Given the very large number of clients using a typical DNS + server, it is desirable to minimize the state on the DNS server side + of the connection. UDP does this well, so it is a reasonable choice, + though this has other implications, for example a reliance on UDP + fragmentation. With IPv6, intermediate fragmentation is not allowed + and Path MTU Discovery is mandated. However, the amount of state + required to deploy Path MTU Discovery for IPv6 on a DNS server might + be a significant practical problem. + + One implication of this is that research into alternative transport + protocols, designed more for DNS-like applications where there are + very many clients using each server, might be useful. Of particular + interest would be transport protocols with little burden for the DNS + server, even if that increased the burden somewhat for the DNS + client. + + Additional study of DNS caching, both currently available caching + techniques and also of potential new caching techniques, might be + helpful in finding ways to reduce the offered load for a typical DNS + + + +Atkinson & Floyd Informational [Page 8] + +RFC 3869 Research Funding Recommendations August 2004 + + + server. In particular, examination of DNS caching through typical + commercial firewalls might be interesting if it lead to alternative + firewall implementations that were less of an obstacle to DNS + caching. + + The community lacks a widely-agreed-upon set of metrics for measuring + DNS server performance. It would be helpful if people would + seriously consider what characteristics of the DNS system should be + measured. + + Some in the community would advocate replacing the current DNS system + with something better. Past attempts to devise a better approach + have not yielded results that persuaded the community to change. + Proposed work in this area could be very useful, but might require + careful scrutiny to avoid falling into historic design pitfalls. + + With regards to DNS security, major technical concerns include + finding practical methods for signing very large DNS zones (e.g., and + tools to make it easier to manage secure DNS infrastructure. + + Most users are unable to distinguish a DNS-related failure from a + more general network failure. Hence, maintaining the integrity and + availability of the Domain Name System is very important for the + future health of the Internet. + +3.2.2. New Namespaces + + Additionally, the Namespace Research Group (NSRG) of the Internet + Research Task Force (IRTF) studied adding one or more additional + namespaces to the Internet Architecture [LD2002]. Many members of + the IRTF NSRG believe that there would be significant architectural + benefit to adding one or more additional namespaces to the Internet + Architecture. Because smooth consensus on that question or on the + properties of a new namespace was not obtained, the IRTF NSRG did not + make a formal recommendation to the IETF community regarding + namespaces. The IAB believes that this is an open research question + worth examining further. + + Finally, we believe that future research into the evolution of + Internet-based distributed computing might well benefit from studying + adding additional namespaces as part of a new approach to distributed + computing. + +3.3. Routing + + The currently deployed unicast routing system works reasonably well + for most users. However, the current unicast routing architecture is + suboptimal in several areas, including the following: end-to-end + + + +Atkinson & Floyd Informational [Page 9] + +RFC 3869 Research Funding Recommendations August 2004 + + + convergence times in global-scale catenets (a system of networks + interconnected via gateways); the ability of the existing inter- + domain path-vector algorithm to scale well beyond 200K prefixes; the + ability of both intra-domain and inter-domain routing to use multiple + metrics and multiple kinds of metrics concurrently; and the ability + of IPv4 and IPv6 to support widespread site multi-homing without + undue adverse impact on the inter-domain routing system. Integrating + policy into routing is also a general concern, both for intra-domain + and inter-domain routing. In many cases, routing policy is directly + tied to economic issues for the network operators, so applied + research into routing ideally would consider economic considerations + as well as technical considerations. + + This is an issue for which the commercial interest is clear, but that + seems unlikely to be solved through commercial funding for research, + in the absence of a consortium of some type. + +3.3.1. Inter-domain Routing + + The current operational inter-domain routing system has between + 150,000 and 200,000 routing prefixes in the default-free zone (DFZ) + [RFC-3221]. ASIC technology obviates concerns about the ability to + forward packets at very high speeds. ASIC technology also obviates + concerns about the time required to perform longest-prefix-match + computations. However, some senior members of the Internet routing + community have concerns that the end-to-end convergence properties of + the global Internet might hit fundamental algorithmic limitations + (i.e., not hardware limitations) when the DFZ is somewhere between + 200,000 and 300,000 prefixes. Research into whether this concern is + well-founded in scientific terms seems very timely. + + Separately from the above concern, recent work has shown that there + can be significant BGP convergence issues today. At present, it + appears that the currently observed convergence issues relate to how + BGP has been configured by network operators, rather than being any + sort of fundamental algorithmic limitation [MGVK02]. This + convergence time issue makes the duration of the apparent network + outage much longer than it should be. Additional applied research + into which aspects of a BGP configuration have the strongest impact + on convergence times would help mitigate the currently observed + operational issues. + + Also, inter-domain routing currently requires significant human + engineering of specific inter-AS paths to ensure that reasonably + optimal paths are used by actual traffic. Ideally, the inter-domain + routing system would automatically cause reasonably optimal paths to + be chosen. Recent work indicates that improved BGP policy mechanisms + + + + +Atkinson & Floyd Informational [Page 10] + +RFC 3869 Research Funding Recommendations August 2004 + + + might help ensure