1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
|
Network Working Group R. Atkinson, Ed.
Request for Comments: 3869 S. Floyd, Ed.
Category: Informational Internet Architecture Board
August 2004
IAB Concerns and Recommendations
Regarding Internet Research and Evolution
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2004).
Abstract
This document discusses IAB concerns that ongoing research is needed
to further the evolution of the Internet infrastructure, and that
consistent, sufficient non-commercial funding is needed to enable
such research.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Document Organization. . . . . . . . . . . . . . . . . . 2
1.2. IAB Concerns . . . . . . . . . . . . . . . . . . . . . . 3
1.3. Contributions to this Document . . . . . . . . . . . . . 4
2. History of Internet Research and Research Funding. . . . . . . 4
2.1. Prior to 1980. . . . . . . . . . . . . . . . . . . . . . 4
2.2. 1980s and early 1990s. . . . . . . . . . . . . . . . . . 5
2.3. Mid-1990s to 2003. . . . . . . . . . . . . . . . . . . . 6
2.4. Current Status . . . . . . . . . . . . . . . . . . . . . 6
3. Open Internet Research Topics. . . . . . . . . . . . . . . . . 7
3.1. Scope and Limitations. . . . . . . . . . . . . . . . . . 7
3.2. Naming . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.1. Domain Name System (DNS). . . . . . . . . . . . 8
3.2.2. New Namespaces. . . . . . . . . . . . . . . . . 9
3.3. Routing. . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3.1. Inter-domain Routing. . . . . . . . . . . . . . 10
3.3.2. Routing Integrity . . . . . . . . . . . . . . . 11
3.3.3. Routing Algorithms. . . . . . . . . . . . . . . 12
3.3.4. Mobile and Ad-Hoc Routing . . . . . . . . . . . 13
3.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 13
Atkinson & Floyd Informational [Page 1]
^L
RFC 3869 Research Funding Recommendations August 2004
3.4.1. Formal Methods. . . . . . . . . . . . . . . . . 14
3.4.2. Key Management. . . . . . . . . . . . . . . . . 14
3.4.3. Cryptography. . . . . . . . . . . . . . . . . . 15
3.4.4. Security for Distributed Computing. . . . . . . 15
3.4.5. Deployment Considerations in Security . . . . . 15
3.4.6. Denial of Service Protection. . . . . . . . . . 16
3.5. Network Management . . . . . . . . . . . . . . . . . . . 16
3.5.1. Managing Networks, Not Devices. . . . . . . . . 16
3.5.2. Enhanced Monitoring Capabilities. . . . . . . . 17
3.5.3. Customer Network Management . . . . . . . . . . 17
3.5.4. Autonomous Network Management . . . . . . . . . 17
3.6. Quality of Service . . . . . . . . . . . . . . . . . . . 17
3.6.1. Inter-Domain QoS Architecture . . . . . . . . . 18
3.6.2. New Queuing Disciplines . . . . . . . . . . . . 19
3.7. Congestion Control . . . . . . . . . . . . . . . . . . . 19
3.8. Studying the Evolution of the Internet Infrastructure. . 20
3.9. Middleboxes. . . . . . . . . . . . . . . . . . . . . . . 21
3.10. Internet Measurement . . . . . . . . . . . . . . . . . . 21
3.11. Applications . . . . . . . . . . . . . . . . . . . . . . 22
3.12. Meeting the Needs of the Future. . . . . . . . . . . . . 22
3.13. Freely Distributable Prototypes. . . . . . . . . . . . . 23
4. Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . 23
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 23
6. Security Considerations. . . . . . . . . . . . . . . . . . . . 24
7. Informative References . . . . . . . . . . . . . . . . . . . . 24
8. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 29
9. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 30
1. Introduction
This document discusses the history of funding for Internet research,
expresses concern about the current state of such funding, and
outlines several specific areas that the IAB believes merit
additional research. Current funding levels for Internet research
are not generally adequate, and several important research areas are
significantly underfunded. This situation needs to be rectified for
the Internet to continue its evolution and development.
1.1. Document Organization
The first part of the document is a high-level discussion of the
history of funding for Internet research to provide some historical
context to this document. The early funding of Internet research was
largely from the U.S. government, followed by a period in the second
half of the 1990s of commercial funding and of funding from several
governments. However, the commercial funding for Internet research
has been reduced due to the recent economic downturn.
Atkinson & Floyd Informational [Page 2]
^L
RFC 3869 Research Funding Recommendations August 2004
The second part of the document provides an incomplete set of open
Internet research topics. These are only examples, intended to
illustrate the breadth of open research topics. This second section
supports the general thesis that ongoing research is needed to
further the evolution of the Internet infrastructure. This includes
research on the medium-time-scale evolution of the Internet
infrastructure as well as research on longer-time-scale grand
challenges. This also includes many research issues that are already
being actively investigated in the Internet research community.
Areas that are discussed in this section include the following:
naming, routing, security, network management, and transport. Issues
that require more research also include more general architectural
issues such as layering and communication between layers. In
addition, general topics discussed in this section include modeling,
measurement, simulation, test-beds, etc. We are focusing on topics
that are related to the IETF and IRTF (Internet Research Task Force)
agendas. (For example, Grid issues are not discussed in this
document because they are addressed through the Global Grid Forum and
other Grid-specific organizations, not in the IETF.)
Where possible, the examples in this document point to separate
documents on these issues, and only give a high-level summary of the
issues raised in those documents.
1.2. IAB Concerns
In the aftermath of September 11 2001, there seems to be a renewed
interest by governments in funding research for Internet-related
security issues. From [Jackson02]: "It is generally agreed that the
security and reliability of the basic protocols underlying the
Internet have not received enough attention because no one has a
proprietary interest in them".
That quote brings out a key issue in funding for Internet research,
which is that because no single organization (e.g., no single
government, software company, equipment vendor, or network operator)
has a sense of ownership of the global Internet infrastructure,
research on the general issues of the Internet infrastructure are
often not adequately funded. In our current challenging economic
climate, it is not surprising that commercial funding sources are
more likely to fund that research that leads to a direct competitive
advantage.
The principal thesis of this document is that if commercial funding
is the main source of funding for future Internet research, the
future of the Internet infrastructure could be in trouble. In
addition to issues about which projects are funded, the funding
Atkinson & Floyd Informational [Page 3]
^L
RFC 3869 Research Funding Recommendations August 2004
source can also affect the content of the research, for example,
towards or against the development of open standards, or taking
varying degrees of care about the effect of the developed protocols
on the other traffic on the Internet.
At the same time, many significant research contributions in
networking have come from commercial funding. However, for most of
the topics in this document, relying solely on commercially-funded
research would not be adequate. Much of today's commercial funding
is focused on technology transition, taking results from non-
commercial research and putting them into shipping commercial
products. We have not tried to delve into each of the research
issues below to discuss, for each issue, what are the potentials and
limitations of commercial funding for research in that area.
On a more practical note, if there was no commercial funding for
Internet research, then few research projects would be taken to
completion with implementations, deployment, and follow-up
evaluation.
While it is theoretically possible for there to be too much funding
for Internet research, that is far from the current problem. There
is also much that could be done within the network research community
to make Internet research more focused and productive, but that would
belong in a separate document.
