One document matched: draft-iab-research-funding-01.ps


%!PS-Adobe-3.0
%%BoundingBox: 24 24 588 768
%%Title: Enscript Output
%%For: Sally Floyd
%%Creator: GNU enscript 1.6.1
%%CreationDate: Sun Jun 29 22:30:43 2003
%%Orientation: Portrait
%%Pages: (atend)
%%DocumentMedia: Letter 612 792 0 () ()
%%DocumentNeededResources: (atend)
%%EndComments
%%BeginProlog
%%BeginResource: procset Enscript-Prolog 1.6 1
%
% Procedures.
%

/_S {	% save current state
  /_s save def
} def
/_R {	% restore from saved state
  _s restore
} def

/S {	% showpage protecting gstate
  gsave
  showpage
  grestore
} bind def

/MF {	% fontname newfontname -> -	make a new encoded font
  /newfontname exch def
  /fontname exch def

  /fontdict fontname findfont def
  /newfont fontdict maxlength dict def

  fontdict {
    exch
    dup /FID eq {
      % skip FID pair
      pop pop
    } {
      % copy to the new font dictionary
      exch newfont 3 1 roll put
    } ifelse
  } forall

  newfont /FontName newfontname put

  % insert only valid encoding vectors
  encoding_vector length 256 eq {
    newfont /Encoding encoding_vector put
  } if

  newfontname newfont definefont pop
} def

/SF { % fontname width height -> -	set a new font
  /height exch def
  /width exch def

  findfont
  [width 0 0 height 0 0] makefont setfont
} def

/SUF { % fontname width height -> -	set a new user font
  /height exch def
  /width exch def

  /F-gs-user-font MF
  /F-gs-user-font width height SF
} def

/M {moveto} bind def
/s {show} bind def

/Box {	% x y w h -> -			define box path
  /d_h exch def /d_w exch def /d_y exch def /d_x exch def
  d_x d_y  moveto
  d_w 0 rlineto
  0 d_h rlineto
  d_w neg 0 rlineto
  closepath
} def

/bgs {	% x y height blskip gray str -> -	show string with bg color
  /str exch def
  /gray exch def
  /blskip exch def
  /height exch def
  /y exch def
  /x exch def

  gsave
    x y blskip sub str stringwidth pop height Box
    gray setgray
    fill
  grestore
  x y M str s
} def

% Highlight bars.
/highlight_bars {	% nlines lineheight output_y_margin gray -> -
  gsave
    setgray
    /ymarg exch def
    /lineheight exch def
    /nlines exch def

    % This 2 is just a magic number to sync highlight lines to text.
    0 d_header_y ymarg sub 2 sub translate

    /cw d_output_w cols div def
    /nrows d_output_h ymarg 2 mul sub lineheight div cvi def

    % for each column
    0 1 cols 1 sub {
      cw mul /xp exch def

      % for each rows
      0 1 nrows 1 sub {
        /rn exch def
        rn lineheight mul neg /yp exch def
        rn nlines idiv 2 mod 0 eq {
	  % Draw highlight bar.  4 is just a magic indentation.
	  xp 4 add yp cw 8 sub lineheight neg Box fill
	} if
      } for
    } for

  grestore
} def

% Line highlight bar.
/line_highlight {	% x y width height gray -> -
  gsave
    /gray exch def
    Box gray setgray fill
  grestore
} def

% Column separator lines.
/column_lines {
  gsave
    .1 setlinewidth
    0 d_footer_h translate
    /cw d_output_w cols div def
    1 1 cols 1 sub {
      cw mul 0 moveto
      0 d_output_h rlineto stroke
    } for
  grestore
} def

% Column borders.
/column_borders {
  gsave
    .1 setlinewidth
    0 d_footer_h moveto
    0 d_output_h rlineto
    d_output_w 0 rlineto
    0 d_output_h neg rlineto
    closepath stroke
  grestore
} def

% Do the actual underlay drawing
/draw_underlay {
  ul_style 0 eq {
    ul_str true charpath stroke
  } {
    ul_str show
  } ifelse
} def

% Underlay
/underlay {	% - -> -
  gsave
    0 d_page_h translate
    d_page_h neg d_page_w atan rotate

    ul_gray setgray
    ul_font setfont
    /dw d_page_h dup mul d_page_w dup mul add sqrt def
    ul_str stringwidth pop dw exch sub 2 div ul_h_ptsize -2 div moveto
    draw_underlay
  grestore
} def

/user_underlay {	% - -> -
  gsave
    ul_x ul_y translate
    ul_angle rotate
    ul_gray setgray
    ul_font setfont
    0 0 ul_h_ptsize 2 div sub moveto
    draw_underlay
  grestore
} def

% Page prefeed
/page_prefeed {		% bool -> -
  statusdict /prefeed known {
    statusdict exch /prefeed exch put
  } {
    pop
  } ifelse
} def

% Wrapped line markers
/wrapped_line_mark {	% x y charwith charheight type -> -
  /type exch def
  /h exch def
  /w exch def
  /y exch def
  /x exch def

  type 2 eq {
    % Black boxes (like TeX does)
    gsave
      0 setlinewidth
      x w 4 div add y M
      0 h rlineto w 2 div 0 rlineto 0 h neg rlineto
      closepath fill
    grestore
  } {
    type 3 eq {
      % Small arrows
      gsave
        .2 setlinewidth
        x w 2 div add y h 2 div add M
        w 4 div 0 rlineto
        x w 4 div add y lineto stroke

        x w 4 div add w 8 div add y h 4 div add M
        x w 4 div add y lineto
	w 4 div h 8 div rlineto stroke
      grestore
    } {
      % do nothing
    } ifelse
  } ifelse
} def

% EPSF import.

/BeginEPSF {
  /b4_Inc_state save def    		% Save state for cleanup
  /dict_count countdictstack def	% Count objects on dict stack
  /op_count count 1 sub def		% Count objects on operand stack
  userdict begin
  /showpage { } def
  0 setgray 0 setlinecap
  1 setlinewidth 0 setlinejoin
  10 setmiterlimit [ ] 0 setdash newpath
  /languagelevel where {
    pop languagelevel
    1 ne {
      false setstrokeadjust false setoverprint
    } if
  } if
} bind def

/EndEPSF {
  count op_count sub { pos } repeat	% Clean up stacks
  countdictstack dict_count sub { end } repeat
  b4_Inc_state restore
} bind def