that reasonably optimal paths are normally used for + inter-domain IP traffic. [SMA03] Continued applied research in this + area might lead to substantially better technical approaches. + + The current approach to site multi-homing has the highly undesirable + side-effect of significantly increasing the growth rate of prefix + entries in the DFZ (by impairing the deployment of prefix + aggregation). Research is needed into new routing architectures that + can support large-scale site multi-homing without the undesirable + impacts on inter-domain routing of the current multi-homing + technique. + + The original application for BGP was in inter-domain routing, + primarily within service provider networks but also with some use by + multi-homed sites. However, some are now trying to use BGP in other + contexts, for example highly mobile environments, where it is less + obviously well suited. Research into inter-domain routing and/or + intra-domain policy routing might lead to other approaches for any + emerging environments where the current BGP approach is not the + optimal one. + +3.3.2. Routing Integrity + + Recently there has been increased awareness of the longstanding issue + of deploying strong authentication into the Internet inter-domain + routing system. Currently deployed mechanisms (e.g., BGP TCP MD5 + [RFC-2385], OSPF MD5, RIP MD5 [RFC-2082]) provide cryptographic + authentication of routing protocol messages, but no authentication of + the actual routing data. Recent proposals (e.g., S-BGP [KLMS2000]) + for improving this in inter-domain routing appear difficult to deploy + across the Internet, in part because of their reliance on a single + trust hierarchy (e.g., a single PKI). Similar proposals (e.g., OSPF + with Digital Signatures, [RFC-2154]) for intra-domain routing are + argued to be computationally infeasible to deploy in a large network. + + A recurring challenge with any form of inter-domain routing + authentication is that there is no single completely accurate source + of truth about which organizations have the authority to advertise + which address blocks. Alternative approaches to authentication of + data in the routing system need to be developed. In particular, the + ability to perform partial authentication of routing data would + facilitate incremental deployment of routing authentication + mechanisms. Also, the ability to use non-hierarchical trust models + (e.g., the web of trust used in the PGP application) might facilitate + incremental deployment and might resolve existing concerns about + centralized administration of the routing system, hence it merits + additional study and consideration. + + + + +Atkinson & Floyd Informational [Page 11] + +RFC 3869 Research Funding Recommendations August 2004 + + +3.3.3. Routing Algorithms + + The current Internet routing system relies primarily on two + algorithms. Link-state routing uses the Dijkstra algorithm + [Dijkstra59]. Distance-Vector routing (e.g., RIP) and Path-Vector + routing (e.g., BGP) use the Bellman-Ford algorithm [Bellman1957, + FF1962]. Additional ongoing basic research into graph theory as + applied to routing is worthwhile and might yield algorithms that + would enable a new routing architecture or otherwise provide + improvements to the routing system. + + Currently deployed multicast routing relies on the Deering RPF + algorithm [Deering1988]. Ongoing research into alternative multicast + routing algorithms and protocols might help alleviate current + concerns with the scalability of multicast routing. + + The deployed Internet routing system assumes that the shortest path + is always the best path. This is provably false, however it is a + reasonable compromise given the routing protocols currently + available. The Internet lacks deployable approaches for policy-based + routing or routing with alternative metrics (i.e., some metric other + than the number of hops to the destination). Examples of alternative + policies include: the path with lowest monetary cost; the path with + the lowest probability of packet loss; the path with minimized + jitter; and the path with minimized latency. Policy metrics also + need to take business relationships into account. Historic work on + QoS-based routing has tended to be unsuccessful in part because it + did not adequately consider economic and commercial considerations of + the routing system and in part because of inadequate consideration of + security implications. + + Transitioning from the current inter-domain routing system to any new + inter-domain routing system is unlikely to be a trivial exercise. So + any proposal for a new routing system needs to carefully consider and + document deployment strategies, transition mechanisms, and other + operational considerations. Because of the cross-domain + interoperability aspect of inter-domain routing, smooth transitions + from one inter-domain routing system are likely to be difficult to + accomplish. Separately, the inter-domain routing system lacks strong + market forces that would encourage migration to better technical + approaches. Hence, it appears unlikely that the commercial sector + will be the source of a significantly improved inter-domain routing + system. + + + + + + + + +Atkinson & Floyd Informational [Page 12] + +RFC 3869 Research Funding Recommendations August 2004 + + +3.3.4. Mobile and Ad-Hoc Routing + + While some of the earliest DARPA-sponsored networking research + involved packet radio networks, mobile routing [IM1993] and mobile + ad-hoc routing [RFC-2501] are relatively recent arrivals in the + Internet, and are not yet widely deployed. The current approaches + are not the last word in either of those arenas. We believe that + additional research into routing support for mobile hosts and mobile + networks is needed. Additional research for ad-hoc mobile hosts and + mobile networks is also worthwhile. Ideally, mobile routing and + mobile ad-hoc routing capabilities should be native inherent + capabilities of the Internet routing architecture. This probably + will require a significant evolution from the existing Internet + routing architecture. (NB: The term "mobility" as used here is not + limited to mobile telephones, but instead is very broadly defined, + including laptops that people carry, cars/trains/aircraft, and so + forth.) + + Included in this topic are a wide variety of issues. The more + distributed and dynamic nature of partially or completely self- + organizing