1.3. Contributions to this Document
A number of people have directly contributed text for this document,
even though, following current conventions, the official RFC author
list includes only the key editors of the document. The
Acknowledgements section at the end of the document thanks other
people who contributed to this document in some form.
2. History of Internet Research and Research Funding
2.1. Prior to 1980
Most of the early research into packet-switched networks was
sponsored by the U.S. Defense Advanced Research Projects Agency
(DARPA) [CSTB99]. This includes the initial design, implementation,
and deployment of the ARPAnet connecting several universities and
other DARPA contractors. The ARPAnet originally came online in the
late 1960s. It grew in size during the 1970s, still chiefly with
DARPA funding, and demonstrated the utility of packet-switched
networking.
Atkinson & Floyd Informational [Page 4]
^L
RFC 3869 Research Funding Recommendations August 2004
DARPA funding for Internet design started in 1973, just four years
after the initial ARPAnet deployment. The support for Internet
design was one result of prior DARPA funding for packet radio and
packet satellite research. The existence of multiple networks
(ARPAnet, packet radio, and packet satellite) drove the need for
internetworking research. The Internet arose in large measure as a
consequence of DARPA research funding for these three networks -- and
arise only incidentally from the commercially-funded work at Xerox
PARC on Ethernet.
2.2. 1980s and early 1990s
The ARPAnet converted to the Internet Protocol (IP) on January 1,
1983, approximately 20 years before this document was written.
Throughout the 1980s, the U.S. Government continued strong research
and development funding for Internet technology. DARPA continued to
be the key funding source, but was supplemented by other DoD (U.S.
Department of Defense) funding (e.g., via the Defense Data Network
(DDN) program of the Defense Communication Agency (DCA)) and other
U.S. Government funding (e.g., U.S. Department of Energy (DoE)
funding for research networks at DoE national laboratories, (U.S.)
National Science Foundation (NSF) funding for academic institutions).
This funding included basic research, applied research (including
freely distributable prototypes), the purchase of IP-capable
products, and operating support for the IP-based government networks
such as ARPAnet, ESnet, MILnet, the NASA Science Internet, and
NSFnet.
During the 1980s, the U.S. DoD desired to leave the business of
providing operational network services to academic institutions, so
funding for most academic activities moved over to the NSF during the
decade. NSF's initial work included sponsorship of CSnet in 1981.
By 1986, NSF was also sponsoring various research projects into
networking (e.g., Mills' work on Fuzzballs). In the late 1980s, NSF
created the NSFnet backbone and sponsored the creation of several NSF
regional networks (e.g., SURAnet) and interconnections with several
international research networks. NSF also funded gigabit networking
research, through the Corporation for National Research Initiatives
(CNRI), starting in the late 1980s. It is important to note that the
NSF sponsorship was focused on achieving core NSF goals, such as
connecting scientists at leading universities to NSF supercomputing
centers. The needs of high-performance remote access to
supercomputers drove the overall NSFnet performance. As a side
effect, this meant that students and faculty at those universities
enjoyed a relatively high-performance Internet environment. As those
students graduated, they drove both commercial use of the Internet
and the nascent residential market. It is no accident that this was
the environment from which the world wide web emerged.
Atkinson & Floyd Informational [Page 5]
^L
RFC 3869 Research Funding Recommendations August 2004
Most research funding outside the U.S. during the 1980s and early
1990s was focused on the ISO OSI networking project or on then-new
forms of network media (e.g., wireless, broadband access). The
European Union was a significant source of research funding for the
networking community in Europe during this period. Some of the best
early work in gigabit networking was undertaken in the UK and Sweden.
2.3. Mid-1990s to 2003
Starting in the middle 1990s, U.S. Government funding for Internet
research and development was significantly reduced. The premise for
this was that the growing Internet industry would pay for whatever
research and development that was needed. Some funding for Internet
research and development has continued in this period from European
and Asian organizations (e.g., the WIDE Project in Japan [WIDE]).
Reseaux IP Europeens [RIPE] is an example of market-funded networking
research in Europe during this period.
Experience during this period has been that commercial firms have
often focused on donating equipment to academic institutions and
promoting somewhat vocationally-focused educational projects. Many
of the commercially-funded research and development projects appear
to have been selected because they appeared likely to give the
funding source a specific short-term economic advantage over its
competitors. Higher risk, more innovative research proposals
generally have not been funded by industry. A common view in Silicon
Valley has been that established commercial firms are not very good
at transitioning cutting edge research into products, but were
instead good at buying small startup firms who had successfully
transitioned such cutting edge research into products.
Unfortunately, small startup companies are generally unable
financially to fund any research themselves.
2.4. Current Status
The result of reduced U.S. Government funding and profit-focused,
low-risk, short-term industry funding has been a decline in higher-
risk but more innovative research activities. Industry has also been
less interested in research to evolve the overall Internet
architecture, because such work does not translate into a competitive
advantage for the firm funding such work.
The IAB believes that it would be helpful for governments and other
non-commercial sponsors to increase their funding of both basic
research and applied research relating to the Internet, and to
sustain these funding levels going forward.
Atkinson & Floyd Informational [Page 6]
^L
RFC 3869 Research Funding Recommendations August 2004
3. Open Internet Research Topics
This section primarily discusses some specific topics that the IAB
believes merit additional research. Research, of course, includes
not just devising a theory, algorithm, or mechanism to accomplish a
goal, but also evaluating the general efficacy of the approach and
then the benefits vs. the costs of deploying that algorithm or
mechanism. Important cautionary notes about this discussion are
given in the next sub-section. This particular set of topics is not
intended to be comprehensive, but instead is intended to demonstrate
the breadth of open Internet research questions.
Other discussions of problems of the Internet that merit further
research include the following:
[CIPB02,Claffy03a,Floyd,NSF03a,NSF03b].
3.1. Scope and Limitations
This document is NOT intended as a guide for public funding agencies
as to exactly which projects or proposals should or should not be
funded.
In particular, this document is NOT intended to be a comprehensive
list of *all* of the research questions that are important to further
the evolution of the Internet; that would be a daunting task, and
would presuppose a wider and more intensive effort than we have
undertaken in this document.
Similarly, this document is not intended to list the research
questions that are judged to be only of peripheral importance, or to
survey the current (global; governmental, commercial, and academic)
avenues for funding for Internet research, or to make specific
recommendations about which areas need additional funding. The
purpose of the document is to persuade the reader that ongoing
research is needed towards the continued evolution of the Internet
infrastructure; the purpose is not to make binding pronouncements
about which specific areas are and are not worthy of future funding.
For some research clearly relevant to the future evolution of the
Internet, there are grand controversies between competing proposals
or competing schools of thought; it is not the purpose of this
document to take positions in these controversies, or to take
positions on the nature of the solutions for areas needing further
research.
Atkinson & Floyd Informational [Page 7]
^L
RFC 3869 Research Funding Recommendations August 2004
That all carefully noted, the remainder of this section discusses a
broad set of research areas, noting a subset of particular topics of
interest in each of those research areas. Again, this list is NOT
comprehensive, but rather is intended to suggest that a broad range
of ongoing research is needed, and to propose some candidate topics.
3.1.1. Terminology
Several places in this document refer to 'network operators'. By
that term, we intend to include anyone or any organization that
operates an IP-based network; we are not using that term in the
narrow meaning of commercial network service providers.
