diff options
Diffstat (limited to 'doc/rfc/rfc7305.txt')
-rw-r--r-- | doc/rfc/rfc7305.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc7305.txt b/doc/rfc/rfc7305.txt new file mode 100644 index 0000000..28dbd66 --- /dev/null +++ b/doc/rfc/rfc7305.txt @@ -0,0 +1,955 @@ + + + + + + +Internet Architecture Board (IAB) E. Lear, Ed. +Request for Comments: 7305 July 2014 +Category: Informational +ISSN: 2070-1721 + + + Report from the IAB Workshop + on Internet Technology Adoption and Transition (ITAT) + +Abstract + + This document provides an overview of a workshop held by the Internet + Architecture Board (IAB) on Internet Technology Adoption and + Transition (ITAT). The workshop was hosted by the University of + Cambridge on December 4th and 5th of 2013 in Cambridge, UK. The goal + of the workshop was to facilitate adoption of Internet protocols, + through examination of a variety of economic models, with particular + emphasis at the waist of the hourglass (e.g., the middle of the + protocol stack). This report summarizes contributions and + discussions. As the topics were wide ranging, there is no single set + of recommendations for IETF participants to pursue at this time. + Instead, in the classic sense of early research, the workshop noted + areas that deserve further exploration. + + Note that this document is a report on the proceedings of the + workshop. The views and positions documented in this report are + those of the workshop participants and do not necessarily reflect IAB + views and positions. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Architecture Board (IAB) + and represents information that the IAB has deemed valuable to + provide for permanent record. It represents the consensus of the + Internet Architecture Board (IAB). Documents approved for + publication by the IAB are not a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc7305. + + + + + + + +Lear Informational [Page 1] + +RFC 7305 ITAT Report July 2014 + + +Copyright Notice + + Copyright (c) 2014 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Lear Informational [Page 2] + +RFC 7305 ITAT Report July 2014 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 + 1.1. Organization of This Report . . . . . . . . . . . . . . . 5 + 2. Motivations and Review of Existing Work . . . . . . . . . . . 5 + 3. Economics of Protocol Adoption . . . . . . . . . . . . . . . 7 + 3.1. When can bundling help adoption of network + technologies or services? . . . . . . . . . . . . . . . . 7 + 3.2. Internet Protocol Adoption: Learning from Bitcoin . . . . 7 + 3.3. Long term strategy for a successful deployment of + DNSSEC - on all levels . . . . . . . . . . . . . . . . . 8 + 3.4. Framework for analyzing feasibility of Internet + protocols . . . . . . . . . . . . . . . . . . . . . . . . 9 + 3.5. Best Effort Service as a Deployment Success Factor . . . 9 + 4. Innovative / Out-There Models . . . . . . . . . . . . . . . . 10 + 4.1. On the Complexity of Designed Systems (and its effect + on protocol deployment) . . . . . . . . . . . . . . . . . 10 + 4.2. Managing Diversity to Manage Technological + Transition . . . . . . . . . . . . . . . . . . . . . . . 10 + 4.3. On Economic Models of Network Technology Adoption, + Design, and Viability . . . . . . . . . . . . . . . . . . 11 + 5. Making Standards Better . . . . . . . . . . . . . . . . . . . 11 + 5.1. Standards: a love/hate relationship with patents . . . . 11 + 5.2. Bridge Networking Research and Internet + Standardization: Case Study on Mobile Traffic + Offloading and IPv6 Transition Technologies . . . . . . . 11 + 5.3. An Internet Architecture for the Challenged . . . . . . . 12 + 6. Other Challenges and Approaches . . . . . . . . . . . . . . . 12 + 6.1. Resilience of the commons: routing security . . . . . . . 12 + 6.2. Getting to the Next Version of TLS . . . . . . . . . . . 13 + 7. Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . 13 + 7.1. Work for the IAB and the IETF . . . . . . . . . . . . . . 13 + 7.2. Potential for the Internet Research Task Force . . . . . 14 + 7.3. Opportunities for Others . . . . . . . . . . . . . . . . 14 + 8. Security Considerations . . . . . . . . . . . . . . . . . . . 14 + 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15 + 10. Attendees . . . . . . . . . . . . . . . . . . . . . . . . . . 15 + 11. Informative References . . . . . . . . . . . . . . . . . . . 