NSFNET: the Partnership That Changed the World
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
QUILT CIRCLE2020 a Letter from the President
THE QUILT CIRCLE2020 A Letter From the President This 2020 Quilt Circle edition commemorates the 20th Anniversary of The Quilt. The fabric of our research and education (R&E) networking community has never been stronger. While our Quilt community has evolved in new and exciting ways in the past two decades, we have also been faced with a number of challenges which we take head-on and always with the spirit of collaboration. As we address the unprecedented challenges presented by the current global public health crisis due to the COVID-19 pandemic, the work of our members is more important than ever to the missions of their member communities. U.S. higher education institutions rely on R&E networks to give them a competitive edge in the most impactful scientific research initiatives which is essential in this crisis. We connect the educational institutions that support university medical centers and their associated hospitals. R&E networks also connect tens of thousands of other community anchor institutions, including K-12 schools, public libraries, local/state government, research sites, cultural institutions, public safety, and tribal lands. Being responsive and providing vital networking infrastructure and resources right now to address immediate needs is who we are and what we do. R&E networks are part of our nation’s critical infrastructure. This year’s edition of The Quilt Circle showcases several examples of the key role of R&E network members in both providing and facilitating the use-network infrastructure to further scientific discovery and collaborations at higher education institutions of all sizes. -
General Distribution OCDE/GD(97)42
General Distribution OCDE/GD(97)42 OECD WORKSHOPS ON THE ECONOMICS OF THE INFORMATION SOCIETY WORKSHOP No. 5 SEOUL, KOREA, 22-23 October 1996 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT Paris 50254 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format Copyright OECD, 1997 Applications for permission to reproduce or translate all or part of this material should be made to: Head of Publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16, France. 2 TABLE OF CONTENTS PREAMBLE............................................................................................................................................. 4 POLICY IMPLICATIONS ....................................................................................................................... 5 PROGRAMME ........................................................................................................................................ 9 RAPPORTEUR'S SUMMARY ..............................................................................................................18 SPEECH SUMMARIES BY SPEAKERS ...............................................................................................48 DISCUSSION COMMENTS BY DISCUSSANTS..................................................................................86 BIOGRAPHIES.......................................................................................................................................98 LIST OF PARTICIPANTS....................................................................................................................109 -
Ccnso 10-Year Anniversary Presentation
10 years of ccNSO 10 years of ccNSO Today we celebrateHow the it all began? WhereHow it areall beganwe now? ? 10th What have we anniversary of Whereaccomplished will we? go? ccNSO What do we still have to do? The Evolution of ccNSO DNSO and wwTLD Singapore 1999 First ICANN meeting Some ccTLDs are present and actively participate. First ideas of joining efforts are floating in the air ccTLDs are part of the DNSO together with gTLD registries, ISPs, Berlin Registrars, as well May 1999 as commercial and business entities. During this meeting in Berlin wwTLD is created. The first ADMIN Executive of wwTLD was appointed. Nii Quaynor Kilnam Chon (AFTLD) (APTLD) Oscar Robles Antony Van Peter de Blanc Dennis Jennings (LACTLD) Couvering (IATLD) (NATLD) (CENTR) Stockholm May 2001 ccTLDs decide to step out of DNSO and decide to work on the establishment of ccNSO ICANN 2.0 Evolution and Reform Committee appointed: Hans Alejandro Pisanty Nii Quaynor Lyman Chapin Kraaijenbrink September 2001 Assistance Group to ERC of 17 people appointed ICANN staff support: Theresa Swinehart Members of the AG Sebastien Bachollet (Business Constituency, CIGREF) Bart Boswinkel (.nl ccTLD) Becky Burr (Wilmer Cutler & Pickering) Chris Disspain (.au ccTLD) Hartmut Glaser (.br ccTLD, LACNIC) Alf Hansen (.no ccTLD) Hiro Hotta (.jp ccTLD, NTT, ISP/CP) Geoff Huston (IAB, Telstra, APNIC) Michael Katundu (Kenya GAC representative) Christian de Larrinaga (ISOC England) Pierre Ouedraogo (.bf ccTLD) Patricio Poblete (.cl ccTLD) Oscar Robles (.mx ccTLD) Philip Sheppard (Business Constituency, AIM, former NC Chair) Mohd Sharil Tarmizi (GAC Vice Chair, Malaysia representative) Kiyoshi Tsuru (IP consultant, WIPO panellist, Mexico) Bernard Turcotte (.ca ccTLD) Shanghai October 2002 ccTLDs present Final decision to step out of DNSO. -
