One document matched: draft-iab-research-funding-03.ps
%!PS-Adobe-3.0
%%BoundingBox: 24 24 588 768
%%Title: Enscript Output
%%For: Sally Floyd
%%Creator: GNU enscript 1.6.1
%%CreationDate: Mon May 10 16:17:55 2004
%%Orientation: Portrait
%%Pages: (atend)
%%DocumentMedia: Letter 612 792 0 () ()
%%DocumentNeededResources: (atend)
%%EndComments
%%BeginProlog
%%BeginResource: procset Enscript-Prolog 1.6 1
%
% Procedures.
%
/_S { % save current state
/_s save def
} def
/_R { % restore from saved state
_s restore
} def
/S { % showpage protecting gstate
gsave
showpage
grestore
} bind def
/MF { % fontname newfontname -> - make a new encoded font
/newfontname exch def
/fontname exch def
/fontdict fontname findfont def
/newfont fontdict maxlength dict def
fontdict {
exch
dup /FID eq {
% skip FID pair
pop pop
} {
% copy to the new font dictionary
exch newfont 3 1 roll put
} ifelse
} forall
newfont /FontName newfontname put
% insert only valid encoding vectors
encoding_vector length 256 eq {
newfont /Encoding encoding_vector put
} if
newfontname newfont definefont pop
} def
/SF { % fontname width height -> - set a new font
/height exch def
/width exch def
findfont
[width 0 0 height 0 0] makefont setfont
} def
/SUF { % fontname width height -> - set a new user font
/height exch def
/width exch def
/F-gs-user-font MF
/F-gs-user-font width height SF
} def
/M {moveto} bind def
/s {show} bind def
/Box { % x y w h -> - define box path
/d_h exch def /d_w exch def /d_y exch def /d_x exch def
d_x d_y moveto
d_w 0 rlineto
0 d_h rlineto
d_w neg 0 rlineto
closepath
} def
/bgs { % x y height blskip gray str -> - show string with bg color
/str exch def
/gray exch def
/blskip exch def
/height exch def
/y exch def
/x exch def
gsave
x y blskip sub str stringwidth pop height Box
gray setgray
fill
grestore
x y M str s
} def
% Highlight bars.
/highlight_bars { % nlines lineheight output_y_margin gray -> -
gsave
setgray
/ymarg exch def
/lineheight exch def
/nlines exch def
% This 2 is just a magic number to sync highlight lines to text.
0 d_header_y ymarg sub 2 sub translate
/cw d_output_w cols div def
/nrows d_output_h ymarg 2 mul sub lineheight div cvi def
% for each column
0 1 cols 1 sub {
cw mul /xp exch def
% for each rows
0 1 nrows 1 sub {
/rn exch def
rn lineheight mul neg /yp exch def
rn nlines idiv 2 mod 0 eq {
% Draw highlight bar. 4 is just a magic indentation.
xp 4 add yp cw 8 sub lineheight neg Box fill
} if
} for
} for
grestore
} def
% Line highlight bar.
/line_highlight { % x y width height gray -> -
gsave
/gray exch def
Box gray setgray fill
grestore
} def
% Column separator lines.
/column_lines {
gsave
.1 setlinewidth
0 d_footer_h translate
/cw d_output_w cols div def
1 1 cols 1 sub {
cw mul 0 moveto
0 d_output_h rlineto stroke
} for
grestore
} def
% Column borders.
/column_borders {
gsave
.1 setlinewidth
0 d_footer_h moveto
0 d_output_h rlineto
d_output_w 0 rlineto
0 d_output_h neg rlineto
closepath stroke
grestore
} def
% Do the actual underlay drawing
/draw_underlay {
ul_style 0 eq {
ul_str true charpath stroke
} {
ul_str show
} ifelse
} def
% Underlay
/underlay { % - -> -
gsave
0 d_page_h translate
d_page_h neg d_page_w atan rotate
ul_gray setgray
ul_font setfont
/dw d_page_h dup mul d_page_w dup mul add sqrt def
ul_str stringwidth pop dw exch sub 2 div ul_h_ptsize -2 div moveto
draw_underlay
grestore
} def
/user_underlay { % - -> -
gsave
ul_x ul_y translate
ul_angle rotate
ul_gray setgray
ul_font setfont
0 0 ul_h_ptsize 2 div sub moveto
draw_underlay
grestore
} def
% Page prefeed
/page_prefeed { % bool -> -
statusdict /prefeed known {
statusdict exch /prefeed exch put
} {
pop
} ifelse
} def
% Wrapped line markers
/wrapped_line_mark { % x y charwith charheight type -> -
/type exch def
/h exch def
/w exch def
/y exch def
/x exch def
type 2 eq {
% Black boxes (like TeX does)
gsave
0 setlinewidth
x w 4 div add y M
0 h rlineto w 2 div 0 rlineto 0 h neg rlineto
closepath fill
grestore
} {
type 3 eq {
% Small arrows
gsave
.2 setlinewidth
x w 2 div add y h 2 div add M
w 4 div 0 rlineto
x w 4 div add y lineto stroke
x w 4 div add w 8 div add y h 4 div add M
x w 4 div add y lineto
w 4 div h 8 div rlineto stroke
grestore
} {
% do nothing
} ifelse
} ifelse
} def
% EPSF import.
/BeginEPSF {
/b4_Inc_state save def % Save state for cleanup
/dict_count countdictstack def % Count objects on dict stack
/op_count count 1 sub def % Count objects on operand stack
userdict begin
/showpage { } def
0 setgray 0 setlinecap
1 setlinewidth 0 setlinejoin
10 setmiterlimit [ ] 0 setdash newpath
/languagelevel where {
pop languagelevel
1 ne {
false setstrokeadjust false setoverprint
} if
} if
} bind def
/EndEPSF {
count op_count sub { pos } repeat % Clean up stacks
countdictstack dict_count sub { end } repeat
b4_Inc_state restore
} bind def
% Check PostScript language level.
/languagelevel where {
pop /gs_languagelevel languagelevel def
} {
/gs_languagelevel 1 def
} ifelse
%%EndResource
%%BeginResource: procset Enscript-Encoding-88591 1.6 1
/encoding_vector [
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/space /exclam /quotedbl /numbersign
/dollar /percent /ampersand /quoteright
/parenleft /parenright /asterisk /plus
/comma /hyphen /period /slash
/zero /one /two /three
/four /five /six /seven
/eight /nine /colon /semicolon
/less /equal /greater /question
/at /A /B /C
/D /E /F /G
/H /I /J /K
/L /M /N /O
/P /Q /R /S
/T /U /V /W
/X /Y /Z /bracketleft
/backslash /bracketright /asciicircum /underscore
/quoteleft /a /b /c
/d /e /f /g
/h /i /j /k
/l /m /n /o
/p /q /r /s
/t /u /v /w
/x /y /z /braceleft
/bar /braceright /tilde /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/.notdef /.notdef /.notdef /.notdef
/space /exclamdown /cent /sterling
/currency /yen /brokenbar /section
/dieresis /copyright /ordfeminine /guillemotleft
/logicalnot /hyphen /registered /macron
/degree /plusminus /twosuperior /threesuperior
/acute /mu /paragraph /bullet
/cedilla /onesuperior /ordmasculine /guillemotright
/onequarter /onehalf /threequarters /questiondown
/Agrave /Aacute /Acircumflex /Atilde
/Adieresis /Aring /AE /Ccedilla
/Egrave /Eacute /Ecircumflex /Edieresis
/Igrave /Iacute /Icircumflex /Idieresis
/Eth /Ntilde /Ograve /Oacute
/Ocircumflex /Otilde /Odieresis /multiply
/Oslash /Ugrave /Uacute /Ucircumflex
/Udieresis /Yacute /Thorn /germandbls
/agrave /aacute /acircumflex /atilde
/adieresis /aring /ae /ccedilla
/egrave /eacute /ecircumflex /edieresis
/igrave /iacute /icircumflex /idieresis
/eth /ntilde /ograve /oacute
/ocircumflex /otilde /odieresis /divide
/oslash /ugrave /uacute /ucircumflex
/udieresis /yacute /thorn /ydieresis
] def
%%EndResource
%%EndProlog
%%BeginSetup
%%IncludeResource: font Courier-Bold
%%IncludeResource: font Courier
/HFpt_w 10 def
/HFpt_h 10 def
/Courier-Bold /HF-gs-font MF
/HF /HF-gs-font findfont [HFpt_w 0 0 HFpt_h 0 0] makefont def
/Courier /F-gs-font MF
/F-gs-font 10 10 SF
/#copies 1 def
% Pagedevice definitions:
gs_languagelevel 1 gt {
<<
/PageSize [612 792]
>> setpagedevice
} if
/d_page_w 564 def
/d_page_h 744 def
/d_header_x 0 def
/d_header_y 744 def
/d_header_w 564 def
/d_header_h 0 def
/d_footer_x 0 def
/d_footer_y 0 def
/d_footer_w 564 def
/d_footer_h 0 def
/d_output_w 564 def
/d_output_h 744 def
/cols 1 def
%%EndSetup
%%Page: (1) 1
%%BeginPageSetup
_S
24 24 translate
/pagenum 1 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 665 M
(Internet Engineering Task Force Ran Atkinson, Editor) s
5 654 M
(INTERNET DRAFT Sally Floyd, Editor) s
5 643 M
(draft-iab-research-funding-03.txt Internet Architecture Board) s
5 632 M
( May 2004) s
5 577 M
(IAB Concerns and Recommendations Regarding Internet Research and Evolution) s
5 544 M
( Status of this Memo) s
5 511 M
( This document is an Internet-Draft and is in full conformance with) s
5 500 M
( all provisions of Section 10 of RFC2026.) s
5 478 M
( Internet-Drafts are working documents of the Internet Engineering) s
5 467 M
( Task Force \(IETF\), its areas, and its working groups. Note that) s
5 456 M
( other groups may also distribute working documents as Internet-) s
5 445 M
( Drafts.) s
5 423 M
( Internet-Drafts are draft documents valid for a maximum of six months) s
5 412 M
( and may be updated, replaced, or obsoleted by other documents at any) s
5 401 M
( time. It is inappropriate to use Internet-Drafts as reference) s
5 390 M
( material or to cite them other than as "work in progress.") s
5 368 M
( The list of current Internet-Drafts can be accessed at) s
5 357 M
( http://www.ietf.org/ietf/1id-abstracts.txt) s
5 335 M
( The list of Internet-Draft Shadow Directories can be accessed at) s
5 324 M
( http://www.ietf.org/shadow.html.) s
5 302 M
(Copyright Notice) s
5 280 M
( Copyright \(C\) The Internet Society \(2004\). All Rights Reserved.) s
5 258 M
(Abstract) s
5 236 M
( This document discusses IAB concerns that ongoing research is needed) s
5 225 M
( to further the evolution of the Internet infrastructure, and that) s
5 214 M
( consistent, sufficient non-commercial funding is needed to enable) s
5 203 M
( such research.) s
5 181 M
(Table of Contents) s
5 104 M
(IAB Informational [Page 1]) s
_R
S
%%Page: (2) 2
%%BeginPageSetup
_S
24 24 translate
/pagenum 2 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( 1. Introduction) s
5 654 M
( 1.1. Document Organization) s
5 643 M
( 1.2. IAB Concerns) s
5 632 M
( 1.3. Contributions to this Document) s
5 621 M
( 2. History of Internet Research and Research Funding) s
5 610 M
( 2.1. Prior to 1980) s
5 599 M
( 2.2. 1980s and early 1990s) s
5 588 M
( 2.3. Mid-1990s to 2003) s
5 577 M
( 2.4. Current Status) s
5 566 M
( 3. Open Internet Research Topics) s
5 555 M
( 3.1. Scope and Limitations) s
5 544 M
( 3.2. Naming) s
5 533 M
( 3.2.1. Domain Name System \(DNS\)) s
5 522 M
( 3.2.2. New Namespaces) s
5 511 M
( 3.3. Routing) s
5 500 M
( 3.3.1. Inter-domain Routing) s
5 489 M
( 3.3.2. Routing Integrity) s
5 478 M
( 3.3.3. Routing Algorithms) s
5 467 M
( 3.3.4. Mobile and Ad-Hoc Routing) s
5 456 M
( 3.4. Security) s
5 445 M
( 3.4.1. Formal Methods) s
5 434 M
( 3.4.2. Key Management) s
5 423 M
( 3.4.3 Cryptography) s
5 412 M
( 3.4.4 Security for Distributed Computing) s
5 401 M
( 3.4.5. Deployment Considerations in Security) s
5 390 M
( 3.4.6. Denial of Service Protection) s
5 379 M
( 3.5. Network Management) s
5 368 M
( 3.5.1. Managing Networks, Not Devices) s
5 357 M
( 3.5.2. Enhanced Monitoring Capabilities) s
5 346 M
( 3.5.3. Customer Network Management) s
5 335 M
( 3.5.4. Autonomous Network Management) s
5 324 M
( 3.6. Quality of Service) s
5 313 M
( 3.6.1. Inter-Domain QoS Architecture) s
5 302 M
( 3.6.2. New Queuing Disciplines) s
5 291 M
( 3.7. Congestion control.) s
5 280 M
( 3.8. Studying the Evolution of the Internet Infrastructure) s
5 269 M
( 3.9. Middleboxes) s
5 258 M
( 3.10. Internet Measurement) s
5 247 M
( 3.11. Applications) s
5 236 M
( 3.12. Meeting the Needs of the Future) s
5 225 M
( 3.13. Freely Distributable Prototypes) s
5 214 M
( 3.14. Additional topics) s
5 203 M
( 4. Conclusions) s
5 192 M
( 5. Acknowledgements) s
5 181 M
( 6. Security Considerations) s
5 170 M
( 7. IANA Considerations) s
5 159 M
( 9. AUTHORS' ADDRESSES) s
5 104 M
(IAB Informational [Page 2]) s
_R
S
%%Page: (3) 3
%%BeginPageSetup
_S
24 24 translate
/pagenum 3 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(1. Introduction) s
5 643 M
( This document discusses the history of funding for Internet research,) s
5 632 M
( expresses concern about the current state of such funding, and) s
5 621 M
( outlines several specific areas that the IAB believes merit) s
5 610 M
( additional research. Current funding levels for Internet research) s
5 599 M
( are not generally adequate, and several important research areas are) s
5 588 M
( significantly underfunded. This situation needs to be rectified for) s
5 577 M
( the Internet to continue its evolution and development.) s
5 555 M