15 + + + + + + + + + + + + + +Lear Informational [Page 3] + +RFC 7305 ITAT Report July 2014 + + +1. Introduction + + The Internet is a complex ecosystem that encompasses all aspects of + society. At its heart is a protocol stack with an hourglass shape, + and IP at its center. Recent research points to possible + explanations for the success of such a design and for the significant + challenges that arise when trying to evolve or change its middle + section, e.g., as partially evident in the difficulties encountered + by IPv6. The workshop had a number of other key examples to + consider, including the next generation of HTTP and real time web- + browser communications (WebRTC). The eventual success of many if not + all of these protocols will largely depend on our understanding of + not only what features and design principles contribute lasting + value, but also how deployment strategies can succeed in unlocking + that value to foster protocol adoption. The latter is particularly + important in that most if not all Internet protocols exhibit strong + externalities that create strong barriers to adoption, especially in + the presence of a well-established incumbent. That is, factors + beyond the control of the end points (such as middleboxes) can limit + deployment, sometimes by design. + + The Internet Architecture Board (IAB) holds occasional workshops + designed to consider long-term issues and strategies for the + Internet, and to suggest future directions for the Internet + architecture. This long-term planning function of the IAB is + complementary to the ongoing engineering efforts performed by working + groups of the Internet Engineering Task Force (IETF), under the + leadership of the Internet Engineering Steering Group (IESG) and area + directorates. + + Taking into account [RFC5218] on what makes a protocol successful, + this workshop sought to explore how the complex interactions of + protocols' design and deployment affect their success. One of the + workshop's goals was, therefore, to encourage discussions to develop + an understanding of what makes protocol designs successful not only + in meeting initial design goals but more importantly in their ability + to evolve as these goals and the available technology change. + Another equally important goal was to develop protocol deployment + strategies that ensure that new features can rapidly gain enough of a + foothold to ultimately realize broad adoption. Such strategies must + be informed by both operational considerations and economic factors. + + Participants in this workshop consisted of operators, researchers + from the fields of computer science and economics, and engineers. + Contributions were wide ranging. As such, this report makes few + recommendations for the IETF to consider. + + + + + +Lear Informational [Page 4] + +RFC 7305 ITAT Report July 2014 + + +1.1. Organization of This Report + + This report records the participants' discussions. At the end, + workshop participants reviewed potential follow-up items. These will + be highlighted at each point during the report, and a summary is + given at the end. + + Section 2 reviews the motivations and existing work, and Section 3 + discusses the economics of protocol adoption. Section 4 covers + innovative models for protocol adoption. Section 5 delves into an + examination of recent standards issues and some success stories. + Section 6 examines different views of success factors. Finally, + Section 7 examines potential next steps. + +2. Motivations and Review of Existing Work + + Our workshop began with an introduction that asks the question: is + the neck of the Internet hourglass closed for business? There are + numerous instances where progress has been slow, the three biggest + that come to mind being IPv6 [RFC2480], the Stream Control + Transmission Protocol (SCTP) [RFC4960], and DNS Security (DNSSEC) + [RFC4034]. The impact of DNSSEC is of particular interest, because + it is relied upon for the delivery of other services, such as DNS- + Based Authentication of Named Entities (DANE) [RFC6698], and it could + be used for application discovery services through DNS (specifically + where security properties are part of that discovery). Thus, + slowdown at the neck of the glass can have an impact closer to the + lip. + + Even when one considers the classic neck of the hourglass to be IP + and transport layers, it was suggested that the hourglass might + extend as high as the application layer. + + + + + + + + + + + + + + + + + + + +Lear Informational [Page 5] + +RFC 7305 ITAT Report July 2014 + + + ______________________ + \ / + \ Applications / + \ / + \ / + \ / + \__________/ + | HTTP(s)| + |________| + / \ + / TCP/IP \ + /______________\ + / MPLS/ \ + / Framing \ + /____________________\ + / Physical \ + /________________________\ + + HTTP(s) as the new neck? + + This idea was rebutted by the argument that protocols do continue to + evolve, that protocols like SMTP and IMAP in the applications space + have continued to evolve, as has the transport layer. + + The workshop moved on to a review of RFC 5218, which discusses + protocol success factors. This work was presented in the IETF 70 + plenary and was the basis for this ongoing work. There were two + clear