3.2. Naming
The Internet currently has several different namespaces, including IP
addresses, sockets (specified by the IP address, upper-layer
protocol, and upper-layer port number), Autonomous System (AS)
number, and the Fully-Qualified Domain Name (FQDN). Many of the
Internet's namespaces are supported by the widely deployed Domain
Name System [RFC-3467] or by various Internet applications [RFC-2407,
Section 4.6.2.1]
3.2.1. Domain Name System (DNS)
The DNS system, while it works well given its current constraints,
has several stress points.
The current DNS system relies on UDP for transport, rather than SCTP
or TCP. Given the very large number of clients using a typical DNS
server, it is desirable to minimize the state on the DNS server side
of the connection. UDP does this well, so it is a reasonable choice,
though this has other implications, for example a reliance on UDP
fragmentation. With IPv6, intermediate fragmentation is not allowed
and Path MTU Discovery is mandated. However, the amount of state
required to deploy Path MTU Discovery for IPv6 on a DNS server might
be a significant practical problem.
One implication of this is that research into alternative transport
protocols, designed more for DNS-like applications where there are
very many clients using each server, might be useful. Of particular
interest would be transport protocols with little burden for the DNS
server, even if that increased the burden somewhat for the DNS
client.
Additional study of DNS caching, both currently available caching
techniques and also of potential new caching techniques, might be
helpful in finding ways to reduce the offered load for a typical DNS
Atkinson & Floyd Informational [Page 8]
^L
RFC 3869 Research Funding Recommendations August 2004
server. In particular, examination of DNS caching through typical
commercial firewalls might be interesting if it lead to alternative
firewall implementations that were less of an obstacle to DNS
caching.
The community lacks a widely-agreed-upon set of metrics for measuring
DNS server performance. It would be helpful if people would
seriously consider what characteristics of the DNS system should be
measured.
Some in the community would advocate replacing the current DNS system
with something better. Past attempts to devise a better approach
have not yielded results that persuaded the community to change.
Proposed work in this area could be very useful, but might require
careful scrutiny to avoid falling into historic design pitfalls.
With regards to DNS security, major technical concerns include
finding practical methods for signing very large DNS zones (e.g., and
tools to make it easier to manage secure DNS infrastructure.
Most users are unable to distinguish a DNS-related failure from a
more general network failure. Hence, maintaining the integrity and
availability of the Domain Name System is very important for the
future health of the Internet.
3.2.2. New Namespaces
Additionally, the Namespace Research Group (NSRG) of the Internet
Research Task Force (IRTF) studied adding one or more additional
namespaces to the Internet Architecture [LD2002]. Many members of
the IRTF NSRG believe that there would be significant architectural
benefit to adding one or more additional namespaces to the Internet
Architecture. Because smooth consensus on that question or on the
properties of a new namespace was not obtained, the IRTF NSRG did not
make a formal recommendation to the IETF community regarding
namespaces. The IAB believes that this is an open research question
worth examining further.
Finally, we believe that future research into the evolution of
Internet-based distributed computing might well benefit from studying
adding additional namespaces as part of a new approach to distributed
computing.
3.3. Routing
The currently deployed unicast routing system works reasonably well
for most users. However, the current unicast routing architecture is
suboptimal in several areas, including the following: end-to-end
Atkinson & Floyd Informational [Page 9]
^L
RFC 3869 Research Funding Recommendations August 2004
convergence times in global-scale catenets (a system of networks
interconnected via gateways); the ability of the existing inter-
domain path-vector algorithm to scale well beyond 200K prefixes; the
ability of both intra-domain and inter-domain routing to use multiple
metrics and multiple kinds of metrics concurrently; and the ability
of IPv4 and IPv6 to support widespread site multi-homing without
undue adverse impact on the inter-domain routing system. Integrating
policy into routing is also a general concern, both for intra-domain
and inter-domain routing. In many cases, routing policy is directly
tied to economic issues for the network operators, so applied
research into routing ideally would consider economic considerations
as well as technical considerations.
This is an issue for which the commercial interest is clear, but that
seems unlikely to be solved through commercial funding for research,
in the absence of a consortium of some type.
3.3.1. Inter-domain Routing
The current operational inter-domain routing system has between
150,000 and 200,000 routing prefixes in the default-free zone (DFZ)
[RFC-3221]. ASIC technology obviates concerns about the ability to
forward packets at very high speeds. ASIC technology also obviates
concerns about the time required to perform longest-prefix-match
computations. However, some senior members of the Internet routing
community have concerns that the end-to-end convergence properties of
the global Internet might hit fundamental algorithmic limitations
(i.e., not hardware limitations) when the DFZ is somewhere between
200,000 and 300,000 prefixes. Research into whether this concern is
well-founded in scientific terms seems very timely.
Separately from the above concern, recent work has shown that there
can be significant BGP convergence issues today. At present, it
appears that the currently observed convergence issues relate to how
BGP has been configured by network operators, rather than being any
sort of fundamental algorithmic limitation [MGVK02]. This
convergence time issue makes the duration of the apparent network
outage much longer than it should be. Additional applied research
into which aspects of a BGP configuration have the strongest impact
on convergence times would help mitigate the currently observed
operational issues.
Also, inter-domain routing currently requires significant human
engineering of specific inter-AS paths to ensure that reasonably
optimal paths are used by actual traffic. Ideally, the inter-domain
routing system would automatically cause reasonably optimal paths to
be chosen. Recent work indicates that improved BGP policy mechanisms
Atkinson & Floyd Informational [Page 10]
^L
RFC 3869 Research Funding Recommendations August 2004
might help ensure that reasonably optimal paths are normally used for
inter-domain IP traffic. [SMA03] Continued applied research in this
area might lead to substantially better technical approaches.
The current approach to site multi-homing has the highly undesirable
side-effect of significantly increasing the growth rate of prefix
entries in the DFZ (by impairing the deployment of prefix
aggregation). Research is needed into new routing architectures that
can support large-scale site multi-homing without the undesirable
impacts on inter-domain routing of the current multi-homing
technique.
The original application for BGP was in inter-domain routing,
primarily within service provider networks but also with some use by
multi-homed sites. However, some are now trying to use BGP in other
contexts, for example highly mobile environments, where it is less
obviously well suited. Research into inter-domain routing and/or
intra-domain policy routing might lead to other approaches for any
emerging environments where the current BGP approach is not the
optimal one.
3.3.2. Routing Integrity
Recently there has been increased awareness of the longstanding issue
of deploying strong authentication into the Internet inter-domain
routing system. Currently deployed mechanisms (e.g., BGP TCP MD5
[RFC-2385], OSPF MD5, RIP MD5 [RFC-2082]) provide cryptographic
authentication of routing protocol messages, but no authentication of
the actual routing data. Recent proposals (e.g., S-BGP [KLMS2000])
for improving this in inter-domain routing appear difficult to deploy
across the Internet, in part because of their reliance on a single
trust hierarchy (e.g., a single PKI). Similar proposals (e.g., OSPF
with Digital Signatures, [RFC-2154]) for intra-domain routing are
argued to be computationally infeasible to deploy in a large network.