(1.1. Document Organization) s
5 533 M
( The first part of the document is a high-level discussion of the) s
5 522 M
( history of funding for Internet research to provide some historical) s
5 511 M
( context to this document. The early funding of Internet research was) s
5 500 M
( largely from the U.S. government, followed by a period in the second) s
5 489 M
( half of the 1990s of commercial funding and of funding from several) s
5 478 M
( governments. However, the commercial funding for Internet research) s
5 467 M
( has been reduced due to the recent economic downturn.) s
5 445 M
( The second part of the document provides an incomplete set of open) s
5 434 M
( Internet research topics. These are only examples, intended to) s
5 423 M
( illustrate the breadth of open research topics. This second section) s
5 412 M
( supports the general thesis that ongoing research is needed to) s
5 401 M
( further the evolution of the Internet infrastructure. This includes) s
5 390 M
( research on the medium-time-scale evolution of the Internet) s
5 379 M
( infrastructure as well as research on longer-time-scale grand) s
5 368 M
( challenges. This also includes many research issues that are already) s
5 357 M
( being actively investigated in the Internet research community.) s
5 335 M
( Areas that are discussed in this section include the following:) s
5 324 M
( naming, routing, security, network management, and transport. Issues) s
5 313 M
( that require more research also include more general architectural) s
5 302 M
( issues such as layering and communication between layers. In) s
5 291 M
( addition, general topics discussed in this section include modeling,) s
5 280 M
( measurement, simulation, test-beds, etc. We are focusing on topics) s
5 269 M
( that are related to the IETF and IRTF \(Internet Research Task Force\)) s
5 258 M
( agendas. \(E.g., Grid issues are not discussed in this document) s
5 247 M
( because they are addressed through the Global Grid Forum and other) s
5 236 M
( Grid-specific organizations, not in the IETF.\)) s
5 214 M
( Where possible, the examples in this document point to separate) s
5 203 M
( documents on these issues, and only give a high-level summary of the) s
5 192 M
( issues raised in those documents.) s
5 104 M
(IAB Informational [Page 3]) s
_R
S
%%Page: (4) 4
%%BeginPageSetup
_S
24 24 translate
/pagenum 4 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(1.2. IAB Concerns) s
5 643 M
( Recently, in the aftermath of September 11 2001, there seems to be a) s
5 632 M
( renewed interest by governments in funding research for Internet-) s
5 621 M
( related security issues. From [Jackson02]: "It is generally agreed) s
5 610 M
( that the security and reliability of the basic protocols underlying) s
5 599 M
( the Internet have not received enough attention because no one has a) s
5 588 M
( proprietary interest in them".) s
5 566 M
( That quote brings out a key issue in funding for Internet research,) s
5 555 M
( which is that because no single organization \(e.g., no single) s
5 544 M
( government, software company, equipment vendor, or network operator\)) s
5 533 M
( has a sense of ownership of the global Internet infrastructure,) s
5 522 M
( research on the general issues of the Internet infrastructure are) s
5 511 M
( often not adequately funded. In our current challenging economic) s
5 500 M
( climate, it is not surprising that commercial funding sources are) s
5 489 M
( more likely to fund that research that leads to a direct competitive) s
5 478 M
( advantage.) s
5 456 M
( The principal thesis of this document is that if commercial funding) s
5 445 M
( is the main source of funding for future Internet research, the) s
5 434 M
( future of the Internet infrastructure could be in trouble. In) s
5 423 M
( addition to issues about which projects were funded, the funding) s
5 412 M
( source can also affect the content of the research, for example,) s
5 401 M
( towards or against the development of open standards, or taking) s
5 390 M
( varying degrees of care about the effect of the developed protocols) s
5 379 M
( on the other traffic on the Internet.) s
5 357 M
( At the same time, many significant research contributions in) s
5 346 M
( networking have come from commercial funding. However, for most of) s
5 335 M
( the topics in this document, relying solely on commercially-funded) s
5 324 M
( research would not be adequate. Much of today's commercial funding) s
5 313 M
( is focused on technology transition, taking results from non-) s
5 302 M
( commercial research and putting them into shipping commercial) s
5 291 M
( products. We have not tried to delve into each of the research) s
5 280 M
( issues below to discuss, for each issue, what are the potentials and) s
5 269 M
( limitations of commercial funding for research in that area.) s
5 247 M
( On a more practical note, if there was no commercial funding for) s
5 236 M
( Internet research, then few research projects would be taken to) s
5 225 M
( completion with implementations, deployment, and follow-up) s
5 214 M
( evaluation.) s
5 192 M
( While it is theoretically possible for there to be too much funding) s
5 181 M
( for Internet research, that is far from the current problem. There) s
5 170 M
( is also much that could be done within the network research community) s
5 159 M
( to make Internet research more focused and productive, but that would) s
5 148 M
( belong in a separate document.) s
5 104 M
(IAB Informational [Page 4]) s
_R
S
%%Page: (5) 5
%%BeginPageSetup
_S
24 24 translate
/pagenum 5 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(1.3. Contributions to this Document) s
5 643 M
( A number of people have directly contributed text for this document,) s
5 632 M
( even though, following current conventions, the official RFC author) s
5 621 M
( list includes only the key editors of the document. The) s
5 610 M
( Acknowledgements section at the end of the document thanks other) s
5 599 M
( people who contributed to this document in some form.) s
5 577 M
(2. History of Internet Research and Research Funding) s
5 555 M
(2.1. Prior to 1980) s
5 533 M
( Most of the early research into packet-switched networks was) s
5 522 M
( sponsored by the U.S. Defense Advanced Research Projects Agency) s
5 511 M
( \(DARPA\) [CSTB99]. This includes the initial design, implementation,) s
5 500 M
( and deployment of the ARPAnet connecting several universities and) s
5 489 M
( other DARPA contractors. The ARPAnet originally came online in the) s
5 478 M
( late 1960s. It grew in size during the 1970s, still chiefly with) s
5 467 M
( DARPA funding, and demonstrated the utility of packet-switched) s
5 456 M
( networking.) s
5 434 M
( DARPA funding for Internet design started in 1973, just four years) s
5 423 M
( after the initial ARPAnet deployment. The support for Internet) s
5 412 M
( design was one result of prior DARPA funding for packet radio and) s
5 401 M
( packet satellite research. The existence of multiple networks) s
5 390 M
( \(ARPAnet, packet radio, and packet satellite\) drove the need for) s
5 379 M
( internetworking research. The Internet arose in large measure as a) s
5 368 M
( consequence of DARPA research funding for these three networks -- and) s
5 357 M
( arise only incidentally from the commercially-funded work at Xerox) s
5 346 M
( PARC on Ethernet.) s
5 324 M
(2.2. 1980s and early 1990s) s
5 302 M
( The ARPAnet converted to the Internet Protocol \(IP\) on January 1,) s
5 291 M
( 1983, approximately 20 years before this document was written.) s
5 280 M
( Throughout the 1980s, the U.S. Government continued strong research) s
5 269 M
( and development funding for Internet technology. DARPA continued to) s
5 258 M
( be the key funding source, but was supplemented by other DoD \(U.S.) s
5 247 M
( Department of Defense\) funding \(e.g., via the Defense Data Network) s
5 236 M
( \(DDN\) program of the Defense Communication Agency \(DCA\)\) and other) s
5 225 M
( U.S. Government funding \(e.g., U.S. Department of Energy \(DoE\)) s
5 214 M
( funding for research networks at DoE national laboratories, \(U.S.\)) s
5 203 M
( National Science Foundation \(NSF\) funding for academic institutions\).) s
5 192 M
( This funding included basic research, applied research \(including) s
5 181 M
( freely distributable prototypes\), the purchase of IP-capable) s
5 170 M
( products, and operating support for the IP-based government networks) s
5 159 M
( such as ARPAnet, ESnet, MILnet, the NASA Science Internet, and) s
5 148 M
( NSFnet.) s
5 104 M
(IAB Informational [Page 5]) s
_R
S
%%Page: (6) 6
%%BeginPageSetup
_S
24 24 translate
/pagenum 6 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( During the 1980s, the U.S. DoD desired to leave the business of) s
5 654 M
( providing operational network services to academic institutions, so) s
5 643 M
( funding for most academic activities moved over to the NSF during the) s
5 632 M
( decade. NSF's initial work included sponsorship of CSnet in 1981.) s
5 621 M
( By the 1986, NSF was also sponsoring various research projects into) s
5 610 M
( networking \(e.g., Mills' work on Fuzzballs\). In the late 1980s, NSF) s
5 599 M
( created the NSFnet backbone and sponsored the creation of several NSF) s
5 588 M
( regional networks \(e.g., SURAnet\) and interconnections with several) s
5 577 M
( international research networks. NSF also funded gigabit networking) s
5 566 M
( research, through the Corporation for National Research Initiatives) s
5 555 M
( \(CNRI\), starting in the late 1980s. It is important to note that the) s
5 544 M
( NSF sponsorship was focused on achieving core NSF goals, such as) s
5 533 M
( connecting scientists at leading universities to NSF supercomputing) s
5 522 M
( centers. The needs of high-performance remote access to) s
5 511 M
( supercomputers drove the overall NSFnet performance. As a side) s
5 500 M
( effect, this meant that students and faculty at those universities) s
5 489 M
( enjoyed a relatively high-performance Internet environment. As those) s
5 478 M
( students graduated, they drove both commercial use of the Internet) s
5 467 M
( and the nascent residential market. It is no accident that this was) s
5 456 M
( the environment from which the world wide web emerged.) s
5 434 M
( Most research funding outside the U.S. during the 1980s and early) s
5 423 M
( 1990s was focused on the ISO OSI networking project or on then-new) s
5 412 M
( forms of network media \(e.g., wireless, broadband access\). The) s
5 401 M
( European Union was a significant source of research funding for the) s
5 390 M
( networking community in Europe during this period. Some of the best) s
5 379 M
( early work in gigabit networking was undertaken in the UK and Sweden.) s
5 357 M
(2.3. Mid-1990s to 2003) s
5 335 M
( Starting in the middle 1990s, U.S. Government funding for Internet) s
5 324 M
( research and development was significantly reduced. The premise for) s
5 313 M
( this was that the growing Internet industry would pay for whatever) s
5 302 M
( research and development that was needed. Some funding for Internet) s
5 291 M
( research and development has continued in this period from European) s
5 280 M
( and Asian organizations \(e.g., the WIDE Project in Japan [WIDE]\).) s
5 269 M
( Reseaux IP Europeens [RIPE] is an example of market-funded networking) s
5 258 M
( research in Europe during this period.) s
5 236 M
( Experience during this period has been that commercial firms have) s
5 225 M
( often focused on donating equipment to academic institutions and) s
5 214 M
( promoting somewhat vocationally-focused educational projects. Many) s
5 203 M
( of the commercially-funded research and development projects appear) s
5 192 M
( to have been selected because they appeared likely to give the) s
5 181 M
( funding source a specific short-term economic advantage over its) s