outcomes from the discussion. The first was that the Internet + Architecture Board should review and consider that document in the + context of evaluating Birds of a Feather (BoF) session proposals at + the IETF, so that any working group proposal is carefully crafted to + address a specific design space and provide positive net value. + Another aspect was to continue work on tracking the value-specific + works in terms of success, wild success, or failure. On that last + point, failure remains difficult to judge, particularly at the neck + of the hourglass. + + + + + + + + + + + + + + + +Lear Informational [Page 6] + +RFC 7305 ITAT Report July 2014 + + +3. Economics of Protocol Adoption + + Several papers were presented that looked at economic aspects of + protocol adoption. + +3.1. When can bundling help adoption of network technologies or + services? + + Economics of bundling is a long-studied field, but not as applied to + protocols. It is relevant to the IETF and inherent to two key + notions: layering and "mandatory to implement". Two current examples + include DANE atop DNSSEC and WebRTC atop SCTP. The workshop reviewed + a model [Weber13] that explores how bundling of two technologies may + lead to increased or decreased adoption of one or both. This will + depend on a number of factors, including costs, benefits, and + externalities associated with each technology. (Simply put, an + externality is an effect or use decision by one set of parties that + has either a positive or negative impact on others who did not have a + choice or whose interests were not taken into account.) Bundling of + capabilities may provide positive value when individual capabilities + on their own do not provide sufficient critical mass to propel + further adoption. Specifically, bundling can help when one + technology does not provide positive value until critical mass of + deployment exists, and where a second technology has low adoption + cost and immediate value and hence drives initial adoption until + enough of a user base exists to allow critical mass sufficient for + the first technology to get positive value. One question was what + happens where one technology depends on the other. That is directly + tied to "mandatory to implement" discussions within the IETF. That + is a matter for follow-on work. IETF participants can provide + researchers anecdotal experience to help improve models in this area. + +3.2. Internet Protocol Adoption: Learning from Bitcoin + + The workshop considered an examination of protocol success factors in + the context of Bitcoin [Boehme13]. Here, there were any number of + barriers to success, including adverse press, legal uncertainties, + glitches and breaches, previous failed attempts, and speculative + attacks. Bitcoin has thus far overcome these barriers thanks to + several key factors: + + o First, there is a built-in reward system for early adopters. + Participants are monetarily rewarded at an exponentially declining + rate. + + o There exist exchanges or conversion mechanisms to directly convert + Bitcoin to other currencies. + + + + +Lear Informational [Page 7] + +RFC 7305 ITAT Report July 2014 + + + o Finally, there is some store of value in the currency itself, + e.g., people find intrinsic value in it. + + The first two of these factors may be transferable to other + approaches. One key protocol success factor is direct benefit to the + participant. Another key protocol success factor is the ability to + interface with other systems for mutual benefit. In the context of + Bitcoin, there has to be a way to exchange the coins for other + currencies. The Internet email system had simpler adaption + mechanisms to allow interchange with non-Internet email systems; this + facilitated its success. Another more simply stated approach is "IP + over everything". + + A key message from this presentation is that if a protocol imposes + externalities or costs on other systems, find a means to establish + incentives for those other players for implementation. As it + happens, there is a limited example that is directly relevant to the + IETF. + +3.3. Long term strategy for a successful deployment of DNSSEC - on all + levels + + The workshop reviewed the approach Sweden's .SE registry has taken to + improving deployment of DNSSEC [Lowinder13]. .SE has roughly 1.5 + million domains. IIS (<https://www.iis.se>) manages the ccTLD + (Country Code Top Level Domain). They made the decision to encourage + deployment of DNSSEC within .SE. They began by understanding what + the full ecosystem looked like, who their stakeholders were, and the + financial, legal, and technical aspects to deployment. As they began + their rollout, they charged extra for DNSSEC. As they put it, this + didn't work very well. + + They went on to fund development of