A recurring challenge with any form of inter-domain routing
authentication is that there is no single completely accurate source
of truth about which organizations have the authority to advertise
which address blocks. Alternative approaches to authentication of
data in the routing system need to be developed. In particular, the
ability to perform partial authentication of routing data would
facilitate incremental deployment of routing authentication
mechanisms. Also, the ability to use non-hierarchical trust models
(e.g., the web of trust used in the PGP application) might facilitate
incremental deployment and might resolve existing concerns about
centralized administration of the routing system, hence it merits
additional study and consideration.
Atkinson & Floyd Informational [Page 11]
^L
RFC 3869 Research Funding Recommendations August 2004
3.3.3. Routing Algorithms
The current Internet routing system relies primarily on two
algorithms. Link-state routing uses the Dijkstra algorithm
[Dijkstra59]. Distance-Vector routing (e.g., RIP) and Path-Vector
routing (e.g., BGP) use the Bellman-Ford algorithm [Bellman1957,
FF1962]. Additional ongoing basic research into graph theory as
applied to routing is worthwhile and might yield algorithms that
would enable a new routing architecture or otherwise provide
improvements to the routing system.
Currently deployed multicast routing relies on the Deering RPF
algorithm [Deering1988]. Ongoing research into alternative multicast
routing algorithms and protocols might help alleviate current
concerns with the scalability of multicast routing.
The deployed Internet routing system assumes that the shortest path
is always the best path. This is provably false, however it is a
reasonable compromise given the routing protocols currently
available. The Internet lacks deployable approaches for policy-based
routing or routing with alternative metrics (i.e., some metric other
than the number of hops to the destination). Examples of alternative
policies include: the path with lowest monetary cost; the path with
the lowest probability of packet loss; the path with minimized
jitter; and the path with minimized latency. Policy metrics also
need to take business relationships into account. Historic work on
QoS-based routing has tended to be unsuccessful in part because it
did not adequately consider economic and commercial considerations of
the routing system and in part because of inadequate consideration of
security implications.
Transitioning from the current inter-domain routing system to any new
inter-domain routing system is unlikely to be a trivial exercise. So
any proposal for a new routing system needs to carefully consider and
document deployment strategies, transition mechanisms, and other
operational considerations. Because of the cross-domain
interoperability aspect of inter-domain routing, smooth transitions
from one inter-domain routing system are likely to be difficult to
accomplish. Separately, the inter-domain routing system lacks strong
market forces that would encourage migration to better technical
approaches. Hence, it appears unlikely that the commercial sector
will be the source of a significantly improved inter-domain routing
system.
Atkinson & Floyd Informational [Page 12]
^L
RFC 3869 Research Funding Recommendations August 2004
3.3.4. Mobile and Ad-Hoc Routing
While some of the earliest DARPA-sponsored networking research
involved packet radio networks, mobile routing [IM1993] and mobile
ad-hoc routing [RFC-2501] are relatively recent arrivals in the
Internet, and are not yet widely deployed. The current approaches
are not the last word in either of those arenas. We believe that
additional research into routing support for mobile hosts and mobile
networks is needed. Additional research for ad-hoc mobile hosts and
mobile networks is also worthwhile. Ideally, mobile routing and
mobile ad-hoc routing capabilities should be native inherent
capabilities of the Internet routing architecture. This probably
will require a significant evolution from the existing Internet
routing architecture. (NB: The term "mobility" as used here is not
limited to mobile telephones, but instead is very broadly defined,
including laptops that people carry, cars/trains/aircraft, and so
forth.)
Included in this topic are a wide variety of issues. The more
distributed and dynamic nature of partially or completely self-
organizing routing systems (including the associated end nodes)
creates unique security challenges (especially relating to
Authorization, Authentication, and Accounting, and relating to key
management). Scalability of wireless networks can be difficult to
measure or to achieve. Enforced hierarchy is one approach, but can
be very limiting. Alternative, less constraining approaches to
wireless scalability are desired. Because wireless link-layer
protocols usually have some knowledge of current link characteristics
such as link quality, sublayer congestion conditions, or transient
channel behavior, it is desirable to find ways to let network-layer
routing use such data. This raises architectural questions of what
the proper layering should be, which functions should be in which
layer, and also practical considerations of how and when such
information sharing should occur in real implementations.
3.4. Security
The Internet has a reputation for not having sufficient security. In
fact, the Internet has a number of security mechanisms standardized,
some of which are widely deployed. However, there are a number of
open research questions relating to Internet security. In
particular, security mechanisms need to be incrementally deployable
and easy to use. "[Security] technology must be easy to use, or it
will not be configured correctly. If mis-configured, security will
be lost, but things will `work'" [Schiller03].
Atkinson & Floyd Informational [Page 13]
^L
RFC 3869 Research Funding Recommendations August 2004
3.4.1. Formal Methods
There is an ongoing need for funding of basic research relating to
Internet security, including funding of formal methods research that
relates to security algorithms, protocols, and systems.
For example, it would be beneficial to have more formal study of
non-hierarchical trust models (e.g., PGP's Web-of-Trust model). Use
of a hierarchical trust model can create significant limitations in
how one might approach securing components of the Internet, for
example the inter-domain routing system. So research to develop new
trust models suited for the Internet or on the applicability of
existing non-hierarchical trust models to existing Internet problems
would be worthwhile.
While there has been some work on the application of formal methods
to cryptographic algorithms and cryptographic protocols, existing
techniques for formal evaluation of algorithms and protocols lack
sufficient automation. This lack of automation means that many
protocols aren't formally evaluated in a timely manner. This is
problematic for the Internet because formal evaluation has often
uncovered serious anomalies in cryptographic protocols. The creation
of automated tools for applying formal methods to cryptographic
algorithms and/or protocols would be very helpful.
3.4.2. Key Management
A recurring challenge to the Internet community is how to design,
implement, and deploy key management appropriate to the myriad of
security contexts existing in the global Internet. Most current work
in unicast key management has focused on hierarchical trust models,
because much of the existing work has been driven by corporate or
military "top-down" operating models.
The paucity of key management methods applicable to non-hierarchical
trust models (see above) is a significant constraint on the
approaches that might be taken to secure components of the Internet.
Research focused on removing those constraints by developing
practical key management methods applicable to non-hierarchical trust
models would be very helpful.
Topics worthy of additional research include key management
techniques, such as non-hierarchical key management architectures
(e.g., to support non-hierarchical trust models; see above), that are
useful by ad-hoc groups in mobile networks and/or distributed
computing.
Atkinson & Floyd Informational [Page 14]
^L
RFC 3869 Research Funding Recommendations August 2004
Although some progress has been made in recent years, scalable
multicast key management is far from being a solved problem.
Existing approaches to scalable multicast key management add
significant constraints on the problem scope in order to come up with
a deployable technical solution. Having a more general approach to
scalable multicast key management (i.e., one having broader
applicability and fewer constraints) would enhance the Internet's
capabilities.
In many cases, attribute negotiation is an important capability of a
key management protocol. Experience with the Internet Key Exchange
(IKE) to date has been that it is unduly complex. Much of IKE's
complexity derives from its very general attribute negotiation
capabilities. A new key management approach that supported
significant attribute negotiation without creating challenging levels
of deployment and operations complexity would be helpful.
3.4.3. Cryptography
There is an ongoing need to continue the open-world research funding
into both cryptography and cryptanalysis. Most governments focus
their cryptographic research in the military-sector. While this is
understandable, those efforts often have limited (or no) publications
in the open literature. Since the Internet engineering community
must work from the open literature, it is important that open-world
research continues in the future.
