draft-arkko-internet-consolidation-00.txt | draft-arkko-internet-consolidation.txt | |||
---|---|---|---|---|
Internet Engineering Task Force J. Arkko | Network Working Group J. Arkko | |||
Internet-Draft Ericsson | Internet-Draft Ericsson | |||
Intended status: Informational B. Trammell | Intended status: Informational B. Trammell | |||
Expires: April 26, 2019 ETH Zurich | Expires: January 10, 2020 ETH Zurich | |||
M. Nottingham | M. Nottingham | |||
Fastly | ||||
C. Huitema | C. Huitema | |||
Private Octopus Inc. | Private Octopus Inc. | |||
M. Thomson | M. Thomson | |||
Mozilla | Mozilla | |||
J. Tantsura | J. Tantsura | |||
Nuage Networks | Apstra, Inc. | |||
October 23, 2018 | N. ten Oever | |||
University of Amsterdam | ||||
July 09, 2019 | ||||
Considerations on Internet Consolidation and the Internet Architecture | Considerations on Internet Consolidation and the Internet Architecture | |||
draft-arkko-iab-internet-consolidation-00 | draft-arkko-iab-internet-consolidation-02 | |||
Abstract | Abstract | |||
Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
centralised entities in many areas. This phenomenon could be looked | centralised entities in many areas. This phenomenon could be looked | |||
at from many different angles, but this memo considers the topic from | at from many different angles, but this memo considers the topic from | |||
the perspective of how available technology and Internet architecture | the perspective of how available technology and Internet architecture | |||
skipping to change at page 1, line 46 | skipping to change at page 1, line 48 | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on April 26, 2019. | This Internet-Draft will expire on January 10, 2020. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | ||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | ||||
2. Consolidation . . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
2.1. Economics . . . . . . . . . . . . . . . . . . . . . . . . 4 | ||||
2.2. Data- and Capital-intensive Services . . . . . . . . . . 4 | ||||
2.3. Permissionless Innovation . . . . . . . . . . . . . . . . 5 | ||||
2.4. Fundamentals of Communication . . . . . . . . . . . . . . 5 | ||||
2.5. Technology Factors . . . . . . . . . . . . . . . . . . . 5 | ||||
3. Action . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | ||||
4. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
6. Informative References . . . . . . . . . . . . . . . . . . . 8 | ||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
1. Introduction | 1. Introduction | |||
Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
centralised entities in many areas. | centralised entities in many areas. | |||
Is Internet traffic consolidating, i.e., moving towards a larger | We use the term Internet consolidation to refer to the process of the | |||
fraction of traffic involving a small set of large content providers | increasing control over Internet infrastructure and services by a | |||
or social networks? It certainly appears so, though more | small set of organizations. Such concentration has an obvious effect | |||
quantitative research on this topic would be welcome. | on traffic flows or on services and systems that are daily used by a | |||
large population of Internet users. However, it can also create | ||||
secondary effects, where the ability to collect information or to | ||||
affect something is concentrated in that small set of organizations. | ||||
Consolidation may also affect technology choices and the evolution of | ||||
the Internet architecture. For example, large organizations or | ||||
organizations providing important technology components may have a | ||||
significant impact on what technology is deployed for large numbers | ||||
of users or by other organizations. | ||||
Our first question is whether the Internet is indeed consolidating. | ||||
It certainly appears so, but more quantitative research on this topic | ||||
would be welcome. It is also possible that there is only a | ||||
perception of consolidation, as market forces have caused business | ||||
changes in new areas of business. Arguably, today's consolidation | ||||
areas seem to be more in the application layer than further down in | ||||
the stack or in operating systems, as was the case some years ago. | ||||
The second question is if we are seeing consolidation simply moving | ||||
to new areas. | ||||
This phenomenon could be looked at from many different angles, but | This phenomenon could be looked at from many different angles, but | |||
this memo considers the topic from the perspective of how available | this memo considers the topic from the perspective of how available | |||
technology and Internet architecture drives different market | technology and Internet architecture drives different market | |||
directions. How are technology choices and fundamentals of | directions. Our third question is if the Internet technology has | |||
communication affecting some of these trends? | influenced the consolidation trends in some manner. And conversely, | |||
Our engineering remit is to focus on technology, but of course we | the fourth question asks how Internet consolidation is influencing | |||
also want to understand the implications and externalities of the | the development of the Internet infrastructure and architecture. | |||
technical arrangements we design. Technology affects economics and | ||||
vice versa. The Internet technology community continues to make | ||||
decisions that have ramifications on Internet systems, just as we are | ||||
subject to forces that affect them. | ||||
As technologists, one question we have is whether there are changes | The engineering remit at the IETF is to focus on technology, but of | |||
in technology that would help reduce technically-driven large-player | course we also want to understand the implications and externalities | |||
advantages. | of the technical arrangements we design. Technology affects | |||
