The goal of this short document is to explain why recent developments in the Internet's infrastructure are problematic. As context, we note that the Internet was originally designed to provide a simple universal service - global end-to-end packet delivery - on which a wide variety of end-user applications could be built. The early Internet supported this packet-delivery service via an interconnected collection of commercial Internet Service Providers (ISPs) that we will refer to collectively as the public Internet. The Internet has fulfilled its packet-delivery mission far beyond all expectations and is now the dominant global communications infrastructure. By providing a level playing field on which new applications could be deployed, the Internet has enabled a degree of innovation that no one could have foreseen. To improve performance for some common applications, enhancements such as caching (as in content-delivery networks) have been gradually added to the Internet. The resulting performance improvements are so significant that such enhancements are now effectively necessary to meet current content delivery demands. Despite these tangible benefits, this document argues that the way these enhancements are currently deployed seriously undermines the sustainability of the public Internet and could lead to an Internet infrastructure that reaches fewer people and is largely concentrated among only a few large-scale providers. We wrote this document because we fear that these developments are now decidedly tipping the Internet's playing field towards those who can deploy these enhancements at massive scale, which in turn will limit the degree to which the future Internet can support unfettered innovation. This document begins by explaining our concerns but goes on to articulate how this unfortunate fate can be avoided. To provide more depth for those who seek it, we provide a separate addendum with further detail. more »« less
Balakrishnan, Hari; Banerjee, Sujata; Cidon, Israel; Culler, David; Estrin, Deborah; Katz-Bassett, Ethan; Krishnamurthy, Arvind; McCauley, Murphy; McKeown, Nick; Panda, Aurojit; et al
(, ACM SIGCOMM Computer Communication Review)
null
(Ed.)
There is now a significant and growing functional gap between the public Internet, whose basic architecture has remained unchanged for several decades, and a new generation of more sophisticated private networks. To address this increasing divergence of functionality and overcome the Internet's architectural stagnation, we argue for the creation of an Extensible Internet (EI) that supports in-network services that go beyond best-effort packet delivery. To gain experience with this approach, we hope to soon deploy both an experimental version (for researchers) and a prototype version (for early adopters) of EI. In the longer term, making the Internet extensible will require a community to initiate and oversee the effort; this paper is the first step in creating such a community.
Testart, Cecilia; Richter, Philipp; King, Alistair; Dainotti, Alberto; Clark, David
(, Passive and Active Measurement Lecture Notes in Computer Science)
Securing the Internet’s inter-domain routing system against illicit prefix advertisements by third-party networks remains a great concern for the research, standardization, and operator communities. After many unsuccessful attempts to deploy additional security mechanisms for BGP, we now witness increasing adoption of the RPKI (Resource Public Key Infrastructure). Backed by strong cryptography, the RPKI allows network operators to register their BGP prefixes together with the legitimate Autonomous System (AS) number that may originate them via BGP. Recent research shows an encouraging trend: an increasing number of networks around the globe start to register their prefixes in the RPKI. While encouraging, the actual benefit of registering prefixes in the RPKI eventually depends on whether transit providers in the Internet enforce the RPKI’s content, i.e., configure their routers to validate prefix announcements and filter invalid BGP announcements. In this work, we present a broad empirical study tackling the question: To what degree does registration in the RPKI protect a network from illicit announcements of their prefixes, such as prefix hijacks? To this end, we first present a longitudinal study of filtering behavior of transit providers in the Internet, and second we carry out a detailed study of the visibility of legitimate and illegitimate prefix announcements in the global routing table, contrasting prefixes registered in the RPKI with those not registered. We find that an increasing number of transit and access providers indeed do enforce RPKI filtering, which translates to a direct benefit for the networks using the RPKI in the case of illicit announcements of their address space. Our findings bode well for further RPKI adoption and for increasing routing security in the Internet.
Xu, Jinlai; Palanisamy, Balaji; Wang, Qingyang; Ludwig, Heiko; Gopisetty, Sandeep
(, 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid))
In the Internet of Things (loT) era, edge computing is a promising paradigm to improve the quality of service for latency sensitive applications by filling gaps between the loT devices and the cloud infrastructure. Highly geo-distributed edge computing resources that are managed by independent and competing service providers pose new challenges in terms of resource allocation and effective resource sharing to achieve a globally efficient resource allocation. In this paper, we propose a novel blockchain-based model for allocating computing resources in an edge computing platform that allows service providers to establish resource sharing contracts with edge infrastructure providers apriori using smart contracts in Ethereum. The smart contract in the proposed model acts as the auctioneer and replaces the trusted third-party to handle the auction. The blockchain-based auctioning protocol increases the transparency of the auction-based resource allocation for the participating edge service and infrastructure providers. The design of sealed bids and bid revealing methods in the proposed protocol make it possible for the participating bidders to place their bids without revealing their true valuation of the goods. The truthful auction design and the utility-aware bidding strategies incorporated in the proposed model enables the edge service providers and edge infrastructure providers to maximize their utilities. We implement a prototype of the model on a real blockchain test bed and our extensive experiments demonstrate the effectiveness, scalability and performance efficiency of the proposed approach.