OpenDNSSEC to remove technical + barriers to deployment at end sites, noting that tooling was lacking + in this area. Even with this development, more tooling is necessary, + as they point out a need for APIs between the signing zone and the + registrar. + + To further encourage deployment, the government of Sweden provided + financial incentives to communities to see that their domains were + signed. .SE further provided an incentive to registrars to see that + their domains were signed. In summary, .SE examined all the players + and provided incentives for each to participate. + + The workshop discussed whether or not this model could be applied to + other domains. .SE was in a position to effectively subsidize DNS + deployment because of their ability to set prices. This may be + + + + +Lear Informational [Page 8] + +RFC 7305 ITAT Report July 2014 + + + appropriate for certain other top-level domains, but it was pointed + out that the margins of other domains do not allow for a cost + reduction to be passed on at this point in time. + +3.4. Framework for analyzing feasibility of Internet protocols + + One of the goals of the workshop was to provide ways to determine + when work in the IETF was likely to lead to adoption. The workshop + considered an interactive approach that combines value net analysis, + deployment environment analysis, and technical architecture analysis + that leads to feasibility and solution analysis [Leva13]. This work + provided an alternative to RFC 5218 that had many points in common. + The case study examined was that of Multipath TCP (MPTCP). Various + deployment challenges were observed. First and foremost, increasing + bandwidth within the network seems to decrease the attractiveness of + MPTCP. Second, the benefit/cost tradeoff by vendors was not + considered attractive. Third, not all parties may agree on the + benefits. + + Solutions analysis suggested several approaches to improve + deployment, including using open-source software, lobbying various + implementers, deploying proxies, and completing implementations by + parties that own both ends of a connection. + +3.5. Best Effort Service as a Deployment Success Factor + + When given the choice between vanilla and chocolate, why not choose + both? The workshop considered an approach that became a recurring + theme throughout the workshop -- to not examine when it was necessary + to make a choice between technologies, but rather to implement + multiple mechanisms to achieve adoption [Welzl13]. The workshop + discussed the case of Skype, where it will use the best available + transport mechanism to improve communication between clients, rather + than tie fate to any specific transport. The argument goes that such + an approach provides a means to introduce new transports such as + SCTP. This would be an adaptation of "Happy Eyeballs" [RFC6555]. + + + + + + + + + + + + + + + +Lear Informational [Page 9] + +RFC 7305 ITAT Report July 2014 + + +4. Innovative / Out-There Models + + There were several approaches presented that examined how we look at + protocol adoption. + +4.1. On the Complexity of Designed Systems (and its effect on protocol + deployment) + + The workshop reviewed a comparison between the hourglass model and + what systems biologists might call the bow tie model [Meyer13]. The + crux of this comparison is that both rely on certain building blocks + to accomplish a certain end. In the case of our hourglass model, IP + sits notably in the center, whereas in the case of systems biology, + adenosine triphosphate (ATP) is the means by which all organisms + convert nutrients to usable energy, and thus resides centrally within + the biological system. + + The workshop also examined the notion of "robust yet fragile", which + examines the balance between the cost of implementing robust systems + versus their value. That is, highly efficient systems can prove + fragile in the face of failure or may prove hard to evolve. + + The key question asked during this presentation was how we could + apply what has been learned in systems biology or what do the + findings reduce to for engineers? The answer was that more work is + needed. The discussion highlighted the complexity of the Internet in + terms of predicting network behavior. As such, one promising area to + examine may be that of network management. + +4.2. Managing Diversity to Manage Technological Transition + + The workshop considered the difference between planned versus + unplanned technology transitions [Kohno13]. They examined several + transitions at the link, IP, and application layers in Japan. One + key claim in the study is that there is a phase difference in the + diversity trend between each layer. The statistics presented show + that indeed HTTP is the predominant substrate for other applications. + Another