economics and vice versa. The Internet technology community | ||||
continues to make decisions that have ramifications on Internet | ||||
systems, just as we are subject to forces that affect them. | ||||
As technologists, our fourth question is whether there are changes in | ||||
technology that would help reduce those large-player advantages that | ||||
are technically-driven. | ||||
This memo reviews areas where consolidation may be occurring in the | This memo reviews areas where consolidation may be occurring in the | |||
Internet, and discusses the potential reasons for this. Section 2 | Internet, and discusses the potential reasons for this. The memo | |||
starts by reviewing other work in this area in Section 2. Section 3 | ||||
discusses consolidation and the reasons behind the creation of larger | discusses consolidation and the reasons behind the creation of larger | |||
entities, and Section 3 looks at some actions that might alleviate | entities, and Section 4 looks at some actions that might alleviate | |||
the situation. | the situation. | |||
Note: If you are interested on this or other architecture-related | If you are interested on this or other architecture-related topics, | |||
topics, please subscribe to the IAB architecture-discuss mailing list | please subscribe to the IAB architecture-discuss mailing list as one | |||
as one forum for discussion. | forum for discussion. Similarly, the Internet Society has chosen | |||
consolidation as a focus topic for their year 2019 activities. Their | ||||
report is in [ISOC]. | ||||
2. Consolidation | 2. Other Work | |||
One of the causes for the current consolidation of the Internet | ||||
infrastructure can be traced back to some of the assumptions that | ||||
were made during the commercialization of the Internet in the early | ||||
1990s [Abbate], despite [RFC1192] describing some potential issues | ||||
that could arise. Overall it was expected the combination of | ||||
commercialization, together with the technical and architectural | ||||
characteristics of the Internet, such as its modularity and layering | ||||
principles, would lead to perfect markets, free competition and | ||||
decentralized structures [LitanRivlin]. | ||||
But as we know now, this did not happen entirely as expected. Some | ||||
even argue that 'market concentrations, control and power struggles | ||||
are categories to adequately describe the fundamental dynamics of the | ||||
commercial Internet' [DolataSchrape]. While the privatization was | ||||
supposed to lead to competition and innovation [Cowheyetal] | ||||
[VanSchewick], some argue that it actually led to the emergence of | ||||
Internet oligopolies [Mansell] [Smyrnaios]. | ||||
Current scientific economic thinking harbors two different schools of | ||||
thought vis-a-vis efficient markets and monopolies. The school of | ||||
thought based on Adam Smith argues that unfettered markets tend to | ||||
concentration of wealth and income, whereas liberal economists | ||||
believe in efficient markets that stimulate competition. | ||||
On the other hand, according to Joseph Stiglitz, 'many sectors - | ||||
telecommunications, cable TV, digital branches from social media to | ||||
Internet search, health insurance, pharmaceuticals, agro-business, | ||||
and many more - cannot be understood through the lens of competition' | ||||
[Stiglitz]. The considerations of technologists and policy makers at | ||||
the time of the commercialization and privatization of the Internet | ||||
infrastructure might have been based on a belief in efficient | ||||
markets, whereas we are now finding out this might not always be how | ||||
markets function. | ||||
Recently there is a growing body of literature that the currently | ||||
observed consolidation into oligopolies and monopolies can be | ||||
described as a failure of economic policy, which could be addressed | ||||
with revamped, or improved anti-trust policies [Wu] [Khan]. On the | ||||
other hand there are those who criticize these proposals for their | ||||
economic determinism; merger reviews, company break-ups and | ||||
'trustbusting' do not necessarily change the structure of a market. | ||||
Technology might actually have a role to play in this as well. The | ||||
IETF in specific, and the Internet governance regime complex [Nye] in | ||||
general, has been designed as a distributed arrangement to prevent | ||||
capture of the infrastructure by a single interest group or actor. | ||||
Where power or control was centralized, specific governance | ||||
arrangements were put into place to counter the centralization of | ||||
power. | ||||
It cannot be denied that 'market actors have contributed immensely to | ||||
the evolution of the Internet in terms of investment, products, | ||||
services, and infrastructure, and the government's light-handed | ||||
approach to regulation has given producers and consumers substantial | ||||
freedom to innovate and to self-regulate with respect to many issues | ||||
affecting the Internet community in ways that have produced | ||||
substantial social benefits' [Frischmann]. But the current | ||||
consolidation in ownership of and control over the Internet | ||||
infrastructure was not foreseen [Clark], and arguably the loss of | ||||
decentralized control goes against its design objectives. For | ||||
instance, [RFC1958] says: | ||||
This allows for uniform and relatively seamless operations in a | ||||
competitive, multi-vendor, multi-provider public network. | ||||
and | ||||
Heterogeneity is inevitable and must be supported by design. | ||||
And [RFC3935] says: | ||||
We embrace technical concepts such as decentralized control, edge- | ||||
user empowerment and sharing of resources, because those concepts | ||||
resonate with the core values of the IETF community. | ||||
3. Factors Driving Consolidation | ||||
Consolidation is driven by economic factors relating to scale and | Consolidation is driven by economic factors relating to scale and | |||
