Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more
Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more
When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more
Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more
Many communications networks are constructed for a single form of communication, and are ill suited to being used for any other form. Although the Internet is also a specialized network in terms of supporting digital communications, its relatively unique flexibility lies in its ability to digitally encode a very diverse set of communications formats, and then support their interaction over the Internet. In this way many communications networks can be mapped into an Internet application and in so doing become just another distributed application overlayed on the Internet. From this admittedly Internet-centric perspective, voice is just another Internet application. And for the growing population of Voice over IP (VoIP) users, this is indeed the case... more
In this article, published in the Federal Communications Law Journal (FCLJ), the authors (Reed E. Hundt and Gregory L. Rosston) have proposed sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. The following excerpt from the article looks into service competition with respect to VoIP... more
The IETF MARID working group has been slogging away all summer trying to produce a draft standard about e-mail sender verification. They started with Meng Wong's SPF and Microsoft's Caller ID for E-mail, which got stirred together into a hybrid called Sender ID. One of the issues hanging over the MARID process has been Microsoft's Intellectual Property Rights (IPR) in Caller ID and Sender ID. The IETF has a process described in RFC 3668 that requires contributors to disclose IPR claims related to their contributions. more
The Internet Society has announced the 2024 Jonathan B. Postel Service Award recipients, honoring Steve Crocker and Xing Li for their pioneering work in advancing the global Internet infrastructure. more
On May 19, 2024, the Internet's 50th anniversary was celebrated in a virtual event named i50, drawing participation from 1,000 IEEE members and internet enthusiasts from 56 countries. The live-streamed event was a highlight in a series of celebrations marking this milestone. more
Digital communications systems always represent a collection of design trade-offs. Maximizing one characteristic of a system may impair others, and various communications services may choose to optimize different performance parameters based on the intersection of these design decisions with the physical characteristics of the communications medium. more
There have been a number of occasions when the Internet Engineering Task Force (IETF) has made a principled decision upholding users' expectations of privacy in their use of IETF-standardised technologies. (Either that, or they were applying their own somewhat liberal collective bias and to the technologies they were working on!) The first major such incident that I can recall is the IETF's response to the US CALEA measures. more
The world of the Internet mourns the loss of a pioneering force, as Dave Mills, a luminary in the realm of computer networking, passed away on January 17, 2024, at the age of 86 (announced by Vint Cerf). A trailblazer and visionary, Mills played a pivotal role in shaping the very foundations of the interconnected world we inhabit today. more
ome 50 years ago, at the Palo Alto Research Centre of that renowned photocopier company Xerox, a revolutionary approach to local digital networks was born. On the 22nd of May 1973, Bob Metcalf authored a memo that described "X-Wire," a 3Mbps common bus office network system developed at Xerox's Palo Alto Research Center (PARC). more
The idea for Ethernet was born fifty years ago in May 1973 when Robert Metcalf coined the word Ethernet. He had been studying ALOHAnet, developed at the University of Hawaii in 1971 and was the first public demonstration of a wireless packet data network. Metcalf used the work Ethernet as a reference to luminiferous aether, a concept postulated in the 17th century to explain how light could be transmitted through a vacuum. more
At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more