3.4.4. Security for Distributed Computing
MIT's Project Athena was an important and broadly successful research
project into distributed computing. Project Athena developed the
Kerberos [RFC-1510] security system, which has significant deployment
today in campus environments. However, inter-realm Kerberos is
neither as widely deployed nor perceived as widely successful as
single-realm Kerberos. The need for scalable inter-domain user
authentication is increasingly acute as ad-hoc computing and mobile
computing become more widely deployed. Thus, work on scalable
mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain
authentication would be very helpful.
3.4.5. Deployment Considerations in Security
Lots of work has been done on theoretically perfect security that is
impossible to deploy. Unfortunately, the S-BGP proposal is an
example of a good research product that has significant unresolved
deployment challenges. It is far from obvious how one could widely
deploy S-BGP without previously deploying a large-scale inter-domain
public-key infrastructure and also centralizing route advertisement
Atkinson & Floyd Informational [Page 15]
^L
RFC 3869 Research Funding Recommendations August 2004
policy enforcement in the Routing Information Registries or some
similar body. Historically, public-key infrastructures have been
either very difficult or impossible to deploy at large scale.
Security mechanisms that need additional infrastructure have not been
deployed well. We desperately need security that is general, easy to
install, and easy to manage.
3.4.6. Denial of Service Protection
Historically, the Internet community has mostly ignored pure Denial
of Service (DoS) attacks. This was appropriate at one time since
such attacks were rare and are hard to defend against. However, one
of the recent trends in adversarial software (e.g., viruses, worms)
has been the incorporation of features that turn the infected host
into a "zombie". Such zombies can be remotely controlled to mount a
distributed denial of service attack on some victim machine. In many
cases, the authorized operators of systems are not aware that some or
all of their systems have become zombies. It appears that the
presence of non-trivial numbers of zombies in the global Internet is
now endemic, which makes distributed denial of service attacks a much
larger concern. So Internet threat models need to assume the
presence of such zombies in significant numbers. This makes the
design of protocols resilient in the presence of distributed denial
of service attacks very important to the health of the Internet.
Some work has been done on this front [Savage00], [MBFIPS01], but
more is needed.
3.5. Network Management
The Internet had early success in network device monitoring with the
Simple Network Management Protocol (SNMP) and its associated
Management Information Base (MIB). There has been comparatively less
success in managing networks, in contrast to the monitoring of
individual devices. Furthermore, there are a number of operator
requirements not well supported by the current Internet management
framework. It is desirable to enhance the current Internet network
management architecture to more fully support operational needs.
Unfortunately, network management research has historically been very
underfunded. Operators have complained that existing solutions are
inadequate. Research is needed to find better solutions.
3.5.1. Managing Networks, Not Devices
At present there are few or no good tools for managing a whole
network instead of isolated devices. For example, the lack of
appropriate network management tools has been cited as one of the
major barriers to the widespread deployment of IP multicast [Diot00,
Atkinson & Floyd Informational [Page 16]
^L
RFC 3869 Research Funding Recommendations August 2004
SM03]. Current network management protocols, such as the Simple
Network Management Protocol (SNMP), are fine for reading status of
well-defined objects from individual boxes. Managing networks
instead of isolated devices requires the ability to view the network
as a large distributed system. Research is needed on scalable
distributed data aggregation mechanisms, scalable distributed event
correlation mechanisms, and distributed and dependable control
mechanisms.
Applied research into methods of managing sets of networked devices
seems worthwhile. Ideally, such a management approach would support
distributed management, rather than being strictly centralized.
3.5.2. Enhanced Monitoring Capabilities
SNMP does not always scale well to monitoring large numbers of
objects in many devices in different parts of the network. An
alternative approach worth exploring is how to provide scalable and
distributed monitoring, not on individual devices, but instead on
groups of devices and the network-as-a-whole. This requires scalable
techniques for data aggregation and event correlation of network
status data originating from numerous locations in the network.
3.5.3. Customer Network Management
An open issue related to network management is helping users and
others to identify and resolve problems in the network. If a user
can't access a web page, it would be useful if the user could find
out, easily, without having to run ping and traceroute, whether the
problem was that the web server was down, that the network was
partitioned due to a link failure, that there was heavy congestion
along the path, that the DNS name couldn't be resolved, that the
firewall prohibited the access, or that some other specific event
occurred.
3.5.4. Autonomous Network Management
More research is needed to improve the degree of automation achieved
by network management systems and to localize management. Autonomous
network management might involve the application of control theory,
artificial intelligence or expert system technologies to network
management problems.
3.6. Quality of Service
There has been an intensive body of research and development work on
adding QoS to the Internet architecture for more than ten years now
[RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still
Atkinson & Floyd Informational [Page 17]
^L
RFC 3869 Research Funding Recommendations August 2004
don't have end-to-end QoS in the Internet [RFC-2990, RFC-3387]. The
IETF is good at defining individual QoS mechanisms, but poor at work
on deployable QoS architectures. Thus, while Differentiated Services
(DiffServ) mechanisms have been standardized as per-hop behaviors,
there is still much to be learned about the deployment of that or
other QoS mechanisms for end-to-end QoS. In addition to work on
purely technical issues, this includes close attention to the
economic models and deployment strategies that would enable an
increased deployment of QoS in the network.
In many cases, deployment of QoS mechanisms would significantly
increase operational security risks [RFC-2990], so any new research
on QoS mechanisms or architectures ought to specifically discuss the
potential security issues associated with the new proposal(s) and how
to mitigate those security issues.
In some cases, the demand for QoS mechanisms has been diminished by
the development of more resilient voice/video coding techniques that
are better suited for the best-effort Internet than the older coding
techniques that were originally designed for circuit-switched
networks.
One of the factors that has blunted the demand for QoS has been the
transition of the Internet infrastructure from heavy congestion in
the early 1990s, to overprovisioning in backbones and in many
international links now. Thus, research in QoS mechanisms also has
to include some careful attention to the relative costs and benefits
of QoS in different places in the network. Applied research into QoS
should include explicit consideration of economic issues of deploying
and operating a QoS-enabled IP network [Clark02].
3.6.1. Inter-Domain QoS Architecture
Typically, a router in the deployed inter-domain Internet provides
best-effort forwarding of IP packets, without regard for whether the
source or destination of the packet is a direct customer of the
operator of the router. This property is a significant contributor
to the current scalability of the global Internet and contributes to
the difficulty of deploying inter-domain Quality of Service (QoS)
mechanisms.
Deploying existing Quality-of-Service (QoS) mechanisms, for example
Differentiated Services or Integrated Services, across an inter-
domain boundary creates a significant and easily exploited denial-of-
service vulnerability for any network that provides inter-domain QoS
support. This has caused network operators to refrain from
supporting inter-domain QoS. The Internet would benefit from
Atkinson & Floyd Informational [Page 18]
^L
RFC 3869 Research Funding Recommendations August 2004
additional research into alternative approaches to QoS, particularly
into approaches that do not create such vulnerabilities and can be
deployed end-to-end [RFC-2990].
Also, current business models are not consistent with inter-domain
QoS, in large part because it is impractical or impossible to
authenticate the identity of the sender of would-be preferred traffic
while still forwarding traffic at line-rate. Absent such an ability,
it is unclear how a network operator could bill or otherwise recover
costs associated with providing that preferred service. So any new
work on inter-domain QoS mechanisms and architectures needs to
carefully consider the economic and security implications of such
proposals.