routing systems (including the associated end nodes) + creates unique security challenges (especially relating to + Authorization, Authentication, and Accounting, and relating to key + management). Scalability of wireless networks can be difficult to + measure or to achieve. Enforced hierarchy is one approach, but can + be very limiting. Alternative, less constraining approaches to + wireless scalability are desired. Because wireless link-layer + protocols usually have some knowledge of current link characteristics + such as link quality, sublayer congestion conditions, or transient + channel behavior, it is desirable to find ways to let network-layer + routing use such data. This raises architectural questions of what + the proper layering should be, which functions should be in which + layer, and also practical considerations of how and when such + information sharing should occur in real implementations. + +3.4. Security + + The Internet has a reputation for not having sufficient security. In + fact, the Internet has a number of security mechanisms standardized, + some of which are widely deployed. However, there are a number of + open research questions relating to Internet security. In + particular, security mechanisms need to be incrementally deployable + and easy to use. "[Security] technology must be easy to use, or it + will not be configured correctly. If mis-configured, security will + be lost, but things will `work'" [Schiller03]. + + + + + + +Atkinson & Floyd Informational [Page 13] + +RFC 3869 Research Funding Recommendations August 2004 + + +3.4.1. Formal Methods + + There is an ongoing need for funding of basic research relating to + Internet security, including funding of formal methods research that + relates to security algorithms, protocols, and systems. + + For example, it would be beneficial to have more formal study of + non-hierarchical trust models (e.g., PGP's Web-of-Trust model). Use + of a hierarchical trust model can create significant limitations in + how one might approach securing components of the Internet, for + example the inter-domain routing system. So research to develop new + trust models suited for the Internet or on the applicability of + existing non-hierarchical trust models to existing Internet problems + would be worthwhile. + + While there has been some work on the application of formal methods + to cryptographic algorithms and cryptographic protocols, existing + techniques for formal evaluation of algorithms and protocols lack + sufficient automation. This lack of automation means that many + protocols aren't formally evaluated in a timely manner. This is + problematic for the Internet because formal evaluation has often + uncovered serious anomalies in cryptographic protocols. The creation + of automated tools for applying formal methods to cryptographic + algorithms and/or protocols would be very helpful. + +3.4.2. Key Management + + A recurring challenge to the Internet community is how to design, + implement, and deploy key management appropriate to the myriad of + security contexts existing in the global Internet. Most current work + in unicast key management has focused on hierarchical trust models, + because much of the existing work has been driven by corporate or + military "top-down" operating models. + + The paucity of key management methods applicable to non-hierarchical + trust models (see above) is a significant constraint on the + approaches that might be taken to secure components of the Internet. + + Research focused on removing those constraints by developing + practical key management methods applicable to non-hierarchical trust + models would be very helpful. + + Topics worthy of additional research include key management + techniques, such as non-hierarchical key management architectures + (e.g., to support non-hierarchical trust models; see above), that are + useful by ad-hoc groups in mobile networks and/or distributed + computing. + + + + +Atkinson & Floyd Informational [Page 14] + +RFC 3869 Research Funding Recommendations August 2004 + + + Although some progress has been made in recent years, scalable + multicast key management is far from being a solved problem. + Existing approaches to scalable multicast key management add + significant constraints on the problem scope in order to come up with + a deployable technical solution. Having a more general approach to + scalable multicast key management (i.e., one having broader + applicability and fewer constraints) would enhance the Internet's + capabilities. + + In many cases, attribute negotiation is an important capability of a + key management protocol. Experience with the Internet Key Exchange + (IKE) to date has been that it is unduly complex. Much of IKE's + complexity derives from its very general attribute negotiation + capabilities. A new key management approach that supported + significant attribute negotiation without creating challenging levels + of deployment and operations complexity would be helpful. + +3.4.3. Cryptography + + There is an ongoing need to continue the open-world research funding + into both cryptography and cryptanalysis. Most governments focus + their cryptographic research in the military-sector. While this is + understandable, those efforts often have limited (or no) publications + in the open literature. Since the Internet engineering community + must work from the open literature, it is important that open-world + research continues in the future. + +3.4.4. Security for Distributed Computing + + MIT's Project Athena was an important and broadly successful research + project into distributed computing. Project Athena developed the + Kerberos [RFC-1510] security system, which has significant deployment + today in campus environments. However, inter-realm Kerberos is + neither as widely deployed nor perceived as widely successful as + single-realm Kerberos. The need for scalable inter-domain user + authentication is increasingly acute as ad-hoc computing and mobile + computing become more widely deployed. Thus, work on scalable + mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain + authentication would be very helpful. + +3.4.5. Deployment Considerations in Security + + Lots of work has been done on theoretically perfect security that is + impossible to deploy. Unfortunately, the S-BGP proposal is an + example of a good research product that has significant unresolved + deployment challenges. It is far from obvious how one could