40 years ago the Request for Comments (RFC) process for the Internet was born. The RFC process continues to be the way Internet protocols are expressed today. We have one very special man to thank for this and his name is Dr. Stephen D. Crocker. He has played a key role in shaping the modern day Internet. For this, I felt that a special tribute to him was in order as we take a look at his countless contributions from the foundation of the Internet to the Internet as we know it today. more
When I was employed, I ran my own mail server and my own BlackBerry Enterprise Server, and I had things tuned pretty much exactly as I wanted them. My incoming mail got some custom processing that looked the sender's address up in my address book and assigned the message a category... I was a very happy email user. Now that I'm on my own, I've decided not to run my own server and all that software, and I've switched to Gmail and the T-Mobile BlackBerry server... Surprisingly, though, I'm mostly still happy... more
Remarkable how Ethernet has evolved and been widely adopted over this quarter of a century period extending its reach from LAN to MAN to WAN and from 10meg to 10gigE. One has to credit the IEEE for quite an efficient job as a standards body. Over in the IP world, this month of March will see IETF 74 meet in San Francisco and continue to ponder transitions, address translations, double translations, even carrier grade translations... more
While Google admits that offering its services over IPv6 is still in its infancy, the company today announced the option for accessing Google services over IPv6. Last year, Google started offering Google search over IPv6 on IPv6-only websites like 'ipv6.google.com' requiring IPv6 connection, but other Google products have not been generally available over IPv6, says Google. "That's why we created Google over IPv6." more
Here is a list of the most viewed news and blog postings that were featured on CircleID in 2008... Best wishes for 2009 and Happy New Year from all of us here at CircleID. more
After more than two years of work behind closed doors, the Global Network Initiative is launching this week. That's the corporate code of conduct on free speech and privacy I've been talking about in generalities for quite some time. By midnight Tuesday U.S. East Coast time, the full set of documents and list of initial signatories will be made publicly available at globalnetworkinitiative.org. more
The following is most of the generic Top-Level Domain (gTLD) strings applied for in the 2000 and 2003 applications. Some are two, and even one character ASCII strings. Some have since been approved, or disapproved (which of course means nothing in the 2008 round). It is a universe of 180 strings. Enjoy. more
One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more
"The world is flattening," says Dave Rubal at the FOSE Conference and Exhibition this week in Washington, DC. "The race for IT dominance is on, and it is coming west." Mr. Rubal, Cisco's Worldwide Internet Protocol version 6 (IPv6) Task Force Lead, spoke of the tremendous race in IT dominance that is occurring, stating that the "mainstay technologies at the Beijing Olympics will be IPv6-powered." IPv6 is in line to replace version 4, but Rubal hinted that China and other Far East countries may be adopting the new version faster than the United States... more
The Internet Architecture Board's (IAB) chair, Olaf Kolkman, asked the members of the IAB to provide a statement paper each on what they believe the current most pressing issues in terms of Internet architecture are... I have thought about this for the past few days, and realised that it's hard to come up with overarching issues and even harder to come up with issues, where the IAB actually could make a difference. But I came with up with two issues. more
The National Institute for Standards and Technology (NIST) has released a second draft of a proposed standards profile to support the implementation of IPv6 by government agencies. "NIST developed the 'profile' to help ensure that IPv6-enabled federal information systems are interoperable, secure and able to co-exist with the current IPv4 systems." ...The White House's Office of Management and Budget declared in 2005 that all federal agencies shall migrated to IPv6 by June 30, 2008... more
Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more
Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more
When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more
Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more