5 170 M
( competitors. Higher risk, more innovative research proposals) s
5 159 M
( generally have not been funded by industry. A common view in Silicon) s
5 148 M
( Valley has been that established commercial firms are not very good) s
5 104 M
(IAB Informational [Page 6]) s
_R
S
%%Page: (7) 7
%%BeginPageSetup
_S
24 24 translate
/pagenum 7 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( at transitioning cutting edge research into products, but were) s
5 654 M
( instead good at buying small startup firms who had successfully) s
5 643 M
( transitioned such cutting edge research into products.) s
5 632 M
( Unfortunately, small startup companies are generally unable) s
5 621 M
( financially to fund any research themselves.) s
5 599 M
(2.4. Current Status) s
5 577 M
( The result of reduced U.S. Government funding and profit-focused,) s
5 566 M
( low-risk, short-term industry funding has been a decline in higher-) s
5 555 M
( risk but more innovative research activities. Industry has also been) s
5 544 M
( less interested in research to evolve the overall Internet) s
5 533 M
( architecture, because such work does not translate into a competitive) s
5 522 M
( advantage for the firm funding such work.) s
5 500 M
( The IAB believes that it would be helpful for governments and other) s
5 489 M
( non-commercial sponsors to increase their funding of both basic) s
5 478 M
( research and applied research relating to the Internet, and to) s
5 467 M
( sustain these funding levels going forward.) s
5 445 M
(3. Open Internet Research Topics) s
5 423 M
( This section primarily discusses some specific topics that the IAB) s
5 412 M
( believes merit additional research. Research, of course, includes) s
5 401 M
( not just devising a theory, algorithm, or mechanism to accomplish a) s
5 390 M
( goal, but also evaluating the general efficacy of the approach and) s
5 379 M
( then the benefits vs. the costs of deploying that algorithm or) s
5 368 M
( mechanism. Important cautionary notes about this discussion are) s
5 357 M
( given in the next sub-section. This particular set of topics is not) s
5 346 M
( intended to be comprehensive, but instead is intended to demonstrate) s
5 335 M
( the breadth of open Internet research questions.) s
5 313 M
( Other discussions of problems of the Internet that merit further) s
5 302 M
( research include the following: [CIPB02,Claffy03a,,NSF03a,NSF03b].) s
5 280 M
(3.1. Scope and Limitations) s
5 258 M
( This document is NOT intended as a guide for public funding agencies) s
5 247 M
( as to exactly which projects or proposals should or should not be) s
5 236 M
( funded.) s
5 214 M
( In particular, this document is NOT intended to be a comprehensive) s
5 203 M
( list of *all* of the research questions that are important to further) s
5 192 M
( the evolution of the Internet; that would be a daunting task, and) s
5 181 M
( would presuppose a wider and more intensive effort than we have) s
5 170 M
( undertaken in this document.) s
5 148 M
( Similarly, this document is not intended to list the research) s
5 104 M
(IAB Informational [Page 7]) s
_R
S
%%Page: (8) 8
%%BeginPageSetup
_S
24 24 translate
/pagenum 8 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( questions that are judged to be only of peripheral importance, or to) s
5 654 M
( survey the current \(global; governmental, commercial, and academic\)) s
5 643 M
( avenues for funding for Internet research, or to make specific) s
5 632 M
( recommendations about which areas need additional funding. The) s
5 621 M
( purpose of the document is to persuade the reader that ongoing) s
5 610 M
( research is needed towards the continued evolution of the Internet) s
5 599 M
( infrastructure; the purpose is not to make binding pronouncements) s
5 588 M
( about which specific areas are and are not worthy of future funding.) s
5 566 M
( For some research clearly relevant to the future evolution of the) s
5 555 M
( Internet, there are grand controversies between competing proposals) s
5 544 M
( or competing schools of thought; it is not the purpose of this) s
5 533 M
( document to take positions in these controversies, or to take) s
5 522 M
( positions on the nature of the solutions for areas needing further) s
5 511 M
( research.) s
5 489 M
( That all carefully noted, the remainder of this section discusses a) s
5 478 M
( broad set of research areas, noting a subset of particular topics of) s
5 467 M
( interest in each of those research areas. Again, this list is NOT) s
5 456 M
( comprehensive, but rather is intended to suggest that a broad range) s
5 445 M
( of ongoing research is needed, and to propose some candidate topics.) s
5 423 M
(3.1.1 Terminology) s
5 401 M
( Several places in this document refer to 'network operators'. By) s
5 390 M
( that term, we intend to include anyone or any organization that) s
5 379 M
( operates an IP-based network; we are not using that term in the) s
5 368 M
( narrow meaning of commercial network service providers.) s
5 346 M
(3.2. Naming) s
5 324 M
( The Internet currently has several different namespaces, including IP) s
5 313 M
( addresses, sockets \(specified by the IP address, upper-layer) s
5 302 M
( protocol, and upper-layer port number\), Autonomous System \(AS\)) s
5 291 M
( number, and the Fully-Qualified Domain Name \(FQDN\). Many of the) s
5 280 M
( Internet's namespaces are supported by the widely deployed Domain) s
5 269 M
( Name System [RFC-3467] or by various Internet applications [RFC-2407,) s
5 258 M
( Section 4.6.2.1]) s
5 236 M
(3.2.1. Domain Name System \(DNS\)) s
5 214 M
( The DNS system, while it works well given its current constraints,) s
5 203 M
( has several stress points.) s
5 181 M
( The current DNS system relies on UDP for transport, rather than SCTP) s
5 170 M
( or TCP. Given the very large number of clients using a typical DNS) s
5 159 M
( server, it is desirable to minimize the state on the DNS server side) s
5 148 M
( of the connection. UDP does this well, so is a reasonable choice,) s
5 104 M
(IAB Informational [Page 8]) s
_R
S
%%Page: (9) 9
%%BeginPageSetup
_S
24 24 translate
/pagenum 9 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( though this has other implications, for example a reliance on UDP) s
5 654 M
( fragmentation. With IPv6, intermediate fragmentation is not allowed) s
5 643 M
( and Path MTU Discovery is mandated. However, the amount of state) s
5 632 M
( required to deploy Path MTU Discovery for IPv6 on a DNS server might) s
5 621 M
( be a significant practical problem.) s
5 599 M
( One implication of this is that research into alternative transport) s
5 588 M
( protocols, designed more for DNS-like applications where there are) s
5 577 M
( very many clients using each server, might be useful. Of particular) s
5 566 M
( interest would be transport protocols with little burden for the DNS) s
5 555 M
( server, even if that increased the burden somewhat for the DNS) s
5 544 M
( client.) s
5 522 M
( Additional study of DNS caching, both currently available caching) s
5 511 M
( techniques and also of potential new caching techniques, might be) s
5 500 M
( helpful in finding ways to reduce the offered load for a typical DNS) s
5 489 M
( server. In particular, examination of DNS caching through typical) s
5 478 M
( commercial firewalls might be interesting if it lead to alternative) s
5 467 M
( firewall implementations that were less of an obstacle to DNS) s
5 456 M
( caching.) s
5 434 M
( The community lacks a widely-agreed-upon set of metrics for measuring) s
5 423 M
( DNS server performance. It would be helpful if people would) s
5 412 M
( seriously consider what characteristics of the DNS system should be) s
5 401 M
( measured.) s
5 379 M
( Some in the community would advocate replacing the current DNS system) s
5 368 M
( with something better. Past attempts to devise a better approach) s
5 357 M
( have not yielded results that persuaded the community to change.) s
5 346 M
( Proposed work in this are could be very useful, but might require) s
5 335 M
( careful scrutiny to avoid falling into historic design pitfalls.) s
5 313 M
( With regards to DNS security, major technical concerns include) s
5 302 M
( finding practical methods for signing very large DNS zones \(e.g.,) s
5 291 M
( .COM\), practical methods for incremental deployment of DNS security,) s
5 280 M
( and tools to make it easier to manage secure DNS infrastructure.) s
5 258 M
( Most users are unable to distinguish a DNS-related failure from a) s
5 247 M
( more general network failure. Hence, maintaining the integrity and) s
5 236 M
( availability of the Domain Name System is very important for the) s
5 225 M
( future health of the Internet.) s
5 203 M
(3.2.2. New Namespaces) s
5 181 M
( Additionally, the Namespace Research Group \(NSRG\) of the Internet) s
5 170 M
( Research Task Force \(IRTF\) studied adding one or more additional) s
5 159 M
( namespaces to the Internet Architecture [LD2002]. Many members of the) s
5 148 M
( IRTF NSRG believe that there would be significant architectural) s
5 104 M
(IAB Informational [Page 9]) s
_R
S
%%Page: (10) 10
%%BeginPageSetup
_S
24 24 translate
/pagenum 10 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( benefit to adding one or more additional namespaces to the Internet) s
5 654 M
( Architecture. Because smooth consensus on that question or on the) s
5 643 M
( properties of a new namespace was not obtained, the IRTF NSRG did not) s
5 632 M
( make a formal recommendation to the IETF community regarding) s
5 621 M
( namespaces. The IAB believes that this is an open research question) s
5 610 M
( worth examining further.) s
5 588 M
( Finally, we believe that future research into the evolution of) s
5 577 M
( Internet-based distributed computing might well benefit from studying) s
5 566 M
( adding additional namespaces as part of a new approach to distributed) s
5 555 M
( computing.) s
5 533 M
(3.3. Routing) s
5 511 M
( The currently deployed unicast routing system works reasonably well) s
5 500 M
( for most users. However, the current unicast routing architecture is) s
5 489 M
( suboptimal in several areas, including the following: end-to-end) s
5 478 M
( convergence times in global-scale catenets \(a system of networks) s
5 467 M
( interconnected via gateways\); the ability of the existing inter-) s
5 456 M
( domain path-vector algorithm to scale well beyond 200K prefixes; the) s
5 445 M
( ability of both intra-domain and inter-domain routing to use multiple) s
5 434 M
( metrics and multiple kinds of metrics concurrently; and the ability) s
5 423 M
( of IPv4 and IPv6 to support widespread site multi-homing without) s
5 412 M
( undue adverse impact on the inter-domain routing system. Integrating) s
5 401 M
( policy into routing is also a general concern, both for intra-domain) s
5 390 M
( and inter-domain routing. In many cases, routing policy is directly) s
5 379 M
( tied to economic issues for the network operators, so applied) s
5 368 M
( research into routing ideally would consider economic considerations) s
5 357 M
( as well as technical considerations.) s
5 335 M
( This is an issue for which the commercial interest is clear, but that) s
5 324 M
( seems unlikely to be solved through commercial funding for research,) s
5 313 M
( in the absence of a consortium of some type.) s
5 291 M
(3.3.1. Inter-domain Routing) s
5 269 M
( The current operational inter-domain routing system has between) s
5 258 M
( 150,000 and 200,000 routing prefixes in the default-free zone \(DFZ\)) s
5 247 M
( [RFC-3221]. ASIC technology obviates concerns about the ability to) s
5 236 M
( forward packets at very high speeds. ASIC technology also obviates) s
5 225 M
( concerns about the time required to perform longest-prefix-match) s
5 214 M
( computations. However, some senior members of the Internet routing) s
