One document matched: draft-lear-iab-itat-report-00.xml


<?xml version="1.0"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd"[
<!ENTITY RFC2480 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2480.xml">
<!ENTITY RFC4034 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4960 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4960.xml">
<!ENTITY RFC5218 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5218.xml">
<!ENTITY RFC6555 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6555.xml">
<!ENTITY RFC6698 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6698.xml">
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="no" ?>
<?rfc sortrefs="yes" ?>
<?rfc strict="yes" ?>
<?rfc linkmailto="yes" ?>

<rfc ipr="trust200902" docName="draft-lear-iab-itat-report-00" category="info">

  <front>
    <title abbrev="ITAT Report">
      Internet Technology Adoption and Transition
    </title>
    <author fullname="Eliot Lear" initials="E." surname="Lear" role="editor">
      <organization>Cisco Systems GmbH</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <region>ZH</region>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date />

    <abstract>
<t>The Internet Technology Adoption and Transition (ITAT) Workshop
took place on December 4th and 5th of 2013.  The focus of the workshop
was on models to facilitate adoption of Internet protocols, with
particular emphasis at the waist of the hourglass.  This report
summarizes contributions and discussions.  As the topics were wide
ranging, there is no single set of recommendations for IETF
participants to pursue at this time.  Instead, in the classic sense of
early research, we note areas that deserve further exploration.
</t>
    </abstract>
  </front>

<middle>
  <section title="Introduction">
    <t>
      [Ed: this is adapted from our call for papers.]
    </t>
    <t>
      The Internet is a complex ecosystem that encompasses all aspects
      of society.  At its heart is a protocol stack with an hourglass
      shape, and IP at its center.  Recent research points to possible
      explanations for the success of such a design and for the
      significant challenges that arise when trying to evolve or
      change its middle section, e.g., as partially evident in the
      difficulties encountered by IPv6.  We have a number of other key
      examples to consider, including the next generation of HTTP and
      WebRTC.  The eventual success of many if not all of these
      protocols will largely depend on our understanding of not only
      what features and design principles contribute lasting value,
      but also on how (initial) deployment strategies can succeed in
      unlocking that value to foster protocol adoption.  The latter is
      particularly important in that most if not all Internet
      protocols exhibit significant externalities that create strong
      barriers to adoption, especially in the presence of a
      well-established incumbent.  Taking into account RFC 5218 on
      what makes a protocol successful, this workshop sought to
      explore how the complex interactions of protocols design and
      deployment affect their success.  One of the workshop's goals
      was, therefore, to encourage discussions to develop an
      understanding of what makes protocol designs successful not only
      in meeting initial design goals but more importantly in their
      ability to evolve as these goals and the available technology
      change.  Another equally important goal was to develop protocol
      deployment strategies that ensure that new features can rapidly
      gain enough of a foothold to ultimately realize broad adoption.
      Such strategies must be informed by both operational
      considerations and economic factors.
    </t>
    <t>
      Participants this workshop consisted of operators, researchers
      from the fields of computer science and economics, as well as
      engineers.  Contributions were wide ranging.  As such, this
      report makes few if any recommendations for the IETF to
      consider, although there are some.</t>
  <section title="Organization of This Report">
    <t>This report records our discussions.  At the end of the
    workshop we reviewed potential follow-up items.  These will be
    highlighted at each point during the report, and a summary is
    given at the end.
    </t>
    <t>Section 2 discusses the economics of protocol adoption.
      Section 3 delves into an examination of recent operational
      challenges and some success stories.  Section 4 examines
      different views of success factors.  Finally section 5
      summarizes views of the participants, and identifies a few key
      insights.
    </t>
  </section>      
  </section>
  <section title="Motivations and Review of Existing Work">
      <t>Our workshop began with an introduct that asks the question: is
      the neck of the Internet hourglass closed for business?  We have
      numerous instances where progress has been slow, the three
      biggest that come to mind
      being <xref target="RFC2480">IPv6</xref>, <xref target="RFC4960">SCTP</xref>,
      and <xref target="RFC4034">DNSSEC</xref>.  The impact of DNSSEC
      is of particular interest, because it is relied upon for the
      delivery of other services, such
      as <xref target="RFC6698">DANE</xref> as well as application
      discovery mechanisms[refneeded].  Thus slowdown at the neck of
      the glass can have an impact closer to the lip.
