Tussle in cyberspace: defining tomorrow's internet

The architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end to end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a recognized component of mainstream society, new requirements have emerged that suggest new design principles, and perhaps suggest that we revisit some old ones. This paper explores one important reality that surrounds the Internet today: different stakeholders that are part of the Internet milieu have interests that may be adverse to each other, and these parties each vie to favor their particular interests. We call this process "the tussle". Our position is that accommodating this tussle is crucial to the evolution of the network's technical architecture. We discuss some examples of tussle, and offer some technical design principles that take it into account.

[1]  Thomas E. Anderson,et al.  Protocol design in an uncooperative internet , 2002 .

[2]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[3]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[4]  Yakov Rekhter,et al.  EGP and policy based routing in the new NSFNET backbone , 1989, RFC.

[5]  William A. Wulf,et al.  Policy/mechanism separation in Hydra , 1975, SOSP.

[6]  Dominique Vinck,et al.  Everyday Engineering. An ethnography of Design and Innovation , 2003 .

[7]  Clayton M. Christensen The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .

[8]  R. Westrum The Social Construction of Technological Systems , 1989 .

[9]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[10]  Kristin Braa,et al.  Technology as traitor: emergent SAP infrastructure in a global organization , 1998, ICIS '98.

[11]  Xiaowei Yang,et al.  NIRA: a new Internet routing architecture , 2003, FDNA '03.

[12]  L. McKnight,et al.  Internet economics , 1997 .

[13]  Kenneth G. Binmore,et al.  Essays on Foundations of Game Theory , 1982 .

[14]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[15]  Joseph Farrell,et al.  Choosing How to Compete: Strategies and Tactics in Standardization , 1994 .

[16]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[17]  M. Callon Techno-economic Networks and Irreversibility , 1990 .

[18]  Joan Feigenbaum,et al.  Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.

[19]  Jim Boyle,et al.  Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .

[20]  S. Woolgar Configuring the User: The Case of Usability Trials , 1990 .

[21]  Noam Nisan,et al.  Algorithmic Mechanism Design , 2001, Games Econ. Behav..

[22]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[23]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[24]  Robert Tappan Morris,et al.  Resilient overlay networks , 2001, SOSP.

[25]  N. Economides The economics of networks , 1996 .

[26]  B. Latour Technology is Society Made Durable , 1990 .

[27]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[28]  Kirk Lougheed,et al.  Border Gateway Protocol (BGP) , 2021, IP Routing Protocols.

[29]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[30]  W. Lehr Compatibility Standards And Industry Competition: Two Case Studies , 1996 .

[31]  Stefan Savage,et al.  TCP congestion control with a misbehaving receiver , 1999, CCRV.

[32]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[33]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[34]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[35]  D. Edge,et al.  The social shaping of technology , 1988 .