5 203 M
( community have concerns that the end-to-end convergence properties of) s
5 192 M
( the global Internet might hit fundamental algorithmic limitations) s
5 181 M
( \(i.e. not hardware limitations\) when the DFZ is somewhere between) s
5 170 M
( 200,000 and 300,000 prefixes. Research into whether this concern is) s
5 159 M
( well-founded in scientific terms seems very timely.) s
5 104 M
(IAB Informational [Page 10]) s
_R
S
%%Page: (11) 11
%%BeginPageSetup
_S
24 24 translate
/pagenum 11 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( Separately from the above concern, recent work has shown that there) s
5 654 M
( can be significant BGP convergence issues today. At present, it) s
5 643 M
( appears that the currently observed convergence issues relate to how) s
5 632 M
( BGP has been configured by network operators, rather than being any) s
5 621 M
( sort of fundamental algorithmic limitation [MGVK02]. This convergence) s
5 610 M
( time issue makes the duration of the apparent network outage much) s
5 599 M
( longer than it should be. Additional applied research into which) s
5 588 M
( aspects of a BGP configuration have the strongest impact on) s
5 577 M
( convergence times would help mitigate the currently observed) s
5 566 M
( operational issues.) s
5 544 M
( Also, inter-domain routing currently requires significant human) s
5 533 M
( engineering of specific inter-AS paths to ensure that reasonably) s
5 522 M
( optimal paths are used by actual traffic. Ideally, the inter-domain) s
5 511 M
( routing system would automatically cause reasonably optimal paths to) s
5 500 M
( be chosen. Recent work indicates that improved BGP policy mechanisms) s
5 489 M
( might help ensure that reasonably optimal paths are normally used for) s
5 478 M
( inter-domain IP traffic. [SMA03] Continued applied research in this) s
5 467 M
( area might lead to substantially better technical approaches.) s
5 445 M
( The current approach to site multi-homing has the highly undesirable) s
5 434 M
( side-effect of significantly increasing the growth rate of prefix) s
5 423 M
( entries in the DFZ \(by impairing the deployment of prefix) s
5 412 M
( aggregation\). Research is needed into new routing architectures that) s
5 401 M
( can support large-scale site multi-homing without the undesirable) s
5 390 M
( impacts on inter-domain routing of the current multi-homing) s
5 379 M
( technique.) s
5 357 M
( The original application for BGP was in inter-domain routing,) s
5 346 M
( primarily within service provider networks but also with some use by) s
5 335 M
( multi-homed sites. However, some are now trying to use BGP in other) s
5 324 M
( contexts, for example highly mobile environments, where it is less) s
5 313 M
( obviously well suited. Research into inter-domain routing and/or) s
5 302 M
( intra-domain policy routing might lead to other approaches for any) s
5 291 M
( emerging environments where the current BGP approach is not the) s
5 280 M
( optimal one.) s
5 258 M
(3.3.2. Routing Integrity) s
5 236 M
( Recently there has been increased awareness of the longstanding issue) s
5 225 M
( of deploying strong authentication into the Internet inter-domain) s
5 214 M
( routing system. Currently deployed mechanisms \(e.g., BGP TCP MD5) s
5 203 M
( [RFC2385], OSPF MD5, RIP MD5 [RFC2082]\) provide cryptographic) s
5 192 M
( authentication of routing protocol messages, but no authentication of) s
5 181 M
( the actual routing data. Recent proposals \(e.g., S-BGP [KLMS2000]\)) s
5 170 M
( for improving this in inter-domain routing appear difficult to deploy) s
5 159 M
( across the Internet, in part because of their reliance on a single) s
5 148 M
( trust hierarchy \(e.g., a single PKI\). Similar proposals \(e.g., OSPF) s
5 104 M
(IAB Informational [Page 11]) s
_R
S
%%Page: (12) 12
%%BeginPageSetup
_S
24 24 translate
/pagenum 12 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( with Digital Signatures, [RFC2154]\) for intra-domain routing are) s
5 654 M
( argued to be computationally infeasible to deploy in a large network.) s
5 632 M
( A recurring challenge with any form of inter-domain routing) s
5 621 M
( authentication is that there is no single completely accurate source) s
5 610 M
( of truth about which organizations have the authority to advertise) s
5 599 M
( which address blocks. Alternative approaches to authentication of) s
5 588 M
( data in the routing system need to be developed. In particular, the) s
5 577 M
( ability to perform partial authentication of routing data would) s
5 566 M
( facilitate incremental deployment of routing authentication) s
5 555 M
( mechanisms. Also, the ability to use non-hierarchical trust models) s
5 544 M
( \(e.g., the web of trust used in the PGP application\) might facilitate) s
5 533 M
( incremental deployment and might resolve existing concerns about) s
5 522 M
( centralized administration of the routing system, hence merits) s
5 511 M
( additional study and consideration.) s
5 489 M
(3.3.3. Routing Algorithms) s
5 467 M
( The current Internet routing system relies primarily on two) s
5 456 M
( algorithms. Link-state routing uses the Dijkstra algorithm) s
5 445 M
( [Dijkstra59]. Distance-Vector routing \(e.g., RIP\) and Path-Vector) s
5 434 M
( routing \(e.g., BGP\) use the Bellman-Ford algorithm [Bellman1957,) s
5 423 M
( FF1962]. Additional ongoing basic research into graph theory as) s
5 412 M
( applied to routing is worthwhile and might yield algorithms that) s
5 401 M
( would enable a new routing architecture or otherwise provide) s
5 390 M
( improvements to the routing system.) s
5 368 M
( Currently deployed multicast routing relies on the Deering RPF) s
5 357 M
( algorithm [Deering1988]. Ongoing research into alternative multicast) s
5 346 M
( routing algorithms and protocols might help alleviate current) s
5 335 M
( concerns with the scalability of multicast routing.) s
5 313 M
( The deployed Internet routing system assumes that the shortest path) s
5 302 M
( is always the best path. This is provably false, however it is a) s
5 291 M
( reasonable compromise given the routing protocols currently) s
5 280 M
( available. The Internet lacks deployable approaches for policy-based) s
5 269 M
( routing or routing with alternative metrics \(i.e. some metric other) s
5 258 M
( than the number of hops to the destination\). Examples of alternative) s
5 247 M
( policies include: the path with lowest monetary cost; the path with) s
5 236 M
( the lowest probability of packet loss; the path with minimized) s
5 225 M
( jitter; and the path with minimized latency. Policy metrics also) s
5 214 M
( need to take business relationships into account. Historic work on) s
5 203 M
( QoS-based routing has tended to be unsuccessful in part because it) s
5 192 M
( did not adequately consider economic and commercial considerations of) s
5 181 M
( the routing system and in part because of inadequate consideration of) s
5 170 M
( security implications.) s
5 148 M
( Transitioning from the current inter-domain routing system to any new) s
5 104 M
(IAB Informational [Page 12]) s
_R
S
%%Page: (13) 13
%%BeginPageSetup
_S
24 24 translate
/pagenum 13 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( inter-domain routing system is unlikely to be a trivial exercise. So) s
5 654 M
( any proposal for a new routing system needs to carefully consider and) s
5 643 M
( document deployment strategies, transition mechanisms, and other) s
5 632 M
( operational considerations. Because of the cross-domain) s
5 621 M
( interoperability aspect of inter-domain routing, smooth transitions) s
5 610 M
( from one inter-domain routing system are likely to be difficult to) s
5 599 M
( accomplish. Separately, the inter-domain routing system lacks strong) s
5 588 M
( market forces that would encourage migration to better technical) s
5 577 M
( approaches. Hence, it appears unlikely that the commercial sector) s
5 566 M
( will be the source of a significantly improved inter-domain routing) s
5 555 M
( system.) s
5 533 M
(3.3.4. Mobile and Ad-Hoc Routing) s
5 511 M
( While some of the earliest DARPA-sponsored networking research) s
5 500 M
( involved packet radio networks, mobile routing [IM1993] and mobile) s
5 489 M
( ad-hoc routing [RFC2501] are relatively recent arrivals in the) s
5 478 M
( Internet, and are not yet widely deployed. The current approaches) s
5 467 M
( are not the last word in either of those arenas. We believe that) s
5 456 M
( additional research into routing support for mobile hosts and mobile) s
5 445 M
( networks is needed. Additional research for ad-hoc mobile hosts and) s
5 434 M
( mobile networks is also worthwhile. Ideally, mobile routing and) s
5 423 M
( mobile ad-hoc routing capabilities should be native inherent) s
5 412 M
( capabilities of the Internet routing architecture. This probably) s
5 401 M
( will require a significant evolution from the existing Internet) s
5 390 M
( routing architecture. \(NB: The term "mobility" as used here is not) s
5 379 M
( limited to mobile telephones, but instead is very broadly defined,) s
5 368 M
( including laptops that people carry, cars/trains/aircraft, and so) s
5 357 M
( forth.\)) s
5 335 M
( Included in this topic are a wide variety of issues. The more) s
5 324 M
( distributed and dynamic nature of partially or completely self-) s
5 313 M
( organizing routing systems \(including the associated end nodes\)) s
5 302 M
( creates unique security challenges \(especially relating to) s
5 291 M
( Authorization, Authentication and Accounting, and relating to key) s
5 280 M
( management\). Scalability of wireless networks can be difficult to) s
5 269 M
( measure or to achieve. Enforced hierarchy is one approach, but can) s
5 258 M
( be very limiting. Alternative, less constraining approaches to) s
5 247 M
( wireless scalability are desired. Because wireless link-layer) s
5 236 M
( protocols usually have some knowledge of current link characteristics) s
5 225 M
( such as link quality, sublayer congestion conditions, or transient) s
5 214 M
( channel behavior, it is desirable to find ways to let network-layer) s
5 203 M
( routing use such data. This raises architectural questions of what) s
5 192 M
( the proper layering should be, which functions should be in which) s
5 181 M
( layer, and also practical considerations of how and when such) s
5 170 M
( information sharing should occur in real implementations.) s
5 104 M
(IAB Informational [Page 13]) s
_R
S
%%Page: (14) 14
%%BeginPageSetup
_S
24 24 translate
/pagenum 14 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(3.4. Security) s
5 643 M
( The Internet has a reputation for not having sufficient security. In) s
5 632 M
( fact, the Internet has a number of security mechanisms standardized,) s
5 621 M
( some of which are widely deployed. However, there are a number of) s
5 610 M
( open research questions relating to Internet security. In) s
5 599 M
( particular, security mechanisms need to be incrementally deployable) s
5 588 M
( and easy to use. "[Security] technology must be easy to use, or it) s
5 577 M
( will not be configured correctly. If mis-configured, security will) s
5 566 M
( be lost, but things will `work'" [Schiller03].) s
5 544 M
(3.4.1. Formal Methods) s
5 522 M
( There is an ongoing need for funding of basic research relating to) s
5 511 M
( Internet security, including funding of formal methods research that) s
5 500 M
( relates to security algorithms, protocols, and systems.) s
5 478 M
( For example, it would be beneficial to have more formal study of non-) s
5 467 M
( hierarchical trust models \(e.g., PGP's Web-of-Trust model\). Use of a) s
5 456 M
( hierarchical trust model can create significant limitations in how) s
5 445 M
( one might approach securing components of the Internet, for example) s
5 434 M