ability to reach a large market over the Internet. In general, an | ability to easily reach a large market of users over the Internet. | |||
efficient market such as the Internet tends to enable winners to take | This kind of setting tends to enable winners to take large market | |||
large market shares. | shares, whether those winners came about through the model that | |||
liberal economists believe in or the model that Adam Smith believes | ||||
in. | ||||
The most visible aspects of this involve well-recognised Internet | The most visible aspects of this involve well-recognized Internet | |||
services, but it is important to recognise that the Internet is a | services. The Internet Society's report summarised the market | |||
complex ecosystem. There are many underlying services whose | position of popular Internet service brands as follows [ISOC]: | |||
diversity, or lack thereof, are as important as that of, say, | ||||
consumer-visible social networks. For instance, the diversity of | ||||
cloud services, operating systems, browser engines is as important as | ||||
that as of application stores or the browsers themselves. | ||||
Of course, the Internet allows plenty of choice both in these and | o Facebook and Google have been estimated to account for 84% of | |||
other areas. Too many or too few choices create different kinds of | global digital advertising investment (excluding China). | |||
o Amazon is expected to account for 49.1% of all online retail | ||||
spending in the US. Similarly, Alibaba is estimated to have close | ||||
to 60% of the e-commerce market in China. | ||||
o Google alone holds 90% of the global search market, over 60% of | ||||
web browsers, and has the number 1 (by far) mobile operating | ||||
system (Android). | ||||
o Facebook - incorporating Facebook Messenger, WhatsApp, and | ||||
Instagram - holds 4 of the world's top 6 social media platforms. | ||||
But it is important to recognize that the Internet is a complex | ||||
ecosystem. There are many underlying services whose diversity, or | ||||
lack thereof, are as important as that of, say, consumer-visible | ||||
social networks. For instance, the diversity of cloud services, | ||||
operating systems, and browser engines is as important as that as of | ||||
application stores or the browsers themselves. | ||||
Of course, the Internet allows plenty of choice in these and other | ||||
areas. Too many or too few choices create different kinds of | ||||
problems. | problems. | |||
It would be useful to break these general factors and observations | It would be useful to break these general factors and observations | |||
down a bit further. In particular, it is useful to distinguish | down a bit further. In particular, it is useful to distinguish | |||
market or economic factors from technical factors. | market or economic factors from technical factors. | |||
2.1. Economics | 3.1. Economics | |||
Scaling benefits are natural for many types of businesses. And many | Scaling benefits are natural for many types of businesses. And many | |||
Internet-based businesses can potentially serve a very large customer | Internet-based businesses can potentially serve a very large customer | |||
base, as the cost of replicating and delivering their service to new | base, as the cost of replicating and delivering their service to new | |||
customers or areas is small. | customers or areas is small. | |||
However, typically the network effect has an even more pronounced | However, typically the network effect has an even more pronounced | |||
impact. Each additional user adds to the value of the network for | impact. Each additional user adds to the value of the network for | |||
all users in a network. In some applications, such as the open web, | all users in a network. In some applications, such as the open web, | |||
this value grows for everyone, as the web is a globally connected, | this value grows for everyone, as the web is a globally connected, | |||
interoperable service for anyone with a browser can use. | interoperable service for anyone with a browser can use. | |||
There is an important distinction between different applications of | There is an important distinction between different applications of | |||
the network effect, however. Consider email as another example; | the network effect, however. Consider email as another example; | |||
anyone with an account at any email server can use it globally. | anyone with an account at any email server can use it globally. | |||
However, here we have seen much more consolidation into few large | However, here we have seen much more consolidation into few large | |||
email providers, both due to innovative, high-quality services but | email providers, both due to innovative, high-quality services but | |||
also because running email services by small entities is becoming | also because running email services by small entities is becoming | |||
difficult; among other things due to spam prevention practices that | difficult; among other things due to spam prevention practices that | |||
tend to recognise well only the largest entities. | tend to recognize well only the largest entities. | |||
In some other applications, such as social media, the services have a | In some other applications, such as social media, the services have a | |||
more closed nature. The value of being a customer of one social | more closed nature. The value of being a customer of one social | |||
media service depends highly on how many other customers that | media service depends highly on how many other customers that | |||
particular service has. Hence, the larger the service, the more | particular service has. Hence, the larger the service, the more | |||
valuable it is. And the bigger the value difference to the | valuable it is. And the bigger the value difference to the | |||
customers, the less practical choice they have in selecting a | customers, the less practical choice they have in selecting a | |||