% Check PostScript language level.
/languagelevel where {
  pop /gs_languagelevel languagelevel def
} {
  /gs_languagelevel 1 def
} ifelse
%%EndResource
%%BeginResource: procset Enscript-Encoding-88591 1.6 1
/encoding_vector [
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/space        	/exclam       	/quotedbl     	/numbersign   	
/dollar       	/percent      	/ampersand    	/quoteright   	
/parenleft    	/parenright   	/asterisk     	/plus         	
/comma        	/hyphen       	/period       	/slash        	
/zero         	/one          	/two          	/three        	
/four         	/five         	/six          	/seven        	
/eight        	/nine         	/colon        	/semicolon    	
/less         	/equal        	/greater      	/question     	
/at           	/A            	/B            	/C            	
/D            	/E            	/F            	/G            	
/H            	/I            	/J            	/K            	
/L            	/M            	/N            	/O            	
/P            	/Q            	/R            	/S            	
/T            	/U            	/V            	/W            	
/X            	/Y            	/Z            	/bracketleft  	
/backslash    	/bracketright 	/asciicircum  	/underscore   	
/quoteleft    	/a            	/b            	/c            	
/d            	/e            	/f            	/g            	
/h            	/i            	/j            	/k            	
/l            	/m            	/n            	/o            	
/p            	/q            	/r            	/s            	
/t            	/u            	/v            	/w            	
/x            	/y            	/z            	/braceleft    	
/bar          	/braceright   	/tilde        	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/.notdef      	/.notdef      	/.notdef      	/.notdef      	
/space        	/exclamdown   	/cent         	/sterling     	
/currency     	/yen          	/brokenbar    	/section      	
/dieresis     	/copyright    	/ordfeminine  	/guillemotleft	
/logicalnot   	/hyphen       	/registered   	/macron       	
/degree       	/plusminus    	/twosuperior  	/threesuperior	
/acute        	/mu           	/paragraph    	/bullet       	
/cedilla      	/onesuperior  	/ordmasculine 	/guillemotright	
/onequarter   	/onehalf      	/threequarters	/questiondown 	
/Agrave       	/Aacute       	/Acircumflex  	/Atilde       	
/Adieresis    	/Aring        	/AE           	/Ccedilla     	
/Egrave       	/Eacute       	/Ecircumflex  	/Edieresis    	
/Igrave       	/Iacute       	/Icircumflex  	/Idieresis    	
/Eth          	/Ntilde       	/Ograve       	/Oacute       	
/Ocircumflex  	/Otilde       	/Odieresis    	/multiply     	
/Oslash       	/Ugrave       	/Uacute       	/Ucircumflex  	
/Udieresis    	/Yacute       	/Thorn        	/germandbls   	
/agrave       	/aacute       	/acircumflex  	/atilde       	
/adieresis    	/aring        	/ae           	/ccedilla     	
/egrave       	/eacute       	/ecircumflex  	/edieresis    	
/igrave       	/iacute       	/icircumflex  	/idieresis    	
/eth          	/ntilde       	/ograve       	/oacute       	
/ocircumflex  	/otilde       	/odieresis    	/divide       	
/oslash       	/ugrave       	/uacute       	/ucircumflex  	
/udieresis    	/yacute       	/thorn        	/ydieresis    	
] def
%%EndResource
%%EndProlog
%%BeginSetup
%%IncludeResource: font Courier-Bold
%%IncludeResource: font Courier
/HFpt_w 10 def
/HFpt_h 10 def
/Courier-Bold /HF-gs-font MF
/HF /HF-gs-font findfont [HFpt_w 0 0 HFpt_h 0 0] makefont def
/Courier /F-gs-font MF
/F-gs-font 10 10 SF
/#copies 1 def
% Pagedevice definitions:
gs_languagelevel 1 gt {
  <<
    /PageSize [612 792] 
  >> setpagedevice
} if
/d_page_w 564 def
/d_page_h 744 def
/d_header_x 0 def
/d_header_y 744 def
/d_header_w 564 def
/d_header_h 0 def
/d_footer_x 0 def
/d_footer_y 0 def
/d_footer_w 564 def
/d_footer_h 0 def
/d_output_w 564 def
/d_output_h 744 def
/cols 1 def
%%EndSetup
%%Page: (1) 1
%%BeginPageSetup
_S
24 24 translate
/pagenum 1 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 665 M
(Internet Engineering Task Force                    Ran Atkinson, Editor) s
5 654 M
(INTERNET DRAFT                                      Sally Floyd, Editor) s
5 643 M
(draft-iab-research-funding-01.txt           Internet Architecture Board) s
5 632 M
(                                                           29 June 2003) s
5 577 M
( IAB Concerns & Recommendations Regarding Internet Research & Evolution) s
5 544 M
(                          Status of this Memo) s
5 511 M
(   This document is an Internet-Draft and is in full conformance with) s
5 500 M
(   all provisions of Section 10 of RFC2026.) s
5 478 M
(   Internet-Drafts are working documents of the Internet Engineering) s
5 467 M
(   Task Force \(IETF\), its areas, and its working groups.  Note that) s
5 456 M
(   other groups may also distribute working documents as Internet-) s
5 445 M
(   Drafts.) s
5 423 M
(   Internet-Drafts are draft documents valid for a maximum of six months) s
5 412 M
(   and may be updated, replaced, or obsoleted by other documents at any) s
5 401 M
(   time.  It is inappropriate to use Internet- Drafts as reference) s
5 390 M
(   material or to cite them other than as "work in progress.") s
5 368 M
(   The list of current Internet-Drafts can be accessed at) s
5 357 M
(   http://www.ietf.org/ietf/1id-abstracts.txt) s
5 335 M
(   The list of Internet-Draft Shadow Directories can be accessed at) s
5 324 M
(   http://www.ietf.org/shadow.html.) s
5 302 M
(Abstract) s
5 280 M
(   This document discusses IAB concerns that ongoing research is needed) s
5 269 M
(   to further the evolution of the Internet infrastructure, and that) s
5 258 M
(   consistent, sufficient non-commercial funding is needed to enable) s
5 247 M
(   such research.) s
5 225 M
(   Feedback can be sent to the IAB mailing list at iab@ietf.org, or to) s
5 214 M
(   the editors at rja@extremenetworks.com and floyd@icir.org.   Feedback) s
5 203 M
(   can also be sent to the mailing list set up for feedback at research-) s
5 192 M
(   funding@ietf.org.  Requests to join can be sent to research-funding-) s
5 181 M
(   request@ietf.org, with "subscribe research-funding" in the body of) s
5 170 M
(   the request.) s
5 104 M
(IAB                           Informational                     [Page 1]) s
_R
S
%%Page: (2) 2
%%BeginPageSetup
_S
24 24 translate
/pagenum 2 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(Table of Contents) s
5 104 M
(IAB                           Informational                     [Page 2]) s
_R
S
%%Page: (3) 3
%%BeginPageSetup
_S
24 24 translate
/pagenum 3 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(     1.  Introduction) s
5 654 M
(     1.1.  Document Organization) s
5 643 M
(     1.2.  IAB Concerns) s
5 632 M
(     1.3.  Contributions to this Document) s
5 621 M
(     2.  History of Internet Research & Research Funding) s
5 610 M
(     2.1.  Prior to 1980) s
5 599 M
(     2.2.  1980s and early 1990s) s
5 588 M
(     2.3.  Mid-1990s to 2003) s
5 577 M
(     2.4.  Current Status) s
5 566 M
(     3.  Open Internet Research Topics) s
5 555 M
(     3.1.  Scope & Limitations) s
5 544 M
(     3.2.  Naming) s
5 533 M
(     3.2.1.  Domain Name System \(DNS\)) s
5 522 M
(     3.2.2.  New Namespaces) s
5 511 M
(     3.3.  Routing) s
5 500 M
(     3.3.1.  Inter-domain Routing) s
5 489 M
(     3.3.2.  Routing Integrity) s
5 478 M
(     3.3.3.  Routing Algorithms) s
5 467 M
(     3.3.4.  Mobile & Ad-Hoc Routing) s
5 456 M
(     3.4.  Security) s
5 445 M
(     3.4.1.  Freely Distributable Prototypes) s
5 434 M
(     3.4.2.  Formal Methods) s
5 423 M
(     3.4.3.  Key Management) s
5 412 M
(     3.4.4  Cryptography) s
5 401 M
(     3.4.5  Security for Distributed Computing) s
5 390 M
(     3.4.6.  Deployment Considerations in Security) s
5 379 M
(     3.4.7.  Denial of Service Protection) s
5 368 M
(     3.5.  Network Management) s
5 357 M
(     3.5.1.  Configuration Management) s
5 346 M
(     3.5.1.  Enhanced Monitoring Capabilities) s
5 335 M
(     3.5.2.  Managing Networks, Not Devices) s
5 324 M
(     3.5.3.  Improving the Scalability of Network Management) s
5 313 M
(     3.6.  Quality of Service) s
5 302 M
(     3.6.1.  Inter-Domain QoS Architecture) s
5 291 M
(     3.6.2.  New Queuing Disciplines) s
5 280 M
(     3.7.  Congestion control.) s
5 269 M
(     3.8.  Studying the Evolution of the Internet Infrastructure) s
5 258 M
(     3.9.  Middleboxes) s
5 247 M
(     3.10.  Internet Measurement) s
5 236 M
(     3.11.  Meeting the Needs of the Future) s
5 225 M
(     3.12.  Additional topics) s
5 214 M
(     4.  Conclusions) s
5 203 M
(     5.  Acknowledgements) s
5 192 M
(     6.  Security Considerations) s
5 181 M
(     7.  IANA Considerations) s
5 170 M
(     9. AUTHORS' ADDRESSES) s
5 104 M
(IAB                           Informational                     [Page 3]) s
_R
S
%%Page: (4) 4
%%BeginPageSetup
_S
24 24 translate
/pagenum 4 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(1.  Introduction) s
5 643 M
(   This document discusses the history of funding for Internet research,) s
5 632 M
(   expresses concern about the current state of such funding, and) s
5 621 M
(   outlines several specific areas that the IAB believes merit) s
5 610 M
(   additional research.  Current funding levels for Internet research) s
5 599 M
(   are not generally adequate, and several important research areas are) s
5 588 M
(   significantly underfunded.  This situation needs to be rectified for) s
5 577 M
(   the Internet to continue its evolution and development.) s
5 555 M
(1.1.  Document Organization) s
5 533 M
(   The first part of the document is a high-level discussion of the) s
5 522 M
(   history of funding for Internet research to provide some historical) s
5 511 M
(   context to this document.  The early funding of Internet research was) s
5 500 M
(   largely from the U.S. government, followed by a period in the second) s
5 489 M
(   half of the 1990s of commercial funding and of funding from several) s
5 478 M
(   governments.  [Add a citation.]  However, the commercial funding for) s
5 467 M
(   Internet research has been reduced due to the recent economic) s
5 456 M
(   downturn.) s
5 434 M
(   The second part of the document provides an incomplete set of open) s
5 423 M
(   Internet research topics.  These are only examples, intended to) s
5 412 M
(   illustrate the breadth of open research topics.  This second section) s
5 401 M
(   supports the general thesis that ongoing research is needed to) s
5 390 M
(   further the evolution of the Internet infrastructure.  This includes) s
5 379 M
(   research on the medium-time-scale evolution of the Internet) s
5 368 M
(   infrastructure as well as research on longer-time-scale grand) s
5 357 M
(   challenges.  This also includes many research issues that are already) s
5 346 M
(   being actively investigated in the Internet research community.) s
5 324 M
(   Areas that are discussed in this section include the following:) s
5 313 M
(   naming, routing, security, network management, and transport.  Issues) s
5 302 M
(   that require more research also include more general architectural) s
5 291 M
(   issues such as layering and communication between layers.  In) s
5 280 M
(   addition, general topics discussed in this section include modeling,) s
5 269 M
(   measurement, simulation, test-beds, etc.  We are focusing on topics) s
5 258 M