( the inter-domain routing system. So research to develop new trust) s
5 423 M
( models suited for the Internet or on the applicability of existing) s
5 412 M
( non-hierarchical trust models to existing Internet problems would be) s
5 401 M
( worthwhile.) s
5 379 M
( While there has been some work on the application of formal methods) s
5 368 M
( to cryptographic algorithms and cryptographic protocols, existing) s
5 357 M
( techniques for formal evaluation of algorithms and protocols lack) s
5 346 M
( sufficient automation. This lack of automation means that many) s
5 335 M
( protocols aren't formally evaluated in a timely manner. This is) s
5 324 M
( problematic for the Internet because formal evaluation has often) s
5 313 M
( uncovered serious anomalies in cryptographic protocols. The creation) s
5 302 M
( of automated tools for applying formal methods to cryptographic) s
5 291 M
( algorithms and/or protocols would be very helpful.) s
5 269 M
(3.4.2. Key Management) s
5 247 M
( A recurring challenge to the Internet community is how to design,) s
5 236 M
( implement, and deploy key management appropriate to the myriad) s
5 225 M
( security contexts existing in the global Internet. Most current work) s
5 214 M
( in unicast key management has focused on hierarchical trust models,) s
5 203 M
( because much of the existing work has been driven by corporate or) s
5 192 M
( military "top-down" operating models.) s
5 170 M
( The paucity of key management methods applicable to non-hierarchical) s
5 159 M
( trust models \(see above\) is a significant constraint on the) s
5 148 M
( approaches that might be taken to secure components of the Internet.) s
5 104 M
(IAB Informational [Page 14]) s
_R
S
%%Page: (15) 15
%%BeginPageSetup
_S
24 24 translate
/pagenum 15 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( Research focused on removing those constraints by developing) s
5 654 M
( practical key management methods applicable to non-hierarchical trust) s
5 643 M
( models would be very helpful.) s
5 621 M
( Topics worthy of additional research include key management) s
5 610 M
( techniques, such as non-hierarchical key management architectures) s
5 599 M
( \(e.g., to support non-hierarchical trust models; see above\), that are) s
5 588 M
( useful by ad-hoc groups in mobile networks and/or distributed) s
5 577 M
( computing.) s
5 555 M
( Although some progress has been made in recent years, scalable) s
5 544 M
( multicast key management is far from being a solved problem.) s
5 533 M
( Existing approaches to scalable multicast key management add) s
5 522 M
( significant constraints on the problem scope in order to come up with) s
5 511 M
( a deployable technical solution. Having a more general approach to) s
5 500 M
( scalable multicast key management \(i.e. one having broader) s
5 489 M
( applicability and fewer constraints\) would enhance the Internet's) s
5 478 M
( capabilities.) s
5 456 M
( In many cases, attribute negotiation is an important capability of a) s
5 445 M
( key management protocol. Experience with the Internet Key Exchange) s
5 434 M
( \(IKE\) to date has been that it is unduly complex. Much of IKE's) s
5 423 M
( complexity derives from its very general attribute negotiation) s
5 412 M
( capabilities. A new key management approach that supported) s
5 401 M
( significant attribute negotiation without creating challenging levels) s
5 390 M
( of deployment and operations complexity would be helpful.) s
5 368 M
(3.4.3 Cryptography) s
5 346 M
( There is an ongoing need to continue the open-world research funding) s
5 335 M
( into both cryptography and cryptanalysis. Most governments focus) s
5 324 M
( their cryptographic research in the military-sector. While this is) s
5 313 M
( understandable, those efforts often have limited \(or no\) publications) s
5 302 M
( in the open literature. Since the Internet engineering community) s
5 291 M
( must work from the open literature, it is important that open-world) s
5 280 M
( research continues in the future.) s
5 258 M
(3.4.4 Security for Distributed Computing) s
5 236 M
( MIT's Project Athena was an important and broadly successful research) s
5 225 M
( project into distributed computing. Project Athena developed the) s
5 214 M
( Kerberos [RFC-1510] security system, which has significant deployment) s
5 203 M
( today in campus environments. However, inter-realm Kerberos is) s
5 192 M
( neither as widely deployed nor perceived as widely successful as) s
5 181 M
( single-realm Kerberos. The need for scalable inter-domain user) s
5 170 M
( authentication is increasingly acute as ad-hoc computing and mobile) s
5 159 M
( computing become more widely deployed. Thus, work on scalable) s
5 148 M
( mechanisms for mobile, ad-hoc, and non-hierarchical inter-domain) s
5 104 M
(IAB Informational [Page 15]) s
_R
S
%%Page: (16) 16
%%BeginPageSetup
_S
24 24 translate
/pagenum 16 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( authentication would be very helpful.) s
5 643 M
(3.4.5. Deployment Considerations in Security) s
5 621 M
( Lots of work has been done on theoretically perfect security that is) s
5 610 M
( impossible to deploy. Unfortunately, the S-BGP proposal is an) s
5 599 M
( example of a good research product that has significant unresolved) s
5 588 M
( deployment challenges. It is far from obvious how one could widely) s
5 577 M
( deploy S-BGP without previously deploying a large-scale inter-domain) s
5 566 M
( public-key infrastructure and also centralizing route advertisement) s
5 555 M
( policy enforcement in the Routing Information Registries or some) s
5 544 M
( similar body. Historically, public-key infrastructures have been) s
5 533 M
( either very difficult or impossible to deploy at large scale.) s
5 522 M
( Security mechanisms that need additional infrastructure have not been) s
5 511 M
( deployed well. We desperately need security that is general, easy to) s
5 500 M
( install, and easy to manage.) s
5 478 M
(3.4.6. Denial of Service Protection) s
5 456 M
( Historically, the Internet community has mostly ignored pure Denial) s
5 445 M
( of Service \(DoS\) attacks. This was appropriate at one time since) s
5 434 M
( such attacks were rare and are hard to defend against. However, one) s
5 423 M
( of the recent trends in adversarial software \(e.g., viruses, worms\)) s
5 412 M
( has been the incorporation of features that turn the infected host) s
5 401 M
( into a "zombie". Such zombies can be remotely controlled to mount a) s
5 390 M
( distributed denial of service attack on some victim machine. In many) s
5 379 M
( cases, the authorized operators of systems are not aware that some or) s
5 368 M
( all of their systems have become zombies. It appears that the) s
5 357 M
( presence of non-trivial numbers of zombies in the global Internet is) s
5 346 M
( now endemic, which makes distributed denial of service attacks a much) s
5 335 M
( larger concern. So Internet threat models need to assume the) s
5 324 M
( presence of such zombies in significant numbers. This makes the) s
5 313 M
( design of protocols resilient in the presence of distributed denial) s
5 302 M
( of service attacks very important to the health of the Internet.) s
5 291 M
( Some work has been done on this front [Savage00], [MBFIPS01], but) s
5 280 M
( more is needed.) s
5 258 M
(3.5. Network Management) s
5 236 M
( The Internet had early success in network device monitoring with the) s
5 225 M
( Simple Network Management Protocol \(SNMP\) and its associated) s
5 214 M
( Management Information Base \(MIB\). There has been comparatively less) s
5 203 M
( success in managing networks, in contrast to the monitoring of) s
5 192 M
( individual devices. Furthermore, there are a number of operator) s
5 181 M
( requirements not well supported by the current Internet management) s
5 170 M
( framework. It is desirable to enhance the current Internet network) s
5 159 M
( management architecture to more fully support operational needs.) s
5 104 M
(IAB Informational [Page 16]) s
_R
S
%%Page: (17) 17
%%BeginPageSetup
_S
24 24 translate
/pagenum 17 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( Unfortunately, network management research has historically been very) s
5 654 M
( underfunded. Operators have complained that existing solutions are) s
5 643 M
( inadequate. Research is needed to find better solutions.) s
5 621 M
(3.5.1. Managing Networks, Not Devices) s
5 599 M
( At present there are few or no good tools for managing a whole) s
5 588 M
( network instead of isolated devices. For example, the lack of) s
5 577 M
( appropriate network management tools has been cited as one of the) s
5 566 M
( major barriers to the widespread deployment of IP multicast [Diot00,) s
5 555 M
( SM03]. Current network management protocols, such as the Simple) s
5 544 M
( Network Management Protocol \(SNMP\), are fine for reading status of) s
5 533 M
( well-defined objects from individual boxes. Managing networks) s
5 522 M
( instead of isolated devices requires the ability to view the network) s
5 511 M
( as a large distributed system. Research is needed on scalable) s
5 500 M
( distributed data aggregation mechanisms, scalable distributed event) s
5 489 M
( correlation mechanisms, and distributed and dependable control) s
5 478 M
( mechanisms.) s
5 456 M
( Applied research into methods of managing sets of networked devices) s
5 445 M
( seems worthwhile. Ideally, such a management approach would support) s
5 434 M
( distributed management, rather than being strictly centralized.) s
5 412 M
(3.5.2. Enhanced Monitoring Capabilities) s
5 390 M
( SNMP does not always scale well to monitoring large numbers of) s
5 379 M
( objects in many devices in different parts of the network. An) s
5 368 M
( alternative approach worth exploring is how to provide scalable and) s
5 357 M
( distributed monitoring, not on individual devices, but instead on) s
5 346 M
( groups of devices and the network-as-a-whole. This requires scalable) s
5 335 M
( techniques for data aggregation and event correlation of network) s
5 324 M
( status data originating from numerous locations in the network.) s
5 302 M
(3.5.3. Customer Network Management) s
5 280 M
( An open issue related to network management is helping users and) s
5 269 M
( others to identify and resolve problems in the network. If a user) s
5 258 M
( can't access a web page, it would be useful if the user could find) s
5 247 M
( out, easily, without having to run ping and traceroute, whether the) s
5 236 M
( problem was that the web server was down, that the network was) s
5 225 M
( partitioned due to a link failure, that there was heavy congestion) s
5 214 M
( along the path, that the DNS name couldn't be resolved, that the) s
5 203 M
( firewall prohibited the access, or that some other specific event) s
5 192 M
( occurred.) s
5 104 M
(IAB Informational [Page 17]) s
_R
S
%%Page: (18) 18
%%BeginPageSetup
_S
24 24 translate
/pagenum 18 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(3.5.4. Autonomous Network Management) s
5 643 M
( More research is needed to improve the degree of automation achieved) s
5 632 M
( by network management systems and to localize management. Autonomous) s
5 621 M
( network management might involve the application of control theory,) s
5 610 M
( artificial intelligence or expert system technologies to network) s
5 599 M
( management problems.) s
5 566 M
(3.6. Quality of Service) s
5 544 M
( There has been an intensive body of research and development work on) s
5 533 M
( adding QoS to the Internet architecture for more than ten years now) s
5 522 M
( [RFC-1633, RFC-2474, RFC-3260, RFC-2205, RFC-2210], yet we still) s
5 511 M
( don't have end-to-end QoS in the Internet [RFC-2990, RFC-3387]. The) s
5 500 M
( IETF is good at defining individual QoS mechanisms, but poor at work) s
5 489 M