3.6.2. New Queuing Disciplines
The overall Quality-of-Service for traffic is in part determined by
the scheduling and queue management mechanisms at the routers. While
there are a number of existing mechanisms (e.g., RED) that work well,
it is possible that improved active queuing strategies might be
devised. Mechanisms that lowered the implementation cost in IP
routers might help increase deployment of active queue management,
for example.
3.7. Congestion Control.
TCP's congestion avoidance and control mechanisms, from 1988
[Jacobson88], have been a key factor in maintaining the stability of
the Internet, and are used by the bulk of the Internet's traffic.
However, the congestion control mechanisms of the Internet need to be
expanded and modified to meet a wide range of new requirements, from
new applications such as streaming media and multicast to new
environments such as wireless networks or very high bandwidth paths,
and new requirements for minimizing queueing delay. While there are
significant bodies of work in several of these issues, considerably
more needs to be done.
We would note that research on TCP congestion control is also not yet
"done", with much still to be accomplished in high-speed TCP, or in
adding robust performance over paths with significant reordering,
intermittent connectivity, non-congestive packet loss, and the like.
Several of these issues bring up difficult fundamental questions
about the potential costs and benefits of increased communication
between layers. Would it help transport to receive hints or other
information from routing, from link layers, or from other transport-
level connections? If so, what would be the cost to robust operation
across diverse environments?
Atkinson & Floyd Informational [Page 19]
^L
RFC 3869 Research Funding Recommendations August 2004
For congestion control mechanisms in routers, active queue management
and Explicit Congestion Notification are generally not yet deployed,
and there are a range of proposals, in various states of maturity, in
this area. At the same time, there is a great deal that we still do
not understand about the interactions of queue management mechanisms
with other factors in the network. Router-based congestion control
mechanisms are also needed for detecting and responding to aggregate
congestion such as in Distributed Denial of Service attacks and flash
crowds.
As more applications have the need to transfer very large files over
high delay-bandwidth-product paths, the stresses on current
congestion control mechanisms raise the question of whether we need
more fine-grained feedback from routers. This includes the challenge
of allowing connections to avoid the delays of slow-start, and to
rapidly make use of newly-available bandwidth. On a more general
level, we don't understand the potential and limitations for best-
effort traffic over high delay-bandwidth-product paths, given the
current feedback from routers, or the range of possibilities for more
explicit feedback from routers.
There is also a need for long-term research in congestion control
that is separate from specific functional requirements like the ones
listed above. We know very little about congestion control dynamics
or traffic dynamics of a large, complex network like the global
Internet, with its heterogeneous and changing traffic mixes, link-
level technologies, network protocols and router mechanisms, patterns
of congestion, pricing models, and the like. Expanding our knowledge
in this area seems likely to require a rich mix of measurement,
analysis, simulations, and experimentation.
3.8. Studying the Evolution of the Internet Infrastructure
The evolution of the Internet infrastructure has been frustratingly
slow and difficult, with long stories about the difficulties in
adding IPv6, QoS, multicast, and other functionality to the Internet.
We need a more scientific understanding of the evolutionary
potentials and evolutionary difficulties of the Internet
infrastructure.
This evolutionary potential is affected not only by the technical
issues of the layered IP architecture, but by other factors as well.
These factors include the changes in the environment over time (e.g.,
the recent overprovisioning of backbones, the deployment of
firewalls), and the role of the standardization process. Economic
and public policy factors are also critical, including the central
fact of the Internet as a decentralized system, with key players
being not only individuals, but also ISPs, companies, and entire
Atkinson & Floyd Informational [Page 20]
^L
RFC 3869 Research Funding Recommendations August 2004
industries. Deployment issues are also key factors in the evolution
of the Internet, including the continual chicken-and-egg problem of
having enough customers to merit rolling out a service whose utility
depends on the size of the customer base in the first place.
Overlay networks might serve as a transition technology for some new
functionality, with an initial deployment in overlay networks, and
with the new functionality moving later into the core if it seems
warranted.
There are also increased obstacles to the evolution of the Internet
in the form of increased complexity [WD02], unanticipated feature
interactions [Kruse00], interactions between layers [CWWS92],
interventions by middleboxes [RFC-3424], and the like. Because
increasing complexity appears inevitable, research is needed to
understand architectural mechanisms that can accommodate increased
complexity without decreasing robustness of performance in unknown
environments, and without closing off future possibilities for
evolution. More concretely, research is needed on how to evolve the
Internet will still maintaining its core strengths, such as the
current degree of global addressability of hosts, end-to-end
transparency of packet forwarding, and good performance for best-
effort traffic.
3.9. Middleboxes
Research is needed to address the challenges posed by the wide range
of middleboxes [RFC-3234]. This includes issues of security,
control, data integrity, and on the general impact of middleboxes on
the architecture.
In many ways middleboxes are a direct outgrowth of commercial
interests, but there is a need to look beyond the near-term needs for
the technology, to research its broader implications and to explore
ways to improve how middleboxes are integrated into the architecture.
3.10. Internet Measurement
A recurring challenge is measuring the Internet; there have been many
discussions about the need for measurement studies as an integral
part of Internet research [Claffy03]. In this discussion, we define
measurement quite broadly. For example, there are numerous
challenges in measuring performance along any substantial Internet
path, particularly when the path crosses administrative domain
boundaries. There are also challenges in measuring
protocol/application usage on any high-speed Internet link. Many of
Atkinson & Floyd Informational [Page 21]
^L
RFC 3869 Research Funding Recommendations August 2004
the problems discussed above would benefit from increased frequency
of measurement as well as improved quality of measurement on the
deployed Internet.
A key issue in network measurement is that most commercial Internet
Service Providers consider the particular characteristics of their
production IP network(s) to be trade secrets. Ways need to be found
for cooperative measurement studies, e.g., to allow legitimate non-
commercial researchers to be able to measure relevant network
parameters while also protecting the privacy rights of the measured
ISPs.
Absent measured data, there is possibly an over-reliance on network
simulations in some parts of the Internet research community and
probably insufficient validation that existing network simulation
models are reasonably good representations of the deployed Internet
(or of some plausible future Internet) [FK02].
Without solid measurement of the current Internet behavior, it is
very difficult to know what otherwise unknown operational problems
exist that require attention, and it is equally difficult to fully
understand the impact of changes (past or future) upon the Internet's
actual behavioral characteristics.
3.11. Applications
Research is needed on a wide range of issues related to Internet
applications.
Taking email as one example application, research is needed on
understanding the spam problem, and on investigating tools and
techniques to mitigate the effects of spam, including tools and
techniques that aid the implementation of legal and other non-
technical anti-spam measures [ASRG]. "Spam" is a generic term for a
range of significantly different types of unwanted bulk email, with
many types of senders, content and traffic-generating techniques. As
one part of controlling spam, we need to develop a much better
understanding of its many, different characteristics and their
interactions with each other.
3.12. Meeting the Needs of the Future
As network size, link bandwidth, CPU capacity, and the number of
users all increase, research will be needed to ensure that the
Internet of the future scales to meet these increasing demands. We
have discussed some of these scaling issues in specific sections
above.
Atkinson & Floyd Informational [Page 22]
^L
RFC 3869 Research Funding Recommendations August 2004
However, for all of the research questions discussed in this
document, the goal of the research must be not only to meet the
challenges already experienced today, but also to meet the challenges
that can be expected to emerge in the future.
3.13. Freely Distributable Prototypes
U.S.'s DARPA has historically funded development of freely
distributable implementations of various Internet technologies (e.g.,
TCP/IPv4, RSVP, IPv6, and IP security) in a variety of operating
systems (e.g., 4.2 BSD, 4.3 BSD, 4.4 BSD, Tenex). Experience has
shown that a good way to speed deployment of a new technology is to
provide an unencumbered, freely-distributable prototype that can be
incorporated into commercial products as well as non-commercial
prototypes. Japan's WIDE Project has also funded some such work,
primarily focused on IPv6 implementation for 4.4 BSD and Linux.
[WIDE] We believe that applied research projects in networking will
have an increased probability of success if the research project
teams make their resulting software implementations freely available
for both commercial and non-commercial uses. Examples of successes
here include the DARPA funding of TCP/IPv4 integration into the 4.x
BSD operating system [MBKQ96], DARPA/USN funding of ESP/AH design and
integration into 4.4 BSD [Atk96], as well as separate DARPA/USN and
WIDE funding of freely distributable IPv6 prototypes [Atk96, WIDE].
4. Conclusions
This document has summarized the history of research funding for the
Internet and highlighted examples of open research questions. The
IAB believes that more research is required to further the evolution
of the Internet infrastructure, and that consistent, sufficient non-
commercial funding is needed to enable such research.
In case there is any confusion, in this document we are not
suggesting any direct or indirect role for the IAB, the IETF, or the
IRTF in handling any funding for Internet research.
5. Acknowledgements
The people who directly contributed to this document in some form
include the following: Ran Atkinson, Guy Almes, Rob Austein, Vint
Cerf, Jon Crowcroft, Sally Floyd, James Kempf, Joe Macker, Craig
Partridge, Vern Paxson, Juergen Schoenwaelder, and Mike St. Johns.
We are also grateful to Kim Claffy, Dave Crocker, Michael Eder, Eric
Fleischman, Andrei Gurtov, Stephen Kent, J.P. Martin-Flatin, and
Hilarie Orman for feedback on earlier drafts of this document.
Atkinson & Floyd Informational [Page 23]
^L
RFC 3869 Research Funding Recommendations August 2004
We have also drawn from the following reports:
[CIPB02,IST02,NV02,NSF02,NSF03,NSF03a].
6. Security Considerations
This document does not itself create any new security issues for the
Internet community. Security issues within the Internet Architecture
primarily are discussed in Section 3.4 above.
7. Informative References
[ASRG] Anti-Spam Research Group (ASRG) of the IRTF. URL
"http://asrg.sp.am/".
[Atk96] R. Atkinson et al., "Implementation of IPv6 in 4.4
BSD", Proceedings of USENIX 1996 Annual Technical
Conference, USENIX Association, Berkeley, CA, USA.
January 1996. URL
http://www.chacs.itd.nrl.navy.mil/publications/CHACS/
1996/1996atkinson-USENIX.pdf
[Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton
University Press, Princeton, NJ, 1957.
[Claffy03] K. Claffy, "Priorities and Challenges in Internet
Measurement, Simulation, and Analysis", Large Scale
Network meeting, (US) National Science Foundation,
Arlington, VA, USA. 10 June 2003. URL
"http://www.caida.org/outreach/
presentations/2003/lsn20030610/".
[Claffy03a] K. Claffy, "Top Problems of the Internet and What
Sysadmins and Researchers Can Do To Help", plenary talk
at LISA'03, October 2003. URL
"http://www.caida.org/outreach/presentations/
2003/netproblems_lisa03/".
[Clark02] D. D. Clark, "Deploying the Internet - why does it take
so long and, can research help?", Large-Scale
Networking Distinguished Lecture Series, (U.S.)
National Science Foundation, Arlington, VA, 8 January
2002. URL: http://www.ngi-
supernet.org/conferences.html
Atkinson & Floyd Informational [Page 24]
^L
RFC 3869 Research Funding Recommendations August 2004
[CSTB99] Computer Science and Telecommunications Board, (U.S.)
National Research Council, "Funding a Revolution:
Government Support for Computing Research", National
Academy Press, Washington, DC, 1999. URL
"http://www7.nationalacademies.org/cstb/
pub_revolution.html".
[CIPB02] Critical Infrastructure Protection Board, "National
Strategy to Secure Cyberspace", The White House,
Washington, DC, USA. September 2002, URL
"http://www.whitehouse.gov/pcipb".
[CWWS92] J. Crowcroft, I. Wakeman, Z. Wang, and D. Sirovica, "Is
Layering Harmful?", IEEE Networks, Vol. 6, Issue 1, pp
20-24, January 1992.
[Diot00] C. Diot, et al., "Deployment Issues for the IP
Multicast Service and Architecture", IEEE Network,
January/February 2000.
[Deering1988] S. Deering, "Multicast Routing in Internetworks and
LANs", ACM Computer Communications Review, Volume 18,
Issue 4, August 1988.
[Dijkstra59] E. Dijkstra, "A Note on Two Problems in Connexion with
Graphs", Numerische Mathematik, 1, 1959, pp.269-271.
[FF1962] L. R. Ford Jr. and D.R. Fulkerson, "Flows in Networks",
Princeton University Press, Princeton, NJ, 1962.
[FK02] S. Floyd and E. Kohler, "Internet Research Needs Better
Models", Proceedings of 1st Workshop on Hot Topics in
Networks (Hotnets-I), Princeton, NJ, USA. October
2002. URL
"http://www.icir.org/models/bettermodels.html".
[IM1993] J. Ioannidis and G. Maguire Jr., "The Design and
Implementation of a Mobile Internetworking
Architecture", Proceedings of the Winter USENIX
Technical Conference, pages 489-500, Berkeley, CA, USA,
January 1993.
[IST02] Research Networking in Europe - Striving for Global
Leadership, Information Society Technologies, 2002.
URL "http://www.cordis.lu/ist/rn/rn-brochure.htm".
Atkinson & Floyd Informational [Page 25]
^L
RFC 3869 Research Funding Recommendations August 2004
[Jacobson88] Van Jacobson, "Congestion Avoidance and Control",
Proceedings of ACM SIGCOMM 1988 Symposium, ACM SIGCOMM,
Stanford, CA, August 1988. URL
"http://citeseer.nj.nec.com/jacobson88congestion.html".
[Jackson02] William Jackson, "U.S. should fund R&D for secure
Internet protocols, Clarke says", Government Computer
News, 31 October 2002. URL
"http://www.gcn.com/vol1_no1/security/20382-1.html".
[Kruse00] Hans Kruse, "The Pitfalls of Distributed Protocol
Development: Unintentional Interactions between Network
Operations and Applications Protocols", Proceedings of
the 8th International Conference on Telecommunication
Systems Design, Nashville, TN, USA, March 2000. URL
"http://www.csm.ohiou.edu/kruse/publications/
TSYS2000.pdf".
[KLMS2000] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure
Border Gateway Protocol (S-BGP)", Proceedings of ISOC
Network and Distributed Systems Security Symposium,
Internet Society, Reston, VA, February 2000.