(   that are related to the IETF and IRTF \(Internet Research Task Force\)) s
5 247 M
(   agendas.  \(E.g., issues related to the global grid are not discussed) s
5 236 M
(   in this document because these issues are addressed through the) s
5 225 M
(   Global Grid Forum and other grid-specific organizations, not in the) s
5 214 M
(   IETF.\)) s
5 192 M
(   Where at all possible, the examples in the paper point to separate) s
5 181 M
(   documents on these issues, and only give a high-level summary of the) s
5 170 M
(   issues raised in those documents.) s
5 104 M
(IAB                           Informational                     [Page 4]) s
_R
S
%%Page: (5) 5
%%BeginPageSetup
_S
24 24 translate
/pagenum 5 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(1.2.  IAB Concerns) s
5 643 M
(   Recently, in the aftermath of September 11 2001, there seems to be a) s
5 632 M
(   renewed interest by governments in funding research for Internet-) s
5 621 M
(   related security issues.  From [J02]: "It is generally agreed that) s
5 610 M
(   the security and reliability of the basic protocols underlying the) s
5 599 M
(   Internet have not received enough attention because no one has a) s
5 588 M
(   proprietary interest in them".) s
5 566 M
(   That quote brings out a key issue in funding for Internet research,) s
5 555 M
(   which is that because no single organization \(e.g., no single) s
5 544 M
(   government, software company, equipment vendor, or network operator\)) s
5 533 M
(   has a sense of ownership of the global Internet infrastructure,) s
5 522 M
(   research on the general issues of the Internet infrastructure are) s
5 511 M
(   often not adequately funded.  In our current challenging economic) s
5 500 M
(   climate, it is not surprising that commercial funding sources are) s
5 489 M
(   more likely to fund that research that leads to a direct competitive) s
5 478 M
(   advantage.) s
5 456 M
(   The principal thesis of this document is that if commercial funding) s
5 445 M
(   is the main source of funding for future Internet research, the) s
5 434 M
(   future of the Internet infrastructure could be in trouble.  In) s
5 423 M
(   addition to issues about which projects were funded, the funding) s
5 412 M
(   source can also affect the content of the research, for example,) s
5 401 M
(   towards or against the development of open standards, or taking) s
5 390 M
(   varying degrees of care about the effect of the developed protocols) s
5 379 M
(   on the other traffic on the Internet.) s
5 357 M
(   At the same time, many significant research contributions in) s
5 346 M
(   networking have come from commercial funding.  However, for most of) s
5 335 M
(   the topics in this document, relying solely on commercially-funded) s
5 324 M
(   research would not be adequate.  Much of today's commercial funding) s
5 313 M
(   is focused on technology transition, taking results from non-) s
5 302 M
(   commercial research and putting them into shipping commercial) s
5 291 M
(   products.  We have not tried to delve into each of the research) s
5 280 M
(   issues below to discuss, for each issue, what are the potentials and) s
5 269 M
(   limitations of commercial funding for research in that area.) s
5 247 M
(   On a more practical note, if there was no commercial funding for) s
5 236 M
(   Internet research, then few research projects would be taken to) s
5 225 M
(   completion with implementations, deployment, and follow-up) s
5 214 M
(   evaluation.) s
5 192 M
(   While it is theoretically possible for there to be too much funding) s
5 181 M
(   for Internet research, that is far from the current problem.  There) s
5 170 M
(   is also much that could be done within the network research community) s
5 159 M
(   to make Internet research more focused and productive, but that would) s
5 148 M
(   belong in a separate document.) s
5 104 M
(IAB                           Informational                     [Page 5]) s
_R
S
%%Page: (6) 6
%%BeginPageSetup
_S
24 24 translate
/pagenum 6 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(1.3.  Contributions to this Document) s
5 643 M
(   A number of people have directly contributed text for this document,) s
5 632 M
(   even though, following current conventions, the official RFC author) s
5 621 M
(   list includes only the key editors of the document.  The) s
5 610 M
(   Acknowledgements section at the end of the document thanks other) s
5 599 M
(   people who contributed to this document in some form.) s
5 577 M
(2.  History of Internet Research & Research Funding) s
5 555 M
(2.1.  Prior to 1980) s
5 533 M
(   Most of the early research into packet-switched networks was) s
5 522 M
(   sponsored by the U.S. Defense Advanced Research Projects Agency) s
5 511 M
(   \(DARPA\) [CSTB99].  This includes the initial design, implementation,) s
5 500 M
(   and deployment of the ARPAnet connecting several universities and) s
5 489 M
(   other DARPA contractors.  The ARPAnet originally came online in the) s
5 478 M
(   late 1960s.  It grew in size during the 1970s, still chiefly with) s
5 467 M
(   DARPA funding, and demonstrated the utility of packet-switched) s
5 456 M
(   networking.) s
5 434 M
(2.2.  1980s and early 1990s) s
5 412 M
(   The ARPAnet converted to the Internet Protocol on January 1, 1983,) s
5 401 M
(   approximately 20 years before this document was written.  Throughout) s
5 390 M
(   the 1980s, the U.S. Government continued strong research and) s
5 379 M
(   development funding for Internet technology.  DARPA continued to be) s
5 368 M
(   the key funding source, but was supplemented by other DoD \(US) s
5 357 M
(   Department of Defense\) funding \(e.g. via DCA's Defense Data Network) s
5 346 M
(   \(DDN\) program\) and other U.S. Government funding \(e.g. US Department) s
5 335 M
(   of Energy \(DoE\) funding for research networks at DoE national) s
5 324 M
(   laboratories, \(US\) National Science Foundation \(NSF\) funding for) s
5 313 M
(   academic institutions\).  This funding included basic research,) s
5 302 M
(   applied research \(including freely distributable prototypes\), the) s
5 291 M
(   purchase of IP-capable products, and operating support for the IP-) s
5 280 M
(   based government networks such as ARPAnet, ESnet, MILnet, and NSFnet.) s
5 258 M
(   In the late 1980s, the U.S. DoD desired to leave the business of) s
5 247 M
(   providing operational network services to academic institutions, so) s
5 236 M
(   funding for many academic activities moved over to the NSF.  NSF) s
5 225 M
(   funding included research projects into networking, as well as) s
5 214 M
(   creating the NSFnet backbone and sponsoring the creation of several) s
5 203 M
(   NSF regional networks \(e.g. SURAnet\) and interconnections with) s
5 192 M
(   several international research networks.) s
5 170 M
(   Most research funding outside the U.S. during the 1980s and early) s
5 159 M
(   1990s was focused on the ISO OSI networking project or on then-new) s
5 148 M
(   forms of network media \(e.g. wireless, broadband access\).  The) s
5 104 M
(IAB                           Informational                     [Page 6]) s
_R
S
%%Page: (7) 7
%%BeginPageSetup
_S
24 24 translate
/pagenum 7 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   European Union was a significant source of research funding for the) s
5 654 M
(   networking community in Europe during this period.  Some of the best) s
5 643 M
(   early work in gigabit networking was undertaken in the UK and Sweden.) s
5 621 M
(2.3.  Mid-1990s to 2003) s
5 599 M
(   Starting in the middle 1990s, U.S. Government funding for Internet) s
5 588 M
(   research and development was significantly reduced.  The premise for) s
5 577 M
(   this was that the growing Internet industry would pay for whatever) s
5 566 M
(   research and development that was needed.  Some funding for Internet) s
5 555 M
(   research and development has continued in this period from European) s
5 544 M
(   and Asian organizations \(e.g., the WIDE Project in Japan [WIDE]\).) s
5 533 M
(   Reseaux IP Europeens [RIPE] is an example of market-funded networking) s
5 522 M
(   research in Europe during this period.) s
5 500 M
(   Experience during this period has been that commercial firms have) s
5 489 M
(   often focused on donating equipment to academic institutions and) s
5 478 M
(   promoting somewhat vocationally-focused educational projects.  Many) s
5 467 M
(   of the commercially-funded research and development projects appear) s
5 456 M
(   to have been selected because they appeared likely to give the) s
5 445 M
(   funding source a specific short-term economic advantage over its) s
5 434 M
(   competitors.  Higher risk, more innovative research proposals) s
5 423 M
(   generally have not been funded by industry.  A common view in Silicon) s
5 412 M
(   Valley has been that established commercial firms are not very good) s
5 401 M
(   at transitioning cutting edge research into products, but were) s
5 390 M
(   instead good at buying small startup firms who had successfully) s
5 379 M
(   transitioned such cutting edge research into products.) s
5 368 M
(   Unfortunately, small startup companies are generally unable) s
5 357 M
(   financially to fund any research themselves.) s
5 335 M
(2.4.  Current Status) s
5 313 M
(   The result of reduced U.S. Government funding and profit-focused,) s
5 302 M
(   low-risk, short-term industry funding has been a decline in higher-) s
5 291 M
(   risk but more innovative research activities.  Industry has also been) s
5 280 M
(   less interested in research to evolve the overall Internet) s
5 269 M
(   architecture, because such work does not translate into a competitive) s
5 258 M
(   advantage for the firm funding such work.) s
5 236 M
(   The IAB believes that it would be helpful for governments and other) s
5 225 M
(   non-commercial sponsors to increase their funding of both basic) s
5 214 M
(   research and applied research relating to the Internet.  Furthermore,) s
5 203 M
(   those increased funding levels should be sustained and protected) s
5 192 M
(   against inflation going forward.) s
5 104 M
(IAB                           Informational                     [Page 7]) s
_R
S
%%Page: (8) 8
%%BeginPageSetup
_S
24 24 translate
/pagenum 8 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(3.  Open Internet Research Topics) s
5 643 M
(   This section primarily discusses some specific topics that the IAB) s
5 632 M
(   believes merit additional research.  Research, of course, includes) s
5 621 M
(   not just devising a theory, algorithm, or mechanism to accomplish a) s
5 610 M
(   goal, but also evaluating the general efficacy of the approach and) s
5 599 M
(   then the benefits vs. the costs of deploying that algorithm or) s
5 588 M
(   mechanism.  Important cautionary notes about this discussion are) s
5 577 M
(   given in the next sub-section.  This particular set of topics is not) s
5 566 M
(   intended to be comprehensive, but instead is intended to demonstrate) s
5 555 M
(   the breadth of open Internet research questions.) s
5 533 M
(3.1.  Scope & Limitations) s
5 511 M
(   This document is NOT intended as a guide for funding organizations as) s
5 500 M
(   to exactly which projects or proposals should or should not be) s
5 489 M
(   funded.) s
5 467 M
(   In particular, this document is NOT intended to be a comprehensive) s