( on deployable QoS architectures. Thus, while Differentiated Services) s
5 478 M
( \(DiffServ\) mechanisms have been standardized as per-hop behaviors,) s
5 467 M
( there is still much to be learned about the deployment of that or) s
5 456 M
( other QoS mechanisms for end-to-end QoS. In addition to work on) s
5 445 M
( purely technical issues, this includes close attention to the) s
5 434 M
( economic models and deployment strategies that would enable an) s
5 423 M
( increased deployment of QoS in the network.) s
5 401 M
( In many cases, deployment of QoS mechanisms would significantly) s
5 390 M
( increase operational security risks [RFC-2990], so any new research) s
5 379 M
( on QoS mechanisms or architectures ought to specifically discuss the) s
5 368 M
( potential security issues associated with the new proposal\(s\) and how) s
5 357 M
( to mitigate those security issues.) s
5 335 M
( In some cases, the demand for QoS mechanisms has been diminished by) s
5 324 M
( the development of more resilient voice/video coding techniques that) s
5 313 M
( are better suited for the best-effort Internet than the older coding) s
5 302 M
( techniques that were originally designed for circuit-switched) s
5 291 M
( networks.) s
5 269 M
( One of the factors that has blunted the demand for QoS has been the) s
5 258 M
( transition of the Internet infrastructure from heavy congestion in) s
5 247 M
( the early 1990s, to overprovisioning in backbones and in many) s
5 236 M
( international links now. Thus, research in QoS mechanisms also has) s
5 225 M
( to include some careful attention to the relative costs and benefits) s
5 214 M
( of QoS in different places in the network. Applied research into QoS) s
5 203 M
( should include explicit consideration of economic issues of deploying) s
5 192 M
( and operating a QoS-enabled IP network [Clark02].) s
5 104 M
(IAB Informational [Page 18]) s
_R
S
%%Page: (19) 19
%%BeginPageSetup
_S
24 24 translate
/pagenum 19 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(3.6.1. Inter-Domain QoS Architecture) s
5 643 M
( Typically, a router in the deployed inter-domain Internet provides) s
5 632 M
( best-effort forwarding of IP packets, without regard for whether the) s
5 621 M
( source or destination of the packet is a direct customer of the) s
5 610 M
( operator of the router. This property is a significant contributor) s
5 599 M
( to the current scalability of the global Internet and contributes to) s
5 588 M
( the difficulty of deploying inter-domain Quality of Service \(QoS\)) s
5 577 M
( mechanisms.) s
5 555 M
( Deploying existing Quality-of-Service \(QoS\) mechanisms, for example) s
5 544 M
( Differentiated Services or Integrated Services, across an inter-) s
5 533 M
( domain boundary creates a significant and easily exploited denial-of-) s
5 522 M
( service vulnerability for any network that provides inter-domain QoS) s
5 511 M
( support. This has caused network operators to refrain from) s
5 500 M
( supporting inter-domain QoS. The Internet would benefit from) s
5 489 M
( additional research into alternative approaches to QoS, particularly) s
5 478 M
( into approaches that do not create such vulnerabilities and can be) s
5 467 M
( deployed end-to-end [RFC-2990].) s
5 445 M
( Also, current business models are not consistent with inter-domain) s
5 434 M
( QoS, in large part because it is impractical or impossible to) s
5 423 M
( authenticate the identity of the sender of would-be preferred traffic) s
5 412 M
( while still forwarding traffic at line-rate. Absent such an ability,) s
5 401 M
( it is unclear how a network operator could bill or otherwise recover) s
5 390 M
( costs associated with providing that preferred service. So any new) s
5 379 M
( work on inter-domain QoS mechanisms and architectures needs to) s
5 368 M
( carefully consider the economic and security implications of such) s
5 357 M
( proposals.) s
5 335 M
(3.6.2. New Queuing Disciplines) s
5 313 M
( The overall Quality-of-Service for traffic is in part determined by) s
5 302 M
( the scheduling and queue management mechanisms at the routers. While) s
5 291 M
( there are a number of existing mechanisms \(e.g., RED\) that work well,) s
5 280 M
( it is possible that improved active queuing strategies might be) s
5 269 M
( devised. Mechanisms that lowered the implementation cost in IP) s
5 258 M
( routers might help increase deployment of active queue management,) s
5 247 M
( for example.) s
5 225 M
(3.7. Congestion control.) s
5 203 M
( TCP's congestion avoidance and control mechanisms, from 1988) s
5 192 M
( [Jacobson88], have been a key factor in maintaining the stability of) s
5 181 M
( the Internet, and are used by the bulk of the Internet's traffic.) s
5 170 M
( However, the congestion control mechanisms of the Internet need to be) s
5 159 M
( expanded and modified to meet a wide range of new requirements, from) s
5 148 M
( new applications such as streaming media and multicast to new) s
5 104 M
(IAB Informational [Page 19]) s
_R
S
%%Page: (20) 20
%%BeginPageSetup
_S
24 24 translate
/pagenum 20 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( environments such as wireless networks or very high bandwidth paths,) s
5 654 M
( and new requirements for minimizing queueing delay. While there are) s
5 643 M
( significant bodies of work in several of these issues, considerably) s
5 632 M
( more needs to be done.) s
5 610 M
( We would note that research on TCP congestion control is also not yet) s
5 599 M
( "done", with much still to be accomplished in high-speed TCP, or in) s
5 588 M
( adding robust performance over paths with significant reordering,) s
5 577 M
( intermittent connectivity, non-congestive packet loss, and the like.) s
5 555 M
( Several of these issues bring up difficult fundamental questions) s
5 544 M
( about the potential costs and benefits of increased communication) s
5 533 M
( between layers. Would it help transport to receive hints or other) s
5 522 M
( information from routing, from link layers, or from other transport-) s
5 511 M
( level connections? If so, what would be the cost to robust operation) s
5 500 M
( across diverse environments?) s
5 478 M
( For congestion control mechanisms in routers, active queue management) s
5 467 M
( and Explicit Congestion Notification are generally not yet deployed,) s
5 456 M
( and there are a range of proposals, in various states of maturity, in) s
5 445 M
( this area. At the same time, there is a great deal that we still do) s
5 434 M
( not understand about the interactions of queue management mechanisms) s
5 423 M
( with other factors in the network. Router-based congestion control) s
5 412 M
( mechanisms are also needed for detecting and responding to aggregate) s
5 401 M
( congestion such as in Distributed Denial of Service attacks and flash) s
5 390 M
( crowds.) s
5 368 M
( As more applications have the need to transfer very large files over) s
5 357 M
( high delay-bandwidth-product paths, the stresses on current) s
5 346 M
( congestion control mechanisms raise the question of whether we need) s
5 335 M
( more fine-grained feedback from routers. This includes the challenge) s
5 324 M
( of allowing connections to avoid the delays of slow-start, and to) s
5 313 M
( rapidly make use of newly-available bandwidth. On a more general) s
5 302 M
( level, we don't understand the potential and limitations for best-) s
5 291 M
( effort traffic over high delay-bandwidth-product paths, given the) s
5 280 M
( current feedback from routers, or the range of possibilities for more) s
5 269 M
( explicit feedback from routers.) s
5 247 M
( There is also a need for long-term research in congestion control) s
5 236 M
( that is separate from specific functional requirements like the ones) s
5 225 M
( listed above. We know very little about congestion control dynamics) s
5 214 M
( or traffic dynamics of a large, complex network like the global) s
5 203 M
( Internet, with its heterogeneous and changing traffic mixes, link-) s
5 192 M
( level technologies, network protocols and router mechanisms, patterns) s
5 181 M
( of congestion, pricing models, and the like. Expanding our knowledge) s
5 170 M
( in this area seems likely to require a rich mix of measurement,) s
5 159 M
( analysis, simulations, and experimentation.) s
5 104 M
(IAB Informational [Page 20]) s
_R
S
%%Page: (21) 21
%%BeginPageSetup
_S
24 24 translate
/pagenum 21 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
(3.8. Studying the Evolution of the Internet Infrastructure) s
5 643 M
( The evolution of the Internet infrastructure has been frustratingly) s
5 632 M
( slow and difficult, with long stories about the difficulties in) s
5 621 M
( adding IPv6, QoS, multicast, and other functionality to the Internet.) s
5 610 M
( We need a more scientific understanding of the evolutionary) s
5 599 M
( potentials and evolutionary difficulties of the Internet) s
5 588 M
( infrastructure.) s
5 566 M
( This evolutionary potential is affected not only by the technical) s
5 555 M
( issues of the layered IP architecture, but by other factors as well.) s
5 544 M
( These factors include the changes in the environment over time \(e.g.,) s
5 533 M
( the recent overprovisioning of backbones, the deployment of) s
5 522 M
( firewalls\), and the role of the standardization process. Economic) s
5 511 M
( and public policy factors are also critical, including the central) s
5 500 M
( fact of the Internet as a decentralized system, with key players) s
5 489 M
( being not only individuals, but also ISPs, companies, and entire) s
5 478 M
( industries. Deployment issues are also key factors in the evolution) s
5 467 M
( of the Internet, including the continual chicken-and-egg problem of) s
5 456 M
( having enough customers to merit rolling out a service whose utility) s
5 445 M
( depends on the size of the customer base in the first place.) s
5 423 M
( Overlay networks might serve as a transition technology for some new) s
5 412 M
( functionality, with an initial deployment in overlay networks, and) s
5 401 M
( with the new functionality moving later into the core if it seems) s
5 390 M
( warranted.) s
5 368 M
( There are also increased obstacles to the evolution of the Internet) s
5 357 M
( in the form of increased complexity [WD02], unanticipated feature) s
5 346 M
( interactions [Kruse00], interactions between layers [CWWS92],) s
5 335 M
( interventions by middleboxes [RFC-3424], and the like. Because) s
5 324 M
( increasing complexity appears inevitable, research is needed to) s
5 313 M
( understand architectural mechanisms that can accommodate increased) s
5 302 M
( complexity without decreasing robustness of performance in unknown) s
5 291 M
( environments, and without closing off future possibilities for) s
5 280 M
( evolution. More concretely, research is needed on how to evolve the) s
5 269 M
( Internet will still maintaining its core strengths, such as the) s
5 258 M
( current degree of global addressability of hosts, end-to-end) s
5 247 M
( transparency of packet forwarding, and good performance for best-) s
5 236 M
( effort traffic.) s
5 214 M
(3.9. Middleboxes) s
5 192 M
( Research is needed to address the challenges posed by the wide range) s
5 181 M
( of middleboxes [RFC-3234]. This includes issues of security,) s
5 170 M
( control, and data integrity, and on the general impact of middleboxes) s
5 159 M
( on the architecture.) s
5 104 M
(IAB Informational [Page 21]) s
_R
S
%%Page: (22) 22
%%BeginPageSetup
_S
24 24 translate
/pagenum 22 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( In many ways middleboxes are a direct outgrowth of commercial) s
5 654 M
( interests, but there is a need to look beyond the near-term needs for) s
5 643 M
( the technology, to research its broader implications and to explore) s
5 632 M
( ways to improve how middleboxes are integrated into the architecture.) s
5 610 M
(3.10. Internet Measurement) s
5 588 M
( A recurring challenge is measuring the Internet; there have been many) s
5 577 M
( discussions about the need for measurement studies as an integral) s
5 566 M
( part of Internet research [Claffy03]. In this discussion, we define) s
5 555 M
( measurement quite broadly. For example, there are numerous) s
5 544 M
( challenges in measuring performance along any substantial Internet) s
5 533 M
( path, particularly when the path crosses administrative domain) s
5 522 M
( boundaries. There are also challenges in measuring) s
5 511 M
( protocol/application usage on any high-speed Internet link. Many of) s
5 500 M
( the problems discussed above would benefit from increased frequency) s
5 489 M
( of measurement as well as improved quality of measurement on the) s
5 478 M
( deployed Internet.) s
5 456 M
( A key issue in network measurement is that most commercial Internet) s
5 445 M
( Service Providers consider the particular characteristics of their) s
5 434 M
( production IP network\(s\) to be trade secrets. Ways need to be found) s
5 423 M
( for cooperative measurement studies, e.g., to allow legitimate non-) s
5 412 M
( commercial researchers to be able to measure relevant network) s
5 401 M
( parameters while also protecting the privacy rights of the measured) s
5 390 M
( ISPs.) s
5 368 M
( Absent measured data, there is possibly an over-reliance on network) s
5 357 M
( simulations in some parts of the Internet research community and) s
5 346 M
( probably insufficient validation that existing network simulation) s
5 335 M
( models are reasonably good representations of the deployed Internet) s
5 324 M
( \(or of some plausible future Internet\) [FK02].) s
5 302 M
( Without solid measurement of the current Internet behavior, it is) s
5 291 M
( very difficult to know what otherwise unknown operational problems) s
5 280 M
( exist that require attention, and it is equally difficult to fully) s
5 269 M
( understand the impact of changes \(past or future\) upon the Internet's) s
5 258 M
( actual behavioral characteristics.) s
5 236 M
(3.11. Applications) s
5 214 M
( Research is needed on a wide range of issues related to Internet) s
5 203 M
( applications.) s
5 181 M
( Taking email as one example application, research is needed on) s
5 170 M
( understanding the spam problem, and on investigating tools and) s
5 159 M
( techniques to mitigate the effects of spam, including tools and) s
5 148 M
( techniques that aid the implementation of legal and other non-) s
5 104 M
(IAB Informational [Page 22]) s
_R
S
%%Page: (23) 23
%%BeginPageSetup
_S
24 24 translate
/pagenum 23 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( technical anti-spam measures [ASRG]. "Spam" is a generic term for a) s
5 654 M
( range of significantly different types of unwanted bulk email, with) s
5 643 M
( many types of senders, content and traffic-generating techniques. As) s
5 632 M
( one part of controlling spam, we need to develop a much better) s
5 621 M
( understanding of its many, different characteristics and their) s
5 610 M
( interactions with each other.) s
5 577 M
(3.12. Meeting the Needs of the Future) s
5 555 M
( As network size, link bandwidth, CPU capacity, and the number of) s
5 544 M
( users all increase, research will be needed to ensure that the) s
5 533 M
( Internet of the future scales to meet these increasing demands. We) s
5 522 M
( have discussed some of these scaling issues in specific sections) s
5 511 M
( above.) s
5 489 M
( However, for all of the research questions discussed in this) s
5 478 M
( document, the goal of the research must be not only to meet the) s
5 467 M
( challenges already experienced today, but also to meet the challenges) s
5 456 M
( that can be expected to emerge in the future.) s
5 423 M
(3.13. Freely Distributable Prototypes) s
5 401 M
( U.S.'s DARPA has historically funded development of freely) s
5 390 M
( distributable implementations of various Internet technologies \(e.g.,) s
5 379 M
( TCP/IPv4, RSVP, IPv6, and IP security\) in a variety of operating) s
5 368 M
( systems \(e.g. 4.2 BSD, 4.3 BSD, 4.4 BSD, Tenex\). Experience has) s
5 357 M
( shown that a good way to speed deployment of a new technology is to) s
5 346 M
( provide an unencumbered, freely-distributable prototype that can be) s
5 335 M
( incorporated into commercial products as well as non-commercial) s
5 324 M
( prototypes. Japan's WIDE Project has also funded some such work,) s
5 313 M
( primarily focused on IPv6 implementation for 4.4 BSD and Linux.) s
5 302 M
( [WIDE] We believe that applied research projects in networking will) s
5 291 M
( have an increased probability of success if the research project) s
5 280 M
( teams make their resulting software implementations freely available) s
5 269 M
( for both commercial and non-commercial uses. Examples of successes) s
5 258 M
( here include the DARPA funding of TCP/IPv4 integration into the 4.x) s
5 247 M
( BSD operating system [MBKQ96], DARPA/USN funding of ESP/AH design and) s
5 236 M
( integration into 4.4 BSD [Atk96], as well as separate DARPA/USN and) s
5 225 M
( WIDE funding of freely distributable IPv6 prototypes [Atk96, WIDE].) s
5 203 M
(4. Conclusions) s
5 181 M
( This document has summarized the history of research funding for the) s
5 170 M
( Internet and highlighted examples of open research questions. The) s
5 159 M
( IAB believes that more research is required to further the evolution) s
5 148 M
( of the Internet infrastructure, and that consistent, sufficient non-) s
5 104 M
(IAB Informational [Page 23]) s
_R
S
%%Page: (24) 24
%%BeginPageSetup
_S
24 24 translate
/pagenum 24 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( commercial funding is needed to enable such research.) s
5 643 M
( In case there is any confusion, we are not in this document) s
5 632 M
( suggesting any direct or indirect role for the IAB, the IETF, or the) s
5 621 M
( IRTF in handling any funding for Internet research.) s
5 599 M
(5. Acknowledgements) s
5 577 M
( The people who directly contributed to this document in some form) s
5 566 M
( include the following: Ran Atkinson, Guy Almes, Rob Austein, Vint) s
5 555 M
( Cerf, Jon Crowcroft, Sally Floyd, James Kempf, Joe Macker, Craig) s
5 544 M
( Partridge, Vern Paxson, Juergen Schoenwaelder, and Mike St. Johns.) s
5 522 M
( We are also grateful to Kim Claffy, Dave Crocker, Michael Eder, Eric) s
5 511 M
( Fleischman, Andrei Gurtov, Stephen Kent, J.P. Martin-Flatin, and) s
5 500 M
( Hilarie Orman for feedback on earlier drafts of this document.) s
5 478 M
( We have also drawn from the following reports:) s
5 467 M
( [CIPB02,IST02,NV02,NSF02,NSF03,NSF03a].) s
5 445 M
(6. Security Considerations) s
5 423 M
( This document does not itself create any new security issues for the) s
5 412 M
( Internet community. Security issues within the Internet Architecture) s
5 401 M
( primarily are discussed in Section 3.4 above.) s
5 379 M
(7. IANA Considerations) s
5 357 M
( There are no IANA considerations regarding this document.) s
5 335 M
(Normative References) s
5 313 M
( There are no Normative References because this is an Informational) s
5 302 M
( document.) s
5 280 M
(Informative References) s
5 258 M
( [ASRG] Anti-Spam Research Group \(ASRG\) of the IRTF. URL) s
5 247 M
( "http://asrg.sp.am/".) s
5 225 M
( [Atk96] R. Atkinson et al., "Implementation of IPv6 in 4.4 BSD",) s
5 214 M
( Proceedings of USENIX 1996 Annual Technical Conference, USENIX) s
5 203 M
( Association, Berkeley, CA, USA. January 1996. URL) s
5 192 M
( http://www.chacs.itd.nrl.navy.mil/publications/CHACS/1996/) s
5 181 M
( 1996atkinson-USENIX.pdf) s
5 159 M
( [Bellman1957] R.E. Bellman, "Dynamic Programming", Princeton) s
5 148 M
( University Press, Princeton, NJ, 1957.) s
5 104 M
(IAB Informational [Page 24]) s
_R
S
%%Page: (25) 25
%%BeginPageSetup
_S
24 24 translate
/pagenum 25 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( [BL1976] D. E. Bell and L. J. LaPadula, "Secure Computer Systems:) s
5 654 M
( Unified Exposition and Multics Interpretation", MITRE Technical) s
5 643 M
( Report NMTR-1997 \(ESD-TR-75-306\), The Mitre Corporation, March 1976.) s
5 621 M
( [Claffy03] K. Claffy, "Priorities and Challenges in Internet) s
5 610 M
( Measurement, Simulation, and Analysis", Large Scale Network meeting,) s
5 599 M
( \(US\) National Science Foundation, Arlington, VA, USA. 10 June 2003.) s
5 588 M
( URL "http://www.caida.org/outreach/presentations/2003/lsn20030610/".) s
5 566 M
( [Claffy03a] K. Claffy, "Top Problems of the Internet and What) s
5 555 M
( Sysadmins and Researchers Can Do To Help", plenary talk at LISA'03,) s
5 544 M
( October 2003. URL) s
5 533 M
( "http://www.caida.org/outreach/presentations/2003/netproblems_lisa03/".) s
5 511 M
( [Clark02] D. D. Clark, "Deploying the Internet - why does it take so) s
5 500 M
( long and, can research help?", Large-Scale Networking Distinguished) s
5 489 M
( Lecture Series, \(U.S.\) National Science Foundation, Arlington, VA, 8) s
5 478 M
( January 2002. URL: http://www.ngi-supernet.org/conferences.html) s
5 456 M
( [CSTB99] Computer Science and Telecommunications Board, \(U.S.\)) s
5 445 M
( National Research Council, "Funding a Revolution: Government Support) s
5 434 M
( for Computing Research", National Academy Press, Washington, DC,) s
5 423 M
( 1999. URL) s
5 412 M
( "http://www7.nationalacademies.org/cstb/pub_revolution.html".) s
5 390 M
( [CIPB02] Critical Infrastructure Protection Board, "National Strategy) s
5 379 M
( to Secure Cyberspace", The White House, Washington, DC, USA.) s
5 368 M
( September 2002, URL "http://www.whitehouse.gov/pcipb".) s
5 346 M
( [CWWS92] J. Crowcroft, I. Wakeman, Z. Wang, and D. Sirovica, "Is) s
5 335 M
( Layering Harmful?", IEEE Networks, Vol. 6, Issue 1, pp 20-24, January) s
5 324 M
( 1992.) s
5 302 M
( [Diot00] C. Diot, et al., "Deployment Issues for the IP Multicast) s
5 291 M
( Service and Architecture", IEEE Network, January/February 2000.) s
5 269 M
( [Deering1988] S. Deering, "Multicast Routing in Internetworks and) s
5 258 M
( LANs", ACM Computer Communications Review, Volume 18, Issue 4, August) s
5 247 M
( 1988.) s
5 225 M
( [Dijkstra59] E. Dijkstra, "A Note on Two Problems in Connexion with) s
5 214 M
( Graphs", Numerische Mathematik, 1, 1959, pp.269-271.) s
5 192 M
( [FF1962] L. R. Ford Jr. and D.R. Fulkerson, "Flows in Networks",) s
5 181 M
( Princeton University Press, Princeton, NJ, 1962.) s
5 159 M
( [FK02] S. Floyd and E. Kohler, "Internet Research Needs Better) s
5 148 M
( Models", Proceedings of 1st Workshop on Hot Topics in Networks) s
5 104 M
(IAB Informational [Page 25]) s
_R
S
%%Page: (26) 26
%%BeginPageSetup
_S
24 24 translate
/pagenum 26 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( \(Hotnets-I\), Princeton, NJ, USA. October 2002. URL) s
5 654 M
( "http://www.icir.org/models/bettermodels.html".) s
5 632 M
( [IM1993] J. Ioannidis and G. Maguire Jr., "The Design and) s
5 621 M
( Implementation of a Mobile Internetworking Architecture", Proceedings) s
5 610 M
( of the Winter USENIX Technical Conference, pages 489-500, Berkeley,) s
5 599 M
( CA, USA, January 1993.) s
5 577 M
( [IST02] Research Networking in Europe - Striving for Global) s
5 566 M
( Leadership, Information Society Technologies, 2002. URL) s
5 555 M
( "http://www.cordis.lu/ist/rn/rn-brochure.htm".) s
5 533 M
( [Jacobson88] Van Jacobson, "Congestion Avoidance and Control",) s
5 522 M
( Proceedings of ACM SIGCOMM 1988 Symposium, ACM SIGCOMM, Stanford, CA,) s
5 511 M
( August 1988. URL) s
5 500 M
( "http://citeseer.nj.nec.com/jacobson88congestion.html".) s
5 478 M
( [Jackson02] William Jackson, "U.S. should fund R&D for secure) s
5 467 M
( Internet protocols, Clarke says", Government Computer News, 31) s
5 456 M
( October 2002. URL) s
5 445 M
( "http://www.gcn.com/vol1_no1/security/20382-1.html".) s