service. | service. | |||
In some cases, these developments also allow asymmetric relationships | In some cases, these developments also allow asymmetric relationships | |||
to form, with the customers having less ability to affect the service | to form, with the customers having less ability to affect the service | |||
than they would perhaps wish. | than they would perhaps wish. | |||
2.2. Data- and Capital-intensive Services | 3.2. Interdependencies | |||
Entities with a large role in a market place tend to have inertia, of | ||||
course through having many customers, but also due to their | ||||
interconnectedness with the rest of the ecosystem. These | ||||
interconnections can range from business relationships to peering | ||||
connections, linking, and the use of various infrastructure services | ||||
from an entity as building blocks in applications. | ||||
These interconnections make it difficult for a market to move away | ||||
from a large entity. Indeed, even for an individual it can be a | ||||
challenge not to use the most commonly used Internet services | ||||
[Gizmodo]. | ||||
Optimistic technologists ("digital libertarians") tend to believe | ||||
that states have limited ability to regulate the Internet: "The Net | ||||
interprets censorship as damage and routes around it" [Gilmore]. | ||||
However, as argued by [Boyle] states may have multiple ways to | ||||
influence and monitor the Internet. One of the issues related to | ||||
consolidation is that it tends to be easier to exert control of few | ||||
large entities, than a large set of small, distributed players. This | ||||
concern is particularly acute around intellectual property rights or | ||||
surveillance capabilities, particularly when extra-territorial | ||||
requirements are placed on the large entities. These entities cannot | ||||
avoid comforming to regulation and laws in any of the locations they | ||||
have presence in. | ||||
As a result, there's an added angle of interconnectedness with | ||||
governments. At the same time, this of course also provides an | ||||
avenue for control of market forces, e.g., in the form of competition | ||||
law. | ||||
3.3. Data- and Capital-intensive Services | ||||
The scaling advantages are only getting larger with the advent of AI- | The scaling advantages are only getting larger with the advent of AI- | |||
and machine learning -based technologies. | and machine learning-based technologies. | |||
The more users a service has, the more data is available for training | The more users a service has, the more data is available for training | |||
machine learning models, and the better the service becomes, bringing | machine learning models, and the better the service becomes, bringing | |||
again more users. This feedback loop and the general capital- | again more users. This feedback loop and the general capital- | |||
intensive nature of the technology (data and processing at scale) | intensive nature of the technology (data and processing at scale) | |||
makes it likely that the largest companies are ahead in the use of | makes it likely that the largest companies are ahead in the use of | |||
these technologies. | these technologies. | |||
2.3. Permissionless Innovation | One could also take the pessimistic view that many of the ongoing | |||
disputes in standards organizations relate to which market actors | ||||
will ultimately be able to collect the more data from private persons | ||||
and how. The question isn't as much about the protection of these | ||||
persons' privacy but rather whether some industry (or country) will | ||||
be able to benefit from access to data. | ||||
3.4. Permissionless Innovation | ||||
The email vs. social media example also highlights the interesting | The email vs. social media example also highlights the interesting | |||
roles of interoperability and the "permissionless innovation" | roles of interoperability and the "permissionless innovation" | |||
principle -- the idea that a network can be simple but still powerful | principle - the idea that a network can be simple but still powerful | |||
enough that essentially any application could be built on top of it | enough that essentially any application could be built on top of it | |||
without needing any special support from anyone else. Permissionless | without needing any special support from anyone else. Permissionless | |||
innovation has brought us all the innovative applications that we | innovation has brought us all the innovative applications that we | |||
enjoy today, on top of a highly interoperable underlying network, | enjoy today, on top of a highly interoperable underlying network, | |||
along with advances in video coding and other techniques used by | along with advances in video coding and other techniques used by | |||
applications. | applications. | |||
Paradoxically, if the underlying network is sufficiently powerful, | Paradoxically, if the underlying network is sufficiently powerful, | |||
the applications on top can evolve without similar pressures for | the applications on top can evolve without similar pressures for | |||
interoperability, leading to the closed but highly valuable services | interoperability, leading to the closed but highly valuable services | |||
discussed above. We call this the Permissionless Completeness | discussed above. We call this the Permissionless Completeness | |||
Problem. | Problem. | |||
2.4. Fundamentals of Communication | 3.5. Fundamentals of Communication | |||
There are also fundamental issues. For instance, speed of light; | There are also fundamental issues, such as the speed of light. Low- | |||
low-latency services can fundamentally only be provided through | latency services can fundamentally only be provided through globally | |||
globally distributed data centers. These are often provided built by | distributed data centers. These are often provided and/or built by | |||