point made was that "natural selection" is a strong means to + determine technology. + + Along these lines, there were two papers submitted that examined the + formation and changes to the hourglass in the context of evolutionary + economics. Unfortunately, the presenter was unable to attend due to + illness. The work was discussed at the workshop, and there were + different points of view as to the approach. + + + + + + +Lear Informational [Page 10] + +RFC 7305 ITAT Report July 2014 + + +4.3. On Economic Models of Network Technology Adoption, Design, and + Viability + + The workshop considered how network protocol capabilities enable + certain sorts of services that are beneficial to consumers and + service providers. This model looks at smart data pricing (SDP) in + which some behavior is desired and rewarded through a pricing model + [Sen13]. The example given was use of time-dependent pricing (TDP) + and demonstrated how a service provider was able to load shift + traffic to off-peak periods. Explicit Congestion Notification (ECN) + and RADIUS were used by the project alongside a simple GUI. This + sort of work may prove useful to service providers as caching models + evolve over time. The question within the room was how will protocol + developers consider these sorts of requirements. + +5. Making Standards Better + + There were several papers that focused on how standards are produced. + +5.1. Standards: a love/hate relationship with patents + + One of the biggest barriers to deployment is that of the unseen + patent by the non-practicing entity (NPE) [Lear13]. While this + problem is relatively well understood by the industry, the discussion + looked at patents as a means to improve interoperability. Those who + hold patents have the ability to license them in such a way that a + single approach towards standardization is the result (e.g., they get + to decide the venue for their work). + +5.2. Bridge Networking Research and Internet Standardization: Case + Study on Mobile Traffic Offloading and IPv6 Transition + Technologies + + There was a presentation and discussion about the gap between the + research community and standards organizations. Two cases were + examined: mobile offloading and IPv6 transition technologies + [Ding13]. In the case of mobile offloading, a mechanism was examined + that required understanding of both 3GPP (Third Generation + Partnership Project) and IETF standards. Resistance in both + organizations was encountered. In the 3GPP, the problem was that the + organization already had an offloading model in play. In the IETF, + the problem was a lack of understanding of the interdisciplinary + space. The researchers noted that in the case of the IETF, they may + have taken the wrong tack by having jumped into the solution without + having fully explained the problem they were trying to solve. In the + case of IPv6 transition technologies, researchers encountered a + crowded field and not much appetite for new transition technologies. + + + + +Lear Informational [Page 11] + +RFC 7305 ITAT Report July 2014 + + + The workshop discussed whether the standards arena is the best venue + or measurement of success for researchers. The IRTF is meant to + bridge academic research and the IETF. As we will discuss below, + several avenues for continued dialog are contemplated. + +5.3. An Internet Architecture for the Challenged + + The workshop engaged in a very provocative discussion about whether + the existing Internet architecture serves the broadest set of needs. + Three specific aspects were examined: geographic, technical, and + socioeconomic. Researchers presented an alternative hourglass or + protocol architecture known as Lowest Common Denominator Networking + (LCDNet) that re-examines some of the base assumptions of the + existing architecture, including its "always on" nature + [Sathiaseelan13]. + + The workshop questioned many of the baseline assumptions of the + researchers. In part, this may have been due to constrained + discussion time on the topic, where a fuller explanation was + warranted. + +6. Other Challenges and Approaches + + The workshop held a number of other discussions about different + approaches to technology adoption. We should highlight that a number + of papers were submitted to the workshop on routing security, two of + which were not possible to present. + +6.1. Resilience of the commons: routing security + + The workshop discussed a presentation on the tragedy of the commons + in the context of global inter-domain routing [Robachevsky13]. The + "Internet Commons" is a collection of networks that we depend on but + do not control. The main threat to the commons in the context of BGP + is routing pollution, or unwanted or unnecessary routing entries. + The Internet Society has been working