Abstract
The core Internet protocols have not changed significantly in more than a decade, in spite of exponential growth in the number of Internet users and the speed of the fastest links. The requirements placed on the net are also changing, as digital convergence finally occurs. Will the Internet cope gracefully with all this change, or are the cracks already beginning to show? In this paper I examine how the Internet has coped with past challenges resulting in attempts to change the architecture and core protocols of the Internet. Unfortunately, the recent history of failed architectural changes does not bode well. With this history in mind, I explore some of the challenges currently facing the Internet.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Crocker S: ’Protocol notes’, RFC 36, Network Working Group, (Updated by RFC44, RFC 39) (March 1970).
Clark D D: ’The design philosophy of the DARPA internet protocols’, in Proc ACM SIGCOMM, pp 106–114, Stanford, CA, (August 1988).
Kudlick M: ’Host names on-line’, RFC 608, IETF (January 1974).
McQuillan J, Richer I and Rosen E: ’The New Routing Algorithm for the ARPAnet’, IEEE Transactions on Communications (May 1980).
Rosen E: ’Exterior Gateway Protocol (EGP)’, RFC 827 (October 1982).
Jacobson V: ’Congestion avoidance and control’, in Proc ACM SIGCOMM, pp 314–329, Stanford, CA (1988).
Lougheed K and Rekhter Y: ’Border Gateway Protocol BGP’, RFC 1105 (June 1989).
Rosen E, Viswanathan A and Callon R: ’Multiprotocol Label Switching Architecture’, RFC3031, IETF (January 2001).
Ramakrishnan K K, Floyd S and Black D: ’The addition of Explicit Congestion Notification (ECN) to IP’, RFC 3168, IETF (September 2001).
Braden R, Clark D and Shenker S: ’Integrated Services in the Internet architecture: an overview’, RFC 1633, IETF (June 1994).
Carlson M, Weiss W, Blake S, Wang Z, Black D and Davies E: ’An architecture for differentiated services’, RFC 2475, IETF (December 1998).
Rosen E and Rekhter Y: ’BGP/MPLS VPNs’, RFC 2547, IETF (March 1999).
Rosenberg J, Weinberger J, Huitema C and Mahy R: ’STUN — simple traversal of user datagram protocol (UDP) through network address translators (NATs)’, RFC 3489, IETF (March 2003).
Rosenberg J, Mahy R and Huitema C: ’Obtaining relay addresses from Simple Traversal of UDP Through NAT (STUN)’, Internet-Draft (February 2006).
Kohler E, Handley M and Floyd S: ’Datagram Congestion Control Protocol (DCCP)’, RFC 4340, IETF (March 2006).
Kohler E, Handley M and Floyd S: ’Designing DCCP: Congestion Control without Reliability’, to appear in Proc ACM SIGCOMM (September 2006).
Stewart R, Xie Q, Morneault K, Sharp C, Schwarzbauer H, Taylor T, Rytina I, Kalla M, Zhang L and Paxson V: ’Stream Control Transmission Protocol’, RFC 2960, IETF (October 2000).
Smirnov A and Chiueh T: ’Dira: Automatic detection, identification and repair of control-hijacking attacks in NDSS (2005).
Kiriansky V, Bruening D and Amarasinghe S P: ’Secure execution via program shepherding’, in USENIX Security Symposium (2002).
Dunlap G W, King S T, Cinar S, Basrai M A and Chen P M: ’Revirt: Enabling intrusion analysis through virtual-machine logging and replay’, SIGOPS Oper Syst Rev, 36, (2002).
Newsome J and Song D X: ’Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software’, in NDSS (2005).
Raiciu C, Handley M and Rosenblum D: ’Exploit Hijacking: Side Effects of Smart Defenses’, Proc ACM SIGCOMM Workshop on Large Scale Attack Defence (September 2006).
Ferguson P and Senie D: ’Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing’, RFC 2267 (January 1998).
Skype — http://www.skype.com/
Shorten R and Leith D: ’H-TCP: TCP for high-speed and longdistance networks’, Proc PFLDnet, Argonne (2004).
Xu L, Harfoush K and Rhee I: ’Binary increase congestion control for fast long-distance networks’, Proc INFOCOM (2004).
Demers A, Keshav S and Shenker S: ’Analysis and simulation of a fair queueing algorithm’, Internetworking: Research and Experience, 1, pp 3–26 (1990).
Katabi D, Handley M and Rohrs C: ’Internet Congestion Control for High Bandwidth-Delay Product Environments’, Proc ACM SIGCOMM (2002).
Cerf V: ’Report of the Second Ad Hoc Network Management Review Group’, RFC 1109 (August 1989).
Kent S, Lynn C and Seo K: ’Secure Border Gateway Protocol (SBGP)’, IEEE JSAC Special Issue on Network Security (April 2000).
White R: ’Architecture and deployment considerations for Secure Origin BGP (soBGP)’, Internet-Draft (June 2006).
Perkins C: ’IP Mobility Support’, RFC 2002, IETF (October 1996).
Huston G: ’IETF64 Review: SHIM’, IETF Journal, 1, Issue 2 (Winter 2005/2006).
Rekhter Y and Li T: ’An architecture for IP address allocation with CIDR’, RFC 1518, IETF (September 1993).
Huston G: ’IPv4: How long do we have?’, The Internet Protocol Journal, 6, No 4 (December 2003).
About this article
Cite this article
Handley, M. Why the Internet only just works. BT Technol J 24, 119–129 (2006). https://doi.org/10.1007/s10550-006-0084-z
Issue Date:
DOI: https://doi.org/10.1007/s10550-006-0084-z