5 456 M
(   list of *all* of the research questions that are important to further) s
5 445 M
(   the evolution of the Internet; that would be a daunting task, and) s
5 434 M
(   would presuppose a wider and more intensive effort than we have) s
5 423 M
(   undertaken in this document.) s
5 401 M
(   Similarly, this document is not intended to list the research) s
5 390 M
(   questions that are judged to be only of peripheral importance, or to) s
5 379 M
(   survey the current \(global; governmental, commercial, and academic\)) s
5 368 M
(   avenues for funding for Internet research, or to make specific) s
5 357 M
(   recommendations about which areas need additional funding.  The) s
5 346 M
(   purpose of the document is to persuade the reader that ongoing) s
5 335 M
(   research is needed towards the continued evolution of the Internet) s
5 324 M
(   infrastructure; the purpose is not to make binding pronouncements) s
5 313 M
(   about which specific areas are and are not worthy of future funding.) s
5 291 M
(   For some research clearly relevant to the future evolution of the) s
5 280 M
(   Internet, there are grand controversies between competing proposals) s
5 269 M
(   or competing schools of thought; it is not the purpose of this) s
5 258 M
(   document to take positions in these controversies, or to take) s
5 247 M
(   positions on the nature of the solutions for areas needing further) s
5 236 M
(   research.) s
5 214 M
(   That all carefully noted, the remainder of this section discusses a) s
5 203 M
(   broad set of research areas, noting a subset of particular topics of) s
5 192 M
(   interest in each of those research areas.  Again, this list is NOT) s
5 181 M
(   comprehensive, but rather is intended to suggest that a broad range) s
5 170 M
(   of ongoing research is needed, and to propose some candidate topics.) s
5 104 M
(IAB                           Informational                     [Page 8]) s
_R
S
%%Page: (9) 9
%%BeginPageSetup
_S
24 24 translate
/pagenum 9 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(3.2.  Naming) s
5 643 M
(   The Internet currently has several different namespaces, including IP) s
5 632 M
(   addresses, sockets \(specified by the IP address, upper-layer) s
5 621 M
(   protocol, and upper-layer port number\), and the Fully-Qualified) s
5 610 M
(   Domain Name \(FQDN\).  Many of the Internet's namespaces are supported) s
5 599 M
(   by the widely deployed Domain Name System [RFC refs] or by various) s
5 588 M
(   Internet applications [RFC-2407, Section 4.6.2.1]) s
5 566 M
(3.2.1.  Domain Name System \(DNS\)) s
5 544 M
(   The DNS system, while it works well given its current constraints,) s
5 533 M
(   has several stress points.) s
5 511 M
(   The current DNS system relies on UDP for transport, rather than SCTP) s
5 500 M
(   or TCP.  Given the very large number of clients using a typical DNS) s
5 489 M
(   server, it is desirable to minimise the state on the DNS server side) s
5 478 M
(   of the connection.  UDP does this well, so is a reasonable choice,) s
5 467 M
(   though this has other implications, for example a reliance on UDP) s
5 456 M
(   fragmentation.  With IPv6, intermediate fragmentation is not allowed) s
5 445 M
(   and Path MTU Discovery is mandated.  However, the amount of state) s
5 434 M
(   required to deploy Path MTU Discovery for IPv6 on a DNS server might) s
5 423 M
(   be a significant practical problem.) s
5 401 M
(   One implication of this is that research into alternative transport) s
5 390 M
(   protocols, designed more for DNS-like applications where there are) s
5 379 M
(   very many clients using each server, might be useful.  Of particular) s
5 368 M
(   interest would be transport protocols with little burden for the DNS) s
5 357 M
(   server, even if that increased the burden somewhat for the DNS) s
5 346 M
(   client.) s
5 324 M
(   Additional study of DNS caching, both currently available caching) s
5 313 M
(   techniques and also of potential new caching techniques, might be) s
5 302 M
(   helpful in finding ways to reduce the offered load for a typical DNS) s
5 291 M
(   server.  In particular, examination of DNS caching through typical) s
5 280 M
(   commercial firewalls might be interesting if it lead to alternative) s
5 269 M
(   firewall implementations that were less of an obstacle to DNS) s
5 258 M
(   caching.) s
5 236 M
(   The community lacks a widely agreed upon set of metrics for measuring) s
5 225 M
(   DNS server performance.  It would be helpful if people would) s
5 214 M
(   seriously consider what characteristics of the DNS system should be) s
5 203 M
(   measured.) s
5 181 M
(   Some in the community would advocate replacing the current DNS system) s
5 170 M
(   with something better.  Past attempts to devise a better approach) s
5 159 M
(   have not yielded results that persuaded the community to change.) s
5 148 M
(   Proposed work in this are could be very useful, but might require) s
5 104 M
(IAB                           Informational                     [Page 9]) s
_R
S
%%Page: (10) 10
%%BeginPageSetup
_S
24 24 translate
/pagenum 10 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   careful scrutiny to avoid falling into historic design pitfalls.) s
5 643 M
(   With regards to DNS security, major technical concerns include) s
5 632 M
(   finding practical methods for signing very large DNS zones \(e.g.) s
5 621 M
(   .COM\), practical methods for incremental deployment of DNS security,) s
5 610 M
(   and tools to make it easier to manage secure DNS infrastructure.) s
5 588 M
(3.2.2.  New Namespaces) s
5 566 M
(   Additionally, the Namespace Research Group \(NSRG\) of the Internet) s
5 555 M
(   Research Task Force \(IRTF\) studied adding one or more additional) s
5 544 M
(   namespaces to the Internet Architecture [LD2002]. Many participants) s
5 533 M
(   in the IRTF NSRG membership believe that there would be significant) s
5 522 M
(   architectural benefit to adding one or more additional namespaces to) s
5 511 M
(   the Internet Architecture.  Because smooth consensus on that question) s
5 500 M
(   or on the properties of a new namespace was not obtained, the IRTF) s
5 489 M
(   NSRG did not make a formal recommendation to the IETF community) s
5 478 M
(   regarding namespaces.  The IAB believes that this is an open research) s
5 467 M
(   question worth examining further.) s
5 445 M
(   Finally, we believe that future research into the evolution of) s
5 434 M
(   Internet-based distributed computing might well benefit from studying) s
5 423 M
(   adding additional namespaces as part of a new approach to distributed) s
5 412 M
(   computing.) s
5 390 M
(3.3.  Routing) s
5 368 M
(   The currently deployed unicast routing system works reasonably well) s
5 357 M
(   for most users.  However, the current unicast routing architecture is) s
5 346 M
(   suboptimal in several areas, including the following: end-to-end) s
5 335 M
(   convergence times in global-scale catenets \(a system of networks) s
5 324 M
(   interconnected via gateways\); the ability of the existing inter-) s
5 313 M
(   domain path-vector algorithm to scale well beyond 200K prefixes; the) s
5 302 M
(   ability of both intra-domain and inter-domain routing to use multiple) s
5 291 M
(   metrics and multiple kinds of metrics concurrently; and the ability) s
5 280 M
(   of IPv4 and IPv6 to support widespread site multi-homing without) s
5 269 M
(   undue adverse impact on the inter-domain routing system.  Integrating) s
5 258 M
(   policy into routing is also a general concern, both for intra-domain) s
5 247 M
(   and inter-domain routing.  In many cases, routing policy is directly) s
5 236 M
(   tied to economic issues for the network operators, so applied) s
5 225 M
(   research into routing ideally would consider economic considerations) s
5 214 M
(   as well as technical considerations..) s
5 181 M
(3.3.1.  Inter-domain Routing) s
5 159 M
(   The current operational inter-domain routing system has between) s
5 148 M
(   150,000 and 200,000 routing prefixes in the default-free zone \(DFZ\)) s
5 104 M
(IAB                           Informational                    [Page 10]) s
_R
S
%%Page: (11) 11
%%BeginPageSetup
_S
24 24 translate
/pagenum 11 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   [RFC-3221].  ASIC technology obviates concerns about the ability to) s
5 654 M
(   forward packets at very high speeds.  ASIC technology also obviates) s
5 643 M
(   concerns about the time required to perform longest-prefix-match) s
5 632 M
(   computations.  However, some senior members of the Internet routing) s
5 621 M
(   community have concerns that the end-to-end convergence properties of) s
5 610 M
(   the global Internet might hit algorithmic limitations \(i.e. not) s
5 599 M
(   hardware limitations\) when the DFZ is somewhere between 200,000 and) s
5 588 M
(   300,000 prefixes.  Research into whether this concern is well-founded) s
5 577 M
(   in scientific terms seems very timely.) s
5 555 M
(   The current approach to site multi-homing has the highly undesirable) s
5 544 M
(   side-effect of significantly increasing the growth rate of prefix) s
5 533 M
(   entries in the DFZ \(by impairing the deployment of prefix) s
5 522 M
(   aggregation\).  Research is needed into new routing architectures that) s
5 511 M
(   can support large-scale site multi-homing without the undesirable) s
5 500 M
(   impacts on inter-domain routing of the current multi-homing) s
5 489 M
(   technique.) s
5 467 M
(3.3.2.  Routing Integrity) s
5 445 M
(   Recently there has been increased awareness of the longstanding issue) s
5 434 M
(   of deploying strong authentication into the Internet inter-domain) s
5 423 M
(   routing system.  Currently deployed mechanisms \(e.g. BGP TCP MD5) s
5 412 M
(   [RFC2385], OSPF MD5, RIP MD5 [RFC2082]\) provide cryptographic) s
5 401 M
(   authentication of routing protocol messages, but no authentication of) s
5 390 M
(   the actual routing data.  Current proposals \(e.g. S-BGP [KLMS2000]\)) s
5 379 M
(   for improving this in inter-domain routing are unduly challenging to) s
5 368 M
(   deploy across the Internet because of their reliance on a single) s
5 357 M
(   trust hierarchy \(e.g., a single PKI\).  Similar proposals \(e.g. OSPF) s
5 346 M
(   with Digital Signatures, [RFC2154]\) for intra-domain routing are) s
5 335 M
(   argued to be computationally infeasible to deploy in a large network.) s
5 313 M
(   Alternative approaches to authentication of data in the routing) s
5 302 M
(   system need to be developed.  In particular, the ability to perform) s
5 291 M
(   partial authentication of routing data would facilitate incremental) s
5 280 M
(   deployment of routing authentication mechanisms.  Also, the ability) s
5 269 M
(   to use non-hierarchical trust models \(e.g. the web of trust used in) s
5 258 M
(   the PGP application\) might facilitate incremental deployment and) s
5 247 M
(   might resolve existing concerns about centralized administration of) s
5 236 M
(   the routing system, hence merits additional study and consideration.) s
5 214 M
(3.3.3.  Routing Algorithms) s
5 192 M
(   The current Internet routing system relies primarily on only three) s
5 181 M
(   algorithms.  Link-state routing uses the Dijkstra algorithm) s
5 170 M
(   [Dijkstra59].  The Distance-Vector and Path-Vector algorithms use the) s
5 159 M