widely + deploy S-BGP without previously deploying a large-scale inter-domain + public-key infrastructure and also centralizing route advertisement + + + +Atkinson & Floyd Informational [Page 15] + +RFC 3869 Research Funding Recommendations August 2004 + + + policy enforcement in the Routing Information Registries or some + similar body. Historically, public-key infrastructures have been + either very difficult or impossible to deploy at large scale. + Security mechanisms that need additional infrastructure have not been + deployed well. We desperately need security that is general, easy to + install, and easy to manage. + +3.4.6. Denial of Service Protection + + Historically, the Internet community has mostly ignored pure Denial + of Service (DoS) attacks. This was appropriate at one time since + such attacks were rare and are hard to defend against. However, one + of the recent trends in adversarial software (e.g., viruses, worms) + has been the incorporation of features that turn the infected host + into a "zombie". Such zombies can be remotely controlled to mount a + distributed denial of service attack on some victim machine. In many + cases, the authorized operators of systems are not aware that some or + all of their systems have become zombies. It appears that the + presence of non-trivial numbers of zombies in the global Internet is + now endemic, which makes distributed denial of service attacks a much + larger concern. So Internet threat models need to assume the + presence of such zombies in significant numbers. This makes the + design of protocols resilient in the presence of distributed denial + of service attacks very important to the health of the Internet. + Some work has been done on this front [Savage00], [MBFIPS01], but + more is needed. + +3.5. Network Management + + The Internet had early success in network device monitoring with the + Simple Network Management Protocol (SNMP) and its associated + Management Information Base (MIB). There has been comparatively less + success in managing networks, in contrast to the monitoring of + individual devices. Furthermore, there are a number of operator + requirements not well supported by the current Internet management + framework. It is desirable to enhance the current Internet network + management architecture to more fully support operational needs. + + Unfortunately, network management research has historically been very + underfunded. Operators have complained that existing solutions are + inadequate. Research is needed to find better solutions. + +3.5.1. Managing Networks, Not Devices + + At present there are few or no good tools for managing a whole + network instead of isolated devices. For example, the lack of + appropriate network management tools has been cited as one of the + major barriers to the widespread deployment of IP multicast [Diot00, + + + +Atkinson & Floyd Informational [Page 16] + +RFC 3869 Research Funding Recommendations August 2004 + + + SM03]. Current network management protocols, such as the Simple + Network Management Protocol (SNMP), are fine for reading status of + well-defined objects from individual boxes. Managing networks + instead of isolated devices requires the ability to view the network + as a large distributed system. Research is needed on scalable + distributed data aggregation mechanisms, scalable distributed event + correlation mechanisms, and distributed and dependable control + mechanisms. + + Applied research into methods of managing sets of networked devices + seems worthwhile. Ideally, such a management approach would support + distributed management, rather than being strictly centralized. + +3.5.2. Enhanced Monitoring Capabilities + + SNMP does not always scale well to monitoring large numbers of + objects in many devices in different parts of the network. An + alternative approach worth exploring is how to provide scalable and + distributed monitoring, not on individual devices, but instead on + groups of devices and the network-as-a-whole. This requires scalable + techniques for data aggregation and event correlation of network + status data originating from numerous locations in the network. + +3.5.3. Customer Network Management + + An open issue related to network management is helping users and + others to identify and resolve problems in the network. If a user + can't access a web page, it would be useful if the user could find + out, easily, without having to run ping and traceroute, whether the + problem was that the web server was down, that the network was + partitioned due to a link failure, that there was heavy congestion + along the path, that the DNS name couldn't be resolved, that the + firewall prohibited the access, or that some other specific event + occurred. + +3.5.4. Autonomous Network Management + + More research is needed to improve the degree of automation achieved + by network management systems and to localize management. Autonomous + network management might involve the application of control theory, + artificial intelligence or expert system technologies to network + management problems. + +3.6. Quality of Service + + There has been an intensive body of research and development work on + adding QoS to the Internet architecture for more than ten years now + [RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still + + + +Atkinson & Floyd Informational [Page 17] + +RFC 3869 Research Funding Recommendations August 2004 + + + don't have end-to-end QoS in the Internet [RFC-2990, RFC-3387]. The + IETF is good at defining individual QoS mechanisms, but poor at work + on deployable QoS architectures. Thus, while Differentiated Services + (DiffServ) mechanisms have been standardized as per-hop behaviors, + there is still much to be learned about the deployment of that or + other QoS mechanisms for end-to-end QoS. In addition to work on + purely technical issues, this includes close attention to the + economic models and deployment strategies that would enable an + increased deployment of QoS in the network. + + In many cases, deployment of QoS mechanisms would significantly + increase operational security risks [RFC-2990], so any new research + on QoS mechanisms or architectures ought to specifically discuss the + potential security issues associated with the new proposal(s) and how + to mitigate those security issues. + + In some cases, the demand for QoS mechanisms has been diminished by + the development of more resilient voice/video coding techniques that + are better suited for the best-effort Internet than the older coding + techniques that were originally designed for circuit-switched + networks. + + One of the factors that has blunted the demand for QoS has been the + transition of the Internet infrastructure from heavy congestion in + the early 1990s, to overprovisioning in backbones and in many + international links now. Thus, research in QoS mechanisms also has + to include some careful attention to the relative costs and benefits + of QoS in different places in the network. Applied research into QoS + should include explicit consideration of economic issues of deploying + and operating a QoS-enabled IP network [Clark02]. + +3.6.1. Inter-Domain QoS Architecture + + Typically, a router in the deployed inter-domain Internet provides + best-effort forwarding of IP packets, without regard for whether the + source or destination of the packet is a direct customer of the + operator of the router. This property is a significant contributor + to the current scalability of the global Internet and contributes to + the difficulty of deploying inter-domain Quality of Service (QoS) + mechanisms. + + Deploying existing Quality-of-Service (QoS) mechanisms, for example + Differentiated Services or Integrated Services, across an inter- + domain boundary creates a significant and easily exploited denial-of- + service vulnerability for any network that provides inter-domain QoS + support. This has caused network operators to refrain from + supporting inter-domain QoS. The Internet would benefit from + + + + +Atkinson & Floyd Informational [Page 18] + +RFC 3869 Research Funding Recommendations August 2004 + + + additional research into alternative approaches to QoS, particularly + into approaches that do not create such vulnerabilities and can be + deployed end-to-end [RFC-2990]. + + Also, current business models are not consistent with inter-domain + QoS, in large part because it is impractical or impossible to + authenticate the identity of the sender of would-be preferred traffic + while still forwarding traffic at line-rate. Absent such an ability, + it is unclear how a network operator could bill or otherwise recover + costs associated with providing that preferred service. So any new + work on inter-domain QoS mechanisms and architectures needs to + carefully consider the economic and security implications of such + proposals. + +3.6.2. New Queuing Disciplines + + The overall Quality-of-Service for traffic is in part determined by + the scheduling and queue management mechanisms at the routers. While + there are a number of existing mechanisms (e.g., RED) that work well, + it is possible that improved active queuing strategies might be + devised. Mechanisms that lowered the implementation cost in IP + routers might help increase deployment of active queue management, + for example. + +3.7. Congestion Control. + + TCP's congestion avoidance and control mechanisms, from 1988 + [Jacobson88], have been a key factor in maintaining the stability of + the Internet, and are used by the bulk of the Internet's traffic. + However, the congestion control mechanisms of the Internet need to be + expanded and modified to meet a wide range of new requirements, from + new applications such as streaming media and multicast to new + environments such as wireless networks or very high bandwidth paths, + and new requirements for minimizing queueing delay. While there are + significant bodies of work in several of these issues, considerably + more needs to be done. + + We would note that research on TCP congestion control is also not yet + "done", with much still to be accomplished in high-speed TCP, or in + adding robust performance over paths with significant reordering, + intermittent connectivity, non-congestive packet loss, and the like. + + Several of these issues bring up difficult fundamental questions + about the potential costs and benefits of increased communication + between layers. Would it help transport to receive hints or other + information from routing, from link layers, or from other transport- + level connections? If so, what would be the cost to robust operation + across diverse environments? + + + +Atkinson & Floyd Informational [Page 19] + +RFC 3869 Research Funding Recommendations August 2004 + + + For congestion control mechanisms in routers, active queue management + and Explicit Congestion Notification are generally not yet deployed, + and there are a range of proposals, in various states of maturity, in + this area. At the same time, there is a great deal that we still do + not understand about the interactions of queue management mechanisms + with other factors in the network. Router-based congestion control + mechanisms are also needed for detecting and responding to aggregate + congestion such as in Distributed Denial of Service attacks and flash + crowds. + + As more applications have the need to transfer very large files over + high delay-bandwidth-product paths, the stresses on current + congestion control mechanisms raise the question of whether we need + more fine-grained feedback from routers. This includes the challenge + of allowing connections to avoid the delays of slow-start, and to + rapidly make use of newly-available bandwidth. On a more general + level, we don't understand the potential and limitations for best- + effort traffic over high delay-bandwidth-product paths, given the + current feedback from routers, or the range of possibilities for more + explicit feedback from routers. + + There is also a need for long-term research in congestion control + that is separate from specific functional requirements like the ones + listed above. We know very little about congestion control dynamics + or traffic dynamics of a large, complex network like the global + Internet, with its heterogeneous and changing traffic mixes, link- + level technologies, network protocols and router mechanisms, patterns + of congestion, pricing models, and the like. Expanding our knowledge + in this area seems likely to require a rich mix of measurement, + analysis, simulations, and experimentation. + +3.8. Studying the Evolution of the Internet Infrastructure + + The evolution of the Internet infrastructure has been frustratingly + slow and difficult, with long stories about the difficulties in + adding IPv6, QoS, multicast, and other functionality to the Internet. + We need a more scientific understanding of the evolutionary + potentials and evolutionary difficulties of the Internet + infrastructure. + + This evolutionary potential is affected not only by the technical + issues of the layered IP architecture, but by other factors as well. + These factors include the changes in the environment over time (e.g., + the recent overprovisioning of backbones, the deployment of + firewalls), and the role of the standardization process. Economic + and public policy factors are also critical, including the central + fact of the Internet as a decentralized system, with key players + being not only individuals, but also ISPs, companies, and entire + + + +Atkinson & Floyd Informational [Page 20] + +RFC 3869 Research Funding Recommendations August 2004 + + + industries. Deployment issues are also key factors in the evolution + of the Internet, including the continual chicken-and-egg problem of + having enough customers to merit rolling out a service whose utility + depends on the size of the customer base in the first place. + + Overlay networks might serve as a transition technology for some new + functionality, with an initial deployment in overlay networks, and + with the new functionality moving later into the core if it seems + warranted. + + There are also increased obstacles to the evolution of the Internet + in the form of increased complexity [WD02], unanticipated feature + interactions [Kruse00], interactions between layers [CWWS92], + interventions by middleboxes [RFC-3424], and the like. Because + increasing complexity appears inevitable, research is needed to + understand architectural mechanisms that can accommodate increased + complexity without decreasing robustness of performance in unknown + environments, and without closing off future possibilities for + evolution. More concretely, research is needed on how to evolve the + Internet will still maintaining its core strengths, such as the + current degree of global addressability of hosts, end-to-end + transparency of packet forwarding, and good performance for best- + effort traffic. + +3.9. Middleboxes + + Research is needed to address the challenges posed by the wide range + of middleboxes [RFC-3234]. This includes issues of security, + control, data integrity, and on the general impact of middleboxes on + the architecture. + + In many ways middleboxes are a direct outgrowth of commercial + interests, but there is a need to look beyond the near-term needs for + the technology, to research its broader implications and to explore + ways to improve how middleboxes are integrated into the architecture. + +3.10. Internet Measurement + + A recurring challenge is measuring the Internet; there have been many + discussions about the need for measurement studies as an integral + part of Internet research [Claffy03]. In this discussion, we define + measurement quite broadly. For example, there are numerous + challenges in measuring performance along any substantial Internet + path, particularly when the path crosses administrative domain + boundaries. There are also challenges in measuring + protocol/application usage on any high-speed Internet link. Many of + + + + + +Atkinson & Floyd Informational [Page 21] + +RFC 3869 Research Funding Recommendations August 2004 + + + the problems discussed above would benefit from increased frequency + of measurement as well as improved quality of measurement on the + deployed Internet. + + A key issue in network measurement is that most commercial Internet + Service Providers consider the particular characteristics of their + production IP network(s) to be trade secrets. Ways need to be found + for cooperative measurement studies, e.g., to allow legitimate non- + commercial researchers to be able to measure relevant network + parameters while also protecting the privacy rights of the measured + ISPs. + + Absent measured data, there is possibly an over-reliance on network + simulations in some parts of the Internet research community and + probably insufficient validation that existing network simulation + models are reasonably good representations of the deployed Internet + (or of some plausible future Internet) [FK02]. + + Without solid measurement of the current Internet behavior, it is + very difficult to know what otherwise unknown operational problems + exist that require attention, and it is equally difficult to fully + understand the impact of changes (past or future) upon the Internet's + actual behavioral characteristics. + +3.11. Applications + + Research is needed on a wide range of issues related to Internet + applications. + + Taking email as one example application, research is needed on + understanding the spam problem, and on investigating tools and + techniques to mitigate the effects of spam, including tools and + techniques that aid the implementation of legal and other non- + technical anti-spam measures [ASRG]. "Spam" is a generic term for a + range of significantly different types of unwanted bulk email, with + many types of senders, content and traffic-generating techniques. As + one part of controlling spam, we need to develop a much better + understanding of its many, different characteristics and their + interactions with each other. + +3.12. Meeting the Needs of the Future + + As network size, link bandwidth, CPU capacity, and the number of + users all increase, research will be needed to ensure that the + Internet of the future scales to meet these increasing demands. We + have discussed some of these scaling issues in specific sections + above. + + + + +Atkinson & Floyd Informational [Page 22] + +RFC 3869 Research Funding Recommendations August 2004 + + + However, for all of the research questions discussed in this + document, the goal of the research must be not only to meet the + challenges already experienced today, but also to meet the challenges + that can be expected to emerge in the future. + +3.13. Freely Distributable Prototypes + + U.S.'s DARPA has historically funded development of freely + distributable implementations of various Internet technologies (e.g., + TCP/IPv4, RSVP, IPv6, and IP security) in a variety of operating + systems (e.g., 4.2 BSD, 4.3 BSD, 4.4 BSD, Tenex). Experience has + shown that a good way to speed deployment of a new technology is to + provide an unencumbered, freely-distributable prototype that can be + incorporated into commercial products as well as non-commercial + prototypes. Japan's WIDE Project has also funded some such work, + primarily focused on IPv6 implementation for 4.4 BSD and Linux. + [WIDE] We believe that applied research projects in networking will + have an increased probability of success if the research project + teams make their resulting software implementations freely available + for both commercial and non-commercial uses. Examples of successes + here include the DARPA funding of TCP/IPv4 integration into the 4.x + BSD operating system [MBKQ96], DARPA/USN funding of ESP/AH design and + integration into 4.4 BSD [Atk96], as well as separate DARPA/USN and + WIDE funding of freely distributable IPv6 prototypes [Atk96, WIDE]. + +4. Conclusions + + This document has summarized the history of research funding for the + Internet and highlighted examples of open research questions. The + IAB believes that more research is required to further the evolution + of the Internet infrastructure, and that consistent, sufficient non- + commercial funding is needed to enable such research. + + In case there is any confusion, in this document we are not + suggesting any direct or indirect role for the IAB, the IETF, or the + IRTF in handling any funding for Internet research. + +5. Acknowledgements + + The people who directly contributed to this document in some form + include the following: Ran Atkinson, Guy Almes, Rob Austein, Vint + Cerf, Jon Crowcroft, Sally Floyd, James Kempf, Joe Macker, Craig + Partridge, Vern Paxson, Juergen Schoenwaelder, and Mike St. Johns. + + We are also grateful to Kim Claffy, Dave Crocker, Michael Eder, Eric + Fleischman, Andrei Gurtov, Stephen Kent, J.P. Martin-Flatin, and + Hilarie Orman for feedback on earlier drafts of this document. + + + + +Atkinson & Floyd Informational [Page 23] + +RFC 3869 Research Funding Recommendations August 2004 + + + We have also drawn from the following reports: + [CIPB02,IST02,NV02,NSF02,NSF03,NSF03a]. + +6. Security Considerations + + This document does not itself create any new security issues for the + Internet community. Security issues within the Internet Architecture + primarily are discussed in Section 3.4 above. + +7. Informative References + + [ASRG] Anti-Spam Research Group (ASRG) of the IRTF. URL + "http://asrg.sp.am/". + + [Atk96] R. Atkinson et al., "Implementation of IPv6 in 4.4 + BSD", Proceedings of USENIX 1996 Annual Technical + Conference, USENIX Association, Berkeley, CA, USA. + January 1996. URL + http://www.chacs.itd.nrl.navy.mil/publications/CHACS/ + 1996/1996atkinson-USENIX.pdf + + [Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton + University Press, Princeton, NJ, 1957. + + [Claffy03] K. Claffy, "Priorities and Challenges in Internet + Measurement, Simulation, and Analysis", Large Scale + Network meeting, (US) National Science Foundation, + Arlington, VA, USA. 10 June 2003. URL + "http://www.caida.org/outreach/ + presentations/2003/lsn20030610/". + + [Claffy03a] K. Claffy, "Top Problems of the Internet and What + Sysadmins and Researchers Can Do To Help", plenary talk + at LISA'03, October 2003. URL + "http://www.caida.org/outreach/presentations/ + 2003/netproblems_lisa03/". + + [Clark02] D. D. Clark, "Deploying the Internet - why does it take + so long and, can research help?", Large-Scale + Networking Distinguished Lecture Series, (U.S.) + National Science Foundation, Arlington, VA, 8 January + 2002. URL: http://www.ngi- + supernet.org/conferences.html + + + + + + + + +Atkinson & Floyd Informational [Page 24] + +RFC 3869 Research Funding Recommendations August 2004 + + + [CSTB99] Computer Science and Telecommunications Board, (U.S.) + National Research Council, "Funding a Revolution: + Government Support for Computing Research", National + Academy Press, Washington, DC, 1999. URL + "http://www7.nationalacademies.org/cstb/ + pub_revolution.html". + + [CIPB02] Critical Infrastructure Protection Board, "National + Strategy to Secure Cyberspace", The White House, + Washington, DC, USA. September 2002, URL + "http://www.whitehouse.gov/pcipb". + + [CWWS92] J. Crowcroft, I. Wakeman, Z. Wang, and D. Sirovica, "Is + Layering Harmful?", IEEE Networks, Vol. 6, Issue 1, pp + 20-24, January 1992. + + [Diot00] C. Diot, et al., "Deployment Issues for the IP + Multicast Service and Architecture", IEEE Network, + January/February 2000. + + [Deering1988] S. Deering, "Multicast Routing in Internetworks and + LANs", ACM Computer Communications Review, Volume 18, + Issue 4, August 1988. + + [Dijkstra59] E. Dijkstra, "A Note on Two Problems in Connexion with + Graphs", Numerische Mathematik, 1, 1959, pp.269-271. + + [FF1962] L. R. Ford Jr. and D.R. Fulkerson, "Flows in Networks", + Princeton University Press, Princeton, NJ, 1962. + + [FK02] S. Floyd and E. Kohler, "Internet Research Needs Better + Models", Proceedings of 1st Workshop on Hot Topics in + Networks (Hotnets-I), Princeton, NJ, USA. October + 2002. URL + "http://www.icir.org/models/bettermodels.html". + + [IM1993] J. Ioannidis and G. Maguire Jr., "The Design and + Implementation of a Mobile Internetworking + Architecture", Proceedings of the Winter USENIX + Technical Conference, pages 489-500, Berkeley, CA, USA, + January 1993. + + [IST02] Research Networking in Europe - Striving for Global + Leadership, Information Society Technologies, 2002. + URL "http://www.cordis.lu/ist/rn/rn-brochure.htm". + + + + + + +Atkinson & Floyd Informational [Page 25] + +RFC 3869 Research Funding Recommendations August 2004 + + + [Jacobson88] Van Jacobson, "Congestion Avoidance and Control", + Proceedings of ACM SIGCOMM 1988 Symposium, ACM SIGCOMM, + Stanford, CA, August 1988. URL + "http://citeseer.nj.nec.com/jacobson88congestion.html". + + [Jackson02] William Jackson, "U.S. should fund R&D for secure + Internet protocols, Clarke says", Government Computer + News, 31 October 2002. URL + "http://www.gcn.com/vol1_no1/security/20382-1.html". + + [Kruse00] Hans Kruse, "The Pitfalls of Distributed Protocol + Development: Unintentional Interactions between Network + Operations and Applications Protocols", Proceedings of + the 8th International Conference on Telecommunication + Systems Design, Nashville, TN, USA, March 2000. URL + "http://www.csm.ohiou.edu/kruse/publications/ + TSYS2000.pdf". + + [KLMS2000] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure + Border Gateway Protocol (S-BGP)", Proceedings of ISOC + Network and Distributed Systems Security Symposium, + Internet Society, Reston, VA, February 2000. + + [LD2002] E. Lear and R. Droms, "What's in a Name: Thoughts from + the NSRG", expired Internet-Draft, December 