Huang, Lei; Zhao, Xiaoyu; Chen, Wei; Poor, H. Vincent
(, Entropy)
Short-packet transmission has attracted considerable attention due to its potential to achieve ultralow latency in automated driving, telesurgery, the Industrial Internet of Things (IIoT), and other applications emerging in the coming era of the Six-Generation (6G) wireless networks. In 6G systems, a paradigm-shifting infrastructure is anticipated to provide seamless coverage by integrating low-Earth orbit (LEO) satellite networks, which enable long-distance wireless relaying. However, how to efficiently transmit short packets over a sizeable spatial scale remains open. In this paper, we are interested in low-latency short-packet transmissions between two distant nodes, in which neither propagation delay, nor propagation loss can be ignored. Decode-and-forward (DF) relays can be deployed to regenerate packets reliably during their delivery over a long distance, thereby reducing the signal-to-noise ratio (SNR) loss. However, they also cause decoding delay in each hop, the sum of which may become large and cannot be ignored given the stringent latency constraints. This paper presents an optimal relay deployment to minimize the error probability while meeting both the latency and transmission power constraints. Based on an asymptotic analysis, a theoretical performance bound for distant short-packet transmission is also characterized by the optimal distance–latency–reliability tradeoff, which is expected to provide insights into designing integrated LEO satellite communications in 6G.
Scanteianu, Adriana; Schwandt, Hilary M.; Boulware, Angel; Corey, Julia; Herrera, Ana; Hudler, Ethan; Imbabazi, Claudette; King, Ilia; Linus, Jessica; Manzi, Innocent; et al
(, Reproductive Health)
Abstract Background Contraceptive use in Rwanda tripled since 2005. This study aims to understand the role of coordinated and integrated public family planning service delivery in achieving this increase in contraceptive use in Rwanda. Methods This qualitative study in 2018 included eight focus group discussions with family planning providers and 32 in-depth interviews with experienced family planning users. Results Results indicate a well-coordinated public family planning service delivery system with community health workers and nurses filling different and complementary roles in meeting family planning client needs at the local level. In addition, integration of family planning into other maternal and child health services is the norm. Conclusions The coordination and integration of family planning across both providers and services may help explain the rapid increase in Rwanda’s contraceptive use and has potential applications for enhancing family planning service delivery in other settings.
Blumenthal, Marjory, Govindan, Ramesh, Katz-Bassett, Ethan, Krishnamurthy, Arvind, McCauley, James, Merrill, Nick, Narechania, Tejas, Panda, Aurojit, and Shenker, Scott. Can We Save the Public Internet?. Retrieved from https://par.nsf.gov/biblio/10492345. ACM SIGCOMM Computer Communication Review 53.3 Web. doi:10.1145/3649171.3649175.
Blumenthal, Marjory, Govindan, Ramesh, Katz-Bassett, Ethan, Krishnamurthy, Arvind, McCauley, James, Merrill, Nick, Narechania, Tejas, Panda, Aurojit, and Shenker, Scott.
"Can We Save the Public Internet?". ACM SIGCOMM Computer Communication Review 53 (3). Country unknown/Code not available: ACM. https://doi.org/10.1145/3649171.3649175.https://par.nsf.gov/biblio/10492345.
@article{osti_10492345,
place = {Country unknown/Code not available},
title = {Can We Save the Public Internet?},
url = {https://par.nsf.gov/biblio/10492345},
DOI = {10.1145/3649171.3649175},
abstractNote = {The goal of this short document is to explain why recent developments in the Internet's infrastructure are problematic. As context, we note that the Internet was originally designed to provide a simple universal service - global end-to-end packet delivery - on which a wide variety of end-user applications could be built. The early Internet supported this packet-delivery service via an interconnected collection of commercial Internet Service Providers (ISPs) that we will refer to collectively as the public Internet. The Internet has fulfilled its packet-delivery mission far beyond all expectations and is now the dominant global communications infrastructure. By providing a level playing field on which new applications could be deployed, the Internet has enabled a degree of innovation that no one could have foreseen. To improve performance for some common applications, enhancements such as caching (as in content-delivery networks) have been gradually added to the Internet. The resulting performance improvements are so significant that such enhancements are now effectively necessary to meet current content delivery demands. Despite these tangible benefits, this document argues that the way these enhancements are currently deployed seriously undermines the sustainability of the public Internet and could lead to an Internet infrastructure that reaches fewer people and is largely concentrated among only a few large-scale providers. We wrote this document because we fear that these developments are now decidedly tipping the Internet's playing field towards those who can deploy these enhancements at massive scale, which in turn will limit the degree to which the future Internet can support unfettered innovation. This document begins by explaining our concerns but goes on to articulate how this unfortunate fate can be avoided. To provide more depth for those who seek it, we provide a separate addendum with further detail.},
journal = {ACM SIGCOMM Computer Communication Review},
volume = {53},
number = {3},
publisher = {ACM},
author = {Blumenthal, Marjory and Govindan, Ramesh and Katz-Bassett, Ethan and Krishnamurthy, Arvind and McCauley, James and Merrill, Nick and Narechania, Tejas and Panda, Aurojit and Shenker, Scott},
}
Warning: Leaving National Science Foundation Website
You are now leaving the National Science Foundation website to go to a non-government website.
Website:
NSF takes no responsibility for and exercises no control over the views expressed or the accuracy of
the information contained on this site. Also be aware that NSF's privacy policy does not apply to this site.