(   Bellman-Ford algorithm [Bellman1957, FF1962].  Additional ongoing) s
5 148 M
(   basic research into graph theory as applied to routing is worthwhile) s
5 104 M
(IAB                           Informational                    [Page 11]) s
_R
S
%%Page: (12) 12
%%BeginPageSetup
_S
24 24 translate
/pagenum 12 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   and might yield algorithms that would enable a new routing) s
5 654 M
(   architecture or otherwise provide improvements to the routing system.) s
5 632 M
(   Currently deployed multicast routing relies on the Deering RPF) s
5 621 M
(   algorithm [Deering1988].  Ongoing research into alternative multicast) s
5 610 M
(   routing algorithms and protocols might help alleviate current) s
5 599 M
(   concerns with the scalability of multicast routing.) s
5 577 M
(   The deployed Internet routing system assumes that the shortest path) s
5 566 M
(   is always the best path.  This is provably false, however it is a) s
5 555 M
(   reasonable compromise given the routing protocols currently) s
5 544 M
(   available.  The Internet lacks deployable approaches for policy-based) s
5 533 M
(   routing or routing with alternative metrics \(i.e. some metric other) s
5 522 M
(   than the number of hops to the destination\).  Examples of alternative) s
5 511 M
(   policies include: the path with lowest monetary cost; the path with) s
5 500 M
(   the lowest probability of packet loss; the path with minimized) s
5 489 M
(   jitter; and the path with minimized latency.  Policy metrics also) s
5 478 M
(   need to take business relationships into account.  Historic work on) s
5 467 M
(   QoS-based routing has tended to be unsuccessful in part because it) s
5 456 M
(   did not adequately consider economic/commercial considerations of the) s
5 445 M
(   routing system and in part because of inadequate consideration of) s
5 434 M
(   security implications.) s
5 390 M
(3.3.4.  Mobile & Ad-Hoc Routing) s
5 368 M
(   Mobile routing [IM1993] and mobile ad-hoc routing [RFC2501] are) s
5 357 M
(   relatively recent arrivals in the Internet, and are not yet widely) s
5 346 M
(   deployed.  The current approaches are not the last word in either of) s
5 335 M
(   those arenas.  We believe that additional research into routing) s
5 324 M
(   support for mobile hosts and mobile networks is needed.  Additional) s
5 313 M
(   research for ad-hoc mobile hosts and mobile networks is also) s
5 302 M
(   worthwhile.  Ideally, mobile routing and mobile ad-hoc routing) s
5 291 M
(   capabilities should be native inherent capabilities of the Internet) s
5 280 M
(   routing architecture.  This probably will require a significant) s
5 269 M
(   evolution from the existing Internet routing architecture.  \(NB: The) s
5 258 M
(   term "mobility" as used here is not limited to mobile telephones, but) s
5 247 M
(   instead is very broadly defined, including laptops that people carry,) s
5 236 M
(   cars/trains/aircraft, and so forth.\)) s
5 214 M
(   Included in this topic are a wide variety of issues.  The more) s
5 203 M
(   distributed and dynamic nature of partially or completely self-) s
5 192 M
(   organizing routing systems \(including the associated end nodes\)) s
5 181 M
(   creates unique security challenges \(especially relating to AAA and) s
5 170 M
(   key management\).  Scalability of wireless networks can be difficult) s
5 159 M
(   to measure or to achieve.  Enforced hierarchy is one approach, but) s
5 148 M
(   can be very limiting.  Alternative, less constraining approaches to) s
5 104 M
(IAB                           Informational                    [Page 12]) s
_R
S
%%Page: (13) 13
%%BeginPageSetup
_S
24 24 translate
/pagenum 13 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   wireless scalability are desired.  Because wireless link-layer) s
5 654 M
(   protocols usually have some knowledge of current link characteristics) s
5 643 M
(   such as link quality, sublayer congestion conditions, or transient) s
5 632 M
(   channel behavior, it is desirable to find ways to let network-layer) s
5 621 M
(   routing use such data.  This raises architectural questions of what) s
5 610 M
(   the proper layering should be, which functions should be in which) s
5 599 M
(   layer, and also practical considerations of how and when such) s
5 588 M
(   information sharing should occur in real implementations.) s
5 566 M
(3.4.  Security) s
5 544 M
(   The Internet has a reputation for not having sufficient security.  In) s
5 533 M
(   fact, the Internet has a number of security mechanisms standardized,) s
5 522 M
(   some of which are widely deployed.  However, there are a number of) s
5 511 M
(   open research questions relating to Internet security.  In) s
5 500 M
(   particular, security mechanisms need to be incrementally deployable) s
5 489 M
(   and easy to use.  "[Security] technology must be easy to use, or it) s
5 478 M
(   will not be configured correctly.  If mis-configured, security will) s
5 467 M
(   be lost, but things will `work'" [S03].) s
5 445 M
(3.4.1.  Freely Distributable Prototypes) s
5 423 M
(   U.S.'s DARPA has historically funded development of freely) s
5 412 M
(   distributable implementations of various security technologies, such) s
5 401 M
(   as IP security, in a variety of operating systems.  Experience has) s
5 390 M
(   shown that a good way to speed deployment of a new technology is to) s
5 379 M
(   provide an unencumbered, freely-distributable prototype.  We believe) s
5 368 M
(   that applied research projects in Internet security will have an) s
5 357 M
(   increased probability of success if the research project teams make) s
5 346 M
(   their resulting software implementations freely available for both) s
5 335 M
(   commercial and non-commercial uses.  Examples of successes here) s
5 324 M
(   include the DARPA funding of TCP/IPv4 integration into the 4.x BSD) s
5 313 M
(   operating system [MBKQ96] and DARPA/USN funding of ESP/AH design and) s
5 302 M
(   integration into 4.4 BSD [Atk96].) s
5 280 M
(3.4.2.  Formal Methods) s
5 258 M
(   There is an ongoing need for funding of basic research relating to) s
5 247 M
(   Internet security, including funding of formal methods research that) s
5 236 M
(   relates to security algorithms, protocols, and systems.  For example,) s
5 225 M
(   while there has been significant work into hierarchical security) s
5 214 M
(   models \(e.g. Bell-Lapadula\) [BL1976], there has not been adequate) s
5 203 M
(   formal study of alternative security models \(e.g. PGP's Web-of-Trust) s
5 192 M
(   model\).  Use of a hierarchical trust model creates significant) s
5 181 M
(   limitations in how one might approach securing components of the) s
5 170 M
(   Internet, for example the DNS, or the inter-domain routing system.) s
5 159 M
(   So research to develop new trust models or on the applicability of) s
5 148 M
(   existing non-hierarchical trust models to existing problems would be) s
5 104 M
(IAB                           Informational                    [Page 13]) s
_R
S
%%Page: (14) 14
%%BeginPageSetup
_S
24 24 translate
/pagenum 14 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   worthwhile.) s
5 643 M
(   While there has been some work on the application of formal methods) s
5 632 M
(   to cryptographic algorithms and cryptographic protocols, existing) s
5 621 M
(   techniques for formal evaluation of algorithms and protocols lack) s
5 610 M
(   sufficient automation.  This lack of automation means that many) s
5 599 M
(   protocols aren't formally evaluated in a timely manner.  This is) s
5 588 M
(   problematic for the Internet because formal evaluation has often) s
5 577 M
(   uncovered serious anomalies in cryptographic protocols.  The creation) s
5 566 M
(   of automated tools for applying formal methods to cryptographic) s
5 555 M
(   algorithms and/or protocols would be very helpful.) s
5 533 M
(3.4.3.  Key Management) s
5 511 M
(   A recurring challenge to the Internet community is how to design,) s
5 500 M
(   implement, and deploy key management appropriate to the myriad) s
5 489 M
(   security contexts existing in the global Internet.  Most current work) s
5 478 M
(   in unicast key management has focused on hierarchical trust models,) s
5 467 M
(   because much of the existing work has been driven by corporate or) s
5 456 M
(   military "top-down" operating models.) s
5 434 M
(   The absence of key management methods applicable to non-hierarchical) s
5 423 M
(   trust models \(see above\) is a significant constraint on the) s
5 412 M
(   approaches that might be taken to secure components of the Internet.) s
5 401 M
(   Research focused on removing those constraints by developing) s
5 390 M
(   practical key management methods applicable to non-hierarchical trust) s
5 379 M
(   models would be very helpful.) s
5 357 M
(   Topics worthy of additional research include key management) s
5 346 M
(   techniques, such as non-hierarchical key management architectures) s
5 335 M
(   \(e.g. to support non-hierarchical trust models; see above\), that are) s
5 324 M
(   useful by ad-hoc groups in mobile networks and/or distributed) s
5 313 M
(   computing.) s
5 291 M
(   Although some progress has been made in recent years, scalable) s
5 280 M
(   multicast key management is far from being a solved problem.) s
5 269 M
(   Existing approaches to scalable multicast key management add) s
5 258 M
(   significant constraints on the problem scope in order to come up with) s
5 247 M
(   a deployable technical solution.  Having a more general approach to) s
5 236 M
(   scalable multicast key management \(i.e. one having broader) s
5 225 M
(   applicability and fewer constraints\) would enhance the Internet's) s
5 214 M
(   capabilities.) s
5 192 M
(   In many cases, attribute negotiation is an important capability of a) s
5 181 M
(   key management protocol.  Experience with the Internet Key Exchange) s
5 170 M
(   \(IKE\) to date has been that it is unduly complex.  Much of IKE's) s
5 159 M
(   complexity derives from its very general attribute negotiation) s
5 148 M
(   capabilities.  A new key management approach that supported) s
5 104 M
(IAB                           Informational                    [Page 14]) s
_R
S
%%Page: (15) 15
%%BeginPageSetup
_S
24 24 translate
/pagenum 15 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   significant attribute negotiation without creating challenging levels) s
5 654 M
(   of deployment and operations complexity would be helpful.) s
5 632 M
(3.4.4  Cryptography) s
5 610 M
(   There is an ongoing need to continue the open-world research funding) s
5 599 M
(   into both cryptography and cryptanalysis.  Most governments focus) s
5 588 M
(   their cryptographic research in the military-sector.  While this is) s
5 577 M
(   understandable, those efforts often have limited \(or no\) publications) s
5 566 M
(   in the open literature.  Since the Internet engineering community) s
5 555 M
(   must work from the open literature, it is important that open-world) s
5 544 M
(   research continues in the future.) s
5 522 M
(3.4.5  Security for Distributed Computing) s
5 500 M
(   MIT's Project Athena was an important and broadly successful research) s
5 489 M
(   project into distributed computing.  Project Athena developed the) s
5 478 M
(   Kerberos [RFC-1510] security system, which has significant deployment) s
5 467 M