On Multi-Point, In-Network Filtering of Distributed Denial-Of-Service Traffic
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic Mingwei Zhang∗, Lumin Shi∗, Devkishen Sisodia∗, Jun Li∗, Peter Reihery ∗ University of Oregon fmingwei, luminshi, dsisodia, [email protected] y University of California, Los Angeles [email protected] Abstract—Research has shown that distributed denial-of- in a common language. Further, it is also unknown how these service (DDoS) attacks on the Internet could often be better solutions perform under insufficient knowledge of the attacks handled by enlisting the in-network defense of multiple au- or against intelligent adversaries who can dynamically revise tonomous systems (ASes), rather than relying entirely on the victim’s Internet Service Provider at the edge. Less noticed their attack strategies to escape defense. Without a quantitative but important is the fact that an in-network defense can also comparison, it is hard for a DDoS victim to select the most remove DDoS traffic from the Internet early en route to the suitable solution to achieve its defense goal and meet the victim, thus decreasing the overall load on the Internet and resource requirements. reducing chances of link congestion. However, it is not well In this paper, we introduce a modeling and simulation understood to what degree different in-network defense strategies can achieve such benefits. In this paper, we model the existing framework to systematically evaluate in-network DDoS de- two main categories of in-network DDoS defense algorithms fense algorithms. The framework contains a general model (PushBack, SourceEnd) and propose a new type of algorithm that can describe the attack and defense for various defense (StrategicPoints). -
THE INGHAM COUNTY NE.WS Section 2 and Diu Ll, I Gue11h 'Lhnl'u Tl Good Hally Is 'Mnlhi!L''• Lltllll Hpitl· Wny Lo Do If You Lceep Pu Ttlng CJ',' Something Orr, Mr
' I INGHAM COUNTY Ninety-second No, 42 THE Year~ MASON, MICHIGAN. THURSDAY, OCTOBER 18, 1951 3 Sections - 20 Pagc11 Hunters Shoot FIREWORKS AND SWORD-PLAY, TOO /~ Charity Dri~e Rice Oparates a Squash Ranch Halloween Program ~Q Council Names More Birds as Leaders· Start Is Growing Bigger ··-~-· I Ralph Hall as Pressure Eases Mn~on f{lwllnlnn~ rtl'e piilllnJl "'1'11" r1rrh J'iH'> WPifl slrlllorl 19 11onwwhr••r. nrounrl !11400 into the yenrs ngn I o MIJlplnnt the dnngrl On Canvassing Monday Opening Reduces pol In Hlflfl'e 1he enmtnlllllty'~ hlg g-rHI Hnllowccn pur•! y. llUH nnrl <'OII~Iy horscplny whlclt Prcssm·e on Pheasrmts, then wrrs lhl' Halloween c11stom Chief of Police AI n meeting 'I~IC~r!ny nl~rht Red Fenthe1· Campaign Hags Show Big I ncreasc thry s.11rl that the rutnunl party B11smcss mrn nnd Yotlnl:"stcl s Is Opened Out-County G1·oup Insurance Proglfllll flnH' hPCil showing- KlgnA of pctci have r•cnchcrl an implleri agree Tu Haisc Local Quotas Fcwcr huntc1s, mole buds rng- rml, Tlw flrrll:"rnrn outhnorl Jnr ment lhnt Halloween fun wlll be May Be Offered Employeoa and Ideal weather marked the this yr1n Hlinulrl 1 cvivc it In n big' cnntlnt•d to Athletic field uml lh,ll Instead of Sick Leaves wny, ·they dcclr11 cd the! o will he no sonpmg ol wln fi1 st three days of the bird sea· The pn 1ty will he IJCid the nlll'ht clows or trlrolt nncl lrel\t Rllll! son, Consc1 vat1on Officer of Wcdnnlldny, Octobc1 3t, nt Waltc1 Mutchler 1cportcd. -
The Korean Internet Freak Community and Its Cultural Politics, 2002–2011