[LD2002] E. Lear and R. Droms, "What's in a Name: Thoughts from
the NSRG", expired Internet-Draft, December 2002.
[MBFIPS01] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John
Ioannidis, Vern Paxson, and Scott Shenker, "Controlling
High Bandwidth Aggregates in the Network", ACM Computer
Communications Review, Vol. 32, No. 3, July 2002. URL
"http://www.icir.org/pushback/".
[MBKQ96] M. McKusick, K. Bostic, M. Karels, and J. Quarterman,
"Design and Implementation of the 4.4 BSD Operating
System", Addison-Wesley, Reading, MA, 1996.
[MGVK02] Z. Mao, R. Govindan, G. Varghese, & R. Katz, "Route
Flap Dampening Exacerbates Internet Routing
Convergence", Proceedings of ACM SIGCOMM 2002, ACM,
Pittsburgh, PA, USA, August 2002.
[NV02] NetVision 2012 Committee,"DARPA's Ten-Year Strategic
Plan for Networking Research", (U.S.) Defense Advanced
Research Projects Agency, October 2002. Citation for
acknowledgement purposes only.
Atkinson & Floyd Informational [Page 26]
^L
RFC 3869 Research Funding Recommendations August 2004
[NSF02] NSF Workshop on Network Research Testbeds, National
Science Foundation, Directorate for Computer and
Information Science & Engineering, Advanced Networking
Infrastructure & Research Division, Arlington, VA, USA,
October 2002. URL "http://www-
net.cs.umass.edu/testbed_workshop/".
[NSF03] NSF ANIR Principal Investigator meeting, National
Science Foundation, Arlington, VA, USA. January 9-10,
2003, URL "http://www.ncne.org/training/nsf-
pi/2003/nsfpimain.html".
[NSF03a] D. E. Atkins, et al., "Revolutionizing Science and
Engineering Through Cyberinfrastructure", Report of NSF
Advisory Panel on Cyberinfrastructure, January 2003.
URL "http://www.cise.nsf.gov/evnt/reports/
atkins_annc_020303.htm".
[NSF03b] Report of the National Science Foundation Workshop on
Fundamental Research in Networking. April 24-25, 2003.
URL "http://www.cs.virginia.edu/~jorg/workshop1/NSF-
NetWorkshop-2003.pdf".
[Floyd] S. Floyd, "Papers about Research Questions for the
Internet", web page, ICSI Center for Internet Research
(ICIR), Berkeley, CA, 2003 URL
"http://www.icir.org/floyd/research_questions.html".
[RFC-1510] Kohl, J. and C. Neuman, "The Kerberos Network
Authentication Service (V5)", RFC 1510, September 1993.
[RFC-1633] Braden, R., Clark, D., and S. Shenker, "Integrated
Services in the Internet Architecture: an Overview",
RFC 1633, June 1994.
[RFC-2082] Baker, F. and R. Atkinson, "RIP-2 MD5 Authentication",
RFC 2082, January 1997.
[RFC-2210] Wroclawski, J., "The Use of RSVP with IETF Integrated
Services", RFC 2210, September 1997.
[RFC-2154] Murphy, S., Badger, M., and B. Wellington, "OSPF with
Digital Signatures", RFC 2154, June 1997.
[RFC-2385] Heffernan, A., "Protection of BGP Sessions via the TCP
MD5 Signature Option", RFC 2385, August 1998.
Atkinson & Floyd Informational [Page 27]
^L
RFC 3869 Research Funding Recommendations August 2004
[RFC-2407] Piper, D., "The Internet IP Security Domain of
Interpretation for ISAKMP", RFC 2407, November 1998.
[RFC-2501] Corson, S. and J. Macker, "Mobile Ad hoc Networking
(MANET): Routing Protocol Performance Issues and
Evaluation Considerations", RFC 2501, January 1999.
[RFC-2990] Huston, G., "Next Steps for the IP QoS Architecture",
RFC 2990, November 2000.
[RFC-3221] Huston, G., "Commentary on Inter-Domain Routing in the
Internet", RFC 3221, December 2001.
[RFC-3234] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and
Issues", RFC 3234, February 2002.
[RFC-3424] Daigle, L. and IAB, "IAB Considerations for UNilateral
Self-Address Fixing (UNSAF) Across Network Address
Translation", RFC 3424, November 2002.
[RFC-3467] Klensin, J., "Role of the Domain Name System (DNS)",
RFC 3467, February 2003.
[RFC-3535] Schoenwaelder, J., "Overview of the 2002 IAB Network
Management Workshop", RFC 3535, May 2003.
[RFC-3387] Eder, M., Chaskar, H., and S. Nag, "Considerations from
the Service Management Research Group (SMRG) on Quality
of Service (QoS) in the IP Network", RFC 3387,
September 2002.
[RIPE] RIPE (Reseaux IP Europeens), Amsterdam, NL. URL
"http://www.ripe.net/ripe/".
[Savage00] Savage, S., Wetherall, D., Karlink, A. R., and
Anderson, T., "Practical Network Support for IP
Traceback", Proceedings of 2000 ACM SIGCOMM Conference,
ACM SIGCOMM, Stockholm, SE, pp. 295-306. August 2000.
[Schiller03] J. I. Schiller, "Interception Technology: The Good, The
Bad, and The Ugly!", Presentation at 28th NANOG
Meeting, North American Network Operators Group
(NANOG), Ann Arbor, MI, USA, June 2003. URL
"http://www.nanog.org/mtg-0306/schiller.html".
Atkinson & Floyd Informational [Page 28]
^L
RFC 3869 Research Funding Recommendations August 2004
[SM03] P. Sharma and R. Malpani, "IP Multicast Operational
Network Management: Design, Challenges, and
Experiences", IEEE Network, Vol. 17, No. 2, March
2003.
[SMA03] N. Spring, R. Mahajan, & T. Anderson, "Quantifying the
Causes of Path Inflation", Proceedings of ACM SIGCOMM
2003, ACM, Karlsruhe, Germany, August 2003.
[WD02] Walter Willinger and John Doyle, "Robustness and the
Internet: Design and Evolution", Unpublished/Preprint,
1 March 2002, URL
"http://netlab.caltech.edu/internet/".
[WIDE] WIDE Project, Japan. URL "http://www.wide.ad.jp/".
8. Authors' Addresses
Internet Architecture Board
EMail: iab@iab.org
Internet Architecture Board Members
at the time this document was published were:
Bernard Aboba
Harald Alvestrand (IETF chair)
Rob Austein
Leslie Daigle (IAB chair)
Patrik Faltstrom
Sally Floyd
Mark Handley
Bob Hinden
Geoff Huston (IAB Executive Director)
Jun-ichiro Itojun Hagino
Eric Rescorla
Pete Resnick
Jonathan Rosenberg
We note that Ran Atkinson, one of the editors of the document, was an
IAB member at the time that this document was first created, in
November 2002, and that Vern Paxson, the IRTF chair, is an ex-officio
member of the IAB.
Atkinson & Floyd Informational [Page 29]
^L
RFC 3869 Research Funding Recommendations August 2004
Full Copyright Statement
Copyright (C) The Internet Society (2004). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/S HE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the IETF's procedures with respect to rights in IETF Documents can
be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Atkinson & Floyd Informational [Page 30]
^L
|