large organisations, although collaborative and data center or cloud | large organizations, although collaborative data center or cloud | |||
computing service approaches also exist. | computing service approaches also exist. | |||
A similar issue has arisen in recent years around large-scale denial- | A similar issue has arisen in recent years around large-scale denial- | |||
of-service attacks, and how various entities can deal with them. | of-service attacks, and how various entities can deal with them. | |||
While the largest attacks affect all players (see, for instance, the | While the largest attacks affect all players (see, for instance, the | |||
Dyn attacks in October 2016), it is also true that large cloud- and | Dyn attacks in October 2016), it is also true that large cloud- and | |||
content delivery providers can better deal with such attacks due to | content-delivery providers can better deal with such attacks due to | |||
their scale. This is one reason that attracts many network services | their scale. This is one reason that attracts many network services | |||
to such providers. | to such providers. | |||
2.5. Technology Factors | 3.6. Technology Factors | |||
One of the key questions is whether we are seeing developments that | One of the key questions is whether we are seeing developments that | |||
are driven by economic factors or whether fundamental reasons or lack | are driven by economic factors or whether fundamental reasons or lack | |||
available technology drives particular models. For instance, | of available technology drives particular models. For instance, | |||
centralised solutions might desirable due to business incentives, or | centralised solutions might be desirable due to business incentives, | |||
they might be necessary because there is no distributed, | or they might be necessary because there is no distributed, | |||
collaborative solution. | collaborative solution. | |||
For instance, some technical issues have historically not been easy | Some technical issues have historically not been easy to solve, such | |||
to solve, such as e-mail spam, which has lead to reliance on non- | as e-mail spam, which has led to reliance on non-technical solutions. | |||
technical solutions. Today, it is becoming increasingly difficult to | Today, it is becoming increasingly difficult to run your own mail | |||
run your own mail services, essentially forcing many organisations | services, essentially forcing many organizations and individuals to | |||
and individuals to employ larger providers. The issues relate | employ larger providers. The issues relate directly to size of | |||
directly to size of entities; no one can afford to disconnect from | entities; no one can afford to disconnect from the largest providers. | |||
the largest providers. But as a small entity, there is little | But as a small entity, there is little leverage to convince peer | |||
leverage to convince peer entities or various supporting white/ | entities or various supporting white/blacklist entities to deal with | |||
blacklist entities to deal with you properly. | you properly. | |||
Many Internet services are based on gathering data about users, and | Many Internet services are based on gathering data about users, and | |||
using that data for, for instance, targeted advertisements. More | using that data for targeted advertisements. More data from more | |||
data from more users makes it possible to run a service more | users makes it possible to run a service more accurately or with | |||
accurately or with better results; here again scale brings | better results; here again scale brings advantages. | |||
advantages. | ||||
Another trend is that more and more content is becoming available | Another trend is that more and more content is becoming available | |||
locally, from a content delivery or provider function directly on | locally, from a content delivery or provider function directly on | |||
your own ISP's network. We predict that eventually most content will | one's own ISP network. We predict that eventually most content will | |||
be delivered this way, reducing the role that global IP connections | be delivered this way, reducing the role that global IP connectivity | |||
across the Internet play. By some metrics this has already happened; | across the Internet plays. By some metrics this has already | |||
what practical - positive or negative - impacts might this have on | happened; what practical - positive or negative - impacts might this | |||
the Internet technology? | have on the Internet technology? | |||
There are also security tradeoffs. Large entities are generally | There are also security tradeoffs. Large entities are generally | |||
better equipped to move to more recent and more secure technology. | better equipped to move to more recent and more secure technology. | |||
For instance, the Domain Name System (DNS) shows signs of ageing but | For instance, the Domain Name System (DNS) shows signs of ageing but | |||
due to the legacy of deployed systems, has changed very slowly. | due to the legacy of deployed systems, has changed very slowly. | |||
Newer technology developed at the IETF enables DNS queries to be | Newer technology developed in accordance with IETF standards enables | |||
performed confidentially, but its deployment is happening mostly in | DNS queries to be performed confidentially, but its deployment is | |||
browsers that use global DNS resolver services, such as Cloudflare's | happening mostly in browsers that use global DNS resolver services, | |||
1.1.1.1 or Google's 8.8.8.8. This results in faster evolution and | such as Cloudflare's 1.1.1.1 or Google's 8.8.8.8. This results in | |||
better security for end users. | faster evolution and better security for end users. | |||
However, if one steps back and considers the overall security effects | However, if one steps back and considers the overall security effects | |||
of these developments, the resulting effects can be different. While | of these developments, the resulting effects can be different. While | |||