5 423 M
( [Kruse00] Hans Kruse, "The Pitfalls of Distributed Protocol) s
5 412 M
( Development: Unintentional Interactions between Network Operations) s
5 401 M
( and Applications Protocols", Proceedings of the 8th International) s
5 390 M
( Conference on Telecommunication Systems Design, Nashville, TN, USA,) s
5 379 M
( March 2000. URL) s
5 368 M
( "http://www.csm.ohiou.edu/kruse/publications/TSYS2000.pdf".) s
5 346 M
( [KLMS2000] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure Border) s
5 335 M
( Gateway Protocol \(S-BGP\)", Proceedings of ISOC Network and) s
5 324 M
( Distributed Systems Security Symposium, Internet Society, Reston, VA,) s
5 313 M
( February 2000.) s
5 291 M
( [LD2002] E. Lear and R. Droms, "What's in a Name: Thoughts from the) s
5 280 M
( NSRG", expired Internet-Draft, December 2002.) s
5 258 M
( [MBFIPS01] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John) s
5 247 M
( Ioannidis, Vern Paxson, and Scott Shenker, "Controlling High) s
5 236 M
( Bandwidth Aggregates in the Network", ACM Computer Communications) s
5 225 M
( Review, Vol. 32, No. 3, July 2002. URL) s
5 214 M
( "http://www.icir.org/pushback/".) s
5 192 M
( [MBKQ96] M. McKusick, K. Bostic, M. Karels, and J. Quarterman,) s
5 181 M
( "Design and Implementation of the 4.4 BSD Operating System", Addison-) s
5 170 M
( Wesley, Reading, MA, 1996.) s
5 148 M
( [MGVK02] Z. Mao, R. Govindan, G. Varghese, & R. Katz, "Route Flap) s
5 104 M
(IAB Informational [Page 26]) s
_R
S
%%Page: (27) 27
%%BeginPageSetup
_S
24 24 translate
/pagenum 27 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( Dampening Exacerbates Internet Routing Convergence", Proceedings of) s
5 654 M
( ACM SIGCOMM 2002, ACM, Pittsburgh, PA, USA, August 2002.) s
5 632 M
( [NV02] NetVision 2012 Committee,"DARPA's Ten-Year Strategic Plan for) s
5 621 M
( Networking Research", \(U.S.\) Defense Advanced Research Projects) s
5 610 M
( Agency, October 2002. Citation for acknowledgement purposes only.) s
5 588 M
( [NSF02] NSF Workshop on Network Research Testbeds, National Science) s
5 577 M
( Foundation, Directorate for Computer and Information Science &) s
5 566 M
( Engineering, Advanced Networking Infrastructure & Research Division,) s
5 555 M
( Arlington, VA, USA, October 2002. URL "http://www-) s
5 544 M
( net.cs.umass.edu/testbed_workshop/".) s
5 522 M
( [NSF03] NSF ANIR Principal Investigator meeting, National Science) s
5 511 M
( Foundation, Arlington, VA, USA. January 9-10, 2003, URL) s
5 500 M
( "http://www.ncne.org/training/nsf-pi/2003/nsfpimain.html".) s
5 478 M
( [NSF03a] D. E. Atkins, et al., "Revolutionizing Science and) s
5 467 M
( Engineering Through Cyberinfrastructure", Report of NSF Advisory) s
5 456 M
( Panel on Cyberinfrastructure, January 2003. URL) s
5 445 M
( "http://www.cise.nsf.gov/evnt/reports/atkins_annc_020303.htm".) s
5 423 M
( [NSF03b] Report of the National Science Foundation Workshop on) s
5 412 M
( Fundamental Research in Networking. April 24-25, 2003. URL) s
5 401 M
( "http://www.cs.virginia.edu/~jorg/workshop1/NSF-) s
5 390 M
( NetWorkshop-2003.pdf".) s
5 368 M
( [Floyd] S. Floyd, "Papers about Research Questions for the Internet",) s
5 357 M
( web page, ICSI Center for Internet Research \(ICIR\), Berkeley, CA,) s
5 346 M
( 2003 URL "http://www.icir.org/floyd/research_questions.html".) s
5 324 M
( [RFC-1510] J. Kohl and C. Neuman, "The Kerberos Network) s
5 313 M
( Authentication Service \(V5\)", RFC 1510, September 1993.) s
5 291 M
( [RFC-2082] F. Baker and R. Atkinson, "RIPv2 MD5 Authentication",) s
5 280 M
( RFC-2082, January 1997.) s
5 258 M
( [RFC-2154] S. Murphy, M. Badger, and B. Wellington, "OSPF with) s
5 247 M
( Digital Signatures", RFC-2154, June 1997.) s
5 225 M
( [RFC-2385] A. Heffernan, "Protection of BGP Sessions via the TCP MD5) s
5 214 M
( Signature Option", RFC-2385, August 1998.) s
5 192 M
( [RFC-2407] D. Piper, "The Internet IP Security Domain of) s
5 181 M
( Interpretation for ISAKMP", RFC-2407, November 1998.) s
5 159 M
( [RFC-2501] S. Corson and J. Macker, "Mobile Ad Hoc Networking) s
5 148 M
( \(MANET\): Routing Protocol Performance Issues and Evaluation) s
5 104 M
(IAB Informational [Page 27]) s
_R
S
%%Page: (28) 28
%%BeginPageSetup
_S
24 24 translate
/pagenum 28 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( Considerations", RFC-2501, January 1999.) s
5 643 M
( [RFC-2990] G. Huston, "Next Steps for the IP QoS Architecture",) s
5 632 M
( RFC-1990, November 2000.) s
5 610 M
( [RFC-3221] G. Huston, "Commentary on Inter-Domain Routing in the) s
5 599 M
( Internet", RFC-3221, December 2001.) s
5 577 M
( [RFC-3234] B. Carpenter and S. Brim, "Middleboxes: Taxonomy and) s
5 566 M
( Issues", RFC 3234, February 2002.) s
5 544 M
( [RFC-3424] L. Daigle, Editor, "IAB Considerations for Unilateral) s
5 533 M
( Self-Address Fixing \(UNSAF\) Across Network Address Translation",) s
5 522 M
( RFC-3424, Internet Architecture Board, November 2002.) s
5 500 M
( [RFC-3467] J. Klensin, "Role of the Domain Name System \(DNS\)", RFC) s
5 489 M
( 3467, February 2003.) s
5 467 M
( [RFC-3535] J. Schoenwalder, Editor, "Overview of the 2002 IAB Network) s
5 456 M
( Management Workshop", RFC-3535, May 2003.) s
5 434 M
( [RFC-3387] M. Eder, H. Chaskar, and S. Nag, "Considerations from the) s
5 423 M
( Service Management Research Group \(SMRG\) on Quality of Service \(QoS\)) s
5 412 M
( in the IP Network", RFC 3387, September 2002.) s
5 390 M
( [RIPE] RIPE \(Reseaux IP Europeens\), Amsterdam, NL. URL) s
5 379 M
( "http://www.ripe.net/ripe/".) s
5 357 M
( [Savage00] Savage, S., Wetherall, D., Karlink, A. R., and Anderson,) s
5 346 M
( T., "Practical Network Support for IP Traceback", Proceedings of 2000) s
5 335 M
( ACM SIGCOMM Conference, ACM SIGCOMM, Stockholm, SE, pp. 295-306.) s
5 324 M
( August 2000.) s
5 302 M
( [Schiller03] J. I. Schiller, "Interception Technology: The Good, The) s
5 291 M
( Bad, and The Ugly!", Presentation at 28th NANOG Meeting, North) s
5 280 M
( American Network Operators Group \(NANOG\), Ann Arbor, MI, USA, June) s
5 269 M
( 2003. URL "http://www.nanog.org/mtg-0306/schiller.html".) s
5 247 M
( [SM03] P. Sharma and R. Malpani, "IP Multicast Operational Network) s
5 236 M
( Management: Design, Challenges, and Experiences", IEEE Network, Vol.) s
5 225 M
( 17, No. 2, March 2003.) s
5 203 M
( [SMA03] N. Spring, R. Mahajan, & T. Anderson, "Quantifying the Causes) s
5 192 M
( of Path Inflation", Proceedings of ACM SIGCOMM 2003, ACM, Karlsruhe,) s
5 181 M
( Germany, August 2003.) s
5 159 M
( [WD02] Walter Willinger and John Doyle, "Robustness and the Internet:) s
5 148 M
( Design and Evolution", Unpublished/Preprint, 1 March 2002, URL) s
5 104 M
(IAB Informational [Page 28]) s
_R
S
%%Page: (29) 29
%%BeginPageSetup
_S
24 24 translate
/pagenum 29 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( "http://netlab.caltech.edu/internet/".) s
5 643 M
( [WIDE] WIDE Project, Japan. URL "http://www.wide.ad.jp/".) s
5 621 M
(9. AUTHORS' ADDRESSES) s
5 588 M
( Internet Architecture Board) s
5 577 M
( EMail: iab@iab.org) s
5 555 M
( Internet Architecture Board Members) s
5 544 M
( at the time this document was published were:) s
5 522 M
( Bernard Aboba) s
5 511 M
( Harald Alvestrand \(IETF chair\)) s
5 500 M
( Rob Austein) s
5 489 M
( Leslie Daigle \(IAB chair\)) s
5 478 M
( Patrik Faltstrom) s
5 467 M
( Sally Floyd) s
5 456 M
( Mark Handley) s
5 445 M
( Bob Hinden) s
5 434 M
( Geoff Huston \(IAB Executive Director\)) s
5 423 M
( Jun-ichiro Itojun Hagino) s
5 412 M
( Eric Rescorla) s
5 401 M
( Pete Resnick) s
5 390 M
( Jonathan Rosenberg) s
5 368 M
( We note that Ran Atkinson, one of the editors of the document, was an) s
5 357 M
( IAB member at the time that this document was first created, in) s
5 346 M
( November 2002, and that Vern Paxson, the IRTF chair, is an ex-officio) s
5 335 M
( member of the IAB.) s
5 313 M
(Intellectual Property Notice) s
5 291 M
( The IETF has been notified of intellectual property rights claimed in) s
5 280 M
( regard to some or all of the specification contained in this) s
5 269 M
( document, particularly regarding support for mobility. For more) s
5 258 M
( information consult the online list of claimed rights.) s
5 236 M
( By submitting this Internet-Draft, we certify that any applicable) s
5 225 M
( patent or other IPR claims of which we are aware have been disclosed,) s
5 214 M
( and any of which we become aware will be disclosed, in accordance) s
5 203 M
( with RFC 3668.) s
5 181 M
( The IETF takes no position regarding the validity or scope of any) s
5 170 M
( intellectual property or other rights that might be claimed to) s
5 159 M
( pertain to the implementation or use of the technology described in) s
5 148 M
( this document or the extent to which any license under such rights) s
5 104 M
(IAB Informational [Page 29]) s
_R
S
%%Page: (30) 30
%%BeginPageSetup
_S
24 24 translate
/pagenum 30 def
/fname (draft-iab-research-funding-03.txt) def
/fdir () def
/ftail (draft-iab-research-funding-03.txt) def
/user_header_p false def
%%EndPageSetup
5 698 M
(draft-iab-research-funding May 2004) s
5 665 M
( might or might not be available; neither does it represent that it) s
5 654 M
( has made any effort to identify any such rights. Information on the) s
5 643 M
( IETF's procedures with respect to rights in standards-track and) s
5 632 M
( standards-related documentation can be found in BCP-11. Copies of) s
5 621 M
( claims of rights made available for publication and any assurances of) s
5 610 M
( licenses to be made available, or the result of an attempt made to) s
5 599 M
( obtain a general license or permission for the use of such) s
5 588 M
( proprietary rights by implementors or users of this specification can) s
5 577 M
( be obtained from the IETF Secretariat.) s
5 555 M
(Full Copyright Statement) s
5 533 M
( Copyright \(C\) The Internet Society 2004. This document is subject to) s
5 522 M
( the rights, licenses and restrictions contained in BCP 78, and except) s
5 511 M
( as set forth therein, the authors retain all their rights.) s
5 489 M
( This document and translations of it may be copied and furnished to) s
5 478 M
( others, and derivative works that comment on or otherwise explain it) s
5 467 M
( or assist in its implementation may be prepared, copied, published) s
5 456 M
( and distributed, in whole or in part, without restriction of any) s
5 445 M
( kind, provided that the above copyright notice and this paragraph are) s
5 434 M
( included on all such copies and derivative works. However, this) s
5 423 M
( document itself may not be modified in any way, such as by removing) s
5 412 M
( the copyright notice or references to the Internet Society or other) s
5 401 M
( Internet organizations, except as needed for the purpose of) s
5 390 M
( developing Internet standards in which case the procedures for) s
5 379 M
( copyrights defined in the Internet Standards process must be) s
5 368 M
( followed, or as required to translate it into languages other than) s
5 357 M
( English.) s
5 335 M
( The limited permissions granted above are perpetual and will not be) s
5 324 M
( revoked by the Internet Society or its successors or assigns.) s
5 302 M
( This document and the information contained herein are provided on an) s
5 291 M
( "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS) s
5 280 M
( OR IS SPONSORED BY \(IF ANY\), THE INTERNET SOCIETY AND THE INTERNET) s
5 269 M
( ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,) s
5 258 M
( INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE) s
5 247 M
( INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED) s
5 236 M
( WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.) s
5 104 M
(IAB Informational [Page 30]) s
_R
S
%%Trailer
%%Pages: 30
%%DocumentNeededResources: font Courier-Bold Courier
%%EOF
| PAFTECH AB 2003-2026 | 2026-04-23 00:11:53 |