(   today in campus environments.  However, inter-realm Kerberos is) s
5 456 M
(   neither as widely deployed nor perceived as widely successful as) s
5 445 M
(   single-realm Kerberos.  The need for scalable inter-domain user) s
5 434 M
(   authentication is increasingly acute as ad-hoc computing and mobile) s
5 423 M
(   computing become more widely deployed.  Thus, work on scalable) s
5 412 M
(   mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain) s
5 401 M
(   authentication would be very helpful.) s
5 379 M
(3.4.6.  Deployment Considerations in Security) s
5 357 M
(   Lots of work has been done on theoretically perfect security that is) s
5 346 M
(   impossible to deploy.  Unfortunately, Kent's S-BGP proposal is an) s
5 335 M
(   example of a good research product that has significant unresolved) s
5 324 M
(   deployment challenges. It is far from obvious how one could widely) s
5 313 M
(   deploy S-BGP without previously deploying a large-scale inter-domain) s
5 302 M
(   public-key infrastructure and also centralising route advertisement) s
5 291 M
(   policy enforcement in the Routing Information Registries or some) s
5 280 M
(   similiar body.  Historically, public-key infrastructures have been) s
5 269 M
(   either very difficult or impossible to deploy at large scale.  Some) s
5 258 M
(   have recently suggested that the PGP web-of-trust authentication) s
5 247 M
(   model should be applied to inter-domain advertisement of routing) s
5 236 M
(   prefixes [Schiller03].  Security mechanisms that need additional) s
5 225 M
(   infrastructure have not been deployed well.  We desperately need) s
5 214 M
(   security that is general, easy to install, and easy to manage.) s
5 192 M
(3.4.7.  Denial of Service Protection) s
5 170 M
(   Historically, the Internet community has mostly ignored pure Denial) s
5 159 M
(   of Service \(DoS\) attacks.  This was appropriate at one time since) s
5 148 M
(   such attacks were rare and are hard to defend against.  However, one) s
5 104 M
(IAB                           Informational                    [Page 15]) s
_R
S
%%Page: (16) 16
%%BeginPageSetup
_S
24 24 translate
/pagenum 16 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   of the recent trends in malware \(viruses, worms, etc.\)  has been the) s
5 654 M
(   incorporation of features that turn the infected host into a) s
5 643 M
(   "zombie".  Such zombies can be remotely controlled to mount a) s
5 632 M
(   distributed denial of service attack on some victim machine.  This) s
5 621 M
(   makes the design of anti-DoS measures of high importance to the) s
5 610 M
(   Internet.  Some work has been done on this front [Sav00], [MBFIPS01],) s
5 599 M
(   but more is needed.) s
5 577 M
(3.5.  Network Management) s
5 555 M
(   The Internet had early success in network device monitoring with the) s
5 544 M
(   Simple Network Management Protocol \(SNMP\) and its associated) s
5 533 M
(   Management Information Base \(MIB\).  There has been comparatively less) s
5 522 M
(   success in managing networks, in contrast to the hierarchical) s
5 511 M
(   monitoring of individual devices.) s
5 489 M
(   Unfortunately, network management research has historically been very) s
5 478 M
(   underfunded, because it is difficult to get funding bodies to) s
5 467 M
(   recognize this as legitimate networking research.) s
5 445 M
(3.5.1.  Configuration Management) s
5 423 M
(   Operators at the IAB Network Management Workshop [RFC-3535] held in) s
5 412 M
(   2002 reported that scalable distributed configuration management for) s
5 401 M
(   sets of network devices is a significant challenge today.  An) s
5 390 M
(   enhanced network management architecture that more fully supports) s
5 379 M
(   real operational needs is desirable.  Even individual improvements in) s
5 368 M
(   configuration management for sets of networked devices would be very) s
5 357 M
(   welcome.  Such improvements would need to include an integrated) s
5 346 M
(   approach to security for the configuration data.) s
5 324 M
(3.5.1.  Enhanced Monitoring Capabilities) s
5 302 M
(   SNMP does not scale very well to monitoring large numbers of objects) s
5 291 M
(   in many devices in different parts of the network.  An alternative) s
5 280 M
(   approach worth exploring is how to provide scalable and distributed) s
5 269 M
(   monitoring, not on individual devices, but instead on groups of) s
5 258 M
(   devices and networks-as-a-whole.) s
5 236 M
(3.5.2.  Managing Networks, Not Devices) s
5 214 M
(   In particular, at present there are few or no good tools for managing) s
5 203 M
(   a whole network of devices, though SNMP \(Simple Network Management) s
5 192 M
(   Protocol\) and CMIP \(Common Management Information Protocol\) are fine) s
5 181 M
(   for reading status of well-defined objects from individual boxes.) s
5 170 M
(   Applied research into methods of managing sets of networked devices) s
5 159 M
(   seems worthwhile.  Ideally this configuration management approach) s
5 148 M
(   would support distributed management, rather than being strictly) s
5 104 M
(IAB                           Informational                    [Page 16]) s
_R
S
%%Page: (17) 17
%%BeginPageSetup
_S
24 24 translate
/pagenum 17 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   hierarchical.) s
5 643 M
(   As an example, the current set of network management tools for) s
5 632 M
(   managing multimedia \(voice and video\) IP networks is inadequate, and) s
5 621 M
(   research would be useful in this area.  The lack of appropriate) s
5 610 M
(   network management tools has also been cited as one of the major) s
5 599 M
(   barriers to the deployment of IP multicast [D00, SP03].) s
5 577 M
(3.5.3.  Improving the Scalability of Network Management) s
5 555 M
(   An open issue related to network management is helping users and) s
5 544 M
(   others to identify and resolve problems in the network.  If a user) s
5 533 M
(   can't access a web page, it would be useful if the user could find) s
5 522 M
(   out, easily, without having to run ping and traceroute, whether the) s
5 511 M
(   problem was that the web server was down, that the network was) s
5 500 M
(   partitioned due to a link failure, that there was heavy congestion) s
5 489 M
(   along the path, that the DNS name couldn't be resolved, that the) s
5 478 M
(   firewall prohibited the access, or something else.  Current) s
5 467 M
(   approaches to network management do not scale sufficiently, so) s
5 456 M
(   network service providers and enterprises often have difficulty) s
5 445 M
(   operating their network\(s\) as successfully and economically as) s
5 434 M
(   desired.  Hence, more work is needed to improve the scalability of) s
5 423 M
(   network management systems.  This might involve application of) s
5 412 M
(   artificial intelligence, expert systems technology, or other) s
5 401 M
(   mechanisms, for example.) s
5 379 M
(3.6.  Quality of Service) s
5 357 M
(   There has been an intensive body of research and development work on) s
5 346 M
(   adding QoS to the Internet architecture for more than ten years now) s
5 335 M
(   [RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still) s
5 324 M
(   don't have end-to-end QoS in the Internet [RFC-2990].  The IETF is) s
5 313 M
(   good at defining individual QoS mechanisms, but poor at work on) s
5 302 M
(   deployable QoS architectures.  Thus, while Differentiated Services) s
5 291 M
(   \(DiffServ\) mechanisms have been standardized as per-hop behaviors,) s
5 280 M
(   there is still much to be learned about the deployment of that or) s
5 269 M
(   other QoS mechanisms for end-to-end QoS.  In addition to work on) s
5 258 M
(   purely technical issues, this includes close attention to the) s
5 247 M
(   economic models and deployment strategies that would enable an) s
5 236 M
(   increased deployment of QoS in the network.) s
5 214 M
(   In many cases, deployment of QoS mechanisms would significantly) s
5 203 M
(   increase operational security risks [RFC-2990], so any new research) s
5 192 M
(   on QoS mechanisms or architectures ought to specifically discuss the) s
5 181 M
(   potential security issues associated with the new proposal\(s\) and how) s
5 170 M
(   to mitigate those security issues.) s
5 148 M
(   One of the factors that has blunted the demand for QoS has been the) s
5 104 M
(IAB                           Informational                    [Page 17]) s
_R
S
%%Page: (18) 18
%%BeginPageSetup
_S
24 24 translate
/pagenum 18 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   transition of the Internet infrastructure from heavy congestion in) s
5 654 M
(   the early 1990s, to overprovisioning in backbones and in many) s
5 643 M
(   international links now.  Thus, research in QoS mechanisms also has) s
5 632 M
(   to include some careful attention to the relative costs and benefits) s
5 621 M
(   of QoS in different places in the network.  Applied research into QoS) s
5 610 M
(   should include explicit consideration of economic issues of deploying) s
5 599 M
(   and operating a QoS-enabled IP network [Clark02].) s
5 577 M
(3.6.1.  Inter-Domain QoS Architecture) s
5 555 M
(   Deploying existing Quality-of-Service \(QoS\) mechanisms, for example) s
5 544 M
(   Differentiated Services or Integrated Services, across an inter-) s
5 533 M
(   domain boundary creates a significant and easily exploited denial-of-) s
5 522 M
(   service vulnerability for any network that provides inter-domain QoS) s
5 511 M
(   support.  This has caused network operators to refrain from) s
5 500 M
(   supporting inter-domain QoS.  The Internet would benefit from) s
5 489 M
(   additional research into alternative approaches to QoS, approaches) s
5 478 M
(   that do not create such vulnerabilities and can be deployed end-to-) s
5 467 M
(   end [RFC-2990].) s
5 445 M
(   Also, current business models are not consistent with inter-domain) s
5 434 M
(   QoS, in large part because it is impractical or impossible to) s
5 423 M
(   authenticate the identity of the sender of would-be preferred traffic) s
5 412 M
(   while still forwarding traffic at line-rate.  Absent such an ability,) s
5 401 M
(   it is unclear how a network operator could bill or otherwise recover) s
5 390 M
(   costs associated with providing that preferred service.  So any new) s
5 379 M
(   work on inter-domain QoS mechanisms and architectures needs to) s
5 368 M
(   carefully consider the economic and security implications of such) s
5 357 M
(   proposals.) s
5 335 M
(3.6.2.  New Queuing Disciplines) s
5 313 M
(   The overall Quality-of-Service for traffic is in part determined by) s
5 302 M
(   the scheduling and queue management mechanisms at the routers.  While) s
5 291 M
(   there are a number of existing mechanisms \(e.g. RED\) that work) s
5 280 M
(   reasonably well, it is possible that improved queuing strategies) s
5 269 M
(   might be devised.  Mechanisms that lowered the implementation cost in) s
5 258 M
(   IP routers might help increase deployment of active queue management,) s
5 247 M
(   for example.) s
5 225 M
(3.7.  Congestion control.) s
5 203 M
(   TCP's congestion control mechanisms, from 1988 [J88], have been a key) s
5 192 M
(   factor in maintaining the stability of the Internet, and are used by) s
5 181 M
(   the bulk of the Internet's traffic.  However, the congestion control) s
5 170 M