The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 by Sunyoung Yang A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Anthropology University of Toronto © Copyright by Sunyoung Yang Year of 2015 The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 Sunyoung Yang Doctor of Philosophy Department of Anthropology University of Toronto 2015 Abstract In this dissertation I will shed light on the interwoven process between Internet development and neoliberalization in South Korea, and I will also examine the formation of new subjectivities of Internet users who are also becoming neoliberal subjects. In particular, I examine the culture of the South Korean Internet freak community of DCinside.com and the phenomenon I have dubbed “loser aesthetics.” Throughout the dissertation, I elaborate on the meaning-making process of self-reflexive mockery including the labels “Internet freak” and “surplus (human)” and gender politics based on sexuality focusing on gender ambiguous characters, called Nunhwa, as a means of collective identity-making, and I explore the exploitation of unpaid immaterial labor through a collective project making a review book of a TV drama Painter of the Wind. The youth of South Korea emerge as the backbone of these creative endeavors as they try to find their place in a precarious labor market that has changed so rapidly since the 1990s that only the very best succeed, leaving a large group of disenfranchised and disillusioned youth. I go on to explore the impact of late industrialization and the Asian financial crisis, and the nationalistic desire not be left behind in the age of informatization, but to be ahead of the curve. -
1117 M. Stahl Obsoletes Rfcs: 1062, 1020, 997, 990, 960, 943, M
Network Working Group S. Romano Request for Comments: 1117 M. Stahl Obsoletes RFCs: 1062, 1020, 997, 990, 960, 943, M. Recker 923, 900, 870, 820, 790, 776, 770, 762, SRI-NIC 758, 755, 750, 739, 604, 503, 433, 349 August 1989 Obsoletes IENs: 127, 117, 93 INTERNET NUMBERS Status of this Memo This memo is an official status report on the network numbers and the autonomous system numbers used in the Internet community. Distribution of this memo is unlimited. Introduction This Network Working Group Request for Comments documents the currently assigned network numbers and gateway autonomous systems. This RFC will be updated periodically, and in any case current information can be obtained from Hostmaster at the DDN Network Information Center (NIC). Hostmaster DDN Network Information Center SRI International 333 Ravenswood Avenue Menlo Park, California 94025 Phone: 1-800-235-3155 Network mail: [email protected] Most of the protocols used in the Internet are documented in the RFC series of notes. Some of the items listed are undocumented. Further information on protocols can be found in the memo "Official Internet Protocols" [40]. The more prominent and more generally used are documented in the "DDN Protocol Handbook" [17] prepared by the NIC. Other collections of older or obsolete protocols are contained in the "Internet Protocol Transition Workbook" [18], or in the "ARPANET Protocol Transition Handbook" [19]. For further information on ordering the complete 1985 DDN Protocol Handbook, contact the Hostmaster. Also, the Internet Activities Board (IAB) publishes the "IAB Official Protocol Standards" [52], which describes the state of standardization of protocols used in the Internet. -
David D. Clark
Designs for an Internet David D. Clark Dra Version 3.0 of Jan 1, 2017 David D. Clark Designs for an Internet Status is version of the book is a pre-release intended to get feedback and comments from members of the network research community and other interested readers. Readers should assume that the book will receive substantial revision. e chapters on economics, management and meeting the needs of society are preliminary, and comments are particularly solicited on these chapters. Suggestions as to how to improve the descriptions of the various architectures I have discussed are particularly solicited, as are suggestions about additional citations to relevant material. For those with a technical background, note that the appendix contains a further review of relevant architectural work, beyond what is in Chapter 5. I am particularly interesting in learning which parts of the book non-technical readers nd hard to follow. Revision history Version 1.1 rst pre-release May 9 2016. Version 2.0 October 2016. Addition of appendix with further review of related work. Addition of a ”Chapter zero”, which provides an introduction to the Internet for non-technical readers. Substantial revision to several chapters. Version 3.0 Jan 2017 Addition of discussion of Active Nets Still missing–discussion of SDN in management chapter. ii 178 David D. Clark Designs for an Internet A note on the cover e picture I used on the cover is not strictly “architecture”. It is a picture of the Memorial to the Mur- dered Jews of Europe, in Berlin, which I photographed in 2006. -
“The Past and Future of the Internet”
“The Past and Future of the Internet” presented by Dr Glenn Ricart – Ph.D Synopsis: Glenn Ricart will share some of his first-hand stories about how the ARPAnet grew into an international commercial Internet during the 1980s. Then, looking forward, Dr. Ricart will turn to the developments which he believes will need to take place in technology, economics, and politics in order to allow the Internet to continue to grow. Glitches and weaknesses which are tolerable for an entertainment medium will not be acceptable as Internets become more integral to the economy, health and safety, and national defense. Curriculum Vitae: Dr. Glenn Ricart is an Internet pioneer and entrepreneur with a broad range of technology and business leadership experience in large corporations, startups, academia, the U.S. military, and government research. His positions have included President and CEO of National LambdaRail, Managing Director at PricewaterhouseCoopers, Co-founder and Chief Technology Officer of CenterBeam, and Executive Vice President and Chief Technology Officer for Novell. He is known for his pioneering work in bringing the ARPAnet protocols into academic and commercial use. In the mid-1980s, while academic CIO at the University of Maryland College Park, his teams created the first implementation of TCP/IP for the IBM PC; created the first campus-wide TCP/IP network, shipped and managed the software that powered the first non-military TCP/IP national network, the NSFnet; created the first open Internet interchange point (the FIX and later MAE-EAST); and proposed and created the first operating NSFnet regional network, SURAnet. From 1995-1999 he was Novell's EVP and Chief Technology Officer responsible for its technology. -
Remarks on the Anniversary of the Merit Computer Network
Remarks on the Anniversary of the Merit Computer Network James J. Duderstadt President Emeritus and University Professor of Science and Engineering Ann Arbor November 16, 2006 2 Introduction Happy 40th Anniversary!!! • It is an honor to be able to participate in this celebration and well-deserved recognition of the extraordinary impact Merit has had on our state, the nation, and, indeed, the world. • • It is also great to see so many of those responsible for its achievements present…and still ticking! • • Actually, I arrived at Michigan about the same time that Merit was launched, and my career has been not only heavily influenced by at times interwoven with Merit’s. • • Hence, I thought it might be appropriate to take a quick nostalgia trip through these years, commenting on various aspects of Merit’s history from a personal perspective as a user, occasional defender, and strong admirer of the Merit Network. • • Before dredging up what my failing memory has to offer, let me stay in the present mode for just a moment to mention an experience I had just last week. Salzburg Seminar • Just arrived back from Salzburg, where I led a week long session of 45 higher education leaders from 25 nations and all five continents on a discussion of the changing needs and nature of higher education in the face of o rapidly changing demographics o globalization o and the knowledge economy • Whether in developed nations in Europe, Asia, or North America or in developing nations elsewhere, there is a growing recognition of two imperatives o “massification” of teriary education o lifelong learning 3 • And everywhere there is also a recognition that the scaffolding for this effort will be provided by cyberinfrastructure–or as the rest of the world calls it, ICT–information and communications technology. -
Core Magazine February 2002
FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before. -
Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A
University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2000 Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A. Michael Froomkin University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Constitutional Law Commons, and the Internet Law Commons Recommended Citation A. Michael Froomkin, Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 Duke L.J. 17 (2000). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. WRONG TURN IN CYBERSPACE: USING ICANN TO ROUTE AROUND THE APA AND THE CONSTITUTION A. MICHAEL FROOMKINt ABSTRACT The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyber- space. This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt Copyright © 2000 by A. Michael Froomkin. t Professor, University of Miami School of Law. E-mail: [email protected]. Research and writing of this Article was supported by a Summer Grant from the University of Miami School of Law.