ABSTRACT
The architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end to end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a recognized component of mainstream society, new requirements have emerged that suggest new design principles, and perhaps suggest that we revisit some old ones. This paper explores one important reality that surrounds the Internet today: different stakeholders that are part of the Internet milieu have interests that may be adverse to each other, and these parties each vie to favor their particular interests. We call this process "the tussle". Our position is that accommodating this tussle is crucial to the evolution of the network's technical architecture. We discuss some examples of tussle, and offer some technical design principles that take it into account.
- Blumenthal, M. S., and Clark, D. D. Rethinking the design of the Internet: The end to end arguments vs. the brave new world. ACM Transactions on Internet Technology 1, 1 (August 2001). Version appeared in Communications Policy in Transition: The Internet and Beyond, B. Compaine and S. Greenstein, eds. MIT Press, Sept. 2001. Google ScholarDigital Library
- Computer Science and Telecommunications Board, National Research Council. Realizing the information future: The Internet and beyond, June 1994. Google ScholarDigital Library
- Computer Science and Telecommunications Board, National Research Council. Broadband: Bringing home the bits, January 2002. Google ScholarDigital Library
- Computer Systems Policy Project. Perspectives on the national information infrastructure: Ensuring interoperability, 1994.Google Scholar
- Cross-Industry Working Team. An architectural framework for the national information infrastructure, 1994.Google Scholar
- Economides, N. The economics of networks. International Journal of Industrial Organization 14, 6 (1996), 670--699.Google ScholarCross Ref
- Goldberg, I., Wagner, D., and Brewer, E. Privacy-enhancing technologies for the internet. In Proceedings of IEEE COMPCON 97 (1997), pp. 103--109. Google ScholarDigital Library
- Levin, R., Cohen, E. S., Corwin, W. M., Pollack, F. J., and Wulf, W. A. Policy/mechanism separation in HYDRA. In Symposium on Operating Systems Principles (1975), pp. 132--140. Google ScholarDigital Library
- McKnight, L., and Bailey, J., Eds. Internet Economics. MIT Press, 1997. Google ScholarDigital Library
- Nissenbaum, H. Securing trust online: Wisdom or oxymoron. Boston University Law Review (2001). Available as http://www.princeton.edu/ helen/BU-final-trust.pdf.Google Scholar
- Saltzer, J., Reed, D., and Clark, D. D. End-to-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (Nov. 1984). Google ScholarDigital Library
Index Terms
- Tussle in cyberspace: defining tomorrow's internet
Recommendations
Tussle in cyberspace: defining tomorrow's internet
Proceedings of the 2002 SIGCOMM conferenceThe architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end to end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a ...
Tussle in cyberspace: defining tomorrow's internet
The architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end-to-end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a ...
A Secure IIoT Gateway Architecture based on Trusted Execution Environments
AbstractIndustrial Internet of Things (IIoT) gateways are affected by many cybersecurity threats, compromising their security and dependability. These gateways usually represent single points of failure on the IIoT infrastructure. When compromised, they ...
Comments