Overlay networks and the future of the internet

In recent years, we have seen the emergence of numerous types of so-called "overlay" networks in the internet. There are many diverse examples of such overlay networks including the content-delivery-caching networks, implemented by companies like Akamai, the peer-to-peer file sharing networks associated with applications such as BitTorrent, the voice-over-IP services offered via Skype, and various testbed networks such as PlanetLab. Such overlays have important technological and policy implications for the evolution of next generation internet architecture. This paper provides a first attempt to understand the implications of such overlays for internet architecture, industry structure, and policy. We introduce a taxonomy for thinking about these overlays with some examples of their scale and growing importance in the internet, and suggest some preliminary thoughts on the implications of these overlays for industry structure and policy. he internet started out as a government-funded research network running on top of the Public Switched Telecommunications Network (PSTN). The internet was a data application, mostly unregulated, that was supported on top of the public-utility regulated telephone networks. The internet was an "overlay" that complemented the underlying basic infrastructure of the PSTN by adding new functionality (packet-switched data network) to support the special needs of the research community (peer-to- peer computer communications). Most of the incremental investment in routers, servers, and access devices (PCs) was undertaken by new types of providers (Internet Service Providers or ISPs) and by end-users (Customer Premise Equipment or CPE) to complement the PSTN basic infrastructure already in place. With the commercialization of the internet in the 1980s and its emergence as a mass market platform for broadband communications in the 1990s, the internet has evolved into the principal platform for our global public communications infrastructure. Increasingly, IP packet transport is

[1]  Scott Shenker,et al.  Overcoming the Internet impasse through virtualization , 2005, Computer.

[2]  Diego Lanzi,et al.  Content Delivery and Vertical Integration in On-line Content Markets , 2005 .

[3]  Kevin Werbach,et al.  A Layered Model for Internet Policy , 2005, J. Telecommun. High Technol. Law.

[4]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[5]  Nick Feamster,et al.  Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.

[6]  I. Stoica,et al.  Internet indirection infrastructure , 2002, SIGCOMM '02.

[7]  David Mazières,et al.  Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.

[8]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[9]  D ClarkDavid,et al.  Rethinking the design of the Internet , 2001 .

[10]  Mark A. Lemley,et al.  The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era , 2000 .

[11]  Eli Herscovitz,et al.  Secure virtual private networks: the future of data communications , 1999, Int. J. Netw. Manag..

[12]  D. Saunders The brave new world , 1999 .

[13]  William E. Moen,et al.  Realizing the information future: The internet and beyond , 1996 .

[14]  Lance J. Hoffman,et al.  Cryptography policy , 1994, CACM.

[15]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[16]  R. Sami,et al.  The Growth of Internet Overlay Networks : Implications for Architecture , Industry Structure and Policy , 2005 .

[17]  Rob Frieden,et al.  Adjusting the Horizontal and Vertical in Telecommunications Regulation: A Comparison of the Traditional and a New Layered Approach , 2003 .

[18]  Lorrie Faith Cranor,et al.  Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.

[19]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.