(   mechanisms of the Internet need to be expanded and modified to meet a) s
5 159 M
(   wide range of new stresses, from new applications such as streaming) s
5 148 M
(   media and multicast to new environments such as wireless networks or) s
5 104 M
(IAB                           Informational                    [Page 18]) s
_R
S
%%Page: (19) 19
%%BeginPageSetup
_S
24 24 translate
/pagenum 19 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   very high bandwidth paths, and new requirements for minimizing) s
5 654 M
(   queueing delay.  While there are significant bodies of work in) s
5 643 M
(   several of these issues, considerably more needs to be done.  \(We) s
5 632 M
(   would note that research on TCP congestion control is also not yet) s
5 621 M
(   "done", with much still to be accomplished in high-speed TCP, or in) s
5 610 M
(   adding robust performance over paths with significant reordering,) s
5 599 M
(   intermittent connectivity, non-congestive packet loss, and the like.\)) s
5 577 M
(   Several of these issues bring up difficult fundamental questions) s
5 566 M
(   about the potential costs and benefits of increased communication) s
5 555 M
(   between layers.  Would it help transport to receive hints or other) s
5 544 M
(   information from routing, from link layers, or from other transport-) s
5 533 M
(   level connections?  If so, what would be the cost to robust operation) s
5 522 M
(   across diverse environments?) s
5 500 M
(   For congestion control mechanisms in routers, active queue management) s
5 489 M
(   and Explicit Congestion Notification are generally not yet deployed,) s
5 478 M
(   and there are a range of proposals, in various states of maturity, in) s
5 467 M
(   this area.  At the same time, there is a great deal that we still do) s
5 456 M
(   not understand about the interactions of queue management mechanisms) s
5 445 M
(   with other factors in the network.  Router-based congestion control) s
5 434 M
(   mechanisms are also needed for detecting and responding to aggregate) s
5 423 M
(   congestion such as in Distributed Denial of Service attacks and flash) s
5 412 M
(   crowds.) s
5 390 M
(   As more applications have the need to transfer very large files over) s
5 379 M
(   high delay-bandwidth-product paths, the stresses on current) s
5 368 M
(   congestion control mechanisms raise the question of whether we need) s
5 357 M
(   more fine-grained feedback from routers.  This includes the challenge) s
5 346 M
(   of allowing connections to avoid the delays of slow-start, and to) s
5 335 M
(   rapidly make use of newly-available bandwidth.) s
5 313 M
(   There is also a need for long-term research in congestion control) s
5 302 M
(   that is separate from specific functional requirements like the ones) s
5 291 M
(   listed above.  We know very little about congestion control dynamics) s
5 280 M
(   or traffic dynamics a large, complex network like the global) s
5 269 M
(   Internet, with its heterogeneous and changing traffic mixes, link-) s
5 258 M
(   level technologies, network protocols and router mechanisms, patterns) s
5 247 M
(   of congestion, pricing models, and the like.  Expanding our knowledge) s
5 236 M
(   in this area seems likely to require a rich mix of measurement,) s
5 225 M
(   analysis, simulations, and experimentation.) s
5 203 M
(3.8.  Studying the Evolution of the Internet Infrastructure) s
5 181 M
(   The evolution of the Internet infrastructure has been frustratingly) s
5 170 M
(   slow and difficult, with long stories about the difficulties in) s
5 159 M
(   adding IPv6, QoS, multicast, and other functionality to the Internet.) s
5 148 M
(   We need a more scientific understanding of the evolutionary) s
5 104 M
(IAB                           Informational                    [Page 19]) s
_R
S
%%Page: (20) 20
%%BeginPageSetup
_S
24 24 translate
/pagenum 20 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   potentials and evolutionary difficulties of the Internet) s
5 654 M
(   infrastructure.) s
5 632 M
(   This evolutionary potential is affected not only by the technical) s
5 621 M
(   issues of the layered IP architecture, but by other factors as well.) s
5 610 M
(   These factors include the changes in the environment over time \(e.g.,) s
5 599 M
(   the recent overprovisioning of backbones, the deployment of) s
5 588 M
(   firewalls\), and the role of standardization process.  Economic and) s
5 577 M
(   public policy factors are also critical, including the central fact) s
5 566 M
(   of the Internet as a decentralized system, with key players being not) s
5 555 M
(   only individuals, but also ISPs, companies, and entire industries.) s
5 544 M
(   Deployment issues are also key factors in the evolution of the) s
5 533 M
(   Internet, including the continual chicken-and-egg problem of having) s
5 522 M
(   enough customers to merit rolling out a service whose utility depends) s
5 511 M
(   on the size of the customer base in the first place.) s
5 489 M
(   Overlay networks might serve as a transition technology for new) s
5 478 M
(   functionality, with an initial deployment in overlay networks, and) s
5 467 M
(   with the new functionality moving later into the core if it seems) s
5 456 M
(   warranted.) s
5 434 M
(   There are also increased obstacles to the evolution of the Internet) s
5 423 M
(   in the form of increased complexity [WD02], unanticipated feature) s
5 412 M
(   interactions [K00], interactions between layers [CWWS92],) s
5 401 M
(   interventions by middleboxes [RFC-3424], and the like.  Because) s
5 390 M
(   increasing complexity appears inevitable, research is needed to) s
5 379 M
(   understand architectural mechanisms that can accommodate increased) s
5 368 M
(   complexity without decreasing robustness of performance in unknown) s
5 357 M
(   environments, and without closing off future possibilities for) s
5 346 M
(   evolution.) s
5 324 M
(3.9.  Middleboxes) s
5 302 M
(   Research is needed to address the challenges posed by middleboxes.) s
5 291 M
(   This includes issues of security, control, and data integrity, and on) s
5 280 M
(   the general impact of middleboxes on the architecture.) s
5 258 M
(   In many ways middleboxes are a direct outgrowth of commercial) s
5 247 M
(   interests, but there is a need to look beyond the near-term needs for) s
5 236 M
(   the technology, to research its broader implications and to explore) s
5 225 M
(   ways to improve how middleboxes are integrated into the architecture.) s
5 203 M
(3.10.  Internet Measurement) s
5 181 M
(   A recurring challenge is measuring the Internet; there have been many) s
5 170 M
(   discussions about the need for measurement studies as an integral) s
5 159 M
(   part of Internet research [Claffy03].  In this discussion, we define) s
5 148 M
(   measurement quite broadly.  For example, there are numerous) s
5 104 M
(IAB                           Informational                    [Page 20]) s
_R
S
%%Page: (21) 21
%%BeginPageSetup
_S
24 24 translate
/pagenum 21 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   challenges in measuring performance along any substantial Internet) s
5 654 M
(   path, particularly when the path crosses administrative domain) s
5 643 M
(   boundaries.  There are also challenges in measuring) s
5 632 M
(   protocol/application usage on any high speed Internet link.  Many of) s
5 621 M
(   the problems discussed above would benefit from increased frequency) s
5 610 M
(   of measurement as well as improved quality of measurement on the) s
5 599 M
(   deployed Internet.) s
5 577 M
(   A key issue in network measurement is that most commercial Internet) s
5 566 M
(   Service Providers consider the particular characteristics of their) s
5 555 M
(   production IP network\(s\) to be trade secrets.  Ways need to be found) s
5 544 M
(   for legitimate non-commercial researchers to be able to measure) s
5 533 M
(   relevant network parameters while also protecting the privacy rights) s
5 522 M
(   of the measured ISPs.) s
5 500 M
(   Absent measured data, there is possibly an over-reliance on network) s
5 489 M
(   simulations in some parts of the Internet research community and) s
5 478 M
(   probably insufficient validation that existing network simulation) s
5 467 M
(   models are reasonably good representations of the deployed Internet) s
5 456 M
(   \(or of some plausible future Internet\) [FK02].) s
5 434 M
(   Without solid measurement of the current Internet behaviour, it is) s
5 423 M
(   very difficult to know what otherwise unknown operational problems) s
5 412 M
(   exist that require attention, and it is equally difficult to fully) s
5 401 M
(   understand the impact of changes \(past or future\) upon the Internet's) s
5 390 M
(   actual behavioural characteristics.) s
5 368 M
(3.11.  Meeting the Needs of the Future) s
5 346 M
(   As network size, link bandwidth, CPU capacity, and the number of) s
5 335 M
(   users all increase, research will be needed to ensure that the) s
5 324 M
(   Internet of the future scales to meet these increasing demands.  We) s
5 313 M
(   have discussed some of these scaling issues in specific sections) s
5 302 M
(   above.) s
5 280 M
(   However, for all of the research questions discussed in this) s
5 269 M
(   document, the goal of the research must be not only to meet the) s
5 258 M
(   challenges already experienced today, but also to meet the challenges) s
5 247 M
(   that can be expected to emerge in the future.) s
5 225 M
(3.12.  Additional topics) s
5 203 M
(   We have not included in this document discussions about the need for) s
5 192 M
(   additional research in providing tools for researchers \(e.g.,) s
5 181 M
(   modeling, simulations, test-beds\).) s
5 159 M
(   Any new sections in this document should be focused on the problems) s
5 148 M
(   that need to be addressed, rather than focused on the new approaches) s
5 104 M
(IAB                           Informational                    [Page 21]) s
_R
S
%%Page: (22) 22
%%BeginPageSetup
_S
24 24 translate
/pagenum 22 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   or technologies that might be promising answers to those problems.) s
5 643 M
(4.  Conclusions) s
5 621 M
(   This document has summarized the history of research funding for the) s
5 610 M
(   Internet and highlighted examples of open research questions.  The) s
5 599 M
(   IAB believes that more research is required to further the evolution) s
5 588 M
(   of the Internet infrastructure, and that consistent, sufficient non-) s
5 577 M
(   commercial funding is needed to enable such research.) s
5 555 M
(   In case there is any confusion, we are not in this document) s
5 544 M
(   suggesting any direct or indirect role for the IAB, the IETF, or the) s
5 533 M
(   IRTF in handling any funding for Internet research.) s
5 511 M
(5.  Acknowledgements) s
5 489 M
(   The people who directly contributed to this document in some form) s
5 478 M
(   include the following: Ran Atkinson, Rob Austein, Jon Crowcroft,) s
5 467 M
(   Sally Floyd, James Kempf, Craig Partridge, Vern Paxson, and Mike St.) s
5 456 M
(   Johns.  We are also grateful to Kim Claffy, Andrei Gurtov, Hilarie) s
5 445 M
(   Orman for feedback.) s
5 423 M
(   We have also drawn widely on the following sources: [CIPB02],) s
5 412 M
(   [IST02], [NV02], [NSF02], [NSF03], [NSF03a].) s
5 390 M
(   Upcoming workshops include the following: [COST-NSF03].) s
