Internet Protocol

Internet Protocol / Most Commented

Google Rolling Out Its Services Over IPv6

While Google admits that offering its services over IPv6 is still in its infancy, the company today announced the option for accessing Google services over IPv6. Last year, Google started offering Google search over IPv6 on IPv6-only websites like 'ipv6.google.com' requiring IPv6 connection, but other Google products have not been generally available over IPv6, says Google. "That's why we created Google over IPv6." more

CircleID’s Top 10 Posts of 2008

Here is a list of the most viewed news and blog postings that were featured on CircleID in 2008... Best wishes for 2009 and Happy New Year from all of us here at CircleID. more

The Global Network Initiative

After more than two years of work behind closed doors, the Global Network Initiative is launching this week. That's the corporate code of conduct on free speech and privacy I've been talking about in generalities for quite some time. By midnight Tuesday U.S. East Coast time, the full set of documents and list of initial signatories will be made publicly available at globalnetworkinitiative.org. more

New gTLDs String Theory for Bidders

The following is most of the generic Top-Level Domain (gTLD) strings applied for in the 2000 and 2003 applications. Some are two, and even one character ASCII strings. Some have since been approved, or disapproved (which of course means nothing in the 2008 round). It is a universe of 180 strings. Enjoy. more

The End of End-to-End?

One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more

Cisco Speaks at FOSE on IPv6 Enterprise Architecture Transition

"The world is flattening," says Dave Rubal at the FOSE Conference and Exhibition this week in Washington, DC. "The race for IT dominance is on, and it is coming west." Mr. Rubal, Cisco's Worldwide Internet Protocol version 6 (IPv6) Task Force Lead, spoke of the tremendous race in IT dominance that is occurring, stating that the "mainstay technologies at the Beijing Olympics will be IPv6-powered." IPv6 is in line to replace version 4, but Rubal hinted that China and other Far East countries may be adopting the new version faster than the United States... more

Hot Architectural Issues for the Internet

The Internet Architecture Board's (IAB) chair, Olaf Kolkman, asked the members of the IAB to provide a statement paper each on what they believe the current most pressing issues in terms of Internet architecture are... I have thought about this for the past few days, and realised that it's hard to come up with overarching issues and even harder to come up with issues, where the IAB actually could make a difference. But I came with up with two issues. more

NIST Releases a Profile for IPv6 in the U.S. Government for Comment - Comments Due Feb. 29

The National Institute for Standards and Technology (NIST) has released a second draft of a proposed standards profile to support the implementation of IPv6 by government agencies. "NIST developed the 'profile' to help ensure that IPv6-enabled federal information systems are interoperable, secure and able to co-exist with the current IPv4 systems." ...The White House's Office of Management and Budget declared in 2005 that all federal agencies shall migrated to IPv6 by June 30, 2008... more

A Root Server With a View…

Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more

Change of Leadership at ICANN as Cerf Makes Way for Intellectual Property Expert

Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more

Congestion in the Backbone: Telecom and Internet Solutions

When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more

Mitigating Spoofed Attacks Using IPv6 Address Space

Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more

ENUM: Mapping the E.164 Number Space into the DNS

Many communications networks are constructed for a single form of communication, and are ill suited to being used for any other form. Although the Internet is also a specialized network in terms of supporting digital communications, its relatively unique flexibility lies in its ability to digitally encode a very diverse set of communications formats, and then support their interaction over the Internet. In this way many communications networks can be mapped into an Internet application and in so doing become just another distributed application overlayed on the Internet. From this admittedly Internet-centric perspective, voice is just another Internet application. And for the growing population of Voice over IP (VoIP) users, this is indeed the case... more

Communications Policy for 2006 and Beyond: VoIP as a Case in Point

In this article, published in the Federal Communications Law Journal (FCLJ), the authors (Reed E. Hundt and Gregory L. Rosston) have proposed sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. The following excerpt from the article looks into service competition with respect to VoIP... more

History of SMTP

The following excerpt is from the Free Software Magazine, March 2005 Issue, written by Kirk Strauser. To read the entire article, you may download the magazine here [PDF]. Also thanks to Yakov Shafranovich for making us aware of this publication. "Spam has existed since at least 1978, when an eager DEC sales representative sent an announcement of a product demonstration to a couple hundred recipients. The resulting outcry was sufficient to dissuade most users from repeating the experiment. This changed in the late 1990s: millions of individuals discovered the internet and signed up for inexpensive personal accounts and advertisers found a large and willing audience in this new medium." more