Archive for the 'Policy' Category

thoughts on ICANN’s plans to expand the DNS root zone by orders of magnitude

Wednesday, January 19th, 2011 by kc

My recently submitted public comments on the increasingly controversial issue of ICANN’s plans to expand the generic Top Level Domain namespace indefinitely:

  1. a repeat of my still unaddressed comments from the last (June 2010) economic report,
  2. an attempt to summarize some public comments to that June 2010 report,
  3. end an abbreviated historical timeline of ICANN’s economic research commitment to launching new gTLDs.

(more…)

my first “Future Internet Architecture” PI meeting

Wednesday, January 5th, 2011 by kc

Among the interesting meetings I attended in 2010 was the principal investigators (PI) meeting for NSF’s new “Future Internet Architecture” (FIA) program. The FIA program builds on the successes of NSF’s previous Future Internet Design (FIND) program, the recommendations of a review panel, and a community summit in October 2009. (The FIND program itself has been integrated into NSF’s new Network Science and Engineering research program, while the four FIA teams are attempting to implement some of the ideas developed thus far.) CAIDA is participating in one of these projects — Named Data Networking (NDN), led by Van Jacobson at Xerox Parc and Lixia Zhang at UCLA. (Background links to 2010 technical report describing the proposed architecture, Van’s August 2006 video lecture and 2009 ACM Queue Q&A on NDN ideas.)

(more…)

my first FCC TAC meeting

Monday, November 15th, 2010 by kc

I recently attended my first FCC Technological Advisory Council meeting (video archives). A week before the meeting we received a memo from the chairman of the committee (Tom Wheeler) notifying the committee of a “clear and challenging mandate from Chairman Genachowski: to generate ideas and spur actions that lead to job creation and economic growth in the ICT [information and communication technologies] ecosystem.” Specifically, “The TAC will focus on the short term implementation of innovative ideas to create investment and jobs, as opposed to long term regulatory changes.”

(more…)

On economic frameworks for gTLDs

Wednesday, August 11th, 2010 by kc

[I submitted the following public comment to ICANN in response to their second attempt at commissioning An Economic Framework for the Analysis of the Expansion of Generic Top-Level Domain Names. I’ll link to ICANN’s summary of all public comments on this report when available. -k]

This second economic report posted 16 june (pdf) is an improvement over the June 2009 reports by Dennis Carlton (pdf, pdf) but there are still too many — and too fundamental — flaws for it to serve as the basis of any ICANN policy on new gTLDs:

(more…)

IP-AS mappings

Wednesday, July 28th, 2010 by Amogh Dhamdhere

We have performed an analysis of the IP-AS mapping obtained from Routeviews/RIPE collectors.

A crucial step in various research efforts that study the Internet infrastructure is to map an IP address to the Autonomous System (AS) to which it is assigned. The most common approach to map IP addresses to ASes is by using BGP table dumps from public repositories such as Routeviews and RIPE. We assign “ownership” of an IP address to the AS that originates the longest BGP prefix that matches the IP address. Routeviews and RIPE, however, have multiple collectors, each of which peers with a diverse set of ASes. Consequently, the IP-AS mapping obtained by using the BGP table dump from one collector could be different from that obtained from a different collector. The obvious solution is to aggregate views from as many vantage points as possible to obtain the most complete IP-AS mapping possible. In practice, however, it is common to use data from just one or two collectors, as it greatly simplifies the process of collecting and pre-processing data. The goal of our analysis is to compare different collectors, in terms of the different metrics that we are interested in, viz. address space coverage, IP-AS mapping, unique ASes, unique prefixes, unique more specific prefixes, AS links, and AS paths. Further, we study the utility of adding data from more collectors, in terms of the resulting change in the aforementioned metrics. Finally, we compare the IP-AS mapping from Routeviews and RIPE tables with that obtained from Team Cymru’s whois service.

(more…)

Growth trends in the AS-level Internet

Friday, May 7th, 2010 by Amogh Dhamdhere

We have studied growth trends in the number of ASes seen advertised in the global routing system from different regional registries (similar to Geoff Huston’s 32-bit AS Number Report, but with per-registry trends). We used Routeviews and RIPE BGP dumps over the last 12 years, and Team Cymru’s WHOIS lookup service to map ASNes to registries as of March 2010. To our knowledge, historical data to map an ASN to a regional registry at any given time in the past is not available, so we cannot account for ASN movement between registries. More information about the data collection and pre-processing is in our IMC 2008 paper, “Ten Years in the Evolution of the Internet Ecosystem” and our supplemental data page.

(more…)

data collection and reporting requirements for broadband stimulus recipients

Thursday, November 12th, 2009 by kc

No one was more surprised than I to see data collection requirements in the NTIA’s Notice of Funds Availability (NOFA) for the Rural Utilities Service’s (RUS) Broadband Initiatives Program (BIP) and the Broadband Technology Opportunities Programs (BTOP):

(more…)

What’s Belmont Got To Do With It?

Friday, June 12th, 2009 by Erin Kenneally

Recently a group of Internet technology researchers, attorneys and policy professionals participated in a DHS-sponsored workshop, “Ethical Principles and Guidelines for the Protection of Human Subjects in Information and Communications Technology Network and Security Research.” Possible nickname: Belmont Flux Workshop. If you’re still glassy-eyed: (1) you have yet to engage the depths of an Institutional Review Board (IRB) in the context of network and security research; (2) you gave up after seeing “Ethical principles”; and/or (3) you think human subjects issues and network research are orthogonal.

Here’s a summary of the event, and hopefully some inspiration.

(more…)

Proposal for ICANN/RIR scenario planning exercise

Monday, May 25th, 2009 by kc

Internet infrastructure economics research”, and how to do reasonable examples of it, has come up a lot lately, so i’m posting a brief description of an academic+icann community workshop i’ve been recommending for a few years, which has yet to happen, and (I still believe) is long past due, and specifically more important than passing policies, especially emergency ones to allow IP address markets with no supporting research on the impact on security and stability of the Internet, and even at the risk of killing IPv6 altogether.]

(more…)

ethical phishing experiments have to lie?

Monday, May 4th, 2009 by kc

Stefan pointed me at a paper titled “Designing and Conducting Phishing Experiment” (in IEEE Technology and Society Special Issue on Usability and Security, 2007) that makes an amazing claim: it might be more ethical to not debrief the subjects of your phishing experiments after the experiments are over, in particular you might ‘do less harm’ if you do not reveal that some of the sites you had them browse were phishing sites.

(more…)