    </t>
    <t>Even when we consider the classic neck of the hourglass to be IP
      and transport layers, it was suggested that the hourglass might
      extend as high as the application layer.
    </t>
    <figure>
      <artwork><![CDATA[

        ______________________
        \                    /
         \   Applications   /
          \                /
           \              /
            \            /   
             \__________/  
              | HTTP(s)|  Has the neck moved?
              |________|
             /          \
            /  TCP/IP    \
           /______________\
          /     MPLS/      \
         /     Framing      \
        /____________________\
       /      Physical        \
      /________________________\


]]></artwork></figure>
    <t>
      This idea was rebutted by the argument that protocols do
      continue to evolve, that protocols like SMTP and IMAP in the
      applications space have continued to evolve, as has the
      transport layer. 
    </t>
    <t>
      We moved on to a review of <xref target="RFC5218" /> which
      discusses protocol success factors.  This work was presented in
      an IETF plenary some time ago, and was the basis for this
      ongoing work.  There were two clear outcomes from the
      discussion.  The first was that successive Internet Architecture
      Boards should review and consider that document in the context
      of evaluating birds of a feather (BoF) session proposals at the
      IETF, so that any working group proposal is carefully crafted to
      address a specific design space and provide positive net value.
      Another aspect was to continue work on tracking the value
      specific works in terms of success, wild success, or failure.
      On that last point, failure remains difficult to judge,
      particularly at the neck of the hourglass.
    </t>
  </section>
  <section title="Economics of Protocol Adoption">
    <t>Several papers were submitted that looked at economic aspects of
      protocol adoption.
    </t>
    <section title="When can bundling help adoption of network
		    technologies or services?">
    <t>
      Economics of bundling is a long studied field, but not as
      applied to protocols.  It is relevant to the IETF and inherent
      to two key notions: layering and "mandatory to implement".  Two
      current examples include DANE atop DNSSEC and WebRTC atop SCTP.
      The workshop reviewed a model <xref target="Weber13" /> that
      examines the concept that bundling of technologies can lead to
      several possible outcomes, which includes more or less adoption
      of both.  This will depend on a number of factors, including the
      costs, benefits, and externalities associated with adopting
      each.  The work we considered involved two independent
      technologies.  One question was what happens where one
      technology depends on the other.  That is directly tied to
      "mandatory to implement" discussions within the IETF.  That is a
      matter for follow-on work.  IETF participants can provide
      researchers anecdotal experience to help improve models in this
      area. 
    </t>
  </section>
  <section title="Internet Protocol Adoption: Learning from Bitcoin">
    <t>We considered an examination of protocol success factors in the
      context of Bitcoin<xref target="Bohme13"/>.  Here, there were
      any number of barriers to success, including adverse press,
      legal uncertainties, glitches and breaches, previous failed
      attempts, and speculative attacks, amongst others.  Bitcoin has
      thusfar overcome these barriers thanks to several key factors:
    </t>
    <t>
      <list style="symbols">
	<t>First, there is a built-in reward system for early
	  adopters.  Participants are monetarily rewarded at an
	  exponentially declining rate.</t>
	<t>There exist exchanges or conversion mechanisms to directly
	  convert bitcoin to other currencies.</t>
	<t>Finally, there is some store fo value in the currency
	  itself.
	</t>
      </list>
    </t>
    <t>The first two of these factors may be transferrable to other
      approaches.  That is- one key protocol success factor is direct
      benefit to the participant.  Another key protocol success factor
      is ability to interface with other systems for mutual benefit.
    </t>
    <t>
      A key message from this presentation is that if a protocol
      imposes externalities or costs on other systems, find a means
      to establish incentives for those other players for
      implementation. As it happened we had a limited example of how
      to do this that is directly relevant to the IETF.
    </t>
  </section>
  <section title="Long term strategy for a successful deployment of
		DNSSEC – on all levels">
    <t>We reviewed the approach Sweden's .SE registry has taken to
      improving deployment of DNSSEC<xref target="Lowinder13"/>.  .SE
      has roughly 1.5 million domains.  IIS manages the ccTLD.  They
      made the decision to encourage deployment of DNSSEC within .SE.
      They began by understanding who their stakeholders were, and
      examined financial, legal, and technical aspects to deployment.
      As they began their rollout, they charged extra for DNSSEC.  As
      they put it, this didn't work very well.
    </t>
    <t>They went on to fund development of OpenDNSSEC to remove
      technical barriers to deployment at end sites, noting that
      tooling was lacking in this area.  Even with this development,
      more tooling is necessary, as they point out a need for APIs
      between the signing zone and the registrar.
    </t>
    <t>To further encourage deployment, the government of Sweden
      provided financial incentives to communities to see that their
      domains were signed.  .SE further provided an incentive to
      registrars to see that their domains were signed.  In summary,
      .SE examined all the players and provided incentives for each to
      participate.
    </t>
    <t>The workshop discussed whether or not this model could be
      applied to other domains.  .SE was in a position to effectively
      subsidize DNS deployment because of their ability to set prices.
      This may be appropriate for certain other top level domains, but
      it was pointed out that the margins of other domains do not
      allow for a cost reduction to be passed on at this point in
      time.
    </t>
  </section>
  <section title="Framework for analyzing feasibility of Internet
		  protocols">
    <t>One of the goals of the workshop was to provide ways to
      determine when work in the IETF was likely to lead to adoption.
      We considered an interative approach that combines value net
      analysis, deployment environment analysis, and technical
      architecture analysis that leads to feasibility and solution
      analysis<xref target="Leva13"/>.  This work provided an alternative to RFC 5218 that
      had many points in common.  The case study examined was that of
      MPTCP.  Various deployment challenges were observed.  First and
      foremost, increasing bandwidth within the network seems to
      decrease attractiveness of MPTCP.  Second, the benefit/cost
      tradeoff by vendors was not considered attractive.  Third, not
      all parties may agree on the benefits.</t>
    <t>Solutions analysis suggested five separate approaches to
      improve deployment, including open source, lobbying of various
      implementors, proxy deployment, and implementation by parties
      where they own both ends of a connection.
    </t>
  </section>
  <section title="Best Effort Service as a Deployment Success Factor">
    <t>
      When given the choice between vanilla and chocolate, why not
      choose both?  We considered an approach that became a recurring
      theme throughout the workshop, which was to examine when it was
      necessary to make a choice between technologies, but rather to
      implement multiple mechanisms to achieve
      adoption<xref target="Welzl13"/>.  The workshop discussed the
      case of Skype, where it will use the best available transport
      mechanism to improve communication between clients, rather than
      to tie fate to any specific transport.  The argument goes that
      such an approach provides a means to introduce new transports
      such as SCTP.  This would be an adaptation
      of <xref target="RFC6555">"Happy Eyeballs"</xref>.
    </t>
  </section>
  </section>
  <section title="Innovative / Out There Models">
    <t>There were several approaches presented that examined how we look
      at protocol adoption.
    </t>
    <section title="On the Complexity of Designed Systems (and its effect
		    on protocol deployment)">
      <t>We reviewed a comparison between the hourglass model and what
	systems biologists might call the bowtie
	model<xref target="Meyer13"/>.  The crux of this comparison is
	that both rely on certain building blocks to accomplish a
	certain end.  In the case of our hourglass model, IP sits
	notably in the center, whereas in the case of systems biology,
	as adenosine triphosphate (ATP) is the means by which all
	organisms convert nutrients to usable energy.</t>
      <t>
	We also examined the notion of "robust yet fragile", which
	examines the balance between the cost of implementing robust
	systems versus their value.  That is, highly efficient systems
	can might prove fragile in the face of failure or hard to
	evolve.
      </t>
      <t>The key question asked during this presentation was how we
	could apply what has been learned in systems biology or what
	do the findings reduce to for engineers?  The answer was that
	more work is needed.  The discussion highlighted the
	complexity of the Internet in terms of predicting network
	behavior.  As such, one promising area to examine may be that
	of network management.
      </t>
    </section>
    <section title="Managing Diversity to Manage Technological
		    Transition">
      <t>We considered the difference between planned versus unplanned
	technology transitions<xref target="Kohno13"/>.  They examined
	several transitions at the link, IP, and application layers in
	Japan.  One key claim in the study is that there is a phase
	difference in the diversity trend between each layer.  The
	statistics presented show that indeed HTTP is the predominant
	substrate for other applications.  Another point made was that
	"natural selection" is a strong means to determine technology.
      </t>
    <t>Along these lines there were two papers submitted that examined
      the formation and changes to the hourglass in the context of
      evolutionary economics.  Unfortunately the presentor was unable
      to attend due to illness.  The work was discussed at the
      workshop, and there were different points of views as to the
      approach.
    </t>
    </section>
<section title="On Economic Models of Network Technology Adoption,
  Design, and Viability">
<t>We considered how network protocol capabilities enable certain
  sorts of services that are beneficial to consumers and service
  providers.  This model looks at smart data pricing (SDP) in which
  some behavior is desired and rewarded through a pricing
  model.<xref target="Sen13"/> The example given was use of
  time-dependent pricing (TDP) and demonstrated how a service provider
  was able to load shift traffic to off-peek periods.  Explict
  Congestion Notification (ECN) and RADIUS were used by the project
  alongside a simple GUI.  This sort of work may prove useful to
  service providers as caching models evolve over time.  The question
  within the room is how will protocol developers consider these sorts
  of requirements.
</t>
</section>
</section>
<section title="Making Standards Better">
<t>There were several papers that focused on how standards are
  produced.
</t>

<section title="Standards: A love/hate relationship with patents">
<t>One of the biggest barriers to deployment is that of the unseen
  patent by the non-practicing entity (NPE).<xref target="Lear13"/>
  While this problem is relatively well understood by the industry,
  the discussion looked at patents as a means to improve
  interoperability.  Those who hold patents have the ability to
  license them in such a way that a single approach is the result.
</t>
</section>
<section title="Bridge Networking Research and Internet
		Standardization: Case Study on Mobile Traffic
		Offloading and IPv6 Transition Technologies">
  <t>Not for the first time there was a presentation and discussion
     about the gap between the research community and standards
     organizations.  Two cases were examined: mobile offloading and
     IPv6 transition technologies.<xref target="Ding13"/> In the case
     of mobile offloading, a mechanism was examined that required
     understanding of both 3GPP and IETF standards.  Resistance in
     both organizations was encountered.  In the 3GPP, the problem was
     that the organization already had an offloading model in play.
     In the IETF, the problem was a lack of understanding of the
     interdisciplinary space.  The researchers noted that in the case
     of the IETF, they may have taken the wrong tact by having jumped
     into the solution without having fully explained the problem they
     were trying to solve.  In the case of IPv6 transition
     technologies researchers encountered a crowded field and not much
     appetite for new transition technologies.
  </t>
  <t>The workshop discussed whether the standards arena is the best
     venue or measurement of success for researchers.  The IRTF is
     meant to bridge academic research and the IETF.  As we will
     discuss below, several avenues for continued dialog are
     contemplated.
  </t>
</section>
<section title="An Internet Architecture for the Challenged">
<t>We held a very provocative discussion about whether the existing
  Internet architecture serves the broadest set of needs.  Three
  specific aspects were examined: geographic, technical, and
  socio-economic.  Researchers presented an alternative hourglass or
  protocol architecture known as Lowest Common Denominator Networking
  (LCDNet) that re-examines some of the base assumptions of the
  existing architecture, including its "always on"
  nature.<xref target="Sathiaseelan13"/>
</t>
<t>The workshop questioned many of the baseline assumptions of the
  researchers.  In part this may have been due to constrained
  discussion time on the topic, where a fuller explanation was
  warranted.
</t>
</section>
</section>
<section title="Other Challenges and Approaches">
<t>We held a number of other discussions about different approaches to
  technology adoption.  We should highlight that a number of papers
  were transmitted to the workshop on routing security, two of which
  were not possible to present.
</t>
<section title="Resilience of the commons: routing security">
<t>We discussed a presentation on the tragedy of the commons in the
   context of global inter-domain
   routing<xref target="Robachevsky13"/>.  The "Internet Commons" is a
   collection of networks that we depend on but do not control.  The
   main threat to the commons in the context of BGP is routing
   pollution, or unwanted or unnecessary routing entries.  The
   Internet Society has been working with service providers to improve
   resiliency by driving a common understanding of both problem and
   solution space, and developing a shared view with regard to risk
   and benefits, with the idea being that there would be those who
   would engage in reciprocal cooperation with the hopes that others
   would do similarly in order to break the tragedy.
</t>
<t>What was notable in discussion was that there was no magic bullet
  to addressing the resiliency issue, and that this was a matter of
  clearly identifying the key players and convincing them that their
  incentives were aligned.  It also involved developing approaches to
  measure resiliency.
</t>
</section>
<section title="Getting to the next version of TLS">
<t>Originally the workshop had planned to look at the question of
  whether we could mandate stronger security.  This evolved into a
  discussion about getting to the next version of Transport Layer
  Security (TLS), and what challenges lie ahead.  It was pointed out
  that there were still many old versions of TLS in existence today,
  due to many old implementations.  In particular, it was pointed out
  that a substantial amount of traffic is still encrypted using triple
  DES.
</t>
<t>One concern about the next generation is that perfect could become
  the enemy of good.  Another point that was made was that perhaps a
  testing platform might help interoperability.  Finally, there was
  some discussion about how new versions of TLS get promoted.
  </t>
</section>
</section>
<section title="Outcomes">
<t>
This wide ranging workshop discussed many aspects that go to the
success or failure of the work of the IETF.  While there is no single
silver bullet that we can point to for making a protocol successful,
the workshop did discuss a number of outcomes and potential next
steps.
</t>
<section title="Work for the IAB and the IETF">
<t>
The IAB's role in working group formation consists of providing
guidance to the IESG on which birds of a feather sessions should be
held, review of proposed working group charters, and shepherding some
work so that it can reach a suitable stage for standardization.  In
each of these stages the IAB has an opportunity to apply the lessons
of RFC 5218, as well as other work such as the notion of bundling
choices, when members give advice.
</t>
<t>In addition to working group creation, the IAB has an opportunity
  to track and present protocol success stories, either through wikis
  or through discussion at plenary sessions.  For instance, there is
  much interest at the moment of this report in Bitcoin, its success,
  and what parallels and lessons can be drawn.  Specifically it would
  be useful to track examples of first mover advantages.
</t>
<t>Finally, one area that the IETF may wish to consider, relating
  specifically to DNSSEC, as raised by our speakers was
  standardization of the provisioning interface of DNSSEC (DS keys)
  between parent and child zone.  Contributions in this area would be
  welcome.
</t>
</section>
<section title="Potential for the Internet Research Task Force">
<t>
There are at least two possible activities that the IRTF might wish to
consider.  The first would be a research group that considers
protocol alternatives and recommendations that might be useful in
areas where environments are constrained, due to bandwidth or other
resources.  Such a group has already been proposed, in fact.
</t>
<t>
The second possibility is a more general group that focuses on
economic considerations relating to Internet protocol design.  In
particular there were a number of areas that were presented to the
working group that deserve further investigation, and could use
collaboration between researchers, engineers, and operators.  Two
examples include work on bundling as well as systems biology.
</t>
</section>
<section title="Opportunities For others">
<t>
  Incentive models often involve many different players.  As we
  considered work in the workshop, our partners such as ICANN, and the
  RIRs can continue to play a role in encouraging deployment of
  protocols through their policies.  Their members can also
  participate in any activity of the IRTF that is related to this
  work.
</t>
<t>Specifically, RIRs have a specific role to play in encouraging
  security fo the routing system, and ICANN has a specific role to
  play in securing the domain name service.
</t>
<t>The suggestion was made that the IETF working groups could 
leverage graduate students in many Universities around the world 
in helping review documents (drafts, RFCs etc). This would serve as a
source of education in real world processes to students, and would
engage the research community in IETF processes more thoroughly, as
well as providing a scale-out resource for handling
the IETF review workload. Several attendees who have such students
  were prepared to try this out.
  </t>
</section>
</section>
<section title="Security Considerations">
<t>
This document does not discuss a protocol.  Security for the workshop
itself was excellent.
</t>
</section>
<section title="Acknowledgments">
<t>
The IAB would like to thank the program committee, who consisted of
  Roch Guerin, Constantine Dovrolis, Hannes Tschofenig, Joel Halpern,
  Eliot Lear, and Richard Clayton.</t>
<t>A special debt of gratitude is owed to our hosts, Ross Anderson and
  Richard Clayton for arranging an excellent venue for our
  discussions.
</t>
</section>
<section title="Attendees">
<t> The following people attended the ITAT workshop:</t>
<t>
Aaron Yi Ding,
Adrian Farrel,
Andrei Robachevzsky,
Arjuna Sathiaseelan,
Bjoern Zeeb,
Dave Meyer,
Dave Thaler,
Dongting Yu,
Eliot Lear,
Elwyn Davies,
Erik Nordmark?,
Hannes Tschofenig,
Joel Halpern,
Jon Crowcroft,
Lars Eggert,
Martin Stiemerling?,
Michael Welzl,
Michiel Leenaars,
Miyo Kohno,
Rainer Bohme,
Richard Clayton,
Roch Guerin,
Ross Anderson,
Russ Housley,
Sam Smith,
Sean Turner,
Soumya Sen,
Spencer Dawkins,
Steven Weber,
Tapio Levä,
Toby Moncaster,
Tony Finch
</t>
</section>
</middle>
  <back>
    <references title="Normative References">
      &RFC5218;
    </references>

    <references title="Informative References">
      &RFC2480; &RFC4034; &RFC4960;  &RFC6698;
      <reference anchor="Weber13">
	<front>
	  <title>When can bundling help adoption of network
	  technologies or services?</title>
	  <author initials="S." surname="Weber" fullname="Steven
							  Weber">
	    <organization>Drexel University</organization>
	  </author>
	  <author initials="R." surname="Guerin" fullname="Roch
	    Guerin">
	    <organization>Washington University</organization>
	  </author>
	  <author initials="J. C." surname="Oliveira"
	  fullname="Jaudelice C. de Oliveria">
	    <organization>Drexel University</organization>
	    <address>
	  <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_2.pdf</uri>
	    </address>
	  </author>
	  <date month="December" year="2013"/>
	  </front>
      </reference>
      <reference anchor="Bohme13">
	<front>
	  <title>Internet Protocol Adoption: Learning from
	  Bitcoin</title>
	  <author initials="R." surname="Bohme" fullname="Rainer
	  Bohme">
	    <organization>Westfaeliche Wilhelms-Universitaet
	    Muenster</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_17.pdf</uri>
	    </address>
	  </author>
	  <date month="December" year="2013"/>
	</front>
      </reference>
      <reference anchor="Lowinder13">
	<front>
	  <title>Long term strategy for a successful deployment of
	  DNSSEC – on all levels</title>
	  <author initials= "A.M." surname="Eklund Lowinder"
		  fullname="Anne-Marie Eklund Lowinder">
	    <organization>.SE</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_5.docx</uri>
	    </address>
	  </author>
	  <author initials="P." surname="Wallstrom" fullname="Patrik
							      Wallstrom">
	    <organization>OpenDNSSEC</organization>
	  </author>
	  <date month="December" year="2013"/>
	</front>
      </reference>
      <reference anchor="Leva13">
	<front>
	  <title>Framework for analyzing feasibility of Internet
	  protocols</title>
	  <author initials="T." surname="Leva" fullname="Tapio Leva">
	    <organization>Aalto University</organization>
	    <address>
	    <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_4.pdf</uri>
	    </address>
	    </author>
	  <author initials="H." surname="Soumi" fullname="Henna
							  Suomi">
	    <organization>Aalto University</organization>
	  </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Welzl13">
	<front>
	  <title>The "best effort" service as a deployment success
	  factor</title>
	  <author initials="M." surname="Welzl" fullname="Michael
	  Welzl">
	    <address>
	    <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_8.pdf</uri>
	    </address>
	    </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      &RFC6555;
      <reference anchor="Meyer13">
	<front>
	  <title>On the Complexity of Engineered Systems (and its effect
	    on protocol deployment)</title>
	  <author initials="D. M." surname="Meyer" fullname="David
	    Meyer">
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_9.pdf</uri>
	    </address>
	  </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Kohno13">
	<front>
	  <title>Managing Diversity to Manage Technological Transition</title>
	  <author initials="M." surname="Kohno" fullname="Miya Kohno">
	    <organization>Cisco Systems</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_7.pdf</uri>
	      </address>
	    </author>
	  <author initials="T." surname="Asaba" fullname="Toshiya
							    Asaba">
	    <organization>IIJ Innovation Institute</organization>
	  </author>
	  <author initials="F." surname="Baker" fullname="Fred Baker">
	    <organization>Cisco Systems</organization>
	  </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Sen13">
	<front>
	  <title>On Economic Models of Network Technology Adoption,
	  Design, and Viability</title>
	  <author initials="S." surname="Sen" fullname="Soumya
	  Sen">
	    <organization>Carlson School of Management, University of
	    Minnesota</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_101.pdf</uri>
	      </address>
	    </author>
	  <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Lear13">
	<front>
	  <title>Standards: a love/hate relationship with
	  patents</title>
	  <author initials="E." surname="Lear" fullname="Eliot Lear">
	    <organization>Cisco Systems</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_8.pdf</uri>
	      </address>
	    </author>
	  <author initials="D." surname="Mohlenhoff" fullname="Dale
							 Mohlenhoff">
	    <organization>Cisco Systems</organization>	    
	  </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Ding13">
	<front>
	  <title>Bridge Networking Research and Internet
	  Standardization: Case Study on Mobile Traffic Offloading and
	  IPv6 Transition Technologies</title>
	  <author initials="A." surname="Yi Ding" fullname="Aaron Yi
	  Ding">
	    <organization>University of Cambridge</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_6.pdf</uri>
	      </address>
	    </author>
	  <author initials="J." surname="Korhonen" fullname="Jouna Korhonen">
	    <organization>Renesas Mobile</organization>
	    </author>
	  <author initials="T." surname="Savolainen" fullname="Teemu
							  Savolainen">
	    <organization>Nokia</organization>
	  </author>
	  <author initials="M." surname="Kojo" fullname="Markku
							   Kojo">
	    <organization>University of Helsinki</organization>
	  </author>
	  <author initials="S." surname="Tarkoma" fullname="Sasu
							  Tarkoma">
	    <organization>University of Helsinki</organization>
	  </author>
	  <author initials="J." surname="Crowcroft" fullname="Jon
							Crowcroft">
	    <organization>University of Cambridge</organization>
	  </author>
          <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Sathiaseelan13">
	<front>
	  <title>An Internet Architecture for the Challenged</title>
	  <author initials="A." surname="Sathiaseelan"
	  fullname="Arjuna Sathiaseelan">
	    <organization>Cambridge University</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_3.pdf</uri>
	      </address>
	    </author>
	  <author initials="D." surname="Trossen" fullname="Dirk
							    Trossen">
	    <organization>Cambridge University</organization>
	    </author>
	  <author initials="I." surname="Komnios" fullname="Ioannis
							    Komnios">
	    <organization>DUTH</organization>
	  </author>
	  <author initials="J." surname="Ott" fullname="Jorg Ott">
	    <organization>Aalto University</organization>
	  </author>
	  <author initials="J." surname="Crowcroft" fullname="Jon
							Crowcroft">
	    <organization>University of Cambridge</organization>
	  </author>
	  <date month="December" year="2013"/>
        </front>
      </reference>
      <reference anchor="Robachevsky13">
	<front>
	  <title>Resilience of the commons: routing security</title>
	  <author initials="A." surname="Robachevsky" fullname="Andrei
								Robachevsky">
	    <organization>Internet Society</organization>
	    <address>
	      <uri>http://www.iab.org/wp-content/IAB-uploads/2013/06/itat-2013_submission_12.pdf</uri>
	      </address>
	    </author>
	  <date month="December" year="2013"/>
        </front>
      </reference>
    </references>

    <section title="Changes">
      <t>This section to be removed prior to publication.</t>
      <t>
        <list style="symbols">
          <t>00 Initial Revision. </t>
        </list>
      </t>
    </section>
  </back>
</rfc>

PAFTECH AB 2003-20262026-04-23 08:27:35