with service providers to + improve resiliency by driving a common understanding of both problem + and solution space and by developing a shared view with regard to + risk and benefits, with the idea being that there would be those who + would engage in reciprocal cooperation with the hopes that others + would do similarly in order to break the tragedy. + + What was notable in discussion was that there was no magic bullet to + addressing the resiliency issue, and that this was a matter of + clearly identifying the key players and convincing them that their + incentives were aligned. It also involved developing approaches to + measure resiliency. + + + + +Lear Informational [Page 12] + +RFC 7305 ITAT Report July 2014 + + +6.2. Getting to the Next Version of TLS + + Originally, the workshop had planned to look at the question of + whether the IETF could mandate stronger security. This evolved into + a discussion about getting to the next version of Transport Layer + Security (TLS) and what challenges lie ahead. It was pointed out + that there were still many old versions of TLS in existence today, + due to many old implementations. In particular, it was pointed out + that a substantial amount of traffic is still encrypted using Triple + DES. + + One concern about the next generation is that perfect could become + the enemy of good. Another point that was made was that perhaps a + testing platform might help interoperability. Finally, there was + some discussion about how new versions of TLS get promoted. + +7. Outcomes + + This wide-ranging workshop discussed many aspects that go to the + success or failure of the work of the IETF. While there is no single + silver bullet that we can point to for making a protocol successful, + the workshop did discuss a number of outcomes and potential next + steps. + +7.1. Work for the IAB and the IETF + + The IAB's role in working group formation consists of providing + guidance to the IESG on which Birds of a Feather sessions should be + held, reviewing proposed working group charters, and shepherding some + work so that it can reach a suitable stage for standardization. In + each of these stages, the IAB has an opportunity to apply the lessons + of RFC 5218, as well as other work such as the notion of bundling + choices, when members give advice. + + In addition to working group creation, the IAB has an opportunity to + track and present protocol success stories, either through wikis or + through discussion at plenary sessions. For instance, at the time of + writing, there is much interest in Bitcoin, its success, and what + parallels and lessons can be drawn. Specifically, it would be useful + to track examples of first-mover advantages. + + Finally, one area that the IETF may wish to consider, relating + specifically to DNSSEC, as raised by our speakers was standardization + of the provisioning interface of DNSSEC (DS keys) between parent and + child zone. Contributions in this area would be welcome. + + + + + + +Lear Informational [Page 13] + +RFC 7305 ITAT Report July 2014 + + +7.2. Potential for the Internet Research Task Force + + There are at least two possible activities that the IRTF might wish + to consider. The first would be a research group that considers + protocol alternatives and recommendations that might be useful in + areas where environments are constrained, due to bandwidth or other + resources. Such a group has already been proposed, in fact. + + The second possibility is a more general group that focuses on + economic considerations relating to Internet protocol design. In + particular, there were a number of areas that were presented to the + working group that deserve further investigation and could use + collaboration between researchers, engineers, and operators. Two + examples are work on bundling and systems biology. + +7.3. Opportunities for Others + + Incentive models often involve many different players. As we + considered work in the workshop, our partners such as ICANN and the + Regional Internet Registries (RIRs) can continue to play a role in + encouraging deployment of protocols through their policies. Their + members can also participate in any activity of the IRTF that is + related to this work. + + Specifically, RIRs have a specific role to play in encouraging + security of the routing system, and ICANN has a specific role to play + in securing the domain name service. + + The suggestion was made that the IETF working groups could leverage + graduate students in many universities around the world in helping + review documents (Internet-Drafts, RFCs, etc.). This would serve as + a source of education in real-world processes to students and would + engage the research community in IETF processes more thoroughly; it + would also provide a scale-out resource for handling the IETF review + workload. Several attendees who have such students were prepared to + try this out. + +8. Security Considerations + + This document does not discuss a protocol. Security for the workshop + itself was excellent. + + + + + + + + + + +Lear Informational [Page 14] + +RFC 7305 ITAT Report July 2014 + + +9. Acknowledgments + + The IAB would like to thank the program committee, who consisted of + Roch Guerin, Constantine Dovrolis, Hannes Tschofenig, Joel Halpern, + Eliot Lear, and Richard Clayton, as well as Bernard Aboba and Dave + Thaler. Their earlier work provided a strong basis for this + workshop. + + A special debt of gratitude is owed to our hosts, Ross Anderson and + Richard Clayton, for arranging an excellent venue for our + discussions. + +10. Attendees + + The following people attended the ITAT workshop: + + Aaron Yi Ding, Adrian Farrel, Andrei Robachevsky, Andrew Sullivan, + Arjuna Sathiaseelan, Bjoern Zeeb, Dave Meyer, Dave Thaler, Dongting + Yu, Eliot Lear, Elwyn Davies, Erik Nordmark, Hannes Tschofenig, Joel + Halpern, Jon Crowcroft, Lars Eggert, Martin Stiemerling, Michael + Welzl, Michiel Leenaars, Miya Kohno, Rainer Boehme, Richard Clayton, + Roch Guerin, Ross Anderson, Russ Housley, Sam Smith, Sean Turner, + Soumya Sen, Spencer Dawkins, Steven Weber, Tapio Levae, Toby + Moncaster, Tony Finch + +11. Informative References + + [Boehme13] Boehme, R., "Internet Protocol Adoption: Learning from + Bitcoin", December 2013, <http://www.iab.org/wp-content/ + IAB-uploads/2013/06/itat-2013_submission_17.pdf>. + + [Ding13] Yi Ding, A., Korhonen, J., Savolainen, T., Kojo, M., + Tarkoma, S., and J. Crowcroft, "Bridge Networking Research + and Internet Standardization: Case Study on Mobile Traffic + Offloading and IPv6 Transition Technologies", December + 2013, <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_6.pdf>. + + [Kohno13] Kohno, M., Asaba, T., and F. Baker, "Managing Diversity to + Manage Technological Transition", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_7.pdf>. + + [Lear13] Lear, E. and D. Mohlenhoff, "Standards: a love/hate + relationship with patents", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_11.docx>. + + + + +Lear Informational [Page 15] + +RFC 7305 ITAT Report July 2014 + + + [Leva13] Leva, T. and H. Soumi, "Framework for analyzing + feasibility of Internet protocols", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_4.pdf>. + + [Lowinder13] + Eklund Lowinder, A. and P. Wallstrom, "Long term strategy + for a successful deployment of DNSSEC - on all levels", + December 2013, <http://www.iab.org/wp-content/ + IAB-uploads/2013/06/itat-2013_submission_5.docx>. + + [Meyer13] Meyer, D., "On the Complexity of Engineered Systems (and + its effect on protocol deployment)", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_9.pdf>. + + [RFC2480] Freed, N., "Gateways and MIME Security Multiparts", RFC + 2480, January 1999. + + [RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S. + Rose, "Resource Records for the DNS Security Extensions", + RFC 4034, March 2005. + + [RFC4960] Stewart, R., "Stream Control Transmission Protocol", RFC + 4960, September 2007. + + [RFC5218] Thaler, D. and B. Aboba, "What Makes For a Successful + Protocol?", RFC 5218, July 2008. + + [RFC6555] Wing, D. and A. Yourtchenko, "Happy Eyeballs: Success with + Dual-Stack Hosts", RFC 6555, April 2012. + + [RFC6698] Hoffman, P. and J. Schlyter, "The DNS-Based Authentication + of Named Entities (DANE) Transport Layer Security (TLS) + Protocol: TLSA", RFC 6698, August 2012. + + [Robachevsky13] + Robachevsky, A., "Resilience of the commons: routing + security", December 2013, <http://www.iab.org/wp-content/ + IAB-uploads/2013/06/itat-2013_submission_12.pdf>. + + [Sathiaseelan13] + Sathiaseelan, A., Trossen, D., Komnios, I., Ott, J., and + J. Crowcroft, "An Internet Architecture for the + Challenged", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_3.pdf>. + + + + +Lear Informational [Page 16] + +RFC 7305 ITAT Report July 2014 + + + [Sen13] Sen, S., "On Economic Models of Network Technology + Adoption, Design, and Viability", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_101.pdf>. + + [Weber13] Weber, S., Guerin, R., and J. Oliveira, "When can bundling + help adoption of network technologies or services?", + December 2013, <http://www.iab.org/wp-content/ + IAB-uploads/2013/06/itat-2013_submission_2.pdf>. + + [Welzl13] Welzl, M., "The "best effort" service as a deployment + success factor", December 2013, + <http://www.iab.org/wp-content/IAB-uploads/2013/06/ + itat-2013_submission_8.pdf>. + +Author's Address + + Eliot Lear (editor) + Richtistrasse 7 + Wallisellen, ZH CH-8304 + Switzerland + + Phone: +41 44 878 9200 + EMail: lear@cisco.com + + + + + + + + + + + + + + + + + + + + + + + + + + + +Lear Informational [Page 17] + |