the security of the actual protocol exchanges improves with the | the security of the actual protocol exchanges improves with the | |||
introduction of this new technology, at the same time this implies a | introduction of this new technology, at the same time this implies a | |||
move from using a worldwide distributed set of DNS resolvers into, | move from using a worldwide distributed set of DNS resolvers into, | |||
again, more centralised global resolvers. While these resolvers are | again, more centralised global resolvers. While these resolvers are | |||
very well maintained (and a great service), they are potentially | very well maintained (and a great service), they are potentially | |||
high-value targets for pervasive monitoring and Denial-of-Service | high-value targets for pervasive monitoring and Denial-of-Service | |||
(DoS) attacks. In 2016, for example, DoS attacks were launched | (DoS) attacks. In 2016, for example, DoS attacks were launched | |||
against Dyn, one of the largest DNS providers, leading to some | against Dyn, one of the largest DNS providers, leading to some | |||
outages. | outages. | |||
3. Action | 4. Call to Action | |||
Are there assumptions about the Internet architecture that no longer | Are there assumptions about the Internet architecture that no longer | |||
hold in a world where larger, more centralised entities provide big | hold in a world where larger, more centralised entities provide big | |||
parts of the Internet service? If the world changes, the Internet | parts of the Internet service? If the world changes, the Internet | |||
and its technology/architecture may have to match those changes. | and its technology/architecture may have to match those changes. | |||
It appears that level the playing field for new entrants or small | It appears that leveling the playing field for new entrants or small | |||
players brings potential benefits. Are there technical solutions | players brings potential benefits. Are there technical solutions | |||
that are missing today? | that are missing today? | |||
Of course, it may well be that technology improvements are hard to | Of course, it may well be that technology improvements are hard to | |||
come by. Nevertheless, recognising the risks of consolidation in | come by. Nevertheless, recognizing the risks of consolidation in | |||
both current and proposed future technologies is the first step in | both current and proposed future technologies is the first step in | |||
proactively avoiding those risks where possible. | proactively avoiding those risks where possible. | |||
Assuming that one does not wish for regulation, technologies that | Assuming that one does not wish for regulation, technologies that | |||
support distributed architectures, open source implementations of | support distributed architectures, open source implementations of | |||
currently centralised network functions, or help increase user's | currently centralised network functions, or helping increase users' | |||
control can be beneficial. Federation, for example, would help | control can be beneficial. Federation, for example, would help | |||
enable distributed services in situations where smaller entities | enable distributed services in situations where smaller entities | |||
would like to collaborate. | would like to collaborate. | |||
Similarly, in an asymmetric power balance between users and services, | Similarly, in an asymmetric power balance between users and services, | |||
tools that enable the user to control what information is provided to | tools that enable the user to control what information is provided to | |||
a particular service can be very helpful. Some such tools exist, for | a particular service can be very helpful. Some such tools exist, for | |||
instance, in the privacy and tracking-prevention modes of popular | instance, in the privacy and prevention-tracking modes of popular | |||
browsers but why are these modes not the default, and could we | browsers, but why are these modes not the default, and could we | |||
develop them further? | develop them further? | |||
It is also surprising that in the age of software-defined everything, | It is also surprising that in the age of software-defined everything, | |||
we can program almost anything else except the globally provided, | we can program almost anything else except the globally provided, | |||
packaged services. Opening up interfaces would allow the building of | packaged services. Opening up interfaces would allow the building of | |||
additional, innovative services, and better match with users' needs. | additional, innovative services, and better match users' needs. | |||
Silver bullets are rare, of course. Internet service markets | Silver bullets are rare, of course. Internet service markets | |||
sometimes fragment rather than cooperate through federation. And the | sometimes fragment rather than cooperate through federation. And the | |||
asymmetric power balances are easiest changed with data that is in | asymmetric power balances are easiest changed with data that is user- | |||
your control, but it is much harder to change when someone else holds | controlled, but it is much harder to change when someone else holds | |||
it. Nevertheless, the exploration of solutions to ensure the | it. Nevertheless, the exploration of solutions to ensure the | |||
Internet is kept open for new innovations and in the control of users | Internet is kept open for new innovations and in the control of users | |||
is very important. | is very important. | |||
What IETF topics that should be pursued to address some of the issues | o What IETF topics that should be pursued to address some of the | |||
around consolidation? | issues around consolidation? Some of the topics for consideration | |||
are discussed in Section 4.1 and Section 4.2. | ||||
What measurements relating to the developments centralization or | o Are there open source efforts that should be pursued or continue | |||