5 368 M
(6.  Security Considerations) s
5 346 M
(   This document does not itself create any new security issues for the) s
5 335 M
(   Internet community.  Security issues within the Internet Architecture) s
5 324 M
(   primarily are discussed in Section 3.4 above.) s
5 302 M
(7.  IANA Considerations) s
5 280 M
(   There are no IANA considerations regarding this document.) s
5 258 M
(Normative References) s
5 236 M
(   There are no Normative References because this is an Informational) s
5 225 M
(   document.) s
5 203 M
(Informative References) s
5 181 M
(   [Atk96] R. Atkinson et alia, "Implementation of IPv6 in 4.4 BSD",) s
5 170 M
(   Proceedings of USENIX 1996 Annual Technical Conference, USENIX) s
5 159 M
(   Association, Berkeley, CA, January 1996.) s
5 104 M
(IAB                           Informational                    [Page 22]) s
_R
S
%%Page: (23) 23
%%BeginPageSetup
_S
24 24 translate
/pagenum 23 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   [Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton) s
5 654 M
(   University Press, Princeton, NJ, 1957.) s
5 632 M
(   [BL1976] D. E. Bell & L. J. LaPadula, "Secure Computer Systems:) s
5 621 M
(   Unified Exposition and Multics Interpretation", MITRE Technical) s
5 610 M
(   Report NMTR-1997 \(ESD-TR-75-306\), The Mitre Corporation, March 1976.) s
5 588 M
(   [Claffy03] K. Claffy, "Priorities and Challenges in Internet) s
5 577 M
(   Measurement, Simulation, and Analysis", NSF PI meeting, January 2003.) s
5 566 M
(   URL "http://www.caida.org/outreach/presentations/2003/nsfpi0301/".) s
5 544 M
(   [Clark02] D. D. Clark, "Deploying the Internet - why does it take so) s
5 533 M
(   long and, can research help ?", Large-Scale Networking Distinguished) s
5 522 M
(   Lecture Series, \(US\) National Science Foundation, Arlington, VA, 8) s
5 511 M
(   January 2002.  URL: http://www.ngi-supernet.org/conferences.html) s
5 489 M
(   [CSTB99] Computer Science & Telecommunications Board, \(US\) National) s
5 478 M
(   Research Council, "Funding a Revolution: Government Support for) s
5 467 M
(   Computing Research", National Academy Press, Washington, DC, 1999.) s
5 456 M
(   URL "http://www7.nationalacademies.org/cstb/pub_revolution.html".) s
5 434 M
(   [CIPB02] Critical Infrastructure Protection Board, "National Strategy) s
5 423 M
(   to Secure Cyberspace", The White House, Washington, DC, September) s
5 412 M
(   2002, URL "http://www.whitehouse.gov/pcipb".) s
5 390 M
(   [COST-NSF03] COST-IST\(EU\)--NSF\(USA\) Workshop on Networking, June,) s
5 379 M
(   2003.  URL "http://cgi.di.uoa.gr/~istavrak/costnsf/".) s
5 357 M
(   [CWWS92] J. Crowcroft, I Wakeman, Z. Wang, & D. Sirovica, "Is) s
5 346 M
(   Layering Harmful ?", IEEE Networks, January 1992.) s
5 324 M
(   [Diot00] C. Diot, et alia, "Deployment Issues for the IP Multicast) s
5 313 M
(   Service and Architecture", IEEE Network, January/February 2000.) s
5 291 M
(   [Deering1988] S. Deering, "Multicast Routing in Internetworks and) s
5 280 M
(   LANs", ACM Computer Communications Review, Volume 18, Issue 4, August) s
5 269 M
(   1988.) s
5 247 M
(   [Dijkstra59] E. Dijkstra, "A note on two problems in connexion with) s
5 236 M
(   graphs", Numerishe Mathematik, 1, 1959, pp.269-271.) s
5 214 M
(   [FF1962] L.R. Ford Jr. & D.R. Fulkerson, "Flows in Networks",) s
5 203 M
(   Princeton University Press, Princeton, NJ, 1962.) s
5 181 M
(   [FK02] S. Floyd and E. Kohler, Internet Research Needs Better Models,) s
5 170 M
(   Hotnets-I. October 2002.  URL) s
5 159 M
(   "http://www.icir.org/models/bettermodels.html".) s
5 104 M
(IAB                           Informational                    [Page 23]) s
_R
S
%%Page: (24) 24
%%BeginPageSetup
_S
24 24 translate
/pagenum 24 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   [Handley02] Mark Handley's viewgraphs to an NSF meeting, 2002.) s
5 643 M
(   [IM1993] J. Ioannidis & G. Maguire Jr., "The Design and) s
5 632 M
(   Implementation of a Mobile Internetworking Architecture", Proceedings) s
5 621 M
(   of the Winter USENIX Technical Conference, pages 489-500, January) s
5 610 M
(   1993.) s
5 588 M
(   [IST02] Research Networking in Europe - Striving for Global) s
5 577 M
(   Leadership, Information Society Technologies, 2002.  URL) s
5 566 M
(   "http://www.cordis.lu/ist/rn/rn-brochure.htm".) s
5 544 M
(   [J88] Van Jacobson, Congestion Avoidance and Control, SIGCOMM, 1988.) s
5 533 M
(   URL "http://citeseer.nj.nec.com/jacobson88congestion.html".) s
5 511 M
(   [J02] William Jackson, "U.S. should fund R&D for secure Internet) s
5 500 M
(   protocols, Clarke says", 10/31/02, URL) s
5 489 M
(   "http://www.gcn.com/vol1_no1/security/20382-1.html".) s
5 467 M
(   [K00] Hans Kruse, The Pitfalls of Distributed Protocol Development:) s
5 456 M
(   Unintentional Interactions between Network Operations and) s
5 445 M
(   Applications Protocols, 8th International Conference on) s
5 434 M
(   Telecommunication Systems Design, Nashville, March 2000.  URL) s
5 423 M
(   "http://www.csm.ohiou.edu/kruse/publications/TSYS2000.pdf".) s
5 401 M
(   [KLMS2000] S. Kent, C. Lynn, J. Mikkelson, & K. Seo, "Secure Border) s
5 390 M
(   Gateway Protocol \(S-BGP\)", Proceedings of ISoc Network & Distributed) s
5 379 M
(   Systems Security Symposium, Internet Society, Reston, VA, February) s
5 368 M
(   2000.) s
5 346 M
(   [LD2002] E. Lear & R. Droms, "What's in a Name: Thoughts from the) s
5 335 M
(   NSRG", Internet-Draft, December 2002.) s
5 313 M
(   [MBFIPS01] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John) s
5 302 M
(   Ioannidis, Vern Paxson, and Scott Shenker, Controlling High Bandwidth) s
5 291 M
(   Aggregates in the Network \(Extended Version\), July, 2001.  URL) s
5 280 M
(   "http://www.icir.org/pushback/".) s
5 258 M
(   [MBKQ96] M. McKusick, K. Bostic, M. Karels, & J. Quarterman, "Design) s
5 247 M
(   and Implementation of the 4.4 BSD Operating System", Addison-Wesley,) s
5 236 M
(   Reading, MA, 1996.) s
5 214 M
(   [S03] J. I. Schiller, "Interception Technology: The Good, The Bad,) s
5 203 M
(   and The Ugly!", NANOG, June 2003.  URL) s
5 192 M
(   "http://www.nanog.org/mtg-0306/schiller.html".) s
5 170 M
(   [Schiller03] J. I. Schiller, Private Communication, MIT, Cambridge,) s
5 159 M
(   MA.  2003.) s
5 104 M
(IAB                           Informational                    [Page 24]) s
_R
S
%%Page: (25) 25
%%BeginPageSetup
_S
24 24 translate
/pagenum 25 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   [NV02] NetVision 2012 Committee,"DARPA's Ten-Year Strategic Plan for) s
5 654 M
(   Networking Research", \(US\) Defence Advanced Research Projects Agency,) s
5 643 M
(   October 2002.  Citation for acknowledgement purposes only.) s
5 621 M
(   [NSF02] NSF Workshop on Network Research Testbeds, October 2002.  URL) s
5 610 M
(   "http://www-net.cs.umass.edu/testbed_workshop/".) s
5 588 M
(   [NSF03] NSF ANIR Principal Investigator meeting, January 9-10, 2003,) s
5 577 M
(   URL "http://www.ncne.org/training/nsf-pi/2003/nsfpimain.html".) s
5 555 M
(   [NSF03a] Revolutionizing Science and Engineering Through) s
5 544 M
(   Cyberinfrastructure, NSF Report, January 2003.  URL) s
5 533 M
(   "http://www.cise.nsf.gov/evnt/reports/atkins_annc_020303.htm".) s
5 511 M
(   [ResearchQuestions] Web Page on "Papers about Research Questions for) s
5 500 M
(   the Internet", URL) s
5 489 M
(   "http://www.icir.org/floyd/research_questions.html".) s
5 467 M
(   [RFC-1510] J. Kohl & C. Neuman, "The Kerberos Network Authentication) s
5 456 M
(   Service \(V5\)", RFC 1510, September 1993.) s
5 434 M
(   [RFC-2082] F. Baker & R. Atkinson, "RIPv2 MD5 Authentication",) s
5 423 M
(   RFC-2082, January 1997.) s
5 401 M
(   [RFC-2154] S. Murphy, M. Badger, & B. Wellington, "OSPF with Digital) s
5 390 M
(   Signatures", RFC-2154, June 1997.) s
5 368 M
(   [RFC-2385] A. Heffernan, "Protection of BGP Sessions via the TCP MD5) s
5 357 M
(   Signature Option", RFC-2385, August 1998.) s
5 335 M
(   [RFC-2407] D. Piper, "The Internet IP Security Domain of) s
5 324 M
(   Interpretation for ISAKMP", RFC-2407, November 1998.) s
5 302 M
(   [RFC-2501] S. Corson & J. Macker, "Mobile Ad Hoc Networking \(MANET\):) s
5 291 M
(   Routing Protocol Performance Issues and Evaluation Considerations",) s
5 280 M
(   RFC-2501, January 1999.) s
5 258 M
(   [RFC-2990] G. Huston, "Next Steps for the IP QoS Architecture",) s
5 247 M
(   RFC-1990, November 2000.) s
5 225 M
(   [RFC-3221] G. Huston, "Commentary on Inter-Domain Routing in the) s
5 214 M
(   Internet", RFC-3221, December 2001.) s
5 192 M
(   [RFC-3424] L. Daigle \(Ed.\), "IAB Considerations for Unilateral Self-) s
5 181 M
(   Address Fixing \(UNSAF\) Across Network Address Translation", RFC-3424,) s
5 170 M
(   Internet Architecture Board, November 2002.) s
5 148 M
(   [RFC-3535] J. Schoenwalder, Editor, "Overfiew of the 2002 IAB Network) s
5 104 M
(IAB                           Informational                    [Page 25]) s
_R
S
%%Page: (26) 26
%%BeginPageSetup
_S
24 24 translate
/pagenum 26 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 665 M
(   Management Workshop", RFC-3535, May 2003.) s
5 643 M
(   [RIPE] RIPE \(Reseaux IP Europeens\), URL "http://www.ripe.net/ripe/".) s
5 621 M
(   [Sav00] Savage, S., Wetherall, D., Karlink, A. R., and Anderson, T.,) s
5 610 M
(   Practical Network Support for IP Traceback, SIGCOMM 2000.) s
5 588 M
(   [SP03] P. Sharma & R. Malpani, "IP Multicast Operational Network) s
5 577 M
(   Management: Design, Challenges, and Experiences", IEEE Network, March) s
5 566 M
(   2003.) s
5 544 M
(   [WD02] Walter Willinger and John Doyle, "Robustness and the Internet:) s
5 533 M
(   Design and Evolution", 2002, URL) s
5 522 M
(   "http://netlab.caltech.edu/internet/".) s
5 500 M
(   [WIDE] WIDE Project, URL "http://www.wide.ad.jp/".) s
5 478 M
(9. AUTHORS' ADDRESSES) s
5 445 M
(   Internet Architecture Board) s
5 434 M
(   EMail:  iab@iab.org) s
5 412 M
(   Internet Architecture Board Members) s
5 401 M
(   at the time this document was published were:) s
5 379 M
(   Bernard Aboba) s
5 368 M
(   Harald Alvestrand \(IETF chair\)) s
5 357 M
(   Rob Austein) s
5 346 M
(   Leslie Daigle \(IAB chair\)) s
5 335 M
(   Patrik Faltstrom) s
5 324 M
(   Sally Floyd) s
5 313 M
(   Jun-ichiro Itojun Hagino) s
5 302 M
(   Mark Handley) s
5 291 M
(   Geoff Huston \(IAB Executive Director\)) s
5 280 M
(   Charlie Kaufman) s
5 269 M
(   James Kempf) s
5 258 M
(   Eric Rescorla) s
5 247 M
(   Mike St. Johns) s
5 225 M
(   We note that Ran Atkinson, one of the editors of the document,) s
5 214 M
(   was an IAB member at the time that this document was created,) s
5 203 M
(   and that Vern Paxson, the IRTF chair, is an ex-officio member) s
5 192 M
(   of the IAB.) s
5 170 M
(   This draft was created in November 2002 and revised January 2003,) s
5 159 M
(   February 2003, and June 2003.) s
5 104 M
(IAB                           Informational                    [Page 26]) s
_R
S
%%Page: (27) 27
%%BeginPageSetup
_S
24 24 translate
/pagenum 27 def
/fname (draft-iab-research-funding-01.txt) def
/fdir () def
/ftail (draft-iab-research-funding-01.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding                                     June 2003) s
5 104 M
(IAB                           Informational                    [Page 27]) s
_R
S
%%Trailer
%%Pages: 27
%%DocumentNeededResources: font Courier-Bold Courier 
%%EOF

PAFTECH AB 2003-20262026-04-23 05:38:43