2002. + + [MBFIPS01] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John + Ioannidis, Vern Paxson, and Scott Shenker, "Controlling + High Bandwidth Aggregates in the Network", ACM Computer + Communications Review, Vol. 32, No. 3, July 2002. URL + "http://www.icir.org/pushback/". + + [MBKQ96] M. McKusick, K. Bostic, M. Karels, and J. Quarterman, + "Design and Implementation of the 4.4 BSD Operating + System", Addison-Wesley, Reading, MA, 1996. + + [MGVK02] Z. Mao, R. Govindan, G. Varghese, & R. Katz, "Route + Flap Dampening Exacerbates Internet Routing + Convergence", Proceedings of ACM SIGCOMM 2002, ACM, + Pittsburgh, PA, USA, August 2002. + + [NV02] NetVision 2012 Committee,"DARPA's Ten-Year Strategic + Plan for Networking Research", (U.S.) Defense Advanced + Research Projects Agency, October 2002. Citation for + acknowledgement purposes only. + + + + + + +Atkinson & Floyd Informational [Page 26] + +RFC 3869 Research Funding Recommendations August 2004 + + + [NSF02] NSF Workshop on Network Research Testbeds, National + Science Foundation, Directorate for Computer and + Information Science & Engineering, Advanced Networking + Infrastructure & Research Division, Arlington, VA, USA, + October 2002. URL "http://www- + net.cs.umass.edu/testbed_workshop/". + + [NSF03] NSF ANIR Principal Investigator meeting, National + Science Foundation, Arlington, VA, USA. January 9-10, + 2003, URL "http://www.ncne.org/training/nsf- + pi/2003/nsfpimain.html". + + [NSF03a] D. E. Atkins, et al., "Revolutionizing Science and + Engineering Through Cyberinfrastructure", Report of NSF + Advisory Panel on Cyberinfrastructure, January 2003. + URL "http://www.cise.nsf.gov/evnt/reports/ + atkins_annc_020303.htm". + + [NSF03b] Report of the National Science Foundation Workshop on + Fundamental Research in Networking. April 24-25, 2003. + URL "http://www.cs.virginia.edu/~jorg/workshop1/NSF- + NetWorkshop-2003.pdf". + + [Floyd] S. Floyd, "Papers about Research Questions for the + Internet", web page, ICSI Center for Internet Research + (ICIR), Berkeley, CA, 2003 URL + "http://www.icir.org/floyd/research_questions.html". + + [RFC-1510] Kohl, J. and C. Neuman, "The Kerberos Network + Authentication Service (V5)", RFC 1510, September 1993. + + [RFC-1633] Braden, R., Clark, D., and S. Shenker, "Integrated + Services in the Internet Architecture: an Overview", + RFC 1633, June 1994. + + [RFC-2082] Baker, F. and R. Atkinson, "RIP-2 MD5 Authentication", + RFC 2082, January 1997. + + [RFC-2210] Wroclawski, J., "The Use of RSVP with IETF Integrated + Services", RFC 2210, September 1997. + + [RFC-2154] Murphy, S., Badger, M., and B. Wellington, "OSPF with + Digital Signatures", RFC 2154, June 1997. + + [RFC-2385] Heffernan, A., "Protection of BGP Sessions via the TCP + MD5 Signature Option", RFC 2385, August 1998. + + + + + +Atkinson & Floyd Informational [Page 27] + +RFC 3869 Research Funding Recommendations August 2004 + + + [RFC-2407] Piper, D., "The Internet IP Security Domain of + Interpretation for ISAKMP", RFC 2407, November 1998. + + [RFC-2501] Corson, S. and J. Macker, "Mobile Ad hoc Networking + (MANET): Routing Protocol Performance Issues and + Evaluation Considerations", RFC 2501, January 1999. + + [RFC-2990] Huston, G., "Next Steps for the IP QoS Architecture", + RFC 2990, November 2000. + + [RFC-3221] Huston, G., "Commentary on Inter-Domain Routing in the + Internet", RFC 3221, December 2001. + + [RFC-3234] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and + Issues", RFC 3234, February 2002. + + [RFC-3424] Daigle, L. and IAB, "IAB Considerations for UNilateral + Self-Address Fixing (UNSAF) Across Network Address + Translation", RFC 3424, November 2002. + + [RFC-3467] Klensin, J., "Role of the Domain Name System (DNS)", + RFC 3467, February 2003. + + [RFC-3535] Schoenwaelder, J., "Overview of the 2002 IAB Network + Management Workshop", RFC 3535, May 2003. + + [RFC-3387] Eder, M., Chaskar, H., and S. Nag, "Considerations from + the Service Management Research Group (SMRG) on Quality + of Service (QoS) in the IP Network", RFC 3387, + September 2002. + + [RIPE] RIPE (Reseaux IP Europeens), Amsterdam, NL. URL + "http://www.ripe.net/ripe/". + + [Savage00] Savage, S., Wetherall, D., Karlink, A. R., and + Anderson, T., "Practical Network Support for IP + Traceback", Proceedings of 2000 ACM SIGCOMM Conference, + ACM SIGCOMM, Stockholm, SE, pp. 295-306. August 2000. + + [Schiller03] J. I. Schiller, "Interception Technology: The Good, The + Bad, and The Ugly!", Presentation at 28th NANOG + Meeting, North American Network Operators Group + (NANOG), Ann Arbor, MI, USA, June 2003. URL + "http://www.nanog.org/mtg-0306/schiller.html". + + + + + + + +Atkinson & Floyd Informational [Page 28] + +RFC 3869 Research Funding Recommendations August 2004 + + + [SM03] P. Sharma and R. Malpani, "IP Multicast Operational + Network Management: Design, Challenges, and + Experiences", IEEE Network, Vol. 17, No. 2, March + 2003. + + [SMA03] N. Spring, R. Mahajan, & T. Anderson, "Quantifying the + Causes of Path Inflation", Proceedings of ACM SIGCOMM + 2003, ACM, Karlsruhe, Germany, August 2003. + + [WD02] Walter Willinger and John Doyle, "Robustness and the + Internet: Design and Evolution", Unpublished/Preprint, + 1 March 2002, URL + "http://netlab.caltech.edu/internet/". + + [WIDE] WIDE Project, Japan. URL "http://www.wide.ad.jp/". + +8. Authors' Addresses + + Internet Architecture Board + EMail: iab@iab.org + + Internet Architecture Board Members + at the time this document was published were: + + Bernard Aboba + Harald Alvestrand (IETF chair) + Rob Austein + Leslie Daigle (IAB chair) + Patrik Faltstrom + Sally Floyd + Mark Handley + Bob Hinden + Geoff Huston (IAB Executive Director) + Jun-ichiro Itojun Hagino + Eric Rescorla + Pete Resnick + Jonathan Rosenberg + + We note that Ran Atkinson, one of the editors of the document, was an + IAB member at the time that this document was first created, in + November 2002, and that Vern Paxson, the IRTF chair, is an ex-officio + member of the IAB. + + + + + + + + + +Atkinson & Floyd Informational [Page 29] + +RFC 3869 Research Funding Recommendations August 2004 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/S HE + REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE + INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the IETF's procedures with respect to rights in IETF Documents can + be found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Atkinson & Floyd Informational [Page 30] + |