consolidation should be pursued? | to be pursued to ensure that a diversity of operators and networks | |||
can use a particular technology? This is further discussed in | ||||
{{opensource]]. | ||||
What research -- such as distributed Internet architectures -- should | o What measurements relating to the development of centralization or | |||
be driven forward? | consolidation should be pursued? And what other research, such as | |||
distributed Internet architectures, should be driven forward? | ||||
Some potential topics are discussed in Section 4.4. | ||||
4. Contributors | 4.1. Open Interfaces | |||
Standards and open source efforts continue to build many open | ||||
interfaces and APIs that allow systems interoperability and tailoring | ||||
of services. In some cases, however, the availability of open | ||||
interfaces definitions and software has not led to the realization of | ||||
actual interfaces in this open manner. For instance, different | ||||
instant messaging systems have had a technical ability to be | ||||
interoperable with other systems, just like e-mail is interoperable | ||||
across systems, but have chosen to be disconnected. | ||||
Work in determining what open interfaces can provide benefits to | ||||
users as well be successfully deployed in the Internet ecosystem | ||||
would of course be useful. | ||||
4.2. Specific Standardization Choices | ||||
Sometimes the issue is not the availability of interfaces as such, | ||||
but rather fundamental architectural choices with regards to how | ||||
Internet systems should be built. | ||||
Often this relates to how centralized or distributed deployments are | ||||
targeted. And even if a distributed, broad deployment model is | ||||
targeted, expectations may not match reality when economies of scale, | ||||
DDoS resilience, market consolidation, or other factors have come | ||||
into play. These factors can result in the deployed reality being | ||||
highly concentrated. | ||||
This is a serious issue for the Internet, as concentrated, | ||||
centralized deployment models present risks to user choice, privacy, | ||||
and future protocol evolution. On occasion, the differences to | ||||
expectations can be immediate, but can also occur much later. | ||||
Some examples of these issues include current work in DNS where we | ||||
may see concentration through the use of globally available common | ||||
resolver services, which evolve rapidly and can offer better | ||||
security. But the concentration of these queries into a few services | ||||
creates new security and privacy concerns. | ||||
Another example is email, which started out as many providers running | ||||
in a largely uncoordinated fashion, but which has since then seen | ||||
significant market consolidation and a need for coordination to | ||||
defend against attacks such as spam. The coordination and | ||||
centralized defense mechanisms scale better for large entities, which | ||||
has fueled additional consolidation. | ||||
Awareness of these issues while working on standards would be useful, | ||||
so that the issues can be taken into account and appropriately | ||||
mitigated. To begin with, those of us interested in the broader | ||||
questions about Internet research and development are needed to | ||||
identify some of the effects that new technology developments may | ||||
pose. | ||||
4.3. Open Source | ||||
Many key Internet infrastructure services (e.g., DNS servers), end- | ||||
user applications (e.g., browsers) and technology components (e.g., | ||||
operating systems or protocol implementations) are commonly | ||||
implemented using open source solutions. | ||||
This is often true even if there is a large entity that is in charge | ||||
of a large fraction of development and deployment for a particular | ||||
technology. This is a good thing, as it provides a means for others | ||||
to have a fair chance of changing the technology in question, should | ||||
the large entity drive their use of the technology in some direction | ||||
that does not benefit the users. For instance, users and other | ||||
organizations have traditionally been able to either run their own | ||||
browser versions or provided extensions that suit their needs better | ||||
than the default system. | ||||
As a result, continuing to have this ecosystem is an important safety | ||||
valve and competition opportunity. | ||||
4.4. Research Challenges | ||||
There are a number of different research directions for which further | ||||
work would be useful. | ||||
The first is about measurements; is the Internet indeed | ||||
consolidating, and if so, by how much, and in what aspects? Also, | ||||
where are the Internet's traffic flows concentrating, and how is this | ||||
changing over time? | ||||
There are also questions about the trends and their relationships to | ||||
technology: Has Internet technology influenced the consolidation | ||||
trends in some manner? And conversely, how does Internet | ||||
consolidation influence the development of Internet infrastructure | ||||
and architecture? | ||||
Finally, research on topics that would likely yield results that | ||||
increase the diversity and de-centralization in the Internet would | ||||
obviously be welcome. This can include any de-centralized | ||||
technologies, but in particular distributed Internet architecture is | ||||
an interesting topic. | ||||
5. Contributors | ||||
Much of the text in this memo is from a blog article written by Jari | Much of the text in this memo is from a blog article written by Jari | |||
Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | |||
Trammell for the Internet Architecture Board (IAB), and from a blog | Trammell for the Internet Architecture Board (IAB), and from a blog | |||
article written by Jari Arkko and Brian Trammell APNIC and RIPE. | article written by Jari Arkko and Brian Trammell APNIC and RIPE. | |||
Some parts of the text have also come from a future workshop | ||||
description developed in the IAB, primarily by Christian Huitema and | ||||
Ted Hardie. | ||||
5. Acknowledgements | 6. Acknowledgements | |||
The authors would like to thank IAB members, Geoff Huston, Gonzalo | The authors would like to thank IAB members, Geoff Huston, Amelia | |||
Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf Kolkman, and many | Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf | |||
others for interesting discussions in this problem space. | Kolkman, Greg Skinner and many others for interesting discussions in | |||
this problem space. The authors would also like to thank all | ||||
participants in the 2019 Design Expectations vs. Deployment Reality | ||||
(DEDR) IAB workshop held in Kirkkonummi, Finland, as well as the | ||||
participants in the 2019 EuroDIG workshop on "Internet consolidation | ||||
- opportunities and challenges". | ||||
6. Informative References | 7. Informative References | |||
[Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000, | ||||
<https://mitpress.mit.edu/books/inventing-internet>. | ||||
[Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and | ||||
Hardwired Censors", Duke Law School, | ||||
https://scholarship.law.duke.edu/ | ||||
faculty_scholarship/619/ , 1997. | ||||
[Clark] Clark, D., "The Design Philosophy of the DARPA Internet | ||||
Protocols", In Symposium Proceedings on Communications | ||||
Architectures and Protocols, 106-114. SIGCOMM '88. New | ||||
York, NY, USA, ACM https://doi.org/10.1145/52324.52336 , | ||||
1988. | ||||
[Cowheyetal] | ||||
Cowhey, P., Aronson, J., and J. Richards, "Shaping the | ||||
Architecture of the US Information and Communication | ||||
Technology Architecture: A Political Economic Analysis", | ||||
Review of Policy Research 26 (1-2), pp. 105-125. , 2009. | ||||
[DolataSchrape] | ||||
Dolata, U. and J. Schrape, "Collectivity and Power on the | ||||
Internet: A Sociological Perspective", Springer | ||||
International Publishing. Page 85. , 2018, | ||||
<www.springer.com/de/book/9783319784137>. | ||||
[Frischmann] | ||||
Frischmann, B., "Privatization and Commercialization of | ||||
the Internet Infrastructure", Colum. Sci. & Tech. L. Rev. | ||||
2, pp. 1-25. , 2001. | ||||
[Gilmore] "First Nation in Cyberspace", TIME International (see | ||||
http://kirste.userpage.fu-berlin.de/outerspace/ | ||||
internet-article.html) , December 1993. | ||||
[Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was | ||||
Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut- | ||||
the-big-five-tech-giants-from-my-life-it-was-hell/ , | ||||
February 2019. | ||||
[ISOC] "Consolidation in the Internet economy", Internet Society, | ||||
https://future.internetsociety.org/2019/ , 2019. | ||||
[Khan] Khan, L., "Amazon's Antritrust Paradox", The Yale Law | ||||
Journal 126:710 , 2017. | ||||
[LitanRivlin] | ||||
Litan, R. and A. Rivlin, "Projecting the Economic Impact | ||||
of the Internet", American Economic Review 91 (2), pp. | ||||
313-317 , 2001. | ||||
[Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies: | ||||
A Political Economy Analysis", In Miller, Edythe S.and | ||||
Samuels, Warren J., (eds.) An Institutionalist Approach to | ||||
Public Utilities Regulation. Michigan State University | ||||
Press, East Lansing, Michigan, pp. 162-201. ISBN | ||||
9780870136245 , 2002, <https://core.ac.uk/download/ | ||||
pdf/204420.pdf>. | ||||
[Nye] Nye, J., "The Regime Complex for Managing Global Cyber | ||||
Activities. Global Commission on Internet Governance", | ||||
CIGI, Global Commission on Internet Governance , 2014. | ||||
[RFC1192] Kahin, B., "Commercialization of the Internet summary | ||||
report", RFC 1192, DOI 10.17487/RFC1192, November 1990, | ||||
<https://www.rfc-editor.org/info/rfc1192>. | ||||
[RFC1958] Carpenter, B., Ed., "Architectural Principles of the | [RFC1958] Carpenter, B., Ed., "Architectural Principles of the | |||
Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | |||
<https://www.rfc-editor.org/info/rfc1958>. | <https://www.rfc-editor.org/info/rfc1958>. | |||
[RFC3935] Alvestrand, H., "A Mission Statement for the IETF", | ||||
BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, | ||||
<https://www.rfc-editor.org/info/rfc3935>. | ||||
[Smyrnaios] | ||||
Smyrnaios, N., "Internet Oligopoly: The Corporate Takeover | ||||
of Our Digital World", Emerald Publishing Ltd. , 2018. | ||||
[Stiglitz] | ||||
Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or | ||||
do they tend towards monopoly? The verdict is in", 2016, | ||||
<https://www.weforum.org/agenda/2016/05/joseph-stiglitz- | ||||
are-markets-efficient-or-do-they-tend-towards-monopoly- | ||||
the-verdict-is-in/>. | ||||
[VanSchewick] | ||||
van Schewick, B., "Internet Architecture and Innovation", | ||||
MIT Press , 2012. | ||||
[Wu] Wu, T., "The Curse of Bigness", Columbia Global Reports, | ||||
New York, New York , 2018. | ||||
Authors' Addresses | Authors' Addresses | |||
Jari Arkko | Jari Arkko | |||
Ericsson | Ericsson | |||
Kauniainen 02700 | ||||
Finland | ||||
Email: jari.arkko@piuha.net | Email: jari.arkko@piuha.net | |||
Brian Trammell | Brian Trammell | |||
ETH Zurich | ETH Zurich | |||
Email: ietf@trammell.ch | Email: ietf@trammell.ch | |||
Mark Nottingham | Mark Nottingham | |||
Fastly | ||||
Email: mnot@mnot.net | Email: mnot@mnot.net | |||
Christian Huitema | Christian Huitema | |||
Private Octopus Inc. | Private Octopus Inc. | |||
Email: huitema@huitema.net | Email: huitema@huitema.net | |||
Martin Thomson | Martin Thomson | |||
Mozilla | Mozilla | |||
Email: martin.thomson@gmail.com | Email: martin.thomson@gmail.com | |||
Jeff Tantsura | Jeff Tantsura | |||
Nuage Networks | Apstra, Inc. | |||
Email: jefftant.ietf@gmail.com | Email: jefftant.ietf@gmail.com | |||
Niels ten Oever | ||||
University of Amsterdam | ||||
Email: mail@nielstenoever.net | ||||
End of changes. 55 change blocks. | ||||
120 lines changed or deleted | 461 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |