COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA ITU and IETF in Agreement on ENUM Administration Letter from ITU To ICANN Blocks .tel gTLD Applications As Competition to ENUM -- Administration Modeled on Neutral Tier 1 Database Holder of Pointers to Records of Provisioned Services lobbying. Editor’s Note: The ENUM process has should turn to: taken some significant further steps towards On Novemeber 1, 2000 in a letter

194 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 An expert whom we asked to review our nimity — very few people have the slight- draft replied: “Not necessarily. Remember est clue as to what this is about. As such, it Part Two: that essentially no applications exist which is unlikely FCC or DoC will be in any posi- make use of ENUM (or an ENUM-like pro- tion to decide anything on this issue in the tocol). One possible approach would be to near term.” But the More create an “ENUM path”, that is, a list of suf- fixes to append to a ENUM-ized telephone Given the chaos that has developed around Critical Issue is the number for lookup. For example, it is con- what was assumed to be an IETF - ITU con- ceivable that there would be something like: sensus, we conclude that in this instance, we Multi Lingual will see again how industry self regulation Testbed % setenv ENUMPATH will become, as Michael Froomkin pointed :e164.com:e164.org:e164.arpa:telephones-r- out in his long legal study of ICANN, in- us.de: dustry self-dealing. Protection is available On August 22, 2000 VeriSign NetSol an- for the interests of inside power groups. Ev- nounced that it would open a testbed for the The application (SIP gateway, WAP phone, eryone else be damned. registration of international domain names whatever) would then try looking up the in not Latin, non ascii character sets. It an- number 1-650-779-6003 as nounced the use of the RACE encoding ENUM in Geneva in scheme. On October 31 it announced that getnaptrbyname( January 2001 as of November 10, it would begin accept- 3.0.0.6.9.7.7.0.5.6.1.e164.com ) ing paid Chinese, Japanese and Korean reg- getnaptrbyname( Meanwhile from Robert Shaw we have the istrations for com, net and org in its testbed. 3.0.0.6.9.7.7.0.5.6.1.e164.org ) following announcement: On 17 January Effectively jumping the gun on an IETF stan- getnaptrbyname( 2001, ITU will host a one-day ENUM Work- dards process that had not yet decided how 3.0.0.6.9.7.7.0.5.6.1.e164.arpa ) shop on administrative issues related to de- to proceed. Their press release claimed that getnaptrbyname( 3.0.0.6.9.7.7.0.5.6.1.tele- ployment of the ENUM protocol. The meet- ‘VeriSign GRS’s approach is to ensure cur- phones-r-us.de ) ing will be held at ITU Headquarters in rent and future compliance with evolving Geneva, Switzerland. The following related internationalized domain name standards The application could stop at the first hit, or materials are now available on the ITU web developed within the Internet Engineering it could go through all in the path and present site: Task Force. the user with a selection to choose from (if choosing is necessary — the proponents of ITU ENUM Web pages On November 8, 2000 Network World Fu- such an approach argue that the various http://www.itu.int/infocom/enum/ sion reported that to avoid assigning the same name to differ- Description and Objective of the Workshop ‘several of the world’s largest domain name ent entities). Conceptually, this is equiva- http://www.itu.int/infocom/enum/ registrars will start selling multilingual do- lent to dealing with multiple DNS roots, with workshopjan01/enum-ws-jan17.htm main names Thursday night, [11/09/00] de- all that implies. spite a recommendation from the Internet Draft Agenda Society that this initiative be delayed because It is probably also worth noting that coun- http://www.itu.int/infocom/enum/ it will harm the stability of the Internet’s tries outside the US would probably be a bit workshopjan01/enum-agenda.htm .” “The Internet So- annoyed if a US company took over control ciety ``believes the commercial testbed is of the mapping of E.164 address space into Although the workshop is principally in- premature under the technical standards of the DNS for that country.” tended for national regulators, policy mak- the Internet,’’ the press release states. It rec- ers and numbering authorities, attendance is ommends that “before users of the Internet In any case, Networks Solutions has already open to any interested participant. As we face establish claims of particular domain convinced its VeriSign owners to sell a the January meeting a few of many interest- names, it is now time for a hiatus in the com- balkanized and marginally worth while ser- ing questions are: What positions will the mercial deployment of internationalized vice. The VeriSign - Network Solutions - Canadians take with regard to their share of character sets in the operational DNS.” Telcordia approach is also one that would “1”? Will American nxx codes be put into further marginalize the worth of ENUM ser- e164 or into some new GTld or even into On November 17 in an article headlined vices by putting them under a DNS con- dot com? Beijing Moves to Control Domain Names trolled by ICANN where there only protec- CMP Tech that serve the interests or large corporate cials of the DoC, the IETF, and the ITU Web reported: “The Chinese government trademark interests. Patrik Faltstrom author of key ENUM drafts has mandated that only a handful of domes- and IETF Area Director thoroughly casti- tic companies may assign Chinese-language The Network Solutions VeriSign presenta- gated Network solutions for announcing Internet addresses, striking a blow to the reg- tion by Rutkowski was seen as a move de- ENUM trials accusing it of setting back the istration service launched last week by signed to show the US government that there cause of ENUM deployment by several VeriSign. was no unanimity in the industry and there- years. As contention and conflicting ap- fore that neither the FCC no DoC should proaches continue to grow it looks like “The move pits VeriSign Inc. (stock: VRSN) issue an RFP for ENUM Administrator in Faltstrom may well have been right. and other foreign Web address companies 2001. Another observer disagreed: “Prag- against government-supported Chinese matically speaking, there actually is no una- companies in a fight for a new but lucrative market to register addresses in Chinese script. The two sides have launched com-

195 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA peting standards for Chinese-script domain minefield of disallowing certain strings in til the IETF reaches some level of consen- names as thousands of confused companies any TLD.” sus on how multi-lingual domain names rush to register with both sides.” should be implemented. ISC does, however, VeriSign's Nominum include contributed code in the BIND re- “Without prior approval, no organization or leases, some of which implement multi-lin- individual is allowed to manage, provide Strategy gual enhancements. To date, Verisign has services for, or act as an agent for Chinese- not contributed any such code. JPNIC has language domain name registration,” said a But VeriSign is playing a game of raw na- (their mdnkit). The work Nominum does for notice from the Ministry of Information In- ked market power. At the URL http:// Verisgn may or may not be contributed to dustry (MII) seen by Reuters on Friday. The VeriSign-grs.com/multilingual/strategy.html ISC, depending on numerous factors.” notice, published on the Ministry’s website, we find the following statement. vests the China Internet Network Informa- The question it seems becomes one of tion Centre (CNNIC) with sole authority “A key element of our strategy includes add- whether Nominum will be able to make over registration of Chinese-character do- ing multilingual domain and host name ser- BIND compatible with Asian approaches main names. “ In effect the Chinese may be vices to the Berkeley Internet Name Domain designed to compete with VeriSign’s. We seen as rebelling against the idea that any (BIND) software, recognized as the most doubt it. David Conrad commented: “It de- western company should be able to charge widely deployed DNS server software on the pends on which Asian approach you’re talk- Chinese business annual “rents” on Chinese Internet. VeriSign Global Registry Services ing about.” words used in Internet commerce. has established relationships with other com- panies to assist with the implementation of Klensin Drafts Revamp Our reviewer commented: “This is one view. our strategy. For example, the VeriSign Glo- Another view is that the Chinese govern- bal Registry Services has provided funding DNS? ment is attempting to assert control over for Nominum, Inc., the company that main- anyone who wishes to use Chinese charac- tains the reference implementation of BIND, In the face of the emergence of these appar- ters in a domain name, regardless of whether towards the development of a multilingual ently intractable problems, John Klensin, the they are subject to Chinese governmental domain name version of BIND. Nominum new chair of the IAB has authored 3 ex- influence. For example, a person in provides BIND software to the Internet com- tremely important internet drafts. Singapore, wishing to register his/her fam- munity as open source software through the ily name in Chinese characters would (one Internet Software Consortium (ISC). Engag- On December 13 we have http URL:draft- of Singapore’s national languages), if the ing in relationships with key DNS infrastruc- klensin-i18n-newclass-00.txt world were to abide by the MII’s pronounce- ture providers such as Nominum, VeriSign Title: Internationalizing the DNS — A New ment, have to go to a company authorized Global Registry Services will develop a so- Class < http://search.ietf.org/internet-drafts/ by the Chinese government. More interest- lution that provides multilingual domain draft-klensin-i18n-newclass-00.txt> ingly perhaps would be the case of a com- name services to the greatest number of us- pany in Taiwan.” ers with minimal impact on existing systems, Klensin writes: "This document explores and provide ongoing compatibility with the question of what the DNS, and “DNS By the end of November Network Solu- those users who do not require multilingual names” would have looked like had we been tions was continuing its registration as were domain name services.” designing it today, with multilingual usage several other companies in Asia.. This while as a priority but with current technology and the Chinese government steadfastly asserted VeriSign is saying with the previous state- existing standards available, and proposes a that only designated Chinese companies had ment that they have covered their bets in a way to get there." the right to do so. Then on December 8 way that the Asian nations short of starting Computerwold, Hong Kong announced that their own root and their own DNS resolver "The proposal is radical in the sense that it I-DNS.net (a company formed by individu- software will find hard to match. BIND is implies a major restructuring of DNS usage als that participated in work promoted by the global de-facto standard for DNS re- and, indeed, of the Internet, to make the DNS APNG investigating the feasibility of non- solver software. If VersiSign Network So- seamlessly capable of working with multi- ASCII domain names) registered 90,000 lutions has paid for the development of “a national character sets. Such a restructuring Chinese names in its first four days in busi- multilingual domain name version of is, and should be, quite frightening. It is ness using a system and database completely BIND,” we may rest assured that much worth considering only if the long-term risks independent of VeriSign - Network Solu- awaited BIND Version 9 will be compatible and problems of other proposals are severe tions. with the needs of VeriSign’s multi lingual enough to justify a radical approach. It is domain name implementation. the working hypothesis of this document that What has happened in the last four months they are. At a relatively technical level, this assures that ICANN will face conflicts in We asked David Conrad,President of the would require changing every DNS resolver getting multi lingual domain names into its Internet Software Consortium to comment. and server, and application that accesses ei- legacy root. Should it choose VeriSign’s He responded: “BIND version 9 was re- ther, on the Internet that wished to use non- testbed as the winner, it seems inevitable that leased on September 15. To be clear, ASCII names." Conrad: “Note that you’ll the Chinese and other Asian nations will start Nominum and ISC are separate entities with most likely have to do this anyway — too their own root. Our reviewer disagreed: “I different foci. ISC’s charter is to provide many programs make bad assumptions suspect not. I suspect what will happen is openly available reference implementations about what data is returned from a DNS that ICANN will delegate localized strings, of core Internet protocols. Nominum is a query. “ most likely some ACE, as aliases (either Silicon Valley startup. NSes or DNAMEs) for the ccTLDs in the "Legacy (unconverted) systems would be at root. These aliases would point to the same ISC has explicitly stated on numerous occa- a significant disadvantage in referencing new nameservers as the ASCII ccTLDs. I am sions that multi-lingual support will NOT names (some of which might use only a sub- skeptical that ICANN would venture into the be included in the ISC release of BIND un- set of ASCII characters but might still not 196 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 be registered in the older Class), just as (ii) Applications code would be upgraded to that this mail list could be one of the most legacy systems were during the transition make QClass=UC inquiries and to represent important lists in a long long time. Those to between Hostnames and the DNS. There are the UCS codes for their databases and pre- whom these issues are important are well also a number of problems, such as the weak- sentations in some ASCII-compatible form advised to join. nesses of the DNS as a directory system, compatible with their protocol definitions. which it does not solve (see section 3.6, be- An Uncertain Future low)." [SNIP] (iii) The protocols would be upgraded to in- ternational norms and usage. The problems of internationalized domain “A “new class” proposal would obviously names look to be intractable. If so the new class in Klensin becomes UTF8 and creates not be easy to deploy, but, realistically, nei- (iv) The applications code would be changed ther are any of the other ideas if the defini- and new root into which the old one is folded. to conform to the new protocols, eliminat- Creating a new class would offer the oppor- tion of deployment involves users having ing the workaround of stage (ii). access to Internet names drawn from a broad tunity for old names to migrate new inter- range of languages. It would cleanly sepa- nationalized root. For if it is to work there [SNIP] 5.1 The root server question The would have to be a new resolver that would rate “international character set” name design of the DNS is such that there is no know that if no information was found in spaces from the “ASCII” one — i.e., “old” inherent reason why root servers for a new the old root then it should look at the new. clients and systems would never see the non- class would need to be the same as those for Since Bind 9 is to be found in almost every ASCII types. In the international name IN. However, the same considerations for Unix program known, a critical question is space, English, and the character code points root server selection that apply to the whether Paul Vixie will build in to BIND 9 used to represent it, becomes just one of Class=IN root [rfc2870] would presumably the ability to handle both roots? Conrad: many such languages and their correspond- apply to the Class=UC root as well. There "Paul was not involved in the implementa- ing character code points. It might even let would be several other administrative and tion of BIND 9. BIND 9 (like all other ver- us fix a few other things along the line, as operational advantages for keeping the root sions of BIND) already supports multiple long as they were sufficiently straightfor- servers the same —or at least co-locating classes (Hesiod and Chaosnet being the two ward to not create significant delays. E.g., them— as long as loads and similar factors other than IN supported by BIND).” there are several RR types in the current permitted.” Class that are either obsolete or have never Another issue is whether ICANN would try been widely used, and we might be able to By calling for a universal class Klensin is in to exert control over the new root. Think- ing is that the IETF-ITU designers may have eliminate them by not carrying them for- effect calling a new root into which the old ward.” Conrad: “The only advantage of a had enough to ICANN and may want to keep ASCII based root would be folded as a sub- it ICANN free. Don Heath has resigned the new class is that, for the most part, it is rela- set of the new ‘order’. Over time every DNS tively straight forward to implement. If you ISOC Presidency effective March 2001. He resolver would be obsoleted and replaced. would seem to be a “shoo-in” for the new start mucking about with the underlying pro- It would be a bit like rebooting the Internet. tocol, you might as well go and implement ICANN president. Such events would pose But so convoluted have the DNS wars gown an interesting dilemma for the new Bush DNSng.” that at the very apex of power the thought administration. It is quite possible that While other transition models are possible, has suddenly become one of sweeping ev- Bush’es men may be willing to let the root the cleanest one would be to conclude that erything aside and starting afresh. go. If they were not, such action would likely drive the Asians to establish their own break the new Class was intended, over time, to th simply obsolete and replace Class=IN. If On November 10 and December 13 away root. It seems to us that there is way Klensin published two further drafts: http too much emphasis on the necessity of a registrations in Class=IN were transferred single root and the implied magic of having into (or explicitly referenced from) the new URL:draft-klensin-1591-reflections-02.txt Title: Reflections on the DNS, RFC 1591, everyone on the face of the earth universally class (or a “search rule” system was em- reachable by a single computer network. The ployed), then the transition model would be and Categories of Domains and http URL:draft-klensin-dns-role-00.txt Title: internet we still believe will be controlled very similar to that of the hosttable-> DNS from the edges and not from the center. transition. In particular, “old” clients and Role of the Domain Name System Klensin has thrown down the gauntlet to solve an systems would see a smaller and smaller What we are witnessing here is a very fun- fraction of the Internet until they converted apparently intractible problem. Observers believe that this fresh set of ideas may un- damental shifting of the tectonic plates cur- and we would expect some user-level tools rently supporting the Internet. to arise to work around slow conversions. leash waves of forward motion. [SNIP] NSI is announcing to the Chinese that they Klensin noted that: “A mailing list has been will sell use to them the use of words from If we are really serious about converting the initiated for discussion of this draft, its suc- their own language. The Chinese have said Internet to support applications in all lan- cessors, and closely-related issues at ietf- this is completely unacceptable. In such a guages (which is ultimately the assumption [email protected]. To subscribe context, a depoliticized open standard such underlying this document), then the answer to the mailing list, send a message to ietf- as Klensin is proposing will generate much may be more clear: the overhead of dealing [email protected] with interest by the Chinese. As Ted Byfield puts with the UCS to ASCII interface ought to the single word “subscribe” (without the it: Klensin is saying with his RFCs that the fall on those applications, as an intermedi- quotes) in the body of the message. To problem is purely technical and totally open. ate step until the protocols themselves can unsubscribe from the list, use that same ad- Whereas the minute you say that the DNS be upgraded. In other words, we would an- dress with the single word “unsubscribe” in solution is not open but is bounded by pa- ticipate a four-stage conversion process for the body of the message. Issues related to rameters that in effect make it both a closed those applications: the relationship of the model proposed here system and a proprietary one in a commer- to general issues of multilingual access to cial context, you are in effect closing it and (i) Completely legacy (non-updated) code the DNS should be raised in the IETF IDN selling it and making it both a political and would continue to reference Class=IN (no WG working group, see http://www.ietf.org/ perhaps an intractable issue. other option is possible). html.charters/idn-charter.html.” We predict COOK Report February 2001 197 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Instant Messaging Coordination of People and Devices Becomes Standards Track High Priority Serves as an Enabler for Many New Applications, New Uses of Bandwidth and Intelligent User Agents

Editor’s Note: Since 1996 Henning talk program, as I typed in each character, person to whom you are sending remains Schulzrinne has been a faculty member at that character would appear on my online. You could spend five minutes com- Columbia University in the Department of recipient’s screen in real time. Instant mes- posing an answer and should, in the mean- Computer Sciences and Electrical Engineer- saging is indeed a message service in that I time, that person log off, your carefully com- ing. From 1994 to mid 1996 he was previ- type my entire message and only when I hit posed answer vanishes. ously at the German research institution return does the message appear almost in- called GMD Fokers in Berlin. In 1992 and stantaneously on my recipient’s screen. COOK Report: Other than being very popu- 93 he worked at AT&T Bell Labs which lar on America Online and being of very from a legal perspective is now part of Lu- COOK Report: Therefore I don’t suffer the intense interest to Microsoft, how would you cent. He still maintains an office there and distraction of seeing your message gradu- characterize the reasons for strong interest gets some of his students from there. His ally appear on my screen — especially if in the development of protocols and stan- current interest is Internet protocols, multi- you’re a slow typist? dards elsewhere in the industry? What is media and performance evaluation. He de- driving all this? votes most of this time at Columbia to run- Schulzrinne: Exactly. There is another ning the Columbia University Internet Real somewhat related service. It’s a rather old Schulzrinne: Instant Messaging is appar- Time Laboratory where he directs about a service, although it’s still used in quite a bit. ently seen as a means of communication dozen a Master’s and Ph.D. students. About It is Internet Relay Chat (IRC). For many which is very important to the people who 10 of his students are doctoral students. years IRC has been an open Internet proto- use it. From a consumer services perspec- Some work there full-time and some part- col. It is used primarily in so-called Internet tive it likely ranks behind the Web and email time while employed by other research labo- “chat rooms” where groups of people con- as the third major reason by which people ratories such as IBM. IBM, for example, verse with each other. The primary applica- justify their Internet usage. Standardization pays their salary and their tuition while aca- tion which makes instant messaging rather matters because you now have a problem demically they’re being supervised by Pro- different from IRC is that instant messaging that there are isolated communities where fessor Schulzrinne. He is also a member tends to be only from one person to another people who use the Yahoo instant messag- of the Internet Architecture Board. The URL person where the people involved already ing client cannot send messages to people for the Internet Real Time Laboratory web know each other. So it’s a bit different than who use either the Microsoft or the AOL page is http://www.cs.columbia.edu/~hgs/ email and it is not generally used to send a client. AOL is appears to have 90 percent research/IRT/ random note to someone from whom you of instant messaging users while the remain- may have gotten a business card. ing 10% are split between Microsoft, Ya- COOK Report: Due in part to the instant hoo, ICQ and Tribal Voice. messaging working group reorganization at Why the Interest in Instant the Pittsburgh IETF in August of 2000, in- While this lack of standardization is not now stant messaging has acquired a bit of a buzz Messaging especially daunting in the U.S., it will also lately. I’m beginning to understand that it is begin to get much more important once more a bit more than a significant service being Instant Messaging seems to be very popular advanced wireless services come into play. fought over by Microsoft and AOL. Would within corporations as a quickie coordina- You need to be aware of how popular the you begin by explaining what instant mes- tion mechanism. For example when I was Short Messaging Service (SMS) is in Eu- saging is all about from your point of view? at a conference in Israel and my student and rope on the GSM mobile phone. Moreover collaborator Jonathan Rosenberg was in this popularity exists despite the fact that you Schulzrinne: When one talks about instant Australia, I had a paper to present that after- have to type in your message with the num- messaging, one is really conflating two sepa- noon. We had some last-minute things to do. ber keys. On completion these messages are rate functions. The first is sometimes referred The paper was in New York. He was in Aus- sent instantaneously to another mobile phone to as “buddy list” or presence, which is the tria and I was in Israel. By logging into the with bridges to email also available. ability to tell if a person happens to be cur- New York machine, we were able to use an rently on line. This is primarily relevant for instant messaging application to figure out I would not be surprised if these devices people who use dialog services. It may be what to change and how to fix things at the become more popular in the U.S. as well used to determine if someone is available to very last minute. and I expect that there will be bridges — enter into real-time chat. The second and even on the just chatting side between mo- separate application is the message capabil- Instant messaging use in corporations now bile devices where composing a quickie one ity. This enables you to send mostly text tends to replace a lot of one line e-mail mes- line instant message might be O.K. but messages to one or more people whom you sages. One disadvantage, or, depending on where composing a formal email would be have enabled to receive the message while how you look at it, one advantage of the in- overkill. In Europe the Short Messaging Ser- they are online. stant messaging exchanges is that no per- vice sends billions and billions of messages manent record or archive is left. In this sense — in part because doing so is less disrup- COOK Report: As you type it appears in real instant messaging is also more informal. It tive than making a mobile phone call espe- time on the recipient’s screen? certainly is not suitable for message attach- cially since you don’t have to worry about ments. Also, it only works as long as the reaching the person by voice in the midst of Schulzrinne: Almost. Under the old UNIX 198 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 inappropriate circumstances. activities such as video and or audio means of you saying something every now conferencing. and then like your transmission on a CB ra- it is currently important as a consumer-to- dio to give a listener some idea of what consumer application and to some second- Schulzrinne: For sure this sort of thing will you’re doing, and some sense of where the ary extent it is starting to be used as a con- be an activity. This is why I was careful to listener could respond to you. sumer-to-business application. I have heard separate my description into the part that sig- of a number of technical-support places and nals presence or availability and the mes- COOK Report: How about having an instant a number of consumer mail-order operations sage part. The presence part simply indi- system turn on Web cams in its users offices? which allow users to chat with their sales cates whether or not you’re available with- agents. For example on a Web site you might out really doing anything. It uses heuristics Schulzrinne: It’s possible to do it. But it does click on a link and have an instant messag- to determine whether you’re logged in and raise privacy concerns. For example if you ing client pop-up. From the point of view of whether you have typed anything or not for don’t want to be able to turn on someone the provider of the consumer goods this it is a specified number of minutes. else’s camera-at least not without the other more efficient than voice communications person’s knowledge of what you are doing. because they expect their customer service Instant Messaging is primarily a first order agents to handle about eight simultaneous mechanism. In other words you use it to set COOK Report: Could you have a menu that chat sessions. To sum things up Instant Mes- off other events. This explains where the in effect of functions as a protocol where saging is one of those strange sort of appli- interest of those of us on the multimedia side users could specify under what circum- cations which is actually more popular with came in. What you can do is set up a num- stances or at what times they are willing to the nontechnical crowd than with your ber of simultaneous AOL, or whatever type, have their various devices activated? “techies.” This has had some undesirable of presence sessions or messaging sessions. consequences because it meant that this is- When your group is present, you can start Schulzrinne: The instant messaging proto- sue did not appear on the radar screens of up a completely unrelated application such col is certainly an enabler for most of these the IETF folks until very recently. as a voice-over IP conference call. kinds of functionalities that are actually be- ing differentiated on the end user’s system. COOK Report: Suppose you were working The protocols that are being discussed prob- Possible Uses in your Columbia University lab and you ably all facilitate this to some extent or other. had three collaborators in three different We believe that when people discover the COOK Report: Supposing I am the edge parts United States. Could use the system kind of integration available, they will do chief information officer of a Fortune 500 so that the moment all four of you were on more than just send text messages around. company and I want to offer Instant Mes- line simultaneously it would initiate a voice- For example in Sweden there is a service saging to my company’s employees, how do over IP conference call between you? It available for playing joint games like Quake I do this? Do I have to license it from AOL? would function like a trip wire to establish and things of that nature when two would- your meeting with out any of you having to be players find each other on-line. Schulzrinne: There seem to be different be consciously aware of the need to do so. models out there. One model is that some COOK Report: In a corporate situation could corporations might just use the ICQ or Ya- Schulzrinne: I am not aware of software that you have it start a white board? Such that a hoo server. This has the implication that currently has this capability. But this is ex- remote person would also have a white board you better trust the server to be reasonably actly one of the services that we are putting on his or her screen and could draw some- secure so that whatever private internal cor- into the tool which we are building here at thing and have it appear on the screen of the porate information you exchange does not the university as a prototype. Namely as soon originator as well as on the screens of ev- end up in the wrong place. This is also actu- as some specified condition is met, the sys- eryone else who had joined the session? ally how many of the smaller companies tend tem will call up these specified people. Cur- to make money. From what I can tell their rently these presence indicators tend to be Schulzrinne: Absolutely you could start a public chat servers are really an advertising approximations of reality. For example they white board or some other corporate spe- shingle that they hang out there on the pub- generally don’t know that someone else cific applications such as a modeling pro- lic Web and say: “ oh by the way if you like might be physically in my office and there- gram or a project planning application. this and want to run one internally on your fore I may not want to session started auto- Whatever application you came up with Corporate Intranet, here is where you can matically. So you need a bit more media- would be able to use an instant messaging send check for the server and we will set tion. The general idea, however, is exactly system as a set approach for initiating and this up internally for you.” Also it looks to that. Once you have this kind of integration, managing the interaction of people who need me that Instant Messaging in corporations it becomes much easier to set up multi-party to participate at one time in a given project. is not a service that is decided by the CIO. telephone calls based on the simultaneous It is true that the current expectation of in- Instead it is something that employees tend presence of a defined set of people. stant messaging is that it tends to be text only to pick up on their own. Someone with in an and is of somewhat limited applicability. In engineering group says: “this is neat." I have COOK Report: Are you working on addi- reality even in the area of personal commu- used it at home, and now I can go back and tional capabilities? nication a fair amount of extension beyond tell all my colleagues about it and my group just text is possible. will begin to use it at work . This seems to Schulzrinne: What we have currently is in- be something that is more grassroots, bot- stant messaging as a text based application. Messaging for tom-up driven than something that arrives Even if you don’t think of it as a call model as the result of a corporate decree. and view it more as a social kind of thing, it Notification of Events is replaceable by more multimedia oriented COOK Report: I’ve heard the belief ex- means of communication. For example in- There is also another dimension which I pressed that geographically distributed cor- stead of the text based messaging service, think is interesting to look at. The presence porate users are likely to be interested in In- you could set up something that functioned of people is just a special case of a more stant Messaging as a means of reaching out in the background as a kind of walky talky generic problem — namely that of notify- and pinging their colleagues to coordinate service. This wouldn’t be anything like a ing someone else of the occurrence of an the start up of other bandwidth intensive formal telephone call. Rather it would be a 199 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA event. Presence is really a proper subset of not really workable in the long term because what some people call event notification. AOL, Microsoft and eventually they will find something that on Instant Messaging the wire looks exactly like their product. As COOK Report: And some examples of this long as they are not using encryption they would be? will be unable to prevent such a product from COOK Report: How does the dispute be- interconnecting with their own. Still as long Schulzrinne: There are a number of them. tween America Online and Microsoft effect as AOL does do explicit licensing, it gives For example I’m working with some people what we’ve been talking about a so far with them some control as to who uses it. AOL at Telcordia who are interested in using SIP instant messaging? To what extent, if any, is able to say their software is it the “ real to control things like home appliances: toast- has it been responsible for the development thing” and contrast it with what they present ers, or light bulbs, or heaters for example. of an IETF interest in the standardization of as an inferior imitation. They think of the events in this environment instant messaging? being something like the temperature drop- I don’t know what AOL’s revenue model for ping below 50 degrees Fahrenheit. Schulzrinne: The emergence of instant mes- it is since it is available to people not on AOL saging as one of the primary Internet appli- and you don’t have to be an AOL customer COOK Report: In other words I could use cations has certainly gotten a lot of people to use it and, as far as I know, it is not adver- this event based spinoff of instant messag- interested. This is very likely the largest tising driven. Moreover, it is easily avail- ing to remotely control devices in my home Internet application which is strictly pro- able since , which is now part of and be notified when the furnace went on or prietary. The web and email are certainly AOL, comes with it. the front door opened — having that notifi- reasonably standardized. Instant messaging cation appear on the screen of the CRT in suddenly came out of nowhere because its COOK Report: So was it AOL that started it my office? community of users was somewhat differ- up in the form that it has taken now and got ent than the technical community out of the critical mass going as everyone jumped Schulzrinne: Exactly. This is one example which the Internet sprung. on the bandwagon? and a home-based environment where people do not generate events as to whether COOK Report: Has AOL not licensed the Schulzrinne: Yes. Except that I don’t be- they’re offline or online, but sensors notify use of their messaging software to anyone? lieve they invented the service. It was al- you of events. What you have operating here ways a service that existed on the traditional is a very powerful mechanism for wide area Schulzrinne: I am not sure what their licens- BBS systems. Now AOL comes out of this access to your home appliances. These ing policy is. They control it rather strictly heritage. When they went more Internet events could also be thought of in the sense because I believe it is an important ingredi- based, it could be argued that they took in- of alarms. You might have a sensor that ent in maintaining their customer base. You stant messaging along with them. It seems would turn on a Web cam in the event of can actually get the software for free and I to have come very much out of the nonaca- movement and send a specified alarm to a believe that under nondisclosure you can li- demic and non technical community. remote computer screen. In an industrial cense the details of it. However AOL places setting an event that would trigger an in- strict restrictions on who can offer their in- stant message might be an increase in the stant messaging software. The result is that The IETF Standards pressure in a boiler beyond a specified level. in not everyone can just walk up and say “I want to build an AOL compatible system. “ Process If you take the earlier instances of someone’s COOK Report: What then really happened presence and consider it as but another cat- The protocol apparently is not that difficult because Microsoft, for example, did not li- within about the past year the got it moved egory in an overall catalog of events that can into the IETF? be signaled to a computer on a network as cense the technology from AOL but simply they occur, you end up being able to reuse a reverse engineered it. In doing so Microsoft made their product look like the AOL soft- Schulzrinne: A working group was formed very significant amount of software infra- within the IMPP group to look at a standards- structure. You avoid having to invent say a ware. They observed how it functioned on AOL. (There didn’t seem to be a lot of en- based protocol for this. The group was so new system for industrial alarms, a new sys- diverse, because in this field people come tem for a home events, a new system for cryption going on). In one sense it could be said they didn’t really have to reverse engi- from very different backgrounds, that effec- finding game buddy’s and the new system tively no technical progress was made. Re- for finalizing a text drafts. neer the code. Instead they observed how it functioned and built software that emulated alizing this, at the Adelaide IETF we essen- its functions. tially set up a design competition where the What I see here is a powerful new enablers. first working group and others were or chal- We have something here that fills a gap in lenged essentially to put up or shut up. the kind of communication capabilities that AOL, for its part, then looked at the the Internet has heretofore been unable to Microsoft emulation and tried to figure out where it was less than perfect. These minor COOK Report: But what else happened? I offer. We have had instantaneous retrieval understand there were two groups set up one in web pages. We have had asynchronous differences didn’t really have functional implications, for example, I’m guessing now led by Marshall Rose and Dave Crocker messaging with no immediate feedback in using Rose’s "blocks" proposal and the other electronic mail. But we have not had this that there might have been an extra space somewhere or a small difference in timing. led by yourself and Christian Huitema from type of more rapid asynchronous commu- Microsoft and involving Sip. nication with time scales measured in sec- Nevretheless, they used the differences to onds rather than in minutes. It is much more examine a messaging package and determine that it was a Microsoft emulation and not a Schulzrinne: That is correct. But unfortu- of a push mechanism than web page re- nately it’s even more messy than that. The trieval. And therefore it fills an important genuine AOL original. When it made such a determination, it then acted to turn off ac- working group did produce a requirements ecological niche in our overall group of pro- document that was kind of a motherhood and tocols. cess to from the Microsoft product to it’s own software. apple pie compilation of what instant mes- saging systems should do. That was RFC However, from the AOL perspective this is 2779.

200 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 COOK Report: How exactly did you wind peditious delivery and with no notion that a bring new functionality in where the old way up with the design competition? Was this human is necessarily at the other end. of doing it would be merely to find out Scott Bradner’s idea? whether someone was on line or not? And The proposal is an attempt to take the same in contrast, what you are developing goes Schulzrinne: Basically the outcome was that model of service, namely a message that is well beyond the issue of whether your are the chairs of the working group were in- delivered to one or more recipants asynchro- on line or not. If it finds it that you are not, it formed that their effort wasn’t going any- nously, and apply it to a set of applications will reach out and talk to your machine in where. They were told: “Let’s see if we can rather than just layering it on top of email. order to try to get more information as to make progress by having a design competi- The approach is interested in taking the where you are? tion.” With the deadline set this channeled messaging services and making them avail- new blood into the effort. There was a flurry able as an integral part of our infrastructure Schulzrinne: Yes. One of the abilities that of activity. By the date of the deadline we to other applications. The framework itself SIP has is this finding ability. And unlike had a least seven or eight proposals submit- is very much still being defined and far from traditional messaging protocol’s it is de- ted with it some form of documentation. being finished. signed to have entities in the network which AOL was among them and submitted an are needed to locate you in the event of a over all architectural wish list. However, they From what I can tell there are a number of telephone call. In locating you it will ask that never submitted an actual set of protocol details as well as a number of more funda- you send me a message as to when you will specifications. The other groups submitted mental issues being worked upon simulta- be available. The person asking to be noti- something close to complete specifications. neously. The working group for XPP meant fied (the subscriber) and the person or ob- only for the second time in Pittsburgh. The ject doing the notifying (the notifier) can COOK Report: Was there a late June dead- underlying infrastructure is still very much effectively move around. So you would not line for submitting the proposals with being defined as to whether it will run on subscribe effectively to a piece of hardware enough time to sort out the ramifications by TCP, which is the initial target, or to see or an IP address. Rather you subscribe to a the Pittsburgh IETF? whether it should also run on UDP. In that person. As long as the network knows sense much of the underlying infrastructure through some registration system where the Schulzrinne: Yes. A small set of people was still has scaffolding on it and I don’t think person might be, it will find you, that is as chosen to evaluate the proposals. What they anyone would claim that it is either finished, long as you are willing to allow yourself to came up with was effectively we really don’t ready, or tested. They still view it largely as be found. like any of them but we can’t make a choice a standing application and are not too con- either. Really a non verdict. After some dis- cerned about integrating it with anything COOK Report: So this would allow poten- cussion in order to try to make things more else. They say in effect we have this emerg- tial users to do what? Register the machines manageable the group found that the pro- ing blocks tool set which may be useful and that they use? Put in a schedule? When you posals fell into three categories: the XPP or let’s see what things look like when we ap- say it can reach out and find someone just blocks-based proposal and then the SIP ply it to instant messaging. exactly how would it do this? based proposal which a number of us includ- ing Christian Huitema worked on. Within The SIP Instant Schulzrinne: Let me give me an example. this one, the primary work had started much Say that you are described as earlier with a proposal within the SIP work- Messaging Approach [email protected] . That would be your ing group which Jonathan Rosenberg and I published e-mail address for example. In had been working on for some time. Finally COOK Report: What then is the SIP ap- SIP we use e-mail addresses so that your there was a whole set of proposals which proach being taken by yourself and Chris- telephone, instant messaging presence, and was called "group two", and which was char- tian Huitema? e-mail identifier would, in almost all cases, acterized by a more limited single set of func- be the same. The idea here would be that tions for text based presence indication and Schulzrinne: Our approach came from a you would register to receive calls or notifi- instant messaging. Since there was nothing notion that we see messaging in the more cations or to be subscribed to mail, messag- basically incompatible in this group of pro- generic sense of event notification and that ing and telephone. All of this works pretty posals, they were combined into one. As a we see a signaling system consisting of a much through the same infrastructure. That result, after this winnowing exercise there push part and a pull part if you like. The is regardless of which ISP you happen to be were three proposals left available for con- push part comes in where you call me on using , I would register with my designated sideration. the phone to find out if I’m available. The externally visible address — in your case phone rings and either I pick up or I don’t. cook @ cookreport.com. Your registration I believe that all three proposals would be The pull apart would be when I tell you, just would be held on a server that would be the able to deliver a service that is roughly in case you wanted to know, whether I’m definitive repository of your whereabouts. equivalent to the existing chat and other in- available to talk or not. These two are mir- Doing this would allow you to be in several stant message services that we have today. ror images of each other and thus it makes places logically speaking at once. For ex- The three groups have somewhat different sense for them to be provided within a simi- ample you could both have your home phone design assumptions or starting point. The lar overall signaling framework that includes and your office phone registered with your first one, the blocks proposal, starts out with the ability to reach end systems. identifier. When you had an incoming call a lower level infrastructure which they see the server would see that both office phone as a generic mechanism for a number of as- COOK Report: Presumably this is where SIP and home phone rang simultaneously and yet-unspecified messaging type applications. comes in? whichever phone was picked up first would They saw instant messaging and presence receive the actual call. as a group that they could use for the evalu- Schulzrinne: Exactly. This is where SIP ation of their model. My perception is that comes in because it already provides func- COOK Report: So might this be something this is an attempt to provide a generalized tionality which we consider useful in this like a GUI interface on a Web browser where messaging framework which basically al- context. a user might fill in, a month in advance, what lows you to send messages in a way which he thinks is scheduled to be? is roughly (and at a very high level) similar COOK Report: So the intent would be to to how email works — just with more ex- 201 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Call Processing to. Meeting and Instant Messaging and getting them ready to be replaced by what ever Language The work that we are doing is designed for comes out of standardization effort. Are you messages that are meant to be picked up in willing to comment on this? Schulzrinne: Almost. This would be close to real time in the sense that you’re handled not by our SIP instant messaging actually there when it happens. You want to Schulzrinne: While I am obviously not a client but rather by our Call Processing Lan- get the phone call now and not be told about party to internal Microsoft product discus- guage (CPL) which would enable you to do an hour after it comes in. The model is re- sions, I can say that indeed Christian moved precisely that sort of thing. This works as a lated to email but functionality and require- to Microsoft with that topic area as part of language that you up load to the server. Al- ments are somewhat different. The speed his portfolio. And Microsoft has publicly though as a user you would not know you of delivery is measured in hundreds of mil- stated at a Voice on the Net conference that were doing this. It would be exported from liseconds instead of minutes. It is instant with took place earlier this summer that it will be your calendar and would pick up from the the idea that the other side is already there supporting SIP in various different ways calendar the necessary e-mail addresses and rather than asynchronous and that I send a without however making any specific prod- telephone numbers. It would work so that if message and you may pick it up two min- uct announcements. you are staying with a friend, you could put utes or two days later. in your calendar an entry that: on Saturday I COOK Report: If these capabilities are be- am going to be at such and such a place. COOK Report: So you have some function- ing developed, is it reasonable conclusion You would give your friend’s phone num- ality in here that would be very attractive to that Microsoft would benefit by incorporat- ber in the IP address of the phone. Using people in commercial environments and, ing them? the call processing language you would ap- because not everyone uses the same hard- ply the results to the server. Then when a ware and software, standardization becomes Schulzrinne: Yes. There are a number of request comes into server to talk to important if this technology is to be univer- companies going in that direction. There is cook@cookreport it would it check its list- sally usable. a company called “Hear me” which is, at ing for you and say: oh today he can be this point, engaging more in the traditional found at such and such IP address. It would Infrastructure with a voice-chat environment. It is implement- forward the incoming call to your friend’s ing a SIP-based non proprietary mechanism. house and, just in case you weren’t there, it Billion Users So SIP is clearly happening not just in it the would ring your home phone as well. Thus voice-over IP area or in the traditional either manually or by some logic that is gen- Schulzrinne: That’s true and we’re also in- conferencing area that is encompassed by erated by some explicit specification or de- terested in the integration possibilities since Net Meeting, but it is also happening in the rived from things like calendars, you are SIP is likely to be used as the system for call voice-chat area which is a somewhat sepa- routing incoming calls, or the incoming setup (finding a person) in the third genera- rate small sub area that is a more informal, messages in general to a variety of places. tion wireless systems. We see this as a cen- more walkie talky style if you like, kind of In the case of voice communication, if there tral functionality which we want to lever- application. This is definitely occurring and are gateways available, this can be regular age across related activities (call setup, sub- one can only imagine that major software telephone numbers or advanced telephone scription, and modifications). We see hav- vendors would have an interest in partici- devices. ing a central infrastructure as being much pating in that. Everyone benefits in the end easier to manage and provision than having by not having isolated communities and hav- So the power of using SIP not for a just an separate infrastructures for different tasks. ing users have to download half a dozen dif- “I call you up mode” but also for an “I no- This is where we’re coming from. We said ferent applications to participate, even if the tify you when I’m available mode,” and an we will have a very large set of infrastruc- applications are free. Benefits will come “I want to find out when you are available tures, especially, if as we expect, the next not by trying to keep the pipe sizes different in order to subscribe to” mode means that generation wireless systems will all use SIP but by adding services to a uniform “ pipe” all of these messages are handled by the internally, we will have an infrastructure with or standard. same infrastructure. a billion users on it. We might as well lever- age this infrastructure since the proxies do Progress of the COOK Report: What do you mean by the not have to be upgraded in all in order to same infrastructure? have this functionality. Standards Process Schulzrinne: We mean the same set of soft- Consequently a proxy does not even have COOK Report: If you’re looking at the fu- ware or so-called proxy servers. You can to be aware that instant messaging or pres- ture, can you give me an idea of what your think of those as being cousins of your SMTP ence is going on. Therefore a proxy built schedule looks like to conclude your activi- server. They are similar in where they are today will be a perfectly capable router of ties? Do you think things will go smoothly, likely to be installed. For example at ISPs subscriptions and notifications regardless of or are there any significant areas where you and at large institutions and in some depart- what happens to its details in the future. To have it important problems to surmount? ments of large corporations and so on. They us, this capability opens up an avenue for have a similar functionality in that they do a integration which hopefully will lead to lots Schulzrinne: I believe that we have now a form of generic message routing. In a sense of interesting new services. basic infrastructure in place to provide ca- they’re more dynamic than a mail server pable instant messaging services. Areas of where your mail ends up and forces you to COOK Report: A question about the future work include extending to non per- go to the server to pick it up from wherever Microsoft environment. I understand it has sonal presence for home appliances or in- you might be. The idea in our work on in- instant messaging and something called Net dustrial applications the type of the events stant messaging using SIP is that the mes- Meeting as well that is used for setting up a which we have just discussed. But this is sage routing can be much more dynamic and voice-over IP sessions. I understand that really not so much of protocol issue. Rather follow you around in the sense that you can Christian Huitema moved from Telcordia to it is more a case of deciding that these are tell messages to go dynamically to your and Microsoft about six or nine months with the going to be expressed as XML GTLDs system rather than waiting to be picked up. objective of taking control of Microsoft’s Net which are going to be specific to particular With e-mail you pick up whenever you want domain of application. For example chemi- 202 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 cal factories will have different needs than Schulzrinne: Yes. I would say there’s not all of which seems to be less than clear at most households. They will probably have really much of an issue about a maturity of this point. different descriptions of their states and a specification. We really don’t have a whole events, but they can be carried in the same lot of open issues. It is really more a ques- What is happening is that the leadership of protocol and therefore some amount of ef- tion of deciding where this whole effort is the Instant Messaging and Presence Proto- fort needs to be put into describing possibly on going inside the IETF. SIP based instant col (IMPP) working group will likely nonhuman events. messaging depends, as to whether it can go change. This was the original chartered to proposed standard and first implementa- working group. Different leadership for this There is also an effort to describe how the tion step, on what actions the IETF area di- group will hopefully lead to a resolution on Call Processing Language can be extended rectors and the IESG decides internally to which way to progress. There are a num- to handle subscriptions and notifications that take. One suggestion has been to decide ber of conceivable avenues, one of which is are more specific to the service itself. For whether it makes sense to form separate to have the Area Director deputize represen- example you might allow someone to sub- working groups to basically finalize two or tatives and a bang together a sufficient num- scribe to your presence in order to be able to three of the proposals. And then basically ber of heads until to the proposals give up ascertain it, but you may not allow that per- let the market decide which one to use. or merge somehow. Let me say this out- son to call you at midnight. You might there- come is purely hypothetical. What I see as fore want to be able to distinguish between Now there has been a joint draft put out by more realistic is that since the assumptions two such actions. This is the type of thing the representatives of each one of these pro- underlying the three proposals are very dif- that the Call Processing Language is sup- posals explaining how interworking between ferent, two or three of the proposals move posed be doing and that still needs to be these proposals could work in the market- forward as independent working groups. worked out. place. Even under the worst case assump- What will then happen is that, after some tion that all three proposals progress, we will time, it will become clear whether anyone The basic instant messaging mechanism is be a much better situation than we are to- outside the working groups actually cares complete and are a number of implementa- day. This will be true because, even though about the output of the working group. In tion methods on going. At the last bake off people use different protocols which is some- other words it is possible that one or more there were two independent implementa- what inconvenient, they still can use, across of the working groups will wither from ac- tions. We are working in the third one. I am the protocol communities, at least the com- tual lack of outside input. Or we might find sure there are others who are working on it mon intersection of the services between the that the working group can produce a spec without necessarily telling everyone about three which will be basic instant messaging in a reasonable amount of time and had it. We found we can build workable systems and presence. So this is work which still people actually began to implement it. So if and, as always, there will be extensions to needs to be fleshed out in some of its nitty it turns out to be a full-fledged battle in the these systems as people find out what new gritty details. This is one possible outcome. marketplace, it may simply be a matter of services are wanted. finding out who is most efficiently motivated Therefore it is a little bit early to speak about to push the work forward. COOK Report: So is it accurate to say now the standardization schedule for any one pro- that you have a completed specification and posal because this schedule depends a bit December 2000 COOK Report what you are doing is really working on more on the macro level discussions as to implementations? where things are supposed to be going —

203 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA

Part Five

Other Oncoming Technical Developments that Devour Bandwidth

We conclude our suvey with a group of miscellaneous interviews each of which highlights on coming changes in the intenet that will demand more and more bandwidth.

Data mining is acquiring public standards and, with the arrival of these and the XML markup language, we may expect to see the development of a Data Web where huge datasets can be remotely interogated and can even interogate each other - an activity where each application can use hundreds of megabytes per second while in progress. IPv6 will begin spotty deployment as millions of digital wireless devices start to come on line. Napster marked the debut of peer-to-peer applications where users store and share personal sound libraries on the internet. Spread spectrum wireless is beginning to power ISPs and is being adopted by scientists for envionmental data collection. Finally Akamai is tying to find the best way to manage the growth of the document web by distributing its data.

204 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 major players earlier this year, the trade ing (PSUP), and specialized XML languages press published a flurry of articles. Executive for working with data, including the Predic- However, our interview with Grossman tive Model Markup Language (PMML) and represents the first article that covers the Summary the Data Extraction and Transformation Lan- entire extent of what he is doing. guage (DXML).” Data Web pp. 208-219 Data Space uses open standards to provide IPv6 Mobile Communications, pp. 220- A new web is emerging. The data web will the Internet infrastructure necessary to work likely exceed the document web in size and with scientific, engineering, business, and 226 in its impact on Internet infrastructure. We health care data. Unlike HTTP and HTML which are designed for multi-media docu- We interview Charlie Perkins a Research interview Robert Grossman, CEO of Mag- Fellow in the Wireless Internet Mobility nify, Inc. and Director of the Laboratory for ments, Data Space is somewhat more com- plicated because you have higher expecta- Group at the Nokia Communication Systems Advanced Computing at the University of Laboratory. Perkins offers a fresh point of Illinois Chicago. Grossman has played a pio- tions when you work with data than when you work with documents.” view on the issue of IPv6 deployment. He neering role in the use of high performance explains that independent nodes running computer networks to assist scientists in their IPv6 already exist and will spread. ”IPv4 and analysis of extremely large data sets. He “A document you only have to read. With data you have to analyze, score and make IPv6 can co-exist in the same general net- has built a layered view of how data mining work because they do not collide with each - a process of data analysis and real time decisions. What everyone interested in track- ing and planning for the further growth and other. They just have to know how to ad- decision making - could be carried out over dress each other. For example you can have the Internet. development of Internet infrastructure needs to understand is that so far the current a router that routes IPv6 packets and IPv4 packets on the same network.” Many businesses have extensive data sets internet barely scratches the surface of what you will be able to do with data as Data showing information about their customers “The whole thing about IPv6 to begin with including their customer purchasing history. Space and similar infrastructure begins to be deployed. I’m sure that the data web will was to develop a protocol, deploy it, and do Grossman explains his role in catalyzing the what IETF does well which is to get to in- Data Mining Group which is a consortium be an important driver of bandwidth over the next few years.” ter-operability testing going and then to just made up of Angoss, IBM, Magnify, start to build it. People want to buy solu- Microsoft, Mineit, NCR, Oracle, Salford Grossman also explains the Terabyte Chal- tions to the problems facing them, be they Systems, SGI, SPSS, and Xchange. The IPv4 problems or IPv6 problems. People group is made up predominantly of vendors lenge which for the past four years has been used both as will want to buy solutions for their IPv4 of proprietary data mining software pack- problems and for their IPv6 problems. Even- ages. These vendors are now joined in an a test bed for the basic protocols, languages and tools for Data Space, as well as a testbed tually the solutions for the IPv4 problems effort to develop a set of open standards may become more expensive than the solu- that should lead to much new software and for different ways to scale data intensive applications, especially remote and distrib- tions for the IPv6 problems. This will be to a vast increase in the amount of data min- true in part because the IPv6 solutions that ing. Furthermore, with the spread of the uted data intensive applications. The focus has been on developing an open infrastruc- are already available will become cheaper XML markup language that is used to dis- as IPv6 grows in market share.” play rows and columns of data on the web, ture for working with large and distributed data sets. Grossman’s group has developed it is expected that these developments will NAT will not suddenly disappear. Having lead to the take off of a public data web. This a process of stripping that allows large data sets to interact with each other in real time large domains of both IPv4 and IPv6 is will mean the growth of sites having pub- merely one way to partition the possibility licly accessible data sets where visitors with at sustained bandwidth usage of more than 250 megabytes per second. of overall IP address space in general. In such client browsers equipped to interact with the a situation with the right kind of fire wall site’s data servers can retrieve data that can The data space transfer protocol (DSTP) is NAT platform, you can even mention trans- be manipulated as data rather than exam- lating IPv6 addresses into IPv4 addresses at ined but not changed as is the case with an the protocol used to move data between nodes in the data web. The data extraction the border of the domains so that IPv4 ap- HTML page. The result will be the data web plications can in effect be tricked into be- or what Grossman calls Data Space. and transformation mark up language (DXML) describes how to clean, transform, lieving that what is going on is only an in- and shape data. This is usually one of the teraction between two IPv4 applications.” As Grossman explains: “From the user’s Talking about the inordinate expense of con- perspective, Data Space works like the docu- most labor intensive tasks when working with data. Statistical models are built using verting and IPv4 internet into IPv6 is asking ment web. You can use a browser to exam- the wrong question because v6 can be mean- ine remote and distributed data. And you can statistical and data mining applications. The predictive model markup language (PMML) ingfully deployed in an Internet where v4 analyze and mine it with a point and click continues to function. interface. Web sites can use Data Space ser- describes the output of such systems in an open format. Scoring is the process of us- vices such as personalization and predictive However the arrival of a billion cell phones modeling to provide a site with interactions ing statistical models to make decisions. The Predictive Scoring and Update Protocol over the next 18 months will force much which are created on the fly for each indi- more serious deployment of IPv6 which is vidual visitor. (PSUP) is a protocol that can be used for both on line real time scoring and updates the only reasonable means of doing both voice and data over a single cell phone. From the vendor’s perspective, Data Space as well as scoring in an off line batch envi- ronment. is also like the document web, it simply uses According to Perkins: “We have answers for a richer suite of services, including services most of what we have looked at but, as we for moving data (DSTP) and real time scor- When PMML was adopted as an open standard by the likes of IBM and other 205 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA look, we see more and more problems. For tried without great success as student s in phone connection. The total sum becomes example there are a lot of problems in secu- many cases find other ports to use. A new the amount of subsidy for which the district rity and a lot of problems in quality of ser- program called Gnutella and far more pow- is eligible. The district is then free to spend vice. There are also a lot of problems in erful than Napster is under development as the money on the telco connection or on ra- header compression. Also the way in which well. Some folk are saying that Napster’s dios and a wireless connection. Wireless the base stations are coordinated to manage impact on Internet traffic may approach that normally wins because the district after cost- spectrum most effectively is historically not of the web. ing out the alternatives, normally finds that very friendly towards the IP model.” the cost of radios and plug in via radio to an ISP leaves them several thousand dollars left Hughes on Wireless pp. “All of these things add up to a situation over. where, as I mentioned before, you can em- 233-247 At the 2.4 giga hertz range most manufac- ploy IPv6 now. But for specific applications turers make radios that operate at one tenth like voice IPv6 cannot currently match the We interview Dave Hughes, principal inves- of a watt or 100 miliwatts rather than the performance of analog voice-over the air as tigator of two NSF wireless projects and allowed power of one watt. They do this a part of the PSTN. Now we’re going to owner of Old Colorado Communications on because [such radios can be sold in Europe, change this and believe that we will be able the state of the art of TCP/IP radios for wire- and] it saves considerable money in the cost to equal or exceed the current capabilities less ISPs and for scientific environmental of manufacturing. Customer don’t seem to of analog voice over the air as part of the field research (his second major NSF mind because if their cheaper 100 miliwatt PSTN.” Adding mobility to the mix of nec- project). He points out how a fall in prices radio won’t connect they can buy an inline essary protocol development for IPv6 data and increase in capability has pushed the amplifier for $750 and increase the power phones complicates the technical issues in- price of 10 Mbps radios to well under $1000 to a full watt. When this has been done and volved. According to Perkins: “There are a each. under ideal line of sight conditions the ra- lot of people who want to use v4. But I don’t dios have successfully work over distances think we will ever get to global deployment He views Cisco’s purchase of Aironet as a of up to seventy miles. of mobile IPv4 for voice-over IP. I think by major move forward for the wireless spread the time voice-over-IP really comes into spectrum industry however the impact of this Given the lack of incentive for wireline play, we will be using largely IPv6.” will ultimately depend on how Cisco inte- telco’s to bring broadband into rural grates Aironet products into its business line America, the FCC is has issued a notice of Of several interesting protocols being devel- and whether it comes to see itself as a pro- inquiry on the subject of a Software Defined oped the most interesting is an IETF a work- vider of connectivity solutions. Cisco has Radio (SDR). One where smart software announced its own 45 megabit per second ing group called AAA (authentication, au- controls the radio - its power, its frequency LMDS radio and is also bringing out a line spread, and other technical characteristics. thorization and accounting). Radius only of UNII band radios limited to five miles in Major spectrum possibilities could be works for static objects and has some other transmission range. achieved simply by allowing the design and difficulties as well. Consequently this AAA use of radios that could tune themselves in working group is building up a replacement These new radios can be remotely logged accordance with the operational reality of protocol for Radius. The AAA protocol will into and configured - something that greatly their surroundings. come with features such as session measure- increases their utility for ISPs. ISPs mean- ment and Accounting. Tied in with IP SEC, while are going wireless. Breezecom claims Hughes points out that one way a user who AAA will do authorization and accounting ISP 500 customers in North America. Some lives close to an ISP pop can help to spread for services such as mobile IP. 100 megabit per second radios are begin- the benefits of wireless technology is to as- ning to appear. One such is made by Proxim. certain whether the ISP operator with allow Comparison of v4 and v6 in him to plug a radio into the ISPs pop con- Scaling, pp. 227 - 229 While line of sight problems are critical for nection. If so after a [site] sight survey to these radios, Cisco is claiming to have over- determine that radios needed are available Yet another IETF discussion this time with come some of the drop off of communica- at reasonable price, the user can install the interesting new information on levels of tions caused by Fresnel Zone problems. radios and plug one into the ISP’s Ethernet. complexity of NATs and levels of address Subtle physical differences found at each site allocation. can mar transmission capability. ISPs must To ensure that they can inter operate with have staff skilled in installation. The key each other, radios are being built to the business model is focused on connecting 802.11 standard. As shown by Apple Com- Napster's impact, pp. 230 small business and will be increasingly fo- puter in its Macintosh Airport Base Station - 232 cused on delivery of broadband services to and Airport card architecture, it is possible residential customers who either don’t want for someone to spend upwards of a thou- or can’t get adequate DSL or cable connec- sand dollars to connect to an ISP with a point Napster is an application written by a 19 year tion. to multi-point multi megabit radio and then old computer science student last summer. by placing an omni directional antenna on Downloadable from the web, it lets users Hughes discusses in detail the way that the his roof to connect and relay as many as temporarily turn their computers into serv- E-rate increases by an order of magnitude twenty neighbors using $100 PCMCIA ra- ers for the purpose of swapping MP3 files. the cost of connecting public schools to the dios plugged into their lap tops. Grown hugely popular in the last several Internet by prohibiting the schools from buy- months, it accounts for a significant percent- ing wireless equipment and requiring them Of special benefit to ISPs selling wireless age of Internet traffic. According to univer- instead to rent leased lines from the local connectivity is the ability in software to sity network administrators, it is clogging exchange carrier year after year. Under the throttle down to agreed upon rates, the speed campus connections to the Internet. We pub- Texas subsidy, the monthly cost of the of the connections that radios hey supply to lish edited discussion on what can be done Internet connection is multiplied by 12 and their customers give. Also of significance is about the problem from the CAIDA and to that figure is added the cost of hardware a new Ethernet PPP protocol that means they NANOG mail lists. Port blocking has been (DSU/CSU for example) needed for the need not assign each customer their own IP 206 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 number. Akamai, pp. 248-260 charges each web site owner for the aggre- gate amount of its data delivered to end us- “Watch out UUNET, the frogs and the Rapid and reliable delivery of web-based ers anywhere in the Internet. The table (at shrimp are coming - using your bandwidth” content anywhere in the world has become the end of the interview on page 12) shows - Dave Hughes one of the most critical issues in enabling how many networks receive what percent the continued the scaling of the Internet. of Akamai’s total aggregate of content traf- Having laid out this general background, Web caching started out in 1996 as an at- fic. Its intelligent overlay network of DNS Hughes goes on to discuss aspects of his tempt of many ISPs to store locally as much servers that direct look up must current NSF funded research on wireless and of the content of the web as possible. Each keep very good statistics so that Akamai satellite connectivity for environmental re- ISP would make its own decisions about knows what to bill each of its customers who search. what content to fetch and how often to do it. pay to have their web sites included in This system created many problems for web Akamai’s distribution network. Hughes emphasizes Tachyon which has just content providers because they had no come on line in the spring of 2000 with Con- knowledge about what was cached where, Akamai has, in effect, created a virtual pri- centric as its Internet providing partner as by whom and with what frequency. Fur- vate overlay of the internet where, as much the first company to provide reasonably thermore, since caching distributed their as possible, it keeps packets on a single net- priced bi-directional satellite linkage to the content to many sites, they had no reliable work and minimizes their having to flow internet. Tachyon provides a ground station way of reporting to their advertisers how upstream to transit from one backbone to that talks to the satellite for only $5,000.. It many people had seen the material. It was a another (where most packet loss occurs) and sells bi-directional, true TCP/IP, at 2 mega- hit or miss system that no one was happy them move to the downstream customers of bits down and 256k up, for $2000 a month, with and one that created a major opportu- the other backbone. This means that Akamai or 300kbps down and 64k up, for $795. nity for others to fill. A year ago Sandpiper can go to an ISP and ask to place its servers and Akamai were the most talked about com- in the its key POPs for no co-location charge Hughes describes the National Environmen- petitors. We note that since then Sandpiper and no charge for bandwidth used. Why? tal Observatory Network as part of an ex- has been acquired by Digital Island and has Because it can generally show every ISP panding need for environmental data collec- been focusing on the rapidly growing field how, with Akamai servers locally, its cus- tion - one that is so broad in its proposed of business-to-business e-commerce, leav- tomers will pull far less web traffic across scope that it looks as though only wireless ing Akamai as the acknowledged leader in the ISP’s backbone that they would if the data monitors may do an cost effective job general content delivery. ISP tried to do its own caching. Or, if the of data gathering. ISP just sent the packets back and forth to In late 1999 Avi Freedman left his position the content provider’s central servers. In He talks about several projects in which he as Vice President of Engineering for addition Akamai can demonstrate how, in is working with environmental scientists AboveNet to become Vice President of Net- return for nothing more than some co-lo whom he is surprised to find are generally work Architecture for Akamai. We publish space and bandwidth, the ISP will save band- unaware of the what improvement in wire- a long interview where Avi explains in de- width and give its customers better service. less data gathering technology over the past tail Akamai’s extremely interestng business five years make it possible to do. model. What Akamai does is enabled by a Freedman also describes how Akamai must very significant new use for DNS that it has deal with the needs of its customer’s central The kinds of data gathering involved are developed. servers that are most often located at large quite diverse. For example the transmission web hosting centers at major backbone sites. from sensors the chemical composition of Akamai it has its own network of DNS serv- In these cases he may act as an advocate for lake water in timed coordination with the ers that keep in contact with each other glo- the Akamai customer in procuring if neces- overhead passes of a satellite. A second is bally. Akamai’s other servers take the web sary some Akamai owned and operated short the collection of light readings from a net- content of Akamai’s customers and store it haul links to ensure that they can have work sensors on a forest floor and the trans- in hundreds and then thousands of copies at enough burstable bandwidth to meet peak mission of that data from each individual the edge of the network as Akamai’s global traffic periods. Given his experience at sensor a short distance to a data collector. network of servers continues to grow. AboveNet which ran this type of operation, The collector, in turn after perhaps encap- Akamai solves the problem of the world he is well equipped to deal with the web sulating it in a tiny Linux data base, trans- wide wait by pushing content as close to the based, content provider, the web farm back- mits it back to the research station and the end user as possible. bone operator and the large number of down Internet. A third is the capture of sound - in stream networks where delivery oriented this case the call of the coqui frog from the Akamai’s network of DNS servers then ac- servers can be placed as close to customers rain forest of Puerto Rico. A fourth is the complishes a kind of global air traffic con- as possible. visual observation of shrimp transmitted in trol task of communicating among them- high bandwidth in real time. A possible fifth selves network traffic conditions in real time Akamai has taken advantage of a narrow would include the use of partially buried to determine which local server to send a window of opportunity to become, in con- sensors to grab, chemically analyze via tiny user’s request to or, in the event that regional trast to the older generation vertically inte- Linux and transmit the composition of the traffic problems are interfering with local grated backbones, one of a small but grow- gasses of a prairie fire as the fire ignites the reachability, how to retrieve the data from a ing number of content distribution networks. material around the sensor and passes over more distant server. Such a network hopes to solve problems like head. Other phenomena measured may be the peering problem for a BBN which in the as diverse a earth quakes and hurricanes. Within a site Akamai figures out what data summer of 1998 rebelled at granting Exo- From the point of view of Internet infrastruc- is not constantly updated. That data is mi- dus free peering because Exodus dumped ture this means yet another huge increase in grated to Akamai’s edge servers on a regu- more traffic into BBN than it took out. bandwidth that will be generated and lar basis. The minimum amount of data dumped on to backbones. Watch out possible is pumped from the host web sites UUNET, the frogs and the shrimp are com- to the edges, while each edge is ing - using your bandwidth. kept constantly informed of the best path to get to the fresh host data it needs. Akamai

207 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Three Dimensional Data Web Set To Emerge New Protocols Enable Manipulation of Quantitative Data by Data Web Browsers -- Open Standards Likely to Give Huge Boost to Data Mining Activities -- Work Pushed By Terabyte Challenge Consortium Enables Remote Interaction of Data Sets Editor’s Note: Dr. Robert Grossman is privacy fears will cost online retailers $12.4 the missuse of this technology. It exists. chairman and CEO of Magnify Inc. Mag- billion in sales this year, and predicts that Complaining about it won't make it go away. nify provides outsourced data mining and when Congress reconvenes next year, con- One would however that in addition to pro- intelligent profile services. He is also Direc- sumer privacy legislation will be high on the moting industry standards the Data Mining tor of the Laboratory for Advanced Com- agenda, because it is a bipartisan issue that Group and others involvolved would also puting at the Uni- affects everyone. (InformationWeek 19 Dec tackle the difficult task of educating the pub- versity of Illinois Chicago. The Laboratory 2000) " pabilities of the technology but also as to gies especially involving large data sets, appropriate and inappropriate uses of the high-performance computing, and high-per- These issues also can be elevated to an results. The newly emerging data web in- formance networking. Since 1988 he has Orwellian point of view where they involve dustry needs to figure out how to apply a been a Professor of Mathematics Computer the privacy of an entire nation. On Decem- risks analysis to projects that see the data Science and Statistics at the University of ber 3 Dave Farber published to his Interest- web tools as providing a quick fix to the dan- Illinois Chicago. For the past five years he ing pesons list the following aticle from the gers of anonymity of cyber criminals and has divided his time between Magnify and Observer in the UK. It was titled "Se- for more than a short time without comment versity of California Berkeley. He received cret plan to spy on all British phone calls" from auhoratative source within the data web his Ph.D. in computational mathematics with a by line by Kamal Ahmed, political and data space developers. from Princeton University in 1984. Some editor of his articles can be found on Two Cultures Commoditiztion of Data web site. "Britain's intelligence services are seeking powers to seize all records of telephone calls, Mining: Methodology Editor's Introduction emails and internet connections made by every person living in this country. A docu- and Architecture The impact of most technology on which ment circulated to Home Office officials and we report is socially and politically neutral. obtained by The Observer reveals that MI5, COOK Report: What is data mining all about Fortunately! What we are caling the Data MI6 and the police are demanding new leg- and how did you get involved in it? Web and what Robert Grossman calls Data islation to log every phone call made in this Space is extremely powerful. The enabling country and store the information for seven Grossman: I first got involved when I of a data web with open standards will in- years at a vast government-run 'data ware- started a project called the PASS Project. evitably fuel data mining activities carried house', a super computer that will hold the This was a data mining research project for on now with largely proprietary software. information." the super conducting supercollider. It in- volved about 25 scientists from five univer- The data web technology itself is inherently "The secret moves, which will cost millions sities and national laboratories. Of course neutral. However depending on the data to of pounds, were last night condemned by when the collider was canceled, the project which it is applied and the use that is made politicians and campaigners as a sinister died. But I have always been interested in of the results, the social political and per- expansion of 'Big Brother' state powers and how you could do meaningful statistics on sonal impacts of this technology can be pro- a fundamental attack on the public's right to terabytes of data and make decisions based found. By way of illustration we offer two privacy." on the analysis in real time. The collider pre- examples below. sented an interesting opportunity in how to "Last night, the Home Office admitted that scale up applications in three different tech- When the data mining involves human sub- it was giving the plans serious consideration. nologies (data mining, high-performance jects, it can raise sensitive issues of privacy. ….The document, which is classified 're- networking, and real time detection). For example, the News Scan Daily mail list stricted', says new laws are needed to allow on December 20, 2000 wrote: " In the world the intelligence services, Customs and Ex- We faced three challenges. The first chal- of struggling Internet startups, sometimes the cise and the police access to telephone and lenge was understanding how to do statis- data they've collected on their customers computer records of every member of the tics as data sets grew from gigabytes to turns out to be their most valuable asset. public. It suggests that the Home Office is terabytes and then to petabytes. The second "Data is worth a lot of money," says a sympathetic to the new powers, which would challenge was how to provide scientists from Forrester Research analyst, and therefore be used to tackle the growing problems of around the world transparent access to the "the incentive for startups to violate privacy cybercrime, the use of computers by data using high performance computer net- is strong." Even the biggies -- DoubleClick paedophiles to run child pornography rings, works. The third challenge was the real time and -- face alleged consumer pri- as well as terrorism and international drug component — namely deciding in real time vacy breaches, and the fear is that online trafficking." what decisions to make. The collider could companies' cavalier attitudes will create a capture only about one out of a hundred consumer backlash. Forrester estimates that The COOK Report sees no easy answer to thousand events. A decision had to be made 208 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 in real time whether to even record any par- OC-48 networks, which is the current state data. This will result in a protocol known as ticular data event. of the art. With the propagation of fiber, you the Data Space Transfer Protocol (DSTP). only now beginning to see businesses build Then you need a Data Transformation Pro- COOK Report: Did the real time aspect of corporate networks with OC-3 bandwidth. tocol. For this we are building a language the decision making cut through everything right now called the Data Transformation that came after, or was this to some extent One of measures that I always use is that and Extraction Markup Language (DXML). an anomaly given in the nature of the collider with an OC-3 connection you can move Once you have data that is clean, you can project? about 10 gigabytes of data in 15 minutes. A begin data mining. The output of a data min- company with a million customers may have ing system or data mining tool on a data set Grossman: My interests have always com- 5 or 10 GBs of customer data. With a high is a statistical model. bined these three areas. If you look at the performance network, instead of building a PASS Project which ran from 1991 to 1994 centralized data warehouse, it is possible for We created an XML standard for statistical being able to deal with large data sets in real the first time to move data on the fly and use models called the Predictive Model Markup time in a distributed manner was restricted it for ad hoc analysis in real time situations. Language (PMML). This standard has very to scientific collaborations and to defense wide vendor buy in. You can then take the applications and I have always been involved Say for example that you have a site that PMML output and use it for real time deci- in both. If you move ahead to today, you does your Web hosting and it produces about sion processes. In an E-Commerce applica- will find that in the business world large data 5 GB of data. Say you have a site some- tion the use might be to build a web page. In sets about customers are now common, and where else that does your call centers and a scientific application you may use to pro- large corporations have distributed data that this site accumulates about 5 GB of data. cess a data set. In the business world you about their customers. Real-time decisions Building a unified view of your customers may use it to build web pages or to suggest about customers are now essential for the requires analyzing both data sets, which for scripts in a call center. We have created an- web, for call centers, and for customer rela- the first time becomes possible with an OC- other protocol called the Predictive Scoring tionship management (CRM) systems. 3 network without first building a central- and Update Protocol or PSUP. This will al- ized data warehouse. low you to make real time decisions using At a very basic level, my interests have re- PPML models. mained the same for the last ten or fifteen COOK Report: Under those conditions you years. But what has happened is that the began to think of developing a common tool Here is what we mean by real time. An event computing and networking infrastructure set of protocols to deal with these sets of takes place. That event maybe someone underlying the web has grown driven by the remote data? coming to a web page. You have a PMML commoditization of computers and fiber. file in the scoring engine governing the dis- With the commoditization of computers, Grossman: What we did was to build a lay- play of the appropriate personalized content. there is now enough CPUs to easily do data ered view of how data analysis and real time The arrival of the person at the web page mining even on large data sets. As far as data decision making could be carried out as a causes a profile to be pulled, the profile to storage goes, while handling gigabytes used vital part of the Internet infrastructure. be updated by the event, the new profile to be a challenge, terabytes are now com- scored with the PMML model, and the ap- mon. Finally the technology to enable real COOK Report: In other words issues like propriate content to be displayed. time decisions is much better understood methodology and architecture? today. For example one of the things that COOK Report: By definition then this is we do at Magnify is to make decision in real Grossman: Yes. At the lowest level you something that can be done only for repeat time about customer interactions and use this move data. Then once you have moved it, visitors? information to build web pages. you typically have to transform and clean the data. Grossman: If we are dealing with a first- What I am interested in doing is taking things time visitor you would typically start with a that used to be quite esoteric and building COOK Report: What do you mean by clean- profile containing very little information, but them into what will become part of the com- ing and transforming the data? the basic process is the same. mon and everyday protocols of the next-gen- eration Internet Grossman: For example, you might have a COOK Report: This must be the kind of . hundred different events about a customer: thing that Amazon.com does when you come COOK Report: What determines whether recent web interactions, recent purchase, and to browse and purchase books or other items. you study just one data set or take two data so on. Before you decide what products to sets and compare parts of each with the offer a customer, you generally clean and Creation of an Open other? And perhaps cause parts of each to transform the data in order to compute cer- interact with the other? Did it only recently tain derived statistical quantities. For ex- Infrastructure for a Data become possible to have data sets interact ample you count the total number of pur- Web with each other? chases, look at the most recent purchases, compute the total dollars spent, and things Grossman: Let me answer that by giving of that nature. Grossman: That is correct but in the case of you some examples from some of the Amazon they do it with proprietary black projects that I have been working on recently. COOK Report: In other words your software box systems. On the other hand we are try- The academic community is concerned, by must be able to formulate a set of queries to ing to set up an open infrastructure so that and large, with a scientific and engineering your data set that will allow you to extract anyone can do this as a routine portion of data. At least at the leading research institu- the information you need? what we are calling the Data Web. Right now tions, the infrastructure is two or three or the web is very good for looking at and four years ahead of the infrastructure at large Grossman: Yes. To put all this into a broader moving remote documents which can also corporations. For example at the University context, I was one of the founders of a stan- be multimedia documents but it is not good we’ve been using OC-3 networks for three dards group that is trying to define and stan- for working with data and making real time or four years and have recently begun to ex- dardize open source protocols for this entire decisions. periment with applications using OC-12 and set of processes. First you must move the

209 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA COOK Report: Is one of your goals to be provides infrastructure and so does this. manipulate and printing that spreadsheet to able to compare information that you can Napster yields infrastructure for discovery an Adobe Acrobat PDF file that you cannot find at one place on the Web with large and retrieval of MP3 files. This infrastruc- manipulate. amounts of similar information? ture doesn’t do discovery yet which is some- thing that will be accomplished by other Grossman: Indeed. Imagine the current web Grossman: That’s right. If I want to do a tools. What we are building is a set of proto- data as PDF data. It is an image that you point and click analysis of data available on cols, languages, and tools that will yield an cannot do anything with without a great deal today’s Web I cannot do this in the same infrastructure for (1) looking at data, for (2) of additional work. What we have created sense that I can retrieve a document with a doing remote and distributed data analysis, are protocols, languages and an infrastruc- point and click. We asked ourselves the ques- and (3) doing real time decision making. This ture so that when you see data in one of our tion of what would be the analogies for the and related protocols and languages will cre- Data Space browsers, you can easily work data web of html and http. ate what we are calling the data web. In the with it. If you want to make a decision about same way that there is a music web out there a customer, you can push a PPML file, you Here is an example to explain what we have supported by Napster, we are creating a data can push an event, you can pull a profile and in mind. Several months ago, the New York web specifically designed for business, sci- you can make a decision in real time. Times reported on an article in a scientific entific, engineering and health care data. journal describing a relationship between El COOK Report: If you look at all the docu- Nino and cholera. If you went to the web The web was originally driven by people ments out on the HTML web right now, how after you read the article, you would have who wanted to take documents and make much of the total is useable by these tools? found that there is no simple way to get the them available to the world. Today when data and see if this is indeed such a relation- scientists have data, they publish a paper. Grossman: Not much. Right now we are ship using a simple point and click browser The problem is that it is extremely difficult not trying to translate existing HTML data interface. for anyone out side the specialized commu- formats. We are focusing instead on the ma- nity in which the data originates to make any jority of data which has never been in However we already had some El Nino data use of it. HTML. As an example, most of the data in from NCAR and a DSTP server in Boulder the deep web is of this type. It is found in on the data web. We got some cholera data COOK Report: Is one reason that other flat files or in databases behind gateways. from the World Health Organization and put people cannot “touch” it that it is not out on We have developed very simple ways to get it on a DSTP server in Chicago. At the the web and in XML format? the flat files into the data web. You basically Supercomputing 2000 Conference in mid just create a simple XML file describing the November we demonstrated using the data Grossman: That’s correct. From our expe- names and the columns and the attributes web to do a simple point and click retrieval rience so far, XML is a good format for meta and variables. You put the resulting XML and analysis of the El Nino and cholera data. data but not always the best format for ordi- file and the ascii file containing the data it- nary data. The data web we are building not self into a directory that a Data Space server With our Data Space browser, we can easily look other data formats which may be as simple in an entirely new way. for correlations between the two data sets. as rows and columns. This does not mean that you will always COOK Report: You are saying then that you immediately understand what Data Space COOK Report: So what you are saying is can tell me how to put such data into a di- you see. But unlike the document web, you that in the early years of the web, the place- rectory on my HTML web site that would can at least touch the data in a way that has ment of any data there was done without any be accessible to your tools? some meaning. thought of enabling people to massage or manipulate it in any way and while XML is Grossman: Yes, you would simply have to COOK Report: It sounds like you are talk- one way to enable the manipulation of data put a Data Space server on your website. ing about giving ordinary users of the it is by no means the only way. Your data would then be part of Data Space. Internet tools (which indeed some users have right now) that they can use in the manner The Difference Between COOK Report: Can your Data Space server of a client and server. They will reach out to be added to the same hard drive that my one database and say OK I wanted to talk to the Data and Document Apache web server resides on? you in such as such a fashion. And you go to another database and set up a session and Web Grossman: Yes. tThink of it as something then have the two talk to each other. that can coexist with the Apache server on Grossman: That’s correct. Look at it this the same physical box. Your box probably Grossman: That’s correct. At the Labora- way. It used to be that when you got a fax already runs several services, http, simple tory for Advanced Computing we’re provid- you were happy. Now when you receive ma- mail transfer protocol (SMTP), network ing open source Data Space servers by terial in fax form rather than electronically, news transport protocol (NNTP), Napster, means of which you can put your own data if you actually have to work with the docu- etc. DSTP is simply another such service. on the Web and we are also providing open ment, you would much prefer the electronic The Data Space client talks to the Data Space source Data Space clients so that you can form given all the useful things that you can server through the DSTP protocol in the model any data from one or more Data Space do with it that cannot be done with paper. same way that your web browser talks to an servers. apache server via the HTTP protocol. DSTP But think about the web. People put data has more semantics than http since data has COOK Report: Is it reasonable to draw any there but although you can see it, you can- more semantics than documents, for ex- kind of analogy between the way what you not sum it, average it, correlate it, nor do ample, data has rows and columns and just described works and Napster or regression or any of a number of other ana- ranges, etc. Gnutella? lytical tasks. It is like having a fax.

Grossman: Napster is peer-to-peer. What I COOK Report: It is like the difference be- How it Works am describing is also peer-to-peer. Napster tween having a spread sheet that you can 210 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 COOK Report: Is the talking done in such a From the vendor’s perspective, Data Space use Data Space to examine directly the rela- way that the data would ordinarily be useable is also like the document web, it simply uses tionship between the type of tires and likeli- by that Apache server? a richer suite of services, including services hood of automobile accidents. for moving data (DSTP) and real time scor- Grossman: Not quite. If you want to use ing (PSUP), and specialized XML languages Web sites typically use Data Space services the data web instead of an Apache server for working with data, including the Predic- such as scoring and predictive modeling. The you would use a Data Space sever. Instead tive Model Markup Language (PMML) and PSUP scoring protocol supports what is of Netscape or Internet explorer, you would the Data Extraction and Transformation Lan- called “event driven” scoring. For example, use another browser. Eventually they will guage (DXML). Table 1 below illustrates an event, such as when a user returns to a be merged. Right now it is rather like in the these differences. web site, is used to update a profile about early net era when you used a different pro- the user. The updated profile is then scored gram to read news and to browse the net. A user can explore Data Space directly us- using a PMML file to produce one or more Today, of course, both functions are merged ing a Data Space browser. A Data Space scores. These scores can then used by the into the browser. This software is now avail- browser uses the DTSP to move data and web site, for example, to provide content able and certainly anyone who can put up meta-data from a remote Data Space server from the web site that is relevant for the user. and run an Apache server can also put up a to the local Data Space client. The data can This is particularly important for web sites Data Space server. then be cleaned, transformed and shaped with large amounts of content or for those either in an ad hoc fashion by the user or sites which want to personalize a user’s in- COOK Report: Can you explain in more de- following the rules in a Data Extraction and teraction. tail how this all works? Transformation Markup Language file (DXML). What we are trying to do with these proto- Grossman: From the user’s perspective, cols and industry standards is to allow you Data Space works like the document web. Once cleaned in this fashion, the data can to do all the things that you need to do to You can use a browser to examine remote then be mined using one of the several com- create an open internet infrastructure for and distributed data. And you can analyze mercial data mining or statistical applications data. We have tried to be careful to make and mine it with a point and click interface. available. This in turn produces a statistical sure that the infrastructure scales as your data Web sites can use Data Space services such model expressed in the Predictive Model grows from gigabytes to terabytes and as as personalization and predictive modeling Markup Language (PMML). Producing your networks grow from T-1s to OC-3s. In to provide a site with interactions which are such a model may be the goal itself or the other words, we are trying to put all the in- created on the fly for each individual visi- model may be used to analyze and score frastructure together that is necessary to tor. additional data. As an example, a user could move data, analyze it, and make decisions with it in real time.

Data Space Web

Basic Objects remote & distributed columns of data remote (multi-media) documents

Basic Operations a) moving data b) transforming and shaping data c) exploring and analyzing remote (columns) viewing remote documents of data d) mining distributed (columns) of data e) scoring data Languages a) xml for meta-data b) Predictive Model Markup Language (PM ML) for statistical and data mining models HTML and XML c) Data Extraction and Transformation Markup Language (DXML) for transforming and shaping data d) ascii, XML, and SQL for data Protocols a) DataSpace Transfer Protocol (DSTP) Hyprtext Transfer Protocol HTTP b) Predictive Scoring and Update (PSUP) Pro tocol Servers a) data (DSTP) servers b) scoring (PSUP) servers HTTP servers Interfaces point and click point and click

Table 1. Data Space is modeled on the web and provides an infrastructure to move, transform, explore, and mine remote and distributed data in the same way that the web provides an infrastructure to view remote (multi-media) documents. Table from a forth coming publication by Robert Grossman 211 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Diagramming the Data Space services. Computing, Processes and PMML was developed by a vendor led con- The Terabyte Challenge Testbed is also very sortium called the Data Mining Group active. In addition, a variety of industrial Standards (DMG) . Currently, partners from the Data Mining Group par- PMML is supported by IBM, Oracle, ticipate in the formal demonstrations which Figure One below shows this real time loop Microsoft, NCR, SPSS, Magnify, Angoss, occur twice a year. The members of the 2001 in more detail. In an off-line process, data is Mine It, SGI, and a variety of other data Terabyte Challenge Testbed are University captured and stored in a data mining ware- mining vendors. of Illinois at Chicago, University of Penn- house. A data mining application is then used sylvania, UC-Davis, Caltech, Internet 2 - to produce a statistical model in PMML and At the KDD conference this summer (Au- Ann Arbor, NCAR, Imperial College Lon- a set of profiles that are stored in an opera- gust, 2000), the Data Mining Group spon- don, Australian National University - tional data store. In the event driven, real sored a test in which several vendors includ- Canberra, University of Virgina, Access time environment the scoring server receives ing IBM, Oracle, and Magnify produced Center - Arlington, and various other sites an event. Using the event, the correspond- PMML files from a test set. To demonstrate on an ad hoc basis. Basically, the Testbed ing profile is retrieved from the operational interoperability, Magnify also demonstrated creates new standards and tools for the Data data store. The profile is updated using the a scoring engine that was able to read and Web and the Data Mining Group makes sure event and the rules from a DXML file. The score PMML files from all three vendors. that it becomes vendor supported and car- PMML file is then applied to the updated Since then IBM has also announced a scor- ries on the work once the research compo- profile to produce one or more scores, which ing engine, and additional vendors are ex- nent is minimal. are then returned to the scoring client. Al- pected to announce scoring engines this though it sounds complicated, it can all be coming year. This is what I would call the twenty thou- done in a couple of milliseconds once the sand foot over view of data space. Data profile is obtained. The DMG is now beginning to standardize Space uses open standards to provide the DXML. The Data Space developers are also internet infrastructure necessary to work For example, Magnify is using this type of beginning the process of standardizing the with scientific, engineering, business, and event driven, real time scoring for fraud de- specifications for PSUP and DSTP. Part of health care data. Unlike HTTP and HTML tection and to personalize web sites. the challenge is to make sure that this suite which are designed for multi-media docu- of standards interoperate with related stan- ments, Data Space is somewhat more com- Traditionally, scoring like this has been done dards, including those for privacy (P3P) and plicated because you have higher expecta- using closed proprietary black boxes. But security. tions when you work with data than when with the Internet, people who would ordi- you work with documents. narily do things in proprietary languages, To summarize: the Data Mining Group is a started to use HTML. We believe that it will very active industrial consortium focused on A document you only have to read. With data be the same with the data web. Until we standards. They have been very low key you have to analyze, score and make deci- agreed on PMML, it used to be that all scor- from a marketing perspective and have sim- sions. What everyone interested in tracking ing, all recommendations, and all real time ply focused on the standards. The Data Min- and planning for the further growth and de- processes were done using closed propri- ing Group’s members are: Angoss, IBM, velopment of Internet infrastructure needs etary systems and protocols. Our view is if Magnify, Microsoft, Mineit, NCR, Oracle, to understand is that so far the current the vendors support this, there will be a Salford Systems, SGI, SPSS, and Xchange. internet barely scratches the surface of what growing interest in moving completely to Reviewers: ACM SIG KDD, University of you will be able to do with data as Data open standards for scoring, predictive mod- Illinois at Chicago Laboratory for Advanced Space and similar infrastructure begins to eling, personalization, and other emerging be deployed. I’m sure that the data web will be an important driver of bandwidth over the next few years.

Some people are trying to use JDBC (Java connectivity to a relational data base) to ac- complish this but it doesn’t really do the job. Doing an SQL query over the web is not what this is all about. If you are an e-tailer on the Internet and you want to find out the shipping address of your customer, you would be likely to go to the Oracle database containing those addresses. The call that you make to that database could likely be a JDBC call from your Apache server.

But this is not what we are talking about. If you are a scientist and want to publish your data and let other scientists touch it — for example, are sunspots related to global warming or is El Nino related to cholera — how do you do that? Or if you are in the Fortune 500 and have data at two sites and want to personalize the web content for in- bound visitors to your site, how will you accomplish this? Figure 1: The Operation of the Datamining Process

212 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 about personalization, but today when we COOK Report: To what extent must one use of the net for new and unpremeditated tasks, and devices to enable them. talk about personalization, we mean what worry about security? If a scientist claims Amazon.com does directly to books by to have grabbed my data, how do I know means of a closed system. Think about what that it is really my data that he grabbed? Grossman: This is our hope, and one rea- son that I spend at least one day a week on it would mean if it were open and you could create from it an infrastructure that would Grossman: That is a very real question. the phone with the Data Mining Group is that this is not going to happen without ven- drive an industry. This is what we are trying What we are doing is assuming that what- to do. ever protocols and infrastructure you are dor buy in. It has to be done in an open way, using to protect your documents you will which is why we started the Data Mining Group (DMG). We started with PMML, we There is nothing wrong with having big also be using to protect your data. For ex- dreams because we know there is a lot of ample, if you are a corporation, you would are currently working on the Data Extrac- tion and Transformation Markup Language data out there that it basically being ignored. presumably be using a virtual private net- The amount of data is growing 6-8 orders of work. If one wants to go even further than (DXML), and we will be tackling the the Predictive Scoring and Up Date Protocol magnitude faster than those capable of ana- this, one of the master’s students at the uni- lyzing it. This gap means that most data is versity did a quick throwaway prototype (PSUP) after that. We also worked very hard to get IBM, ORACLE, NCR, SPSS, being ignored. One of the roles of Data Space showing that digital signatures and certifi- is to help close this gap. cates could easily be added to a data space Microsoft, and many of the smaller vendors involved. See Table 2 on this page. server to provide an additional level of se- COOK Report: So what are the businesses curity and confidence. The web is going to go in lots of different and business models springing up in this directions. There is always going to be the space? document web. Peer to peer services like The Next Great Web Napster are here. What I am going to call Grossman: I have a simple view of the last Revolution Broadband Based Business Services (B3S) forty or so years of commercial software. In are coming propelled by increases in band- this view, there are three eras. In the first era COOK Report: What I am hearing now is width. The result is that you will be able to all software was custom. In the second era, that you have a set of tools built that by the move data as easily as documents. As soon the majority of custom software was re- time you can get them reasonably well dis- as you can do this, you will want an infra- placed with standard applications, such as seminated that there will be so much that structure that will allow you to analyze the databases, accounting systems, and word can be done that the impact will conceiv- data, making decisions using the data, and processors. I see us entering a third era in ably be as great as the first web revolution to do this in real time. This is what we call which the majority of applications will be in spawning huge additional growth in the the data web. E-commerce advocates talk replaced by Managed Services. For example, a mail service such as Hot Mail or Yahoo Mail provides enough of the functionality of a PC-based mail application to satisfy the Some of the Protocols and Languages Used in needs of many users. Data Space From the user’s perspective, it is much easier to use this type of managed service than to Operation Standard Description deal with the complexities of a software ap- plication. By the way, an Application Ser- Moving Data DSTP The data space transfer protocol (DSTP) is vice Provider offering software on a leased the protocol used to move data between nodes base over the web provides only part of what in the data web. a Managed Service Provider (MSP) pro- vides. The key is that a MSP provides a com- Transforming pletely outsourced solution, not simply Data DXML The data extraction and transformation mark outsourced leasing of software. up language (DXML) describes how to clean, transform, and shape data. This is usually one Data Space provides the perfect infrastruc- of the most labor intensive tasks when work ture for Managed Service Providers inter- ing with data. ested in working with business data. For example, Magnify is a MSP for data min- Building ing, predictive modeling, and other business Statistical Models PMML Statistical models are built using statistical and intelligence services. I suspect that there will data mining applications. The predictive be more and more Managed Service Pro- model markup language (PMML) describes viders offering data analysis, data analytics, the output of such systems in an open format data warehousing, business intelligence, and data mining. There are already several MSPs Scoring PSUP Scoring is the process of using statistical mod offering storage services. Unfortunately, the els to make decisions. The Predictive Scoring underlying infrastructure for doing what and Update Protocol (PSUP) is a protocol that needs to be done today is simply inadequate. can be used for both on line real time scoring This is where the Data Space infrastructure and updates as well as scoring in an off line and related infrastructures come into play. batch environment. COOK Report: Why is the infrastructure inadequate? Not because physically you can’t transport the bits? But rather it is inad- Table 2. Data Space is based upon new and emerging equate because your software, being largely protocols and languages. Table from a forth coming publication by Robert Grossman 213 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA proprietary, doesn’t transfer well from the formation goes up on the web. In this case chases from in bound 800 telephone orders, environment of one provider to another? you can get the raw maleable data from the but when these same customers purchase on web but you will find that it is very hard to line they are treated as though they were dif- Grossman: Yes. The data simply looses too join that data across experimental bound- ferent customers. Corporate data warehouses much semantic information. You want pro- aries. and some customer management systems do tocols which retain more of the underlying in fact combine information about custom- semantics of the data. For example the prob- In this instance, again I see some of the core ers across the different channels of customer lem is that when you move data over the ideas from Data Space as being highly ap- interaction, but this should be really be some- web, today the data moves primarily as an plicable. Namely, how do you move data thing that is driven by the way that data is HTML table, which as I pointed out earlier with standards? How do you transform data organized, labeled and moved through out you cannot edit or shape in anyway. It is like such as with the data transformation and an organization, say with Data Space tools. a dumb paper based fax. The Data Space extraction mark up language that we talked infrastructure would make it possible for a a little bit about? How do you score data Some of the simple ideas introduced in Data managed service provider to deal with data with the PSUP protocol? What we are try- Space provide simple mechanisms that by having full semantics. We want to improve ing to do is to provide cross disciplinary pro- themselves are not sufficient, but become the foundation on which they operate. This tocols that can be layered over the existing so when combined with some of the activi- should accelerate their growth and acceler- proprietary data bases in certain domains so ties going on in meta data standardization ate the development of the functionality they that you can more easily work with distrib- and the general move from proprietary data can provide. uted data. formats to XML data formats. Combined with these activities, the ideas of data space COOK Report: If I am a corporation with The amount of data has been exploding and offer simple ways to join data from differ- corporate sensitive data, am I going to have what has been lacking is some underlying ent data sources, different departments, or any worries about allowing a third party to wide area and distributed infrastructure for different disciplines in a way where their apply a tool set of their own by means of working with scientific, engineering and combination is formally meaningful. The which they will manipulate my data? health care data. Some of this is being ad- units and transformations are such that they dressed by the so-called “grid” style of dis- may be combined. Grossman: Yes, but a much larger worry is tributed computing. For example, the NCSA that corporations stumble if they do not fo- (www.ncsa.uiuc.edu) and NPACI The commonality is generally a universal cus on their core competencies and outsource (www.sdsc.edu) computing infrastructures correlation key. On the customer side this everything else. Very few corporations have provide distributed computing, distributed would tend to be a customer ID that would as their core competencies data warehous- storage, distributed security, and related ser- tell you who the customer is. There would ing, analytics, or mining. They will there- vices. The Data Space tools, protocols and also probably be a temporal ID so that you fore outsource this and when they do, they languages that we have been talking about would know it is the same customer at the must take care to do it with an infrastructure would by and large interoperate with grid same time. The temporal ID would tell you that provides the necessary security and pri- style computing. that on such and such day there was a web vacy. purchase while on a different day there was There are a number of start-ups which are an offline catalogue purchase. COOK Report: And the companies that do trying to commercialize the distributed grid this know that if they can’t convince their style of computing. Red Herring had a re- In a scientific domain you would say that customers that they will handle the data with cent article about some of these companies. this region of the world at this time over a proper security, they have no viable busi- It is an exciting world because there is such period of one month had “n” many cholera ness? need and such opportunity. There is a bit of cases compared to this region over the same a vacuum though, and, therefore I think there period of time having had such and such El Grossman: Yes. And companies have been will be a number of protocols and languages Nino activity. They are then formally com- doing this for other companies for years. All that will compete over the next couple of parable. With these examples it is possible that is different is that you are replacing fed- years to play a role in helping grids and dis- that there could be some direct causal rela- exing tapes with secure FTP (data transfer tributed computing to do the tasks for which tionship. However there is nothing to pre- protocol) over VPNs. The security infra- they were designed. clude you from saying: Does this customer structure available through virtual private purchase correlate to the position of the stars networks is such that it is probably safer COOK Report: Can you give some ex- at some point in time? All we can do with these days to transfer data over a VPN at an amples of what these data sets would be? the underlying protocol is to provide a for- agreed upon time than it is to send it via How much of the likely work is cross disci- mal comparison using universal correlation Federal Express. plinary and do we need special tool sets in keys that align time, place, profile ID and so such instances? Is the cross disciplinary in- on. Combining Data in teraction mostly in science or is it in busi- ness as well? From this point on it is up to the analyst who Science and Business you never can take out of the loop. All we Applications Grossman: I think it is everywhere. The ex- are doing is providing good tools to be used ample of cholera and el Nino is relevant to by good analysts to do what they need to do your question. The traditional way to do But let’s return for the moment to the flip in less time and less cost than would nor- something about this is to ask a graduate stu- mally be the case. This is what is going on side of this which is the scientific infrastruc- dent to spend his or her time trying to over- with Data Space. For example you could ture that is pushing the data web. This is usu- lay two data sets that have come from dif- ally organized by discipline. Perhaps one of correlate El Nino with the stars again, be- ferent sources and were really never meant cause they after all have a certain position at the better organized disciplines that is try- to be overlaid. It is a very very labor inten- a certain time. ing to use the current Internet to work with sive activity. data is bio-informatics, where for example COOK Report: But it would be the analyst as they sequence the genome and they get In the business world you might have a situ- through the use of his or her specialized additional information about functional ation where one system records recent pur- genomics and related information, that in- knowledge who would make the assertion 214 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 and then be ready to prove that certain things ond socket and so on. We soon found that simple to combine these at one central site could indeed be correlated in a true cause we could run 16, 32, 64, and even up to 128 to get a unified view of the data. The early and effect pattern? different sockets. This allowed us to move years of the Terabyte Challenge worked out data from one point on the vBNS or Abilene the basic principles for PMML. network to another without any special tools High Bandwidth and or tuning. This allow us for the first time to Our recent efforts have been involved in real- Large Data Sets saturate OC-3s with data sets talking to one time event-driven decision making over dis- another. We’re now beginning to saturate tributed applications, such as PSUP and lan- COOK Report: But parallel to this is another OC-12s. guages for data transformations (DXML). very interesting high performance universe. Another current focus is to build effective Let me turn there and ask how the work you COOK Report: In other words rather than gigabit applications. PMML, DXML, PSUP have done with scientific data at the Uni- filling one large OC-3 or OC-12 connection, and related protocols and languages which versity of Illinois Chicago compare to the you are filling those connections with many we are testing on the test bed form the foun- commercial development we have been talk- many smaller connections? dation for Data Space. ing about. Grossman: That’s correct. We built a library COOK Report: What is the subject matter Grossman: I have been working on this in- to do this and called it PSockets for Parallel of some of the terabyte challenge network frastructure in different guises for about 8 to Sockets. We then built the basic Data Space efforts all about? 10 years. Recently we have been looking at application over PSockets. This meant that what you can do differently as you move if you had a terabyte of web data in Phila- Grossman: We have a Data Space node at from and a T-1 to an OC-3 connection when delphia, and a terabyte of customer data in NCAR which is the National Center for At- working with remote and distributed data. Chicago, you could use high-performance mospheric Research. We have another node That is the DSTP protocol that I have been Data Space to move data at high bandwidth at Cal Tech containing astronomy data. We talking about. For small data sets this is prac- and ask basic questions about customer be- also had a variety of financial services and tical today in science and business. havior. We did a number of experiments at business data that we sanitized and used just the Abilene applications meeting in the for purposes of demonstrating some of the But to effectively move big data you need spring and have run tests at the last few Su- types of inter-operability at our command. high bandwidth. Say an OC-3 that can move per Computing Conferences using the We also had a variety of text and data de- 10 gigabytes in 15 minutes. If you are going Terabyte Challenge Test Bed. signed to understand how to improve dis- to examine a large data set you also need a tributed information searches on the web. high performance computer. You can Where several years ago we saturated OC- Finally we had a variety of health-care and achieve this these days by using clusters of 3s now we are beginning to saturate OC- genomic data applications. The general pur- work stations. 12s and hopefully one day even OC-48s. We pose was to figure out whether the architec- did this with applications and not just with ture standards and language of Data Space COOK Report: When you started to experi- moving data. A fundamental challenge to- was adequate for high-volume engineering, ment with large data sets and high band- day is to design and build good applications business, healthcare and scientific use. We width, what did you learn? which can operate at gigabit per second want to focus on real applications in each of speeds and beyond. We are a year or two these areas to understand better what archi- Grossman: We found that if we took our away from this. We know that we can move tectures are necessary and will work produc- standard software and ran it over an OC 3 date data at gigabit per second but the ques- tively. the performance was disappointing. It soon tion is can we also build applications that became clear that effective use of OC 3s function at this bandwidth? Several research We found that as we go from megabytes of would not be possible without new software. groups are attacking this problem and we data on the commodity Internet to gigabytes There were two paths you could take. On will build Data Space to support the efforts. and terabytes on OC-3 and OC-12 networks the one hand you could spend a good deal things break and have to be re-engineered. of time tuning the network between a and b. The Terabyte Challenge Let me give some examples. By using jumbo packets and fine tuning the Mining large data means mining data that network, it is possible to move data at higher COOK Report: So what has the Terabyte bandwidth. does not fit into the memory of a single Challenge been all about? workstation or even a cluster of worksta- But we also saw another choice — the strip- tions. We have built into PMML basic sup- Grossman: We have been running the port for what are called ensembles of statis- ing of data with basic parallelism to achieve Terabyte Challenge for the past four years to scale certain type of statistical algorithms behind RAIDs (redundant arrays of inexpen- and have used it both as a test bed for the sive disks). For example with one commod- to large data sets. For example, we have used basic protocols, languages and tools for Data PMML to build ensembles of models using ity disk you cannot achieve very high per- Space, as well as a testbed for different ways formance. But if you used eight or 16 such 32 processors on close to a terabyte of data. to scale data intensive applications, espe- I have already mentioned PSockets which disks, you could stripe the data and build cially remote and distributed data intensive high-performance disk arrays. You’d pull supports parallel striping of data across a applications. The focus has been on devel- network connection. your first bit out of the first disk, the second oping an open infrastructure for working bit out of the second disk, the third bit out of with large and distributed data sets. the third disk, and so on. We took this idea In addition to using clusters for computing PMML models using data mining, clusters and asked what is the simplest way we could The Predictive Model Markup Language stripe data across a network connection? are also required in order to provide the par- (PMML) arose in a simple way. Assume that allel input-output required to feed high band- you have data in four geographically distrib- Instead of opening a single socket which is width applications. We are currently work- uted locations on the testbed and that you ing on matching the parallel input-output how one would normally move data, we would like to apply data mining to each data would stripe the data with the first byte in provided by MPIO and similar software to set locally. If each data mining application the parallel striping providing by PSockets the first socket, the second byte in the sec- produces PMML, then it becomes quite 215 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA so that we can build genuine end to end high ber left me a bit disappointed in that we could dards group is focusing on. bandwidth gigabit applications. This is still not exploit OC-3 and OC-12 bandwidth a fundamental challenge. more effectively. There were lots of trouble- COOK Report: What standards group is the some basic issues with routers, drivers, ap- DMG working with? We see Data Space as a rich infrastructure plication software, etc. that today allows for a parallel disks, paral- Grossman: Again the issue here is vendor lel network striping, and parallel computa- COOK Report: But if you were doing OBGP buy in. Some times its better just to get 10 tion and all this is either already built or will instead of paths changing all the time, you vendors in a room and have them create a soon be built into the basic protocols and just have a few giant leaps and not many of de facto standard than work with an exist- languages of Data Space. Data Space is be- those. ing standards body, For example I was struck ing designed to operate either at high band- with how successful MPI is. MPI was never width with large datasets or at lower band- Grossman: That’s true. And therefore I think blessed by IEEE nor by ANSI. It was a ven- width with smaller ones. It is designed to that as we go to an optical Terabyte Chal- dor standard that changed the way people support both today’s basic e-business appli- lenge 3 we are going to see changes as fun- do high performance computing. cations and tomorrow’s large scientific and damental as those involved in going from defense applications. T1 to OC-3 bandwidth. I think that is what We took the same track with the PMML lan- is going to save us. I also think that we will guage and with broad acceptance by IBM, The notion of a single document on a single find that we can indeed swallow an entire Oracle and Microsoft there was a standard. server being served by HTTP is replaced lambda. We envision the Terabyte Challenge We will probably do the same thing with the with a cluster of workstations striping data Three as an application test bed over an all Data Space Transfer Protocol. That decision over network connections to a remote com- optical network. We are making no secret will be made in the next couple of months. pute cluster so that a decision can be made of what we’re doing and are inviting every- COOK Report: So who will be the winner in real time. one to come and play. and losers? Are the only losers those who try to maintaining proprietary standards? This will scale down to single workstations The Processes of Data and single sockets, but it will also scale up- Grossman: I think what we will see will be wards. Certainly in the grid based and the Space similar to what happened in the emergence pervasive computing based methodologies of the document web. There everyone fo- that we’re thinking about you must have COOK Report: Where are you going in your cused on whether the Microsoft browser or dialable use of bandwidth and dialable use continued commercialization efforts? the Netscape browser was going to win. It is of cycles. You must be able to make deci- where all the emotional energy went. But sions in real time whether they are scientific Grossman: PMML is basically on track and from a broader perspective, the interesting or business decisions. the Data Mining Group will be releasing thing is not which browser won. Rather what version 1.2 in the spring. With PMML a stan- changed as a result of the web was that pro- Although there is a lot of work these days dard, I expect to see additional business in- prietary document formats whether they be on quality of service, it seems to me these telligence products both exporting it and Microsoft Word or Word Perfect, or Wordstar types of basic engineering issues are more importing it. My effort will begin to shift to were replaced by HTML for a broad range critical just now when building gigabit ap- DXML, PSUP and DSTP and encouraging of applications. I think that this is what is plications. the commercialization of products and ser- going to happen here. There will be vendors vices supporting them. Data Space is just and scientific collaborations that win and COOK Report : After a follow-up interview short hand to refer to the applications and vendors and scientific collaborations that on optical border gate way done at the services built over these and related proto- lose. I think that you will begin to see pro- Canarie meeting in Montreal two days ago I cols and languages. For example, although prietary data storage, data movement and am convinced that it is very likely it will be we have not talked about them standards data transfer protocols replaced by open working within a year or less. When it is being worked upon by others for privacy, ones. With the document web whether and you have an entire lambda at your dis- security, meta-data, etc. will also be an im- Netscape or Microsoft won really didn’t posal, you can take quality of service issues portant component of Data Space. matter. What really matter was that HTTP and tell them to take a flying leap. and HTML won. COOK Report: What has to be done then in Grossman: That is possible. We are cur- the next 6 to 24 months? Is it primarily ven- COOK Report: So single vendor, vertical rently planning what we are calling the dor buy in? Are most of your protocols fin- proprietary kinds of systems failed and had Terabyte Challenge Three which will be an ished? to move over to a horizontal orientation all optical testbed. We hope that we will be where common protocols cut horizontally able to get there in a year to 18 months. Grossman: We have broad vendor buy in across the spectrum at every level. Is this a Terabyte Challenge One consisted of a for the Predictive Model Markup Language decent way of describing what is going on? terabyte of disk over the commodity net- (PMML). We are using the relevant mem- work. Terabyte Challenge Two scaled up to bers of the same vendor consortium that Grossman: It is in the following sense. OC-3s and today to OC-12s and OC-48s. worked for PMML to get broad buy in for When you go to the web today, the ways The technical changes necessary to get from the Data Extraction and Transformation that you operate when you go to search or Terabyte Challenge Two to Terabyte Chal- Markup Language (DXML). After you have when you go to listen the MP3 or to grab lenge Three will be much more fundamen- the output of a business intelligence, data real video, are all different. So you may think tal than what we had to do to get Terabyte mining, or statistical analysis operation stan- of them as all vertical. But they are all still Challenge One to Terabyte Challenge Two. dardized with the Predictive Model Markup driven by the underlying HTTP. Language, both producers, such as data min- COOK Report: What about applications at ing applications, and consumers, such as I think what is going to happen is that a man- this new level? decision support applications can more eas- aged service provider working with cus- ily interoperate. The next major stumbling tomer relationship management data or a Grossman: I think there will be exciting bloc is transforming the data. This is cur- pharmaceutical company working with ge- events. However, what I saw this Novem- rently the activity that the data mining stan- nomic data will look quite different from one 216 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 perspective. On the other hand, both will be 80 percent of users are uncomfortable with worked with you for 10 years knows what driven by an underlying protocol such as a information captured at one web site being you want and how to satisfy you. Most DSTP or a related protocol. The underlying available for use by a second web site. people find the notion of personalization to movement of data a the bit level and at the be comfortable and most would like to be level of rows and columns can be handled I expect that this will become an increas- given some level of it. Where most people with the same infrastructure. ingly important issue. A fundamental issue become uncomfortable is when that infor- will be, will data collected by one web site mation gets to another site. I think that you for one purpose be used at other web sites will see less and less cross site activity, even Privacy Implications for other purposes? I call using data from though there are a number of businesses out one site to improve a visitor’s interactions there who are trying to make that work. On COOK Report: What do you say to some- “deep site” data and the use of data across the other hand there will always be misuses one who may tend to see the purpose or at sites “shallow cross site” data. While most and there will always be some people who least the effect of all this technology as pri- consumers are comfortable with the use of are uncomfortable with any use of their per- vacy invasive? deep site data, most are uncomfortable with sonal data. the use of shallow cross site data. Grossman: That’s a good question. Let’s try What Magnify Does to answer it by going back to the document But there is also a significant proportion of web. We have of course been talking about users, perhaps 25 percent, who are uncom- the underlying infrastructure that will cre- fortable with the use of any data no matter COOK Report: What can you tell me about ate the data web. Now if you go back to the how it has been gathered or from where. magnify and some of its customers so that document web, you will see that HTTP and From this perspective it is responsibility of my readers can have some understanding of HTML provided the foundation by which users to inform sites through P3P of what what the market for these kind of services is people could publish anything that they they’re willing to tolerate. New browsers are at this point? Also what is needed by way of wanted on the document web. Material that including P3P capabilities within their user further investment and for what particular was deemed offensive illegal or otherwise adjustable preference settings. While there’s reasons? banned quickly appeared. Issues related to a responsibility on the consumer side, there content are critical and have important soci- is also responsibility on each of the site sides Grossman: Magnify is a managed services etal implications; on the other hand, they are to respect properly tagged consumer privacy provider of personalization and predictive distinct from the underlying technology. Information. While this is an issue in the modeling services. One of our clients is an U.S., it is even stronger issue in Europe. on-line coupon company. When someone With this is background, let’s look at Data comes to our client’s site, there are probably Space. We have been talking about an infra- Some people talk about crossing the stream 800 coupons that they could buy. When structure in which DSTP, PMML, PSUP, as something that happens when you take someone visits the site, what we do is present universal correlation keys, and all the other data from one site and move it to another. on the first page of the web site the 15 or so components we been talking about allow you By and large I suspect there will be fewer coupons that we think are most relevant to to do more things with more data more eas- and fewer companies willing to “cross the the interests of the visitor. They are free to ily and at lower cost. This is just going to stream”. But I also suspect there will be more ignore what we present. But we have seen happen one way or another, because there is and more companies collecting single site in studies that people will click 30% to 40% a compelling need for this infrastructure. data and exploring ways to use it to enhance more frequently when we personalize the the user’s experience on such sites. I think first page because it makes the process much Privacy related issues are extremely impor- the strengths of European concerns and in- easier for them. They can do what they want tant, but distinct from the underlying infra- terests in privacy and will be such that the to with fewer clicks. structure. There are no simple answers about technology infrastructure will have to com- privacy and Data Space, just as there are no ply with the general level of protection that It is well known that that a visitor to a web simple answers about privacy and the web the Europeans want. This issue will create a site will usually only click a few times be- today. For example, some countries find rather high barrier that the technology must fore wandering off. A productive site will some material offensive that other countries meet. let them do what they want with fewer clicks. feel is appropriate for the web. There are For this company, the 30% to 40% increase protocols and privacy platforms being de- COOK Report: while I don’t mind a site like in clipping coupons immediately affects its veloped to manage privacy on the web — I Amazon collecting information about my bottom line. This is something it makes it think the best example is the Platfom for purchasing patterns to figure out how to easier to use the site because you are push- Privacy Preferences known as P3P. This pro- serve for example a market that is under ing content that the consumer wants closer vides a way for a person’s browser to com- served in the way of classical CD’s, I would to the consumer. The consumer wouldn’t be municate with the server at a web site and rebel at the thought of them analyzing my on the site, if they did not want the content. agree upon what kind of information may purchasing patterns to see if they thought I In this case the data obtained is never shared be validly exchanged. was hooked a well enough to charge incre- with anywhere else. mentally slightly higher prices on continu- According to surveys, when someone is on ing visits. But I suppose this is more a mat- COOK Report: Does this happen in the same the Internet, if their interaction at a particu- ter of ethics in the use of technology then way that when a user goes to a travel related lar site is improved by data which is col- the technology per se. site, the ads on that site to turn out to be travel lected at the site, three-quarters of the people related ads? surveyed are comfortable with use of data Grossman: I think that is exactly correct. in this way, as long as the data captured is Evidence suggests that the majority of con- Grossman: Yes, but in the case you men- restricted to only that single site. sumers agree that if by taking note of what tioned that there is a third party ad server they do, commerce sites can figure out how involved. You might add that from a con- Compare these findings with the situations to serve them better, they will have no ob- sumer perspective they came to that site to where information is used across different jections. One could suggest that the principle get web links and not ads. In the example Web sites as with advertising or when you would be similar to going to the neighbor- above, we’re taking the content at the site to are in an affinity network. In these situations hood clothing store where the clerk who has which the consumer came to get and push-

217 ing it closer to the consumer. Based only on company spends on preventing attrition (that a slightly different way. The protocol’s will the experience of their prior visit to the site, is a deciding what customers will leave) they simply lower the cost of building good when they get there, we immediately shuffle will get back $27 in paid premiums. analytics over clinical procedure so that you the content so that the content of interest is get better insight into which given proce- closest to the front. We are using only site And to sum up: I think that financial ser- dures at which given hospitals were best for specific and session specific material for the vices companies and a lot of click and mor- patients. There are models today, but they’re “personalization”. tar companies are going to begin to use more expensive and hard to normalize across hos- and more of these services. The Data Space pitals. People are indeed doing this in pro- And to give you another example, Magnify infrastructure lowers the cost and increases prietary ways. All that Data Space will do is also works with a lot of financial services the efficiency by which corporations can to enable them to build better models at companies. Consider, for example, insurance deploy this kind of personalization and pre- lower cost. companies. They spend a lot on acquiring dicted modeling technology. customers through advertising. But once I expect that the models will be in PMML they have that customer they are not very Health Care because that’s the most economical way to good at understanding whether the customer do it. Here is an example of their use. Be- is getting what he or she wants. Therefore fore doing a clinical procedure, a score could in our role as a Managed Service provider COOK Report: if you are looking at the be computed automatically indicating its we will process all the insurance company’s health care is there anything striking that appropriateness. If the score is too high, the data on its customers. We will examine the stands out? doctor could be asked to evaluate again the data and, if from a statistical perspective, it appropriateness of the procedure. The looks as though that consumer is likely to Grossman: In this area certainly one of the protocol’s themselves would be involved in “churn” — that is drop its relationship with biggest opportunities would be to try to win using data from admissions, radiology, phar- the insurance company, we bring such in- by doing something interesting with the ge- macy, medical records and many other da- formation to the company’s attention. The nomic sequence, protein and disease data out tabases. Certainly a huge amount of work sales staff can then work to retain the cus- there. I think this is a very interesting space would be needed but we do have the basic tomer. in which you have see for the last couple of tools and the basic infrastructure for this type years both proprietary genomic databases of application. Another thing we do as a managed service being built as well as public domain genomic in the insurance field is run customer data data bases being built and made available. through our systems looking for possibili- There is going to be a lot of opportunity for Other Opportunities ties of fraud. Fraud impacts all the custom- people to explore emerging Data Space in- ers of an insurance company, not only with frastructures to develop business models that COOK Report: What other investment op- respect to rates, but also with respect to how are successful and of interest to the pharma- portunities are available to those interested long it takes to process legitimate claims. ceutical companies and to a variety of other in this technology? We have a scoring based method that is used players in that space. There is such an ex- to evaluate insurance claims. Most will be plosion knowledge about genomic, protein Grossman: Today (December, 2000) the paid quickly but those that don’t score well, and related biological information that there companies out there have been affected by will receive careful, methodical investiga- is ample room for different business mod- the general dissatisfaction of the public mar- tion. When one is red flagged, the process is els. kets with anything related to the Internet or handed off to a human for investigation. With Internet technology. Right now it’s a pretty this predictive modeling and scoring done COOK Report: If the issues of patient pri- scary time out there for start-ups and com- and then sent over the Internet to our cli- vacy and hospital participation could be panies who have just gone public. Over the ents, we believe that they can process claims solved, isn’t one of the Holy Grails of medi- coming months, as a more normal balance more quickly and accurately than would oth- cine the ability to compare treatment pat- returns, I think there are lots of opportuni- erwise be possible. Bad claims are more terns over different cross sections of patient ties to invest in Managed Service Providers likely to be found. This lowers the cost of to populations in different hospitals in differ- providing Data Space services, such as per- everyone and increases the speed with which ent parts of the country? sonalization and predictive modeling ser- legitimate claims will be paid. vices. Grossman: Absolutely. Some treatment data We think this allows the insurance compa- has been centrally warehoused by some or- COOK Report: Do you have any opinion nies which have not been aggressive about ganizations. Hospitals are very interested in on what the creation of these open standards using IT technology to become so and to leap the questions of whether the clinical proto- will mean to investment opportunities in this frog ahead of their peers which have built cols they do are consistent with the so called industry? million-dollar data warehouses and not been benchmark clinical practices. While there is able to get anything useful out of them. Just a lot of data in this area, it is very difficult to Grossman: One way to look at this from because you have a data warehouse, does normalize the data across different hospitals the point of view of the web is that share- not mean you have the infrastructure for because they treat populations with differ- holder value accrued to those companies making good decisions using the data in it. ent social economic characteristics. which were able to put good business mod- With a managed service not only can the data els on the open infrastructure of the web. I warehouse be built for you, but also you can COOK Report: to get the necessary think the game will be won by the people immediately begin to use the data for better protocol’s do you have to massage those who build good open infrastructure for data. decision making. which you have developed or are those prod- The good open infrastructure is really the ucts readily usable? The protocol’s presum- playing field. But from an investment per- COOK Report: Are your tools such that you ably are the basic tools and what apparently spective you don’t care so much about the can pretty easily demonstrate the superior hasn’t happened yet is it for enough people playing field as about the team that is going quality of this to a customer? to become a familiar with them in begin to to win. The team that is going to win is the use them? one that has a good business model. What Grossman: Yes. For example is rather easy we have created with the Data Space is a to show that for every dollar and insurance Grossman: Let me put what you’re saying good playing field. The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 COOK Report: But precisely what is the are being built using proprietary systems. is reasonably usable now and that over the business model? Another business model is to build tools to six over the next six months to a year we’re support the open Data Space infrastructure are at the take off stage of the development Grossman: There is no single good busi- itself. Finally, another business model is to of a lot of interesting companies and eco- ness model. One business model being tried supply data to the other players. I believe nomic activities. is the managed service providers model. An- that there will be two or three successful other business model is to build open Data companies using each of these models. Grossman: I think so. Space application software, such as for next generation web analytics or customer rela- COOK Report: I gather that a lot of the in- February 2001 COOK Report tionship management (CRM). Today these frastructure with which to build a Data Web

219 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA IPv6 from the Viewpoint of Mobile Wireless Continued Cell Phone Growth to Cause Deployment of IPv6 Nets Interconnected to Non Disappearing IPv4 Infrastructure Substantial Work Remains to Bring V6 and Data to Cell Phones Editor’s Note: Charlie Perkins has worked This came about when enterprises began to not be easy and that they are also not scal- at Nokia Communication Systems Labora- insert firewalls and packet filters surround- able. tory as a Research Fellow in the Wireless ing the networks within their domain of ad- Internet Mobility Group since the end of ministration. The constrained address space COOK Report: Aside from these problems, 1999. He was an engineer at Sun also caused the reorganization of the address how do you cope with the criticism of people Microsystems in1997-99 and at IBM from space into CIDR in order to make more ap- like Sean Doran who say that there are so 1984-97. His major engineering focus has propriately sized subnets available as the many NAT boxes standing guard over un- been in the area of mobile networking. He Internet began its rapid expansion. From told numbers of corporate networks that the has also been heavily involved in the devel- the point of view of the reduction of address cost of replacing them with networks opment of IPv6 protocols for mobile sys- consumption in IPv4, CIDR has been dra- reengineered to do IPv6 would be prohibi- tems, and the development of network pro- matically successful. tive when compared to negligible benefits tocols for ad hoc networks. available from IPv6? Have you ever seen The unfortunate side effect of all this is that any one who has attempted to figure out how COOK Report: From the point of view of people have been looking at other ways to ubiquitous the NATs are? someone recommended to me by George obtain addressability. The largest success- Abe as a middle of the road realist on IPv6, ful effort in this direction has been in the what is the IPv6 controversy all about at this area of Network Address Translation boxes IPv4 and IPv6 to Co-exist point? because now people can install a NAT box at their network boundary and get a lot of Perkins: They are very widely deployed. addresses back. Unfortunately those ad- There is no doubt about that. But on the Part One: IPv6 dresses are more or less localized to the do- other hand I think this argument is not rel- Deployment Issues main behind the NAT box. You can get out- evant and I will tell you why. We are going side only by running something that the NAT to have a lot of IPv4 nodes out there. And Incompatibility of IPv6 box knows how to do translation for at the we already have a lot of and NAT boxes out application levels. there. And this is just in the way it is. And and NAT Boxes these conditions are not going to change. But In such a case it will give you something what will change is that we will have to have Perkins: IPv6 assumes end-to-end applica- that appears to be an IP address from the more and more IP addresses. So those nodes tion addressability. The Internet was origi- outside world. If it is an application of which using IPv4 will continue to do so. However nally designed so that it would run applica- the NAT box is aware, this will happen au- as you look at the question of IP address tions with an end-to-end programming tomatically. The other constraint is that the ability for more than one billion cell phones model. In other words an application at one NAT box can do this only with outbound that are likely to be deployed over the next end would interact with an application at the data. An inbound application query goes 18 months, you begin to face the question other end without having to deal with any unrecognized. You cannot have a server or as to whether IPv6 is a possible solution if third party consideration from somewhere peer elsewhere in the Internet suddenly strike you want to have this end-to-end network out in the middle. up a transaction or conversation with any connectivity. Now if you can sell it long and nodes that lie on the inward side of the NAT hard and manage to convince enough people COOK Report: Something that might force box. The node behind the domain has to that they really don’t need that capability, the translation of the application protocol? initiate anything that takes place. you may be OK. The only problem is that the phone companies are not really trying to Perkins: Right. Or, to put it another way the COOK Report: In other words if I had a do this. They are trying to make obviously designers intended that there should not have publicly advertised static IP address, the a very very accessible system. The prob- to be any discernable interaction between node behind your NAT box could initiate a lem then becomes the fact that NAT stands the application endpoints and any interme- transaction with me. However, if I too lay in the way of this objective. diate point. Assuming that they knew how buried behind a NAT box on my end, and to address one another, your application in conversation between us would be out of COOK Report: So as someone who stands New Jersey should be able to talk directly luck? on the cell phone side of things, what are to my application in California. The whole the changes that need to be made to get from point of Internet addressability has been ap- Perkins: Yes. I can, however, imagine spe- where we are to a network of a billion or plication to application direct interaction cial solutions where I may say I’ll call you more IPv6 accessible cell phones? available on a global basis. Unfortunately on the phone to set up some means of ren- in the early 90s when the Internet address dezvous between our machines. The NAT Perkins: You know it’s always impossible space became constrained, it became diffi- box serves as an application level gateway. to predict the future but I can make some cult for an application to find out the IP ad- You could have a remote box doing the same reasonable suggestions about it. So first of dress of the counterpart to which it wanted sort of thing and setting up some kind of all, at a fairly abstract level, this business to link because that counterpart might not encapsulated transmission. My point is that about insufficient addressability in Ipv4 even have an IP address that was globally with some effort solutions could be obtained. pretty much causes you to go to a NAT style visible. The problem is that such solutions would solution. This applies even when you are

220 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 slicing up the addressing domain in IPv4 and you can use to handle IPv6 in situations like tion of the Internet which is very very large IPv6. Therefore in the future it seems likely this. These are in discussed in the IETF and but losing in overall market share. that we will have a lot of IPv4 nodes, and a working group known as the NGTrans very likely even more IPv6 nodes - a num- group. Go to http://www.ietf.org/ As I was going to say before, this NAT so- ber that will grow steadily over time. html.charters/ngtrans-charter.html Once lution is a very natural solution when you on the page you will see the following list- are in a situation where you have to slice up COOK Report: But the network adminis- ing of internet -drafts: your address space. And if you think about trators are not going to throw out their NAT it in this fashion, having large domains of boxes any time soon? The 6bone registry (21895 bytes) both IPv4 and IPv6 is merely one way to Overview of Transition Techniques for IPv6- partition the possibility of overall IP address Perkins: This is quite true. They will stay only to Talk to IPv4-only Communication space in general. In such a situation with the until more people involved with the mainte- (17839 bytes) right kind of fire wall NAT platform, you nance of each node decide that it’s more of Connection of IPv6 Domains via IPv4 can even mention translating IPv6 addresses a hassle to keep it than to change it. Clouds (55716 bytes) into IPv4 addresses at the border of the do- IPv6 Tunnel Broker (24546 bytes) mains so that IPv4 applications can in effect COOK Report: Let’s look then at large cor- An overview of the Introduction of IPv6 in be tricked into believing that what is going porations like and Hewlett-Packard are Sun the Internet (72214 bytes) on is only an interaction between two IPv4 Microsystems or Nokia. These companies A SOCKS-based IPv6/IPv4 Gateway applications. have and very large IPv4 numbered net- Mechanism (22633 bytes) works. When the “hassle factor” arises, are Dual Stack Transition Mechanism (DSTM) COOK Report: And this is because it is go- you saying they will have to begin to renum- (37829 bytes) ing through an address translation barrier? ber? IPv6 over IPv4 tunnels for home to Internet access (9138 bytes) Perkins: Exactly. Except in this case you Perkins: No. IPv4 and IPv6 can co-exist in are translating from 32 to 128 bits instead of the same general network because they do Also you will find relevant material in the from 32 to 32 bits. not collide with each other. They just have RFC list. to know how to address each other. For ex- COOK Report: And yet there are more than ample you can have a router that routes IPv6 Routing Aspects of IPv6 Transition (RFC a few purists out there who, when faced with packets and IPv4 packets on the same net- 2185) (31281 bytes) this explanation, would likely say that it is work. If you want to have some IPv6 Stateless IP/ICMP Translation Algorithm inadequate. That nothing will do until all addressability, all you have to do is get some (SIIT) (RFC 2765) (60924 bytes) IPv4 applications are swept from the path of these routers. The packets will start flow- Network Address Translation - Protocol and the network has IPv6 end-to-end purity ing and everything works exactly as you Translation (NAT-PT] (RFC 2766) (51015 once again. Would it be safe to assume that would like for it to work, until you get to bytes) this is just absolutely not happen until the this one question about how do I get one of Dual Stack Hosts using the Bump-In-the- administrators of your various IPv4 parts of my existing IPv4 boxes to communicate with Stack Technique (BIS) (RFC 2767) (27133 the Internet decided they have no choice one of my new IPv6 boxes? bytes) except to close down? I ask this because I 6Bone Backbone Routing Guidelines (RFC think there’s an implication from which you COOK Report: I want to hear the answer to 2772) (29352 bytes) just said that you may have some v6 appli- that. But first about routers that route both Transition Mechanisms for IPv6 Hosts and cations behind fire walls and still not be able protocols. Would you expand some more Routers (RFC 2893) (64358 bytes) to do end-to-end? Am I hearing you cor- on who makes them and how they work. 6BONE pTLA and pNLA Formats (pTLA) rectly? (RFC 2921) (14218 bytes) Perkins: In Cisco I understand that IPv6 is Perkins: No. Because the IPv6 routing could obtainable mainly through a software up- COOK Report: What you are saying then is just occur naturally and when it has to be grade and that in the future they will be do- that for someone who wants to get IPv6 up translated into an IPv4 address, it goes ing some degree of hardware support as well. and running, one of the best things that can through the firewall which does packet fil- As far as Nokia is concerned we have this be done is to go to that web page and read tering in exactly the same way whether or IPRG platform. While it is not a router, it some of the solutions described in the URL not the packet is an IPv4 or an IPv6 packet. does fire walling with check Point Software s above. but also handles IPv6. As far as Nortel is COOK Report: In other words IPv6 nor- concerned, I don’t know the details of their Perkins: Right. mally functions as an end to end service product line, but I do think they have active unless it has to be translated in order to com- support for IPv6. Communication municate with an IPv4 address. COOK Report: So what you are saying and Between IPv4 and IPv6 Perkins: That is correct. Another way to that the Nokia I P R G platform is a device look at it is that the entire IPv4 address space that may be used to substitute for an exist- COOK Report: This leaves us with a situa- of a quadrillion numbers is just a tiny speck ing IPv4 firewall and NAT box combina- tion where both protocols can be currently in the over all vastly larger IPv6 number tion with the additional capability that it will used. But if one is to do this, one has to be space. You can take any IPv4 address, put allow IPv6 to go wherever it needs to go? able to have IPv4 be able to talk to IPv6 and zeros in front of it and wind up with an IPv6 vice versa. address. Your routers then can route those Perkins: Yes. While I am not an expert on kinds of addresses. If any application in v6 this particular product would you suggest is Perkins: That correct. So let’s say that while land wants to interact with an address that certainly generally correct. You may also you have a growing population of IPv6 looks like a lot of zeros followed by 32 bits use IPv4 routers even when you have no nodes, you may also expect your population of v4, the routers can handle that by routing IPv6 routers because then you have tunnel- of IPv4 nodes to grow as well until they start them directly toward the appropriate NAT ing solutions that are available. There are running out of addresses. And this will lead box. This kind of solution becomes avail- about seven or eight different techniques that to a situation where you have an IPv4 sec- able anytime that you can set the routing 221 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA tables up. Unfortunately, it doesn’t really Perkins: For one thing, today, when you And there was a discussion a few months become an important solution until the total make a telephone call, you expect it to work. ago regarding the size of the IPv6 prefixes size of the IPv6 routing tables has become The quality of service issue is also a big drag that ICANN should handout. What resulted comparable to the size of the IPv4 tables. on generalized VOIP usage. Having to go was a number on the order of a /48 as a pre- across network boundaries means that voice fix for an IPv6 address block. This is a huge COOK Report: How would you describe quality cannot be guaranteed. According to number with plenty of addresses. Anyone what you see coming in the next year or so my understanding, the best market for VOIP who wants to start charging for its use will in the sense of a growing number of IPv6 now occurs when an ISP has extra capacity. run into trouble. If anyone on the down- nodes and the application within the network In such a case it may then take large chunks stream side of ICANN tries to impose a of more and more devices that can handle of circuit switched voice and route such traf- charge, it seems to me that the market com- both protocols at once? fic over its IP networks. petition would render such a model unsus- tainable. Perkins: It will continue to spread but it will COOK Report: To make such a rollout oc- take more than a year. The whole thing about cur, one of the things that must be done is to COOK Report: If you assume that the era IPv6 to begin with was to develop a proto- hand out IPv6 address space is it not? of large-scale use of IPv6 in addressable col, deploy it, and do what IETF does well nodes for data transmission is 24 to 36 which is to get to inter-operability testing Perkins: Addressing is certainly a big deal. months away, one of the things that has to going and then to just start to build it. People Various set-up mechanisms must be elabo- get done to get from here to there is figuring want to buy solutions to the problems fac- rated to make the addresses available. Over out how to handle some of the address reg- ing them, be they IPv4 problems or IPv6 time people will begin to see the benefits istries allocation policies and we just talked problems. People will want to buy solutions and to request it more. In Japan this I-mode about. Now let’s take it for granted that this for their IPv4 problems and for their IPv6 capability is pretty successful and there are does get done satisfactorily. What else needs problems. Eventually the solutions for the a lot of rosy predictions for WAP as well. to happen? For example where does the sup- IPv4 problems may become more expensive port of Microsoft operating system platforms than the solutions for the IPv6 problems. COOK Report: But from the point of view fit in as a prerequisite? This will be true in part because the IPv6 of Nokia, what are you guys going to have solutions that are already available will be- to do to get IPv6 as an integral part of your Perkins: You can go to their web site and come cheaper as IPv6 grows in market share. cell phone capability? Don’t you need to download right now an IPv6 stack for your get some blocks of IPv6 address space in computer. When they’re going to sell an COOK Report: So where does the imminent order to put individual IPv6 addresses into entire operating system that runs IPv6 is an arrival of a billion IP addressable cell phones your phones? I believe the routing Regis- unknown question. fit into this picture? tries have policies for assigning IPv6 space. But isn’t one problem the fact that they’re Data and Addressing in planning on charging for it in the IPv6 ad- Part Two IPv6 and dress blocks? the Cell Phone Cell Phones Inundation Perkins: I really don’t now any of the de- tails of this particular set of policies. But I COOK Report: As far as IPv6 is concerned do know that when very large companies then what are the areas then that occupy your Perkins: The answer is that there will be a step forward and ask for a bloc of a billion time and concerns? billion cell phones within the next 12 to 18 IPv6 addresses, if the registry can’t make months but that by no means will all of them such an assignment available on a reason- Perkins: I spend all my time in the engi- be IPv6 addressable. Increasingly your cell- able basis, very large companies will find a neering area working on mobile network- phone-using population will expect their registry that can. ing stuff. Right now IPv6 is being standard- phones to be data addressable. Now the num- ized into various telephone protocols. In ber of times today that I expect to get data COOK Report: So is undoubtedly has some- Europe you have 3GPP. This stands for the on my cell phone is usually about zero. This thing to do with the stories that I hear about Third Generation Partnership Project. It is is because when someone uses the phone a cell phone industry demanding a reason- a standards group that has been working in they do it for purposes of circuit switched able allocation policies on IPv6 as well as this area for some years. They have said you voice. But, as time goes on, the data will follow-through within the next six months must have IPv6 addresses in your 3GPP tele- begin to be more and more important. or so? Given the amount of addresses de- phones for, I believe, release 00. And this Moreover voice will increasingly arrive as sired and so-far-announced policies on pric- release is basically complete. We next have data — in other words as a voice-over-IP. ing might not the result be a cost impact ri- to start building it and when we do this, you People will begin to understand new ways valing the amount of money spent on the shouldl expect to see things that run accord- in which these devices can be even more spectrum auctions by the industry and isn’t ing to the standard within the next 18 months useful if they have Internet visibility. To do it clear that such an expenditure would be to two years. By building it is meant both this they will need Internet addressability in unsustainable by everyone involved? putting it into the cell phones themselves and order to be able to poll the applications that into the cell phone supporting infrastructure. people are used to using today. The ques- Perkins: Spectrum auctions are governmen- tion is not whether this will happen but how tal regulation of a limited resource. Given The assertion that a generation of cell phones fast? There are a lot of predictions for the the almost unlimited number of IPv6 ad- is running IPv6 is a subject to a large degree very rapid emergence of an increase in mar- dresses, I don’t see any way that the gov- of interpretation. It says nothing about the ket share of voice-over IP. Although I’m ernment could attempt anything similar. If performance characteristics of the product. not a marketing specialist, from my perspec- you send me a packet that has some num- Consequently, right now we’re looking at tive, it seems like it this may take three to bers inside, and I route it to the next place ways to achieve, in a single product, mobil- five years before voice over IP is able to cap- online, that it is just a logical thing to do that ity combined with sufficiently good perfor- ture a 50% market share with a circuit isn’t easily amenable to government regu- mance in a way that people can feel that they switched voice. lation. have the quality of circuit switched voice in a product founded on IP mobility. Note that COOK Report: What is slowing it down? 222 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 doing voice-over IP in a wire line network management of header compression. If voice you could eliminate all problems stemming is quite different from doing it in a cellular packets are only about 25 bytes with IPv6 from packet loss. If you take the wire away network. The constraints are much more headers they become 85 bytes. You must you can still do a good job of header com- difficult than those encountered in a wire line really do something about the size of those pression but you do have to worry about los- network. headers, for if you do not you’re throwing ing packets. However, if you add mobility away nearly two-thirds of your bandwidth. to the removal of the wire, things become COOK Report: I see the concerns about Fortunately IPv6 has very compressible really different and you have to begin doing moving from wire line to cellular in the use headers and it is possible, depending on the things like adding coordination to your of IPv6 but tell me whether there is an issue exact situation to get to the size of your over- points of attachment. Nevertheless, we have of building a cellular data distribution capa- head down to between one and three bytes solved the problem. We’ve built it. We’ve bility into a network with a choice of either per packet. shown it. And now we’re involved in stan- IPv4 or IPv6? Is the situation that in this dardization. case you assume IPv6 by default? COOK Report: Is there a specific working group doing this? COOK Report: In other words right now a Perkins: It’s difficult for me to answer a Nokia phone could use what you developed question like that because we’re working Perkins: Yes. It is the ROHC (Robust to talk to another Nokia phone but without only on IPv6. Header Compression) Group. The reason the standard there is no guarantee that a that it must be robust is that you are dealing phone made by someone else can talk to the COOK Report: Can it be assumed in that with a lossy interface. If you operate in an Nokia product and vice-versa? any decision to go IPv6 only is because of environment where you don’t lose packets, scaling issues involving vast numbers of header compression schemes can be much Perkins: That’s almost correct. The real users? easier. Header compression works by throw- compatibility requirements are between the ing away as many fields in the header as you telephone and base stations. By the time Perkins: We are going have a lot of tele- can. The way that you can throw away a you have done the first hop you have already phones involving also voice and data. field is by keeping track of what the current made the compression and decompression. Therefore if you want to do those two things state of the transmission is. For example if When the package shows up on the network together the use of IPv6 becomes the only you want to avoid having to send the IP side, it’s decompressed and is carried as a reasonable alternative. source and destination addresses and you are part of the normal traffic supported by the operating on a known radio channel, and global public network infrastructure. then you can compress a great deal by not Using IPv6 to Bring Data having to send the IPv6 addresses with each COOK Report: You are talking then about to Cell Phones packet. the example of someone who might want to phone from a car in New York City to Chi- You have some more header fields of vari- cago or San Francisco or Hong Kong and, COOK Report: What then do you have to on arrival at the destination city, be able to do to achieve your objectives? ous kinds that you have to deal with. But some of these are the same, or continuously hop out of the PSTN infrastructure and be delivered locally as a cellular call? Perkins: Let’s put in this way. If you could varying in every packet. Of those that change with time some change slowly, some say that there are perhaps a hundred prob- Perkins: That’s it. lems, then you can say that we’ve looked at rapidly and some are unpredictable. For IPv6 a half-dozen to ten of the total. We have an- most fields are highly predictable. For IPv4, swers for most of what we have looked at the fields are slightly less predictable. IPv6 and Packetized Voice but, as we look, we see more and more prob- You may have a field that increases by one lems. For example there are a lot of prob- COOK Report: What then would be the pur- lems in security and a lot of problems in with each successive packet. You can pretty much get this field perfect by not sending it pose of using the IPv6 protocol in a situa- quality of service. There are also a lot of tion where you were doing primarily cellu- problems in header compression. Also the and incrementing its place holder by one with every successive packet on the receiv- lar within a metropolitan area network or way in which the base stations are coordi- between such networks if your call was not nated to manage spectrum most effectively ing end. However, if you unexpectedly lose a packet, your algorithm is hosed. There- transmitted over the Internet to be com- is historically not very friendly towards the pleted? IP model. fore you must take particular care to make your algorithms robust. Perkins: What is good about IP is that it al- All of these things add up to a situation lows you to transmit packetized voice. where, as I mentioned before, you can em- COOK Report: Could you fix this particu- lar problem by using a check sum? People doing packetized voice care more ploy IPv6 now. But for specific applications about the packets than about IP. But even- like voice IPv6 cannot currently match the tually people are going to want to move performance of analog voice-over the air as Perkins: There is more than one technique that would work, but yes there is a check packets and voice-over IP packets onto their a part of the PSTN. Now we’re going to networks. change this and believe that we will be able sum that you could use and already there to equal or exceed the current capabilities are some check sums at other layers in the protocol. As a result this is manageable. COOK Report: When you say “eventually,” of analog voice over the air as part of the if it were like five years from now, must we PSTN. COOK Report: So one of your concerns assume that all of digital telecommunications will be IP? COOK Report: So would you be willing to would the in figuring out how to handle the outline more methodically where you will headers under different kinds of operating conditions? Perkins: Yes indeed. A lot of people assume have to go in order to achieve that objec- that telecommunications in general will tive? Perkins: You make a very interesting point mean communication by means of the IP protocol and that we will get to this state in Perkins: The first thing must be done is the there. Because if you could just establish a transmitter and receiver connected by wire, rather less than five years.

223 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA One thing to recall about current voice tech- in the process. If you have a situation where in its place that is different than what the nologies including wireless is that everything the intelligence is at the edges of the net- parties expected? You are guarding against you do is geared to knowing how much work which is there primarily just to help my receiving something different than what bandwidth you need in order to make the push bits around, you will need a protocol you sent me. voice that you want happen. Consequently so that you can tell the network where the when you make a phone call over the air, a bits are buffered. Perkins: Not quite. What you’re talking lot of effort goes into giving you a time slot about is different. Let’s make the distinction or code necessary to give you a radio re- COOK Report: And at such a point in the between privacy and authorization, because source. Now if you want to do some data in capacity for doing the buffering would pre- what you’re talking about is a privacy issue addition to voice or if you expect burstiness sumably be in a device on your end and in and what I was talking about is an authori- in your transmission, the old algorithm keyed another device on my end? zation issue. I don’t want anyone to be able to the reliable delivery of voice only goes to steal my identity to the point of having very quickly to hell in a hand basket. Perkins: Actually not because you would packets delivered to the wrong place. But then have an Internet separating us and we you could imagine packets going exactly to If you want to make any convergence be- want to have these buffers delivering their the right place with no privacy at all because tween voice and data, it makes sense to use content to each other very,very fast. Now any one could overhear what was being sent IP to accomplish the task. The current PSTN if you set the buffering at the end points you and received. The issue about making se- this is not geared to do that sort of thing. For might just as well call it TCP, because that’s cure handovers is an authentication and au- proof of this statement you may want to take what TCP does right? thorization issue. a look at the current “success” of CDPD. Being able to mix the use of voice and data COOK Report: OK. But another model for COOK Report: And what we’re talking together necessitates the use of IP. describing this that comes to mind would about here is a by product of the issue of be the client-server model where the server mobility where you have to hand over the COOK Report: So what you must be pre- would be the device containing the buffer signal from one base station to the other? pared to do is to open up an IP channel at and it becomes up to the server to get it the Now can IPsec be used to accomplish the some point in the future between two people contents of the buffer out to the clients at necessary protections and, if not, what does where the people and devices could be us- the appropriate times. Is that a reasonable have to be done? ing the bandwidth available to them by sepa- analogy? rating it into a voice channel and the data Perkins: That is actually a pretty compli- channel on a moment to moment basis. Perkins: It is sort of reasonable at a particu- cated question and there are a lot of moving lar level of abstraction if you see the buffer- parts to it. For example just a situation that Perkins: That’s correct. This is the statisti- ing that your telephone is relying upon as you’re talking about with a couple of base cal multiplexing of IP does so well. the “client” for the phone. But if you look stations, a couple of mobile nodes, a packet at the other side of what it means to be a stream coming in from another place, and COOK Report: OK. But if we’re talking server (as something to log into) you cannot the routers upstream from the base station about how we get from here to there after afford to take the time to do this and the anal- trying to figure out where to send the pack- header compression, what would be next? ogy fails. The point is to save as much time ets. But in the way you have laid out the as possible and the way to do that securely issues of deployment there are other entities Perkins: We have implemented a buffering is to have some protocol and communica- farther into the Internet and into the core scheme in order to handle a situation where tion features involved. networks that start having to have a role to you are momentarily disconnected as you play. move between points of connection and are COOK Report: OK. Duly noted. Now handed off from one base station to another. where does IP SEC come into all this? All All these parts of a mobile IPv6 Internet have When you are handed off from one base sta- IPv6 implementations are required to include particular kinds of security and authentica- tion to another, it is very easy to lose pack- IPSec in order be considered compliant. Are tion needs and the way that this is to be built ets. Packet loss for voice handoff is one situ- they not? up is, I think, the biggest unsolved problem. ation. But if we ever do go to handing off All that I said before was that you could take video, the situation becomes even more de- Unsolved Security some of v6 boxes and put them together in manding. Whatever the case, in order to order to build a network in that would in- have really seamless mobility we have had Issues Yield non deed work. to commit ourselves to buffers. We have Standard Kludged done this and it is working pretty well. But now let’s take a situation where you are Systems a service provider and ask whether you, as a COOK Report: Is this something that is be- service provider, can build up a v6 network ing done in a working group or does it not Perkins: Yes. If your wireless device shows and expect it to work — in other words be need to be done there? up somewhere on the network and makes a able to sell service to customers. And the request to do header compression and relo- truth is that you could only do this in a fairly Perkins: We have submitted an Internet cation or to receive the contents of its buffer non standard way right now because the pro- draft for consideration. Now if you move or asks for its quality of service parameters tocols for doing all the authorization and to a new place in the network and your buff- to be transferred to its new position in the mobility management in IPv6 are simply not ers are somewhere else in the network, then network, these actions must be taken se- finished. You cannot buy equipment that will you may be responsible for requesting de- curely by means of authentication. Other- do this. I would also guess that it would be livery of those buffers to the point where wise people can take advantage of and abuse pretty good number of months before you you have shown up. In our particular kind the system. could begin to do in any way shape or form of a system you will have protocol require- what we’re talking about. And when you are ments. In other systems, the network does COOK Report: In other words aren’t you talking about this kind of engineering you everything for you. It can help figure out turning against the possibility of somebody must ask: is it being done for normal data, where you’re going, where you have been, being able to listen to the bit stream and or for normal data and voice? and how many of buffers you have traversed scoop it out of the air putting something back

224 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 COOK Report: And from convergence point I am using one device plugged into the the world I have an easier time of things tha of view you want to be able to do it with PSTN? Moreover this device is a non mo- if I have to cross over from UUNET to a both voice and data — a goal which pre- bile device with only one number but I am recipient for my call that happens to be a sents us with the most difficult technical going by means of IPv6 over the Internet Sprint customer. Is that correct? hurdles. rather than by means of ordinary circuit switched voice over the PSTN? Perkins: Yes. That is right. Perkins: It is the most difficult because voice has real time delay requirements. Just to do Perkins: All these things are possible and COOK Report: But to get the commercial the routing in the context of real-time con- I’m sure they are all going to be done. But viability which you want, you at Nokia have straints is a difficult challenge. But when let me also see if I can answer your original to be working people at Ericsson, Motorola you look at doing this and also look in do- questions. The point at which you show up and others on the technology and econom- ing it securely, you find that the problem at the ballpark is the point at which you will ics of crossing provider boundaries. True? begins to partition itself into easy parts and have to do authorization. Authorization pre- into hard parts. sumably will be done by interacting with the Perkins: The operators are clamoring for the network as administered at the ballpark. ability so that usually produces good results COOK Report: Do you see it being done And once you get authorized you are pretty from the equipment manufacturers. first without regard for security or do you well established for your use of the network see it being done only in a if security is also while at the ballpark. Nevertheless you can- COOK Report: Can you explain what has handled as an integral part of the original not ignore the existence of a discontinuity to be done? process? in your use the network. In other word some- thing had to change from your prior use to Authentication, Perkins: The problem is one of managing your use while at the ballpark. The point is the distribution of the keys. To hand out all you should be able have this change in au- Authorization and the keys to all the base stations and to all thorization happen automatically. But once Accounting local nodes and other entities there that have you get there and it’s been done, there to interact is not an easy task. It can be done wouldn’t be any further issues of mobility and I can draw pictures on the board of how management or re-authorizations. Perkins: Yes. I am pretty well involved in to do it. In fact we have already done quite this at Nokia and within the IETF. Right a bit of that, but to do it with appropriate COOK Report: In words all your devices now, there is an Internet protocol called Ra- performance and with standards is very defi- must be geographically aware of where they dius. It is used by dial up users to authenti- nitely non trivial. are and be able to revise that awareness on cate their connection to the network. As a the fly? result the process of doing this on a dial up and login basis is pretty well understood. Immediate Architectural Perkins: Yes. Except I would not use the Right now within the IETF there is a work- and Security Issues word “geographically.” Everything depends ing group called AAA (authentication, au- on network connectivity which does not map thorization and accounting). very well to geography. COOK Report: What is it both possible to Since Radius only works for static objects do in the shorter term without doing that and COOK Report: But I was thinking geo- and has some other difficulties as well, this possible to do that from an economic point AAA working group is building up a replace- of view is worthwhile doing? graphically in relationship to their position vis-a-vis the nearest base station in the net- ment protocol for Radius. As a result, we work with which they must check in. will have this AAA protocol that will come Perkins: You can put up a network of IPv6 with features such as session measurement base stations and applications. IPv6 already Perkins: Exactly the base station will be the and Accounting. Tied in with IP SEC, AAA has encryption headers and authorization will do authorization and accounting for ser- headers, all of which work well in a static point of contact with the Internet and the point at which the protocol begins. vices such as mobile IP. And if you say that wireless network. But with a cellular infra- mobile IP is just a part of IP, then what you structure you have a mobile computer com- end up charging for is IP. ing into an area where it doesn’t have any COOK Report: One should think of a two- part communication process? Communica- pre-existing security associations. It will You will have then these mobile devices that have to establish this by some sort of proto- tion between the person using a mobile de- vice and the base station is one set of pro- need to interact with the AAA agents. They col with a remote agent. Providing static will do this according to AAA protocols. security associations within an enterprise cesses and communication between the base station and the rest in the Internet is the other? They will be simple protocols but ones that network is a problem of another color en- have to be done very securely. All this means tirely. You could consider this the middle if you imagine that the call will eventually reach that there must be a connection between the AAA working group and the mobile com- COOK Report: So, in other words, the dif- another base station and pop out on the other side before going to its recipient. puting working group in order that what gets ference is if I have a cell phone and I am out done does so in a way that is interoperable, in the ballpark somewhere, where I am stay- Perkins: Yes. And what is in the middle is modular and scalable. Our current chal- ing for a couple of hours versus wanting to lenge is focused on the workings of these transmit my data from a car moving at high very likely group of service providers that expect to get some money for the transac- two groups where most of the issues that speed down the highway. Is that part of what arise have to do with key distribution. you’re talking? tion. Let me give you an example. If you move Perkins: Yes. It’s a kind of middle ground COOK Report: Are we looking at the same situation here that we looked at in all the from your own network to another networks because there is not as much mobility in- and you receive a key, that key must come volved. classical quality of service issues namely one of crossing provider boundaries. In other from your home network because your se- curity association lies only with your home COOK Report: Or are we thinking of a situ- words if I’m a UUNET and UUNET is so big that I can get almost everywhere else in network. So the key that is sent from your ation where there is a telephone network and home network to the visiting network must 225 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA be different than your actual key because you will ever get to global deployment of mo- on the Internet. Also there is not yet a good don’t want anyone else to see your actual bile IPv4 for voice-over IP. I think by the integration between data and voice. But key. Therefore it must be some sort of de- time voice-over-IP really comes into play, eventually there will be. The third piece is rived key. we will be using largely IPv6. multiplying by ten the number of Internet devices in use over the next four years or so. COOK Report: Is it like a public-private COOK Report: Then IPv4 mobile use is pri- This means that we are going to have key? marily data rather than voice-over IP? scalability problems and more and more customer demands. Perkins: It really is a symmetric key. But Perkins: I think that is generally correct. you could also map it as public-private and But on the other hand, I don’t have any set Right now the majority of Internet deployed in such a case the important part of course of specific data to back up that claim. devices are not mobile but the time is com- would be the private key. In general you want ing when the majority will be mobile. This the appropriate key to follow you from your Summing Up is in part because of the nature of the de- home network and show up at the proper vices themselves and because practically all spot in the visited network. But if it shows the new devices coming on line will be mo- up at where you are, and then you move to a COOK Report: How would you begin to bile. Remember that each of us, as we travel, new place, you want that key to follow you sum up where we are? will have an with us the power to communi- and become available to you in that new cate with not only home and office comput- position without having to go back to the Perkins: We’ve covered most everything ex- ers might also with a myriad of static condi- home network all the time in order to re- cept for quality of service. Quality of ser- tion monitoring devices in both home and trieve it. What you have to do boils down vice is an issue and it has some difficulties office as well as within environments to a combination of encapsulation and en- which, unfortunately, I’m not all expert in. through which we pass. All these factors coding because, when you’re doing these But with that caveat what moving from one taken together over the long haul make an kinds of transmissions, it is no longer safe place to the other in the development effort almost unbeatable case for IPv6 and for to assume that everyone is trustworthy. All for wireless cellular IP seems to boil down mobile IPv6. transmissions must be done in such a way to is that it appears that there is quite a lot of that privacy is insured. capacity within the core network infrastruc- My guess is that in terms of standards we ture. What this means is that when you move are 80 to 85 percent of where we need to be This then is a thumbnail sketch of what needs from one place to the other it that you don’t and that in terms of equipment availability to be done and is being done. A good part cause difficulties with the current allocation we can buy most of the pieces that we need of the story is that this process is basically of spectrum. The thing that you must avoid today but not quite all. And that it will prob- complete for IP version four. What we are is that when you are making a telephone call ably be three years before IPv6 is viewed as in the process of doing now is mapping this and move to a new place in the network having a significant market share. I think into an IPv6 solution. where there are already 10 people making that it will be another four to five years be- telephone calls, you don’t want your new fore the market share of IPv6 is more than COOK Report: So I’m hearing from an ana- telephone call to crash theirs. Therefore it is 50%. log, circuit switched, cellular point of view a lot better to give you a busy signal than to that everything is quite mature and in that cause their voice sessions to degrade. The COOK Report: Are you saying then that everything works. And but I am also hear- protocol necessary to handle this could be the criticism that switching to IPv6 will be ing now that if you want to converge voice called Network Admission Control. Local too costly to do is the wrong way to look at and data in and use IP to do that, things are admission control algorithms are needed and it? But that to the contrary there are reasons rather less far along. From an IPv4 point of then these admission control algorithms can to begin doing IPv6 that will not cost a lot view we have things working with that can- be aggregated into some sort of a back money and will not entail huge expenses of not yet be done in v6 perhaps in part be- hauled differentiated services solution. translating from one system to another? And cause not many people are doing v6 yet? that the reason to start down an incremental Do people have to do everything first in v4 COOK Report: Would you try to sum up for adoption path is that it will just grow and and then transfer the result to v6? Or can my readers in a few sentences the difference grow and grow independent of anything else they begin to do things in directly in v6? between the world where we are now with that is happening? voice and mobile devices that may not use Perkins: People are beginning to do things IPv4 let alone IPv6 and the world where we Perkins: I think that’s fair point of view. To directly in v6. And, for the most part, de- are headed with all the new technical devel- pose the problem as one of how we’re go- velopment is proceeding in parallel in both opment underway? ing to change all the existing devices is just v4 and v6. not right because people don’t want to Perkins: First of all the world is going mo- change existing devices and a lot of benefits COOK Report: So there is then a very de- bile; that’s crucial. So what ever is done of IPv6 can be gotten without changing ex- cent market for the use of IPv4 in mobile protocol-wise must work with mobile as well isting IPv4 devices. communications? as with static devices. Second of all the world is going Internet. However, we have February 2001 COOK Report Perkins: Certainly. There are a lot of people a long way to go there because right now who want to use v4. But I don’t think we the vast majority of voice traffic is not yet

226 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 Among Scaling Issues IPv6 Solves Only IP Number Problem NATs Depend on Both IP Numbers and Routing Issues Since IPv4 and v6 Interconnect But do not Interoperate -Introducing v6 Means Running Two Networks -- 3G Makes v6 Cellular Viable ing that people do it, mind. Editor’s Note: The strains of scaling the to have multiple prefixes. Internet in the face of continued reluctance However, do realize that when you do an Metzger: Imagine a large number of com- to push a switch to IPv6 produced yet an- panies talking to each other — the sort of other v4 versus v6 debate on the IETF mail O(N) analysis on the various factors that are list in mid December. We excerpt below only causing the growth in the routing table, this situation you have when, say, you have a particular one is causing more of an O(C) large clearing and settlement operation on about 20 per cent of the total debate. We note Wall Street that has decided to speak TCP/ that there are new levels of specificity of factor (since most organizations with more concerns indicated about the costs imposed than one prefix would have a reasonably lim- IP to its clients. Now, imagine also that the ited number of them), or maybe O(growth- clearing house doesn’t have real IP addresses on the v4 network of operating with address — after all, you’re always told these days to space shortage. At the end of our excerpt rate-of-individual-organization) [which in Fred Baker gives some fresh stats on the v4 most cases is going to be pretty small - ISP’s use net 10 when you go to the registries and adding a lot of customers would be one ex- aren’t going to be globally routing your nets address pool and on the extent of v6 net- — and that the other firms also use unregis- work deployment so far. ception]. In other words, the exponential shape of the routing table size cannot be due tered addresses — frequently, the same ones. to an O(C) or O(average-growth-of-indi- On December 17 in a “NAT’s Are Evil” dis- Well, you have to talk, so you use NAT. cussion that had started on the IETF mail vidual-organization) factor. list 3 days earlier Sean Doran wrote: IPv6 The bulk of the growth in the table has to be Now, imagine that those clients have to ac- is architecturally flawed in precisely the cess a service you are reselling — say, some same way as IPv4 is; it simply has 4x the due to the growth in the network population number of binary digits in the address fields as a whole, i.e. the sheer number of organi- sort of market data or specialized clearing zations attached to the network (which is information. That service is also delivered and some minor cleanups which were im- over TCP/IP, and also over unregistered ad- portant some years ago. growing at a much faster rate than any indi- vidual organization) - and in particular those dresses. Packets start having to traverse sev- which are becoming multi-homed. eral address zones, just within the network Perry Metzger: Sure. On the other hand, it obvious to the clearing organization. Now, has four times more bits in the address field, and at the moment, we desperately need It’s hard to put numbers on it without know- assume that there are a couple of address ing what %-age of sites which are already zones within the client site for whatever rea- those bits. It is costing us truly astronomical son, so they’re using NAT internally. sums not to have those bits. It does not solve globally advertised has more that one pre- the routing problem. It doesn’t solve world fix, and how fast that number is growing. Now, further assume that through various hunger either. And your point is? However, looking at the routing table growth (it has doubled in about 3 years), and given remote access schemes, you have to provide (On the routing problem, the sad truth is that the growth in the user community over that access to this mess over the “real” internet. Another layer of NAT gets added. in spite of claims for years by you and oth- time, one has to expect that the growth in ers, there are no magic solutions to the rout- the user community is the driver. Yes, the ing problem. Blaming IPv6 for not incorpo- point you mention will have put something Are you starting to see the nightmare that of a multiplier on the table size - but it’s a has been created here? None of this is theo- rating the non-existent magic solution is retical. This stuff is really happening. rather like blaming IPv6 for not incorporat- relativly static multiplier, I expect. ing the non-existent magic cancer cure. I Keith Moore: if “v4” includes dealing with Chiappa: I mean, I can understand it is a used to believe you and others who made temporary thing, e.g. if one company buys vague claims about various architectures, an increasingly severe shortage of address and then I spent some time reading up on space (which sooner or later implies forced another, and in gluing the networks together renumbering) and/or tying together multiple they temporarily leave the bought company them, and I realized that none of them did behind a NAT, but interface it to the world particularly better.) NATted networks, it’s not at all clear that this takes less work than v6. via the main corporation’s gateway/NAT. Bradley Dunn: I do think that there is a Metzger: Unfortunately, multiple organiza- definite causal relationship between the ad- Metzger: It certainly takes more. The dress space shortage and the number of pre- amount of NAT equipment out there is as- tions like to talk to each other over their net- works. Funny, that. fixes in the routing tables. People who allo- tonishing, and as I said at the plenary, people cate addresses .. use slow-start algorithms are starting to pay Real Money (as in mil- in their allocation policies due to the short- lions a year) in large organizations to keep Now, you’d imagine if a Large Market Data the NATs working properly. Several layers Provider, say, went to ARIN to ask for ad- age of addresses. Therefore many organiza- dresses, they’d get them, but they in prac- tions end up announcing several non- of NAT has become common, and NATs are aggregatable prefixes .. .. If everyone could stateful, which means they are necessarily tice don’t — they’re told to use net 10 since more of a reliability problem than routers. their stuff isn’t globally routed — and of get “enough” addresses the first time, we’d course all their customers use net 10 too... be much closer to the ideal of one prefix per AS. Multi Layers of NATs Daniel Senie: I’d read that RIPE is at least making micro-allocations available. The Noel Chiappa: You do have a valid point - that the address shortage is causing people Chiappa: This [several layers of NATs] Iam ability to get a few /27 allocations can RE- a hard time fathoming - not that I’m doubt- ALLY help in cross-connecting corporations

227 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA which find themselves needing private in- your hands on and have to push some of the marks on their service, or as a way of get- terconnects. These micro-allocations are not stuff that’s globally routed back into the pri- ting an even bigger wall around their gar- routed globally, but rather are used to en- vate world somehow... den (e.g. 3G guys might consider this:-), OR sure unique numbers are available for pri- it requires some sort of socially responsible vate interconnects. None of this is theoretical. I’ve seen all of behaviour (e.g. most the 6bone is probably this. It is astonishing how hard it has all be- subsidized) to glop it all together and just ARIN would do well to offer such at low come. As I’ve said, millions are being spent make it inevitable....(this is not specially a cost. Or perhaps someone should gather up a year by large organizations dealing with v6 plug, just a plea for connectivity). a bunch of allocated /24 nets which have failures and complexity attributable to NAT. been out there and aren’t in use, and set up Atkinson: So, if one wanted IPv6 to be pro- an interconnect registry to hand out /27s or / To the routing heads out there, v6 is a total moted by operators, one might spend time 29s and rent them to those who need this failure because it doesn’t solve the routing listening to operators and devising clever type of private interconnect. problem. I hear people like Sean Doran say ways to make multi-homing and routing “NAT is fine”. That’s because to the routing work visibly *better* with IPv6, to compen- Chiappa: But using a NAT box adds a ra- people and ISPs, the ugly stuff that happens sate for the much increased operational bur- tion of complexity (which is always bad and at the endpoints of the networks is immate- den. Oddly enough, some folk are doing just a source of potential problems), and using rial. ISPs get the global address blocks they this. layers of them increases the complexity, with want — why do they care about the rest? attendant complexity costs. I have a hard Crowcoft: Indeed - we might as well work time understanding why people would add Well, as things stand, we’re having serious with what we have - hey, there’s a lot of stuff that much complexity, without a darned good bad trouble happening at the edges of the one can do with the code still, including just reason. net. NAT being a major source of operational re-writing a lot of cruft in routing code - btw, trouble, failure and cost is not a future prob- [looking at] the way 3G access networks Metzger: They can’t avoid it. They need to lem. It is here now. work, one ought to be able to mandate for get their work done. They have no way of really good aggregation - I think a lot of getting registered addresses. They’re told to You may ask why these end users aren’t people forget that the exponential growth use NAT by organizations like ARIN, and demanding v6. Well, they can’t go to their curve of the internet is not made out of ho- so they do the only thing they can. Why do provider and buy v6. They don’t even know mogeneous pieces - its actually a series of you think we’re seeing huge sales of routers about v6. So they struggle along in technology changes. but somehow we haven’t run out of v4 ad- NATworld. After all, everyone else is doing The phases from government and unviersity dress blocks? It isn’t because people are us- the same thing. and dial up, and DSL and cable modem, and ing those routers as heating equipment. It now mobile are all subtly different (as wit- isn’t because those people wouldn’t prefer I mean, once you’re behind a NAT box, ness they have their own ISP cultures and to get registered addresses, too. you’ve got a *lot* of addresses to play with own address allocation and routing head- (how many, exactly, depends on how you’re aches) - while datagram is one size fits all as Anyone notice how odd the growth charts doing it). This is puzzling to me - what con- a way of communicating, we need a range look for the v4 allocation space? It is be- figurations are there out there that demand of address allocation and routing techniques cause we’ve already run out of addresses, more address space, internally, than you al- for the different and future access and core folks — or at least we’re acting as though ready get with one layer of NAT box? Or is networks....I thought most this was discussed we have. there some other reason I haven’t figured in the whole ipng debate and was why we out to have layers of address space? solicited input so widely....so now lets go I’ve seen as many as four layers of NAT. (finish) coding it. (That was only once, and not all the layers Difficulties of ISPs were within a single organization.) Two lay- On Tuesday December 19th Theodore Y. ers is routine, three less so. I’m making as- Supporting Both v6 and Ts’o wrote: The flaw in your argument is sumptions here, of course — you don’t know v4 that you’re assuming that the only reason to what’s really going on inside the other orga- do NAT is because of the address space prob- nizations. For all I know, the packets I think lem. My concern is that it may turn out that are coming in from the other guy’s net 10 On Monday December 18, 2000 RJ Atkinson: From an operator perspective, some transport/routing people may conclude are originating behind another layer of NAT that we may also need to do NAT to solve or two. Hard to tell. supporting *2* IP protocols is much harder than supporting just one. If one looks around, the routing problem. In which case, we’re back to where we started. It is impossible for *me* to try to figure out very few NOCs on the planet today could what is going on in such situations without reasonably be called “fully successful” just I’d feel a lot better if we could get key rout- a diagram. Imagine what it is like for ordi- managing IPv4. ing/transport people to sign some contract nary NOC staff? in blood stating that the IPV6 address is guar- John Crowcoft: let’s not forget that support- anteed to be invariant, and that any attempt And consider that NAT boxes are stateful. ing IP at all is counter intuitive - the busi- to design boxes which muck with the IPV6 When they go, they take out long lived con- ness case for providing interconnectivity to address in transit is architecturally out of nections, unlike dead routers, which you can _other_ peoples services is not there, unless bounds. That may seem to you to be obvi- simply route around. they are already - it requires socialist (i.e. ously true, but I 10 years ago we assumed government subsidy) to make the internet the same would be true for IPV4 addresses. And consider what happens when you sud- what it is now - i am betting that most telco- denly discover that you need to re-jigger child ISPs love NATs and simialr technol- your whole nightmarish rube goldberg net- ogy coz they promote walled gardens (like Address Space Flattening work because suddenly you have to make wap etc) and lock in and all that old stuff, that net you never thought would have to BUT the only way out of this dead end that Geoff Huston: I’m not sure that this is pos- talk to the internet show up on the net and is IP v4 requires either OneBigIsp to take sible - part of the characteristics of today’s you only have a couple of /24s you can get the plunge as a way of getting more check Internet is that its is flattening out. The con- 228 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 cept of hierarchical connectivity with of us still think that. of the address pool has been delegated, and ‘upstreams’ and ‘downstreams’ is one which about 25.21% is currently being advertised. appears to have relied on a high marginal As Yakov is prone to point out, in a perfect The unicast address pool, what we once cost of communications services. Now as I world wherein all applications are client/ called the class A, class B, and class C ad- understand the current deployment plan server and address space is uniformly avail- dress pools, represents 7/8 of the IP Ad- there are TLAs and sub TLAs, and an ap- able, there are enough addresses around so dresses: the remainder are divided among parent hierarchical view of the world again. that NATs are all we need. There are a few the multicast (class D) and experimental problems: (class E) address space. Imagine, for a second, what the topology of the Internet would be if communications - the world is not perfect - all applications So the bottom line is that we have delegated services were free. Now turn up the unit cost are not client/server - address space is not out a touch over half the usable unicast IP knob an little and do the same thought ex- uniformly available. Address space. The way we are using that periment. is, in many places, interconnecting NAT Hence, NATs don’t solve every problem. translation points - the use of private address Part of the issue we faced in the Big Internet space hides the real usage, and we have no discussions, and part of the issue we face The reference to IPv6 is interesting. Up un- really good way to estimate it. If we start now is the semantics of the address and the til a year ago, I didn’t particular push IPv6 going for non-client-server protocols - voice level to which these semantics are over- as a solution. Reason: it wasn’t in anybody’s on IP - in a big way (and I am told that some loaded. Is an address an identification of operational game plan. IPv6 had a serious of the world’s largest telephone carriers have identity? A key to absolute location? A key chicken/egg problem - numerous people plans in place to convert national and inter- to relative location? An encoding of the lo- wanted to be the second to deploy it, but national telco backbones to VoIP over the cal topology? My concern, and the reason nobody wanted to be first, and vendors gen- coming 3-5 years), that means that these why I’m chiming on Ted’s signing blood erally didn’t see the point in implementing devices will need to be addressable from proposal is that in looking at the structure of it apart from somebody waving cash to buy outside their domains, which means those V6 addresses, at least the structure of the it. As a proposal, it solved some interesting people will find themselves needing a non- immediate deployment 1/4 or so of the ad- things, like more bits in the address, better NAT’d address. Implications are largely dresses, we appear to have adopted an ap- autoconfiguration, more scalable mobility, speculative, but have the option of being proach which is not far removed from the more efficient VJ Header Compression, re- non-pretty. provider address hierarchy structure of V4 introduces the end to end model so we can today. My lurking concern is that it is not support non-client/server applications well, Next question, not usually discussed, is how working in the V4 routing system given the and so on. much of the world as yet doesn’t have IP large percentage of table entries which are Addresses allocated to it and would like to. more specific advertisements of aggregate However, being “good” isn’t enough unless I think it is fair to say that the world is con- announcments (approx 40%) and it won’t is it “good enough to deploy” - good enough vinced that IP connectivity is very impor- work for V6 either (using the term ‘work’ to replace the old stuff, or good. When 3G tant. I have heard ministers of telecom from very loosely in terms of being able to route put the proposal on the table, it became vi- dirt-poor African countries discuss how accurately, efficiently and with a clear scal- able. At the moment, globally, we have per- wonderful it would be to have so much free ing property). haps half a dozen to a dozen commercial capital laying around that they could “put a networks running IPv6 and upwards of 50 telephone into each village." Those same It appears that the intended address struc- research networks. That’s an insignificant ministers are doing whatever it takes to en- ture and deployment structure appear to be dent in the great wide Internet, but it is not sure that their countries are on the Internet. at variance, and when that happens the temp- “nothing” either. We have some pretty large tation to alter the address in flight to suit each countries that have stated an intention to Unfortunately, the world is not internet-at- local region’s environment may well be move in that direction. Now that folks have tached. Western Europe is, the US and overwhelming. So I’d prefer to keep my the opportunity to be second - someone else Canada are, Australia is, Taiwan has Internet blood to myself, thanks as its a contract I has gone first - anyone who is having trouble in every public library (I’m told). It com- suspect we’ll break within the operations getting addresses from a registry is thinking prises populations in the 1 billion person environment. (And no I don’t think that this seriously about IPv6. ballpark. There are some pretty large swaths would be a clever move, and yes, we will of people in Eastern Europe, Asia, and Af- regret it afterwards.) In short, things had to get worse before they rica that are not connected and should be. If could get better. We’ll see where things go, 25% of the address space is what we need State of the IP v4 but whatever my opinions on IPv6 are (and for the part connected now, that tells me that I am on record as saying it isn’t all we might I need 150% of the address space to cover Address Pool have liked it to be, my voice being one everybody. If wide deployment of converged among many), I am not at all convinced that networks means that 25% was nowhere On Thursday December 21 Fred Baker: it is a washout. close enough for the present Internet popu- let’s be fair. There was an excellent reason lation, then 150% is a very low guess. for NAT at the time. Postel suggested that Tony Dal Santo: What exactly is the state private address spaces could be used rather of the IPv4 “address pool”? I realize there is So that’s “what is” last I heard it from those than assigning precious IP Address space to a PERCEIVED shortage, and this is usually who have the hard numbers, and “what could networks that had no intention of attaching the main motivation for NAT. But is there a be”. “What will be” remains anybody’s to the network, and NATs wound up being a real shortage? Are “reasonable” requests for guess. My crystal ball is really shiny due to way to couple that with topological address addresses being denied? excessive rubbing, and just as cloudy as ever. space management to try it out. We knew it was a short term hack at the time, and many Fred Baker: The way I understand it (which February 2001 COOK Report could easily be out of date) is that about 45%

229 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Napster - MP3 File Sharing Application - A Hugely Popular Bandwidth Sink Defies Control Efforts of Network Administrators Napster, a program written at the end of last The CAIDA Discussion for one of the several Napster directory serv- summer by 19 year old Shawn Fanning a ers (those servers contain user and song freshman at Northeastern University has info). You can see this via ‘telnet On March 1, Mark Boolootian having com- server.napster.com 8875’ We blocked all of become so popular so fast that in early March plained that Napster traffic was filing up the it touched off discussions on the CAIDA list 208.184.216.0/24, but it probably would and NANOG. Napster was clogging the bit bit pipes of the University of California Santa have been fine to just block Cruz wrote: our survey “was based on 208.184.216.223/32. They have changed the pipes into and out of many University netflow data. We took an hour snapshot of Internet connections. Some were saying that IP address of this box at least once - it used Napster was on the verge of having an im- data during peak campus load and simply to be 208.184.216.222. Ran another netflow summed up bytes for those ports known to view of yesterday’s outbound traffic and pact on Internet traffic potentially as great be used for Napster. as that of the web. napster (ports 6688/6699) was 40% of total campus outbound flow. We may turn up Vern Paxson: What I meant in particular CAR for these ports in the next day or two. Edited versions of both discussions follow. was a question for Mark, namely: is he bas- First however let's take a quick look at what Napster actually is. According to a Febru- ing his analysis on 6699/tcp, or on a more extensive set of ports? The NANOG Discussion ary 3 Janelle Brown article in Salon “Napster the software Boolootian: I’m sorry to say, I lied. I should On NANOG on March 6 Jeff of the Uni- have checked my sources before making any versity of Tenessee at Chattanooga asked: program — a downloadable application that claims about how the data was collected. It lets users temporarily turn their computers Is there an updated list of ports used by into servers for the purpose of swapping turns out that the off-the-cuff analysis was Napster and various games (Doom, Unreal, not based on netflow stats. The approach etc)? At this point we’re just collecting data MP3 files — is growing faster than anyone taken was to block all traffic to the could have imagined. To add to the - points and not actively filtering anything, but ment, Napster the company is now em- napster.com address space. This effectively of course the IANA port number list is sadly disabled the directory service which is re- out of date with regard to these tools. broiled in a lawsuit with the notorious Re- quired for finding napster servers. A graph cording Industry Association of America.’ The next day Scott Rosenburg commented “The brilliance list, there must be an update somewhere but of Napster is that, like the Internet itself, it The block was in place from 16:00 until it is not publicly available... And I am not 21:30. The graph suggests that well over finding one for Europe to see if they use dif- lacks any center: It’s just you, me and er7c, 50% of our outbound traffic (blue line) could acting as individuals, sending files across the ferent ports... Net. The RIAA could try to shut down the be attributed to Napster. This test was per- formed on a Saturday, a day on which traf- Bill Woodcock: Best port-number list I central Napster directory, which lets users fic flow is typically somewhat reduced from locate other users and their files; you can know of is the one that’s included in the bet, though, that sooner or later someone weekday traffic flow. This had the effect of nmap distribution. slightly exaggerating the reduction. would then come up with a more legally bulletproof version of the same service. And Joshua Goodall: Europe uses the same port if the RIAA goes after the entire Napster user I ran through netflow data for yesterday (Feb numbers. 29th), using ports 6688 and 6699. Outbound base, the music industry will find itself in traffic to those two ports was 27% of total the awkward position of suing a whole lot Shawn McMahon: If you’re intending to of its best customers. Which doesn’t sound outbound campus traffic. The primary rea- filter at some point, then who cares what the son napster is only responsible for 27% of like smart business.” ports are? Filter the ports that are using too our outflow is, as I think I mentioned be- much traffic on your network. If Napster/ Not surprisingly the Recording Industry fore, our local resnet police force sending Doom/whatever isn’t using too much band- cease-and-desist email to the top talkers on width, blow it off. There’s a very big differ- Association of America ence between filtering to correct a problem, expresed a different point of view when it and prior restraint. On March 2 Paxson: Yowza! What is the filed suit against Napster on December 7th, napster.com address space? napster.com re- 1999. “According to the complaint, Napster Scott McGrath: When you have limited is similar to a giant online pirate bazaar: us- solves for me to 208.184.216.238 and bandwidth you need to ensure that it is used 208.49.239.246 - did you use those /24’s, or for what it is purchased for (email access to ers log onto Napster servers and make their something else? I’d like to do similar mea- previously personal MP3 collections avail- network based resources etc) and also as able for download by other Napster users surements locally ... Napster moves MP3’s you need to ensure that your facilities are not used for infringe- who are logged on at the same time. Napster Boolootian: napster.com is their web site. provides its users with all the facilities and ment on other’s intellectual property so that means to engage in massive copyright The machine that Napster clients first talk you and your organization are not sued by to is server.napster.com. The Napster client infringment.” rapacious lawyers unfortunate but there it is connects to port 8875 on server.napster.com here is a short list in ACL format of Napster which returns an IP address/port number pair and other MP3 servers.

230 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 ! Napster’s Servers & Networks ! deny ip property issues, nor issues of “I don’t want cies harder than they need to be. The trick is 208.49.228.0 0.0.0.255 any deny ip my access line to be 100% used, even if the in figuring out how much headache is the 208.184.216.0 0.0.0.255 any deny ip napster traffic behaves in a UNIX nice +20 nature of the beast, how much we can help 208.49.239.240 0.0.0.15 any deny ip fashion, because I pay for number of bytes alleviate, and what the realistic compromise 208.178.175.128 0.0.0.7 any deny ip moved per month”. is. 208.178.163.56 0.0.0.7 any ! ! Other MP3 ! deny ip 202.36.148.5 0.0.0.255 any deny ip Scott McGarth: If Napster and it’s ilk were Of course, I can only make suggestions to 202.36.147.16 0.0.0.255 any well written applications I could create cus- management, but I know that everyone here tom queues for it and discard when neces- is very aware of the real life issues for the Simon Lyall: In case people didn’t notice sary like I do for non business related web NANOG type community, and also very these networks [206] are used by ORBS (see traffic rather than my current heavy handed interested in doing what can reasonably be www.orbs.org) and people associated it with ACL’s If anyone on the list has a alternate done. it. Perhaps some may wish to block them method I would appreciate hearing about it but it’s a little pathetic for Scott to try and and my users would love me for giving them Certainly it would be easier to queue it if it sneak them into other people’s access lists back access to Napster and other music sites. [Napster] only used one port for client->cli- in this way. ent transfer, but the problem is that there’s Michael Ridley from Napster.com : What no way to know if that port would be in use. Scott McGrath: I am a corporate end user would be your suggestions on making Also, for people behind firewalls you need so the common carrier exception does not Napster a more network friendly app? to tunnel in sometimes (of course, that works apply to me and the intellectual property de- only a small portion of the time). I don’t mon does. Sean Doran: 1. RFC 2001 compliance. know what the numbers look like, but it may Keep it TCP. be the case that just queueing up the default re: ORBS I got those addresses from my traf- data port would catch some large percent- fic analyis on where the MP3 traffic was Michael Ridley: Agreed - I don’t know of age of the Napster file transfering. coming from and I apologize to the list and anything we would want to do that would it’s members for not checking who the block break that stuff. Scott McGarth: One of the big problems belongs to. I have no desire to add fuel to from my standpoint is that I know of no well the ORBS controversy. Sean Doran: 2. Although RFC 1349 is sup- known data port that I can queue for for web posedly dead and the TOS octet in the RFC traffic from other than authorized sites I use Internet access has become critical to many 791 scheme is dead too[*], it is at least good a low priority queue which during busy times business processes and we need to come up politics to set a low TOS value on the bulk drops packets but when the usage is low all with mechanism to allow traffic like MP3 transfer traffic. (If not on all traffic). Thus, web traffic flows smoothly. to fill slack in our networks however in my routers configured to do TOS-based fancy case I need to ensure that bandwith is avail- queueing will DTRT and fewer people will Another way would be to tag the Napster able for the purpose for which it is purchased accuse Napster of being a resource pig. frames with QoS information so that Napster for. If Napster and it’s ilk were well written usage could be controlled with QoS poli- applications I could create custom queues Michael Ridley: I believe there was some cies. I really DO NOT WANT to prohibit for it and discard when necessary like I do discussion about doing that, actually, al- access to Napster but I do NEED to deliver for non business related web traffic rather though I don’t know where it went (as I just the critical services first and “fill up the cor- than my current heavy handed ACL’s If any- do system admin stuff, not development ners” with entertainment services which one on the list has a alternate method I would stuff). I’ll have to inquire as I haven’t heard make our end-users happy. appreciate hearing about it and my users anything about it recently. Of course, the real would love me for giving them back access impact would be pretty limited since I don’t John Kristoff: I’ve been thinking and talk- to Napster and other music sites. know that most peoples’ routers really look ing about this a lot with some of my peers in to that header for QoS. Nevertheless... the University environment the last couple Sean Doran: Napster traffic is principally of weeks. Like yourself, I am trying to come bulk TCP transfers. Bulk TCP transfers are Peter Glabavy: I think while the technol- up with a fairness policy and implementa- good for your network — much better than ogy is not anywhere near perfect (hence the tion based on technical limitations of IP and lots of short TCP transfers (web “mice”) deprecation in most environments of ToS), our network equipment. because they are highly sensitive to network if you label your traffic as bulk, then at least congestion. those who are interested can have the op- Some of the most important thoughts/con- portunity to prioritise based on ToS. Most clusions I have had are as follows: Avoid Moreover, where chronic congestion is a will not do this, but you will gain the re- mucking with TCP and end-to-end transpar- problem (i.e., your access line is full and spect (to whatever degree) of those that do, ency as much as possible. Let IP and RFC dropping packets for long periods of time), by acknowledging that you are concerned 2581 do its job. Managing by UDP/TCP port bulk transfers back off much more quickly about the resources of others. Think of it is unreliable. All it takes is for someone to with a very gentle RED control law than do more as a politcial rather than operational change configuration, find the next killer app web mice or short SMTP sessions etc. acknowledgement. or even more fun, implement some type of “port hopping” mechanism. I’m just wait- So, having one’s supplier apply RED on your Sean Doran: 3. “If we aren’t network ing for this to happen. access line, and you applying RED towards friendly, please let us know what will make the supplier, is a cheap, simple, and band- us more network friendly” is a great attitude Using ToS fields *seems* to be the right width-effective way of making sure that to demonstrate. Hopefully this will be ap- approach to provide *some* of what we Napster traffic can consume the entire line, preciated by actual operators (at least the want. Coupled with something like WRED but not in any way worsen the performance ones who don’t pay per-packet/per-byte in our Cisco routers at the our Internet bor- of short TCP sessions and the like, which charges). der. More sophisticated QoS mechanisms are not as congestion-sensitive. than that seems to be an effort in futility. Michael Ridley: Yeah, definately we aren’t KISS. I’m thinking a simple low priority, I deliberately do not address intellectual trying to make peoples’ lives/budgets/laten- high priority ToS setting for packets that are

231 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA either within or outside of the local defini- (bandwidth) more power to them assuming successor to Napster: “Justin Frankel and tion of fair. For example, I like the idea where of course that you have a method to charge Tom Pepper, founders of Nullsoft and the all packets exceeding an average rate of X for it! popular Winamp MP3 player, have been bps get tagged low priority and dropped by developing a file- sharing software tool WRED as necessary. Be prepared to find that On March 8 Eric Fair: Any operator trying which could be even more potent than by using ToS bits, you break something (see to control which applications are used on Napster in letting users share MP3 files over http://micro.uoregon.edu/macintosh/ their networks has either never learned, or the Net. But the “Gnutella” project may mactcp.html). already forgotten, the lesson of “fsp, NASA, never get past its current beta stage if AOL and OZ.” determines the project is a threat to record You might be able to influence what comes labels Warner Music and EMI, which would into your network from the outside through Precis: they (developers, users) can modify become part of AOL this year if pending these mechanisms, but you can’t control the application to use spread-spectrum style mergers are approved.” them. You also can’t count on any service port numbers that constantly change guarantees past your administrative control. throughout the life of a session, which makes “ Unlike Napster, which uses a centralized A few more good reasons to avoid anything it effectively impossible to filter using ex- server system to let users share files, the overly complex. isting technology. Sean Doran has it right: Gnutella software was designed to create be glad this is bulk TCP (fsp was UDP self-perpetuating networks that grow inde- It is often easier and cheaper to just add band- based), and turn on RED. pendent of one company’s involvement. width than trying to tweak utilization and apply QoS throughout your network. Scott McGarth: Well said Erik. However After installing the program, users would this is what leads many organizations to re- connect to other “servant” computers, cre- I’m having a hard time applying this fair- strict/remove internet access from whole ating a chain of participating users. This ar- ness concept down to the user port level, if regions of the company to solve the chitecture would allow for one-to-one or anyone has any thoughts or feedback, I’d bandwith utilization issue. So we are back many-to-many connections, and makes it appreciate it if you contact me (and also see to needing effective ToS/QoS methods to difficult for administrators to block the soft- my post in the unisog list). balance the quality of life issues with the ware, which occurred recently with Napster bottom line requirements of organizations on college campuses. Scott McGarth: As a member of the dreaded ‘Corporate America’ and an end user Keeping it TCP with a well known port is a “Distributed nature of servant makes it pretty I need to block it for now because of 1 ex- good first step because then with a custom damned tough for college administrators to cessive b/w usage. queue you can route it with a low priority, block access to the Gnutella service.... Abil- IF the link is not busy it goes out fast this is ity to change the port you listen on makes it 2. “Mr J. Random Engineer did you know- how we handle web traffic. Sure it slows even harder for those college administrators ingly allow a service to enter your premises down from time to time but it ALWAYS to block access,” the site said before it was which allowed my clients intellectual prop- works rather than the ‘ACL the Napster serv- taken down.” See http://www.wired.com/ erty to be infringed yes or no?” ers’ approach which is currently in effect. news/technology/0,1282,34978,00.html and right now Napster NEVER works. We need a system which allows “internet While the AOL web site was taken down on radio” for legitimate content and allows us Editor’s Note: The discussion has trailed the 15th of March a quick search of the web to control bandwidth usage on end-user net- off. But Napster traffic seems uncontainable. on March 19 showed that the Gnutilla code works. At universities where it has been blocked, was already available on mirror sites. An- student wrote programs to redirect it to other other bandwidth eating genie is out of the The common carriers have an entirely dif- ports. bottle and pobably cannot be stuffed back ferent set of needs and to keep their com- in. mon carrier exemption they cannot do any- On March 15 Wired carried new of AOL’s thing about “excessive traffic” besides if moving against Gnutella, an open source May 2000 COOK Report your customers want more of your product

232 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 Broadband Spread Spectrum Wireless Extends Internet Reach of ISPs & Field Research Scientists Increased Radio Speed and Decline in Price Enabling Smaller ISPs to Compete with Cable and DSL Internet Access NSF PI Dave Hughes Explains How Wireless Data Gathering by Environmental Scientists Will Yield Huge Increase in Network Traffic

Editor’s Note: Dave Hughes is the owner rules, with a faster chipping rate, the FCC good radios and have a large market share. of Old Colorado City Communications. See was able to permit the basic signal processes . He has been an in- ond from the previous 2Mbps. hopping) fall under FCC Part 15 no license dependent networking visionary for more regulations? than twenty years. He was technical advisor COOK Report: In other words, if you get a to Big Sky Telegraph, linking remote schools 500% increase in your chipping rate, then Hughes: Oh, yes. of Montana to a University and the net in you can get a 500% increase in your band- the late 1980s and early 90s. He owns his width? COOK Report: From an operational point own ISP company, and uses wireless in its of view why would you use direct sequence both up and downstream connections. Since Hughes: It’s not quite that simple. rather than frequency hoping or vice-versa? 1995 he has been doing research for the National Science Foundation in the grass COOK Report: But it’s related? Hughes: They differ in their ability to handle roots use of no license wireless in remote interference. Direct Sequence Spread Spec- areas, including Mongolia, and beginning in Broadband Comes to trum radios have more efficient switching the fall of 1999 no license wireless and sat- by using Phase Shift Keying (PSK). They ellite technology for biological and environ- Spread Spectrum seem to be cheaper to make. And since they mental science. We interviewed Dave on can operate at 11Mpbs while Frequency hop- March 18, 2000. We also updated the inter- Wireless ping radios are limited to 2Mbps, that is a view in early May, 2000. huge advantage. The rules of the FCC to this Hughes: Yeah, it’s related to the rate, and of date, have not permitted frequency hopping Part One course you realize, when you say 11 mega- to reach 11 megabits per second. bits per second, that you’re also saying LAN. Wireless ISPs Wireless LAN, 10BaseT protocol speed. So COOK Report: And still do not? there’s no accident that everybody came COOK Report: It is said that there have been roaring out at 11mbps because you will find Hughes: There’s pressure and formal filings tremendous improvements in spread spec- a 10BaseT connection built into the back of now at the FCC to change their rules to ac- trum radios in the last couple of years. Are all these radios. And with such a connec- commodate the new technologies. For ex- these mainly driven by better digital signal tion, you end up extending the wired LAN ample take Breezecom, which has a large processors or by a whole lot of stuff? from inside of a building, to a wireless wide piece of the market. They’re quite success- area network, or WAN. That connection can ful, and we’ve used their radios, too. They Hughes: It’s a combination of things. One span a city, or reach across a rural county, at operate at 1 megabit per second for 7 miles. thing that kick-started the whole rush to go the same speed as if the network were all The problem is they’re frequency-hoppers. from two megabit radios, (the E1 standard wired. Acting just like a wired network. Given what their competition is doing, they in Europe), to 11 megabits per second was That’s a huge, huge step, because for the want to come out with frequency hopping the Harris Semiconductor ‘Prism’ chipset first time these radios operating at LAN radios that operate at 11 megabits per sec- which had a much faster chipping rate and speed can connect separate LANs without ond. And as soon as the FCC approves the permitted the development of much faster slow, or costly, wired pipes acting as a bottle- changes - and there is no reason to believe direct sequence spread spectrum radios. neck for their performance. they won’t, then frequency hoppers can get up to the same speed, in the same frequency COOK Report: What is a chipping rate as Now I wasn’t too impressed with Aironet bands that everybody else does. But all that opposed to a CPU rate? radios three years ago, when I was buying underscores just how bleeding edge these radios for the first NSF project. But now they technologies are - the FCC is having a hard Hughes: It’s how fast the chipset can handle have come out with an 11 megabit per sec- time keeping up with the rate of change. switching from one frequency to another ond family of radios, as did Lucent, as did while handling the packets of data being Solectek and others. They all happen to be COOK Report: What are the prices of the broadcast or received. Harris explanation is running, though, under the FCC rules for 11 megabit per second radios? at http://www.zettweb.com/CDROMs/ ‘direct sequence’ modulation, which is a dif- cdrom006/prism/ ferent way to modulate the signal than fre- Hughes: They have started coming down. quency hopping. Now Breezecom, a very The early 11 Mbps Solectek Radio was COOK Report: I see, in other words, how successful company that started in Israel and $9,000 two years ago. Then out came rapidly it can dance around. has been brought to the U.S., also has fre- Aironets, Lucents - competitor’s that started quency-hopping radios that, for the moment, out thousands of dollars cheaper. Right now, Hughes: In a manner of speaking, yes. With operate at less than LAN speed. They are I can buy a PCMIA card for my laptop that direct sequence modulation, under the FCC 233 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA cost $165 from Aironet that operates at 11 ment. Very, very significant. Cisco, a device- Hughes: You put your finger on it, I’ve been megabits per second, half duplex. Which based company, manufacturer of routers par screaming about this from the day it started. really means about 5-6 Mbps true through- excellence ends up doing several things. It And you could only use one full watt of put. Which is 3-5 times faster than a T-1. buys Aironet for $880 million. This is all in power in a UNII radio if you built a radio And I can buy a Teletronics 2.4Ghz, 2Mbps the last 60 days. They’re getting into the that offered 20 megabits of throughput. But radio for $500 for the base unit, and only wireless LAN market at that level. The nec- then the FCC, always fretting about poten- $99 for the client radio. essary radios are down below $1,500 and tial interference, imposed a formula for spec- with PCMIA cards down below $200 in cost. tral density, whereby if you choose to make COOK Report: So is it safe to assume that Aironet has made some changes since then, a radio that’s only 10 megabits per second, you can buy an actual 11 megabit per sec- however. They have dropped the power of or 5 or 1.544 - T-1 speed in the UNII bands, ond radio for under $1,000? their radios to 30 miliwatts which is more you must lower the power accordingly. And appropriate for wireless LANs than ISPs. so every way you do it, the range of a UNII Hughes: Yes. While you could still stick an amplifier on radio is not going to exceed five miles. The the antenna, doing so raises your costs. They laws of physics still hold true. And that’s COOK Report: Way under a thousand? have momentarily ceased production pre- okay for a lot of uses. But its lousy for any- sumably prior to getting revved up again in thing really rural, or even school districts Hughes: Yes. But there is a difference be- their Cisco corporate guise. which are spread off across cities. Yet the tween buying a Base Station radio - that can UNII band was touted as having ‘solved’ the handle hundreds of client radios, and a one COOK Report: Do the Aironet radios speak connectivity problem for and between pub- IP/MAC address radio - for the client end. TCP/IP perfectly well? lic schools. My NSF studies show that no Both prices have come down rather dramati- license radios need to have ranges of be- cally, with client radios now below the magic Hughes: Oh, yes, perfectly well. Most of tween 10 and 15 miles if they are to serve ‘consumer’ $500 price point. Which happens these spread spectrum no license radios are even 90-95% of all public school districts. to be what I had to pay for a 1200 baud Hayes transparent to the protocol moving over Not 5 miles. Micromodem back 15 years ago. them. But also, at the same time, Cisco it- self comes out and announces an LMDS Cisco is bringing out UNII radios. They’re Now let me expand on what I have been radio that’ll operate 30 miles, cost $20,000 going to be pretty low cost at the client end saying. This is a technical speed-up. It is one each end, but goes DS3, 45 megabits per - perhaps from $500 to $750 at the begin- that’s been coupled by more companies second 30 times faster than a T-1. So there’s ning, and they’re going to have other people, jumping into the game. With more learned a radio in the licensed area and that radio is like Motorola manufacture the end users’ about the software/hardware required, and out in the marketplace right now. The point radios, while they manufacture the main base with more production. Significantly, com- is that the DS3 LMDS radio is integrated engine at home, in Cisco. So my problem, panies are now getting gobbled up by big- into and part of an extension of their wireline which few others have expressed, is that the ger companies. This is happening as these routers. Lots of integration is done in soft- UNII technical radio manufacturing restric- larger companies — this includes the Ciscos ware. They’re software experts. They can tions the FCC imposed are too limiting for and Nokia’s and so on —have started to get use the crunch capability of their router rural use, where interference is not the main into the wireless world. And some is unli- knowledge and software knowledge to drive problem, distance of link is. The very places censed, but some is licensed, like MMDS the hardware that’s already released. I have the President is citing as having a huge ‘digi- and LMDS. Which opens the door to far recently been briefed by them. They have tal divide’ - affordable rural connectivity to cheaper ‘backbone’ IP links. some very interesting things up their sleeve. the Internet. And they are not a communications service COOK Report: Craig McCaw has huge company, they are a company which makes COOK Report: Clarify for me what you slices of that stuff. devices - that communicate. If Cisco does meant when you said $500 to $750 on the things right it could represent a big paradigm client end. In other words, a base station is, Hughes: Yes, because you can make radios shift from the Telco Model of business. what, point to multi-point, which is more — again, with very fast signal processors expensive and more costly than the end user and so on — that operate in licensed spec- Now, remember, there are the no-licensed device? trum, but get high rates of reliable, error cor- spread spectrum bands around 915 mega- rected, reasonably secure, data communica- hertz, and 2.4 and 5.8 gigahertz. But the FCC Hughes: Yes the base station is much more tions. Up to 100Mbps. also came out with the UNII band. sophisticated, of course. You could even take a PCMIA card and have it talk to another COOK Report: And they’re up into the high COOK Report: That was about two years PCMIA card. Period. But the minute you put number of gigahertz frequency, right? ago? a second card, two cards talking to one, then you have to have what’s called a base radio, Hughes: It depends. MCI Worldcom bought Hughes: Closer to 3 years. Now there are or an access point. That’s essentially the ge- up a whole lot of MMDS licenses. And radios being made also in the 5.8 gigahertz neric term for it. An access point is the point they’ve come out of the 2.5 gigahertz to 2.7 UNII no-license bands that do not require at which multiple radios talk to one radio range. That’s not way up high. That’s just spread spectrum. and then presumably out the back of that above 2.4, which is unlicensed. And they’re access radio, your traffic goes into some heading towards services that are still aimed COOK Report: At a 5.8 gig? network by either 10BaseT or 100Mbps at the corporate or business level and that Ethernet. Or, as the way LANs work, by get up into quite high speeds. Fixed, wire- Hughes: It’s the same thing. They overlap, moving traffic back out via radio to another less networks. as a matter of fact. In other words, the two computer on the LAN, through standard band’s services overlap, but that’s normal in hubs. Cisco Integrating the FCC Part 15 frequency bands. In the Aironet line, for example, is the Wireless and Wireline COOK Report: Aren’t they severely artifi- BR500, which 11 megabits-per-second ra- cially limited in their range? dio and operates in the 2.4-2.483 gigahertz Now here comes another recent develop- band. It can theoretically have over a thou- 234 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 sand connections to it. Of course you are ing wrong on my end, caused by a wireless signal then they’re getting into the wireless sharing its bandwidth. But that is no differ- outage. So when I called Qwest’s network game. Whether it’s licensed services on a ent from a hundred workstations on a wired operation center, I knew the problem was monthly basis or whether it’s unlicensed. LAN sharing a T-1 pipe to the Internet. Ex- theirs, not mine. Radically different from Telephone compa- cept this radio operates much faster, at least nies buying them up, to just put them into 3-5 times the throughput of a T-1. The Then, inside my ISP offices, we have the the tired old central office, per minute cost, BR500 radio itself lists at $2,400. But the usual wired LAN network between our serv- circuit switched telephone business model. end user radios, which can be a PCMIA card, ers and router. And we have a number of can be as low as $165. And with a ‘pigtail’ business customers in the same building This is all, of course, a relatively recent phe- that permits an outside antenna. One client where we are. These customers wanted nomenon. And while there’s something in radio talking to the point-to-multi-point ra- higher speed connections to the net than dial the neighborhood of 7,000 ISP’s in the U.S., dio. So there is usually a base radio - an ac- up. They can’t get DSL, don’t like ISDN, the fact is that hundreds of them now are cess point - and a number of client radios, and would have to pay, each of them, over delivering wireless services. usually called bridges. They differ in price. $1,500 a month for a US West-MCI/Sprint/ Quest network connections. We merely ran Now, another one of the advances that have 10BaseT connections to them through ceil- Wireless ISPs been made is that that BR500 not only can ing tiles, and sell them a fast connection from be an access point radio, it can be config- $35 a month for just the link to the outside, COOK Report: Well, I heard you estimate ured as a relay radio. You don’t have to have to $55 a month for that plus full ISP service about 300? a different radio, as you did with the early - email, web space, shell or net accounts on BreezeComs. Meaning if you can’t reach our server. Hughes: That’s just an estimate. There was your destination because of non-line of sight a hard number of 180 months and months problems or distance, you can put one Now, since I want to be connected from my ago, but the increase is evident. It may be a BR500 at the base, one BR500 out ten miles home-office, we have another set of radios, thousand by now. Nobody’s counting. I am and another one another ten miles or over from Wi-Lan of Canada, 915Mhz frequency watching it on a daily basis on the wireless the mountain. You can have 20, 30, 40 miles hoppers that deliver T-1 speed to me in my ISP mail list. [Editor’s Note: the list address with one or two ‘hops’ using that same ra- house. Free. And to the History Center, and is [email protected] and as we dio at every point. Moreover, that same ra- its web site. And to another home-office. went to press with this article we were told dio can be logged into by password protected Then inside my house I use an older genera- that Breezecom, alone, now claims to be telnet or a web browser. They can have IP tion ‘only’ one mbps wireless LAN to my selling to 500 ISPs in North America]. addresses in them. Even a crude router. You laptops. For use anywhere in or around my can use a web tool not to just configure, but house, like out on my porch, smelling the I have been reading the wireless list for a also to monitor the wireless network, re- flowers. While running my business. And long time, I’m seeing, on an almost daily motely, even if the radios are in a box high connecting at the lowest speed of one mbps. basis, somebody new to the list saying, well, on an outside tower. I’m an ISP and I want to offer wireless ser- But here is another point. The Breezecoms vice. Or I want to start offering next month COOK Report: In other words, the newer are still in use! For a business with several wireless ISP service from scratch. What do radios come with a user-friendly GUI inter- workstations, in another building close by, I need to know? face that will allow you to set it up in your wanted a minimum one Mbps connection. I own network of multiple radios? installed the Breezecoms to link the two COOK Report: And they’re talking a wire- buildings to my net. So now I have four dif- less service meaning connecting to an up- Hughes: That’s correct. I use these myself, ferent radio brands connected by hubs and stream wireless or allowing users to connect in my own ISP operation. I originally re- 10BaseT cabling to the same Wide Area to them via wireless? placed my T-1 connection to my upstream Network in Old Colorado City. The moral provider, 3 miles away in downtown Colo- of the story is that radios can be reused eas- Hughes: No, both. Starting with users. And rado Springs, with three Breezecom 3mbps ily in different places. Lots different from some of those have started out, of course, half duplex (making them effectively the yanking out wires or fiber. by aiming at business. And government and same as T-1) radios. Three radios because there is a large office building blocking a And I am able, sitting at home, on a wire- good line of sight between our building in less LAN, to log into my Aironet radios, Old Colorado City and a 14 story office check the status, see how many packets it’s building downtown Colorado Springs, sending, what the error rates are, or change where a number of ISP backbone providers the radio rates, set up separate wireless chan- are. So I set up a relay point, which, because nels for groups of radios to operate in, within Breezecom’s Access Point/Bridge radio de- the total allocated spectrum, permitting sub signs, I had to use the AP radio at the relay or parallel nets. Check for retries, error cor- point. That was fine for 2 years, rain or shine. recting, messaging, and many other configu- But then, as things grew and newer radios rations. In short, all but the very lowest cost, came out, I replaced the Breezecoms with and earlier - 3 years ago - spread spectrum 11 mbps Aironets, and simply ‘configured’ radios have gotten very ‘smart.’ The era of one of them as a relay radio. the smart, self configuring radio, has arrived.

Now, I can log into that radio that’s up the So the large companies are buying up street or up a tower. I don’t have to climb smaller, successful wireless companies. And the tower. I can log into it, I can monitor it. that’s giving the whole industry credibility. And when Qwest had an outage yesterday And that’s also what’s getting the interest of for four hours, I was able to ping all three of Wall Street. Because when a Cisco or a Lu- my radios and then finally the Cisco router, cent and so on starts to buy up smaller com- Aironet BR500 11mbps Bridge, and PC C all of which responded that there was noth- panies that are successful, it’s a very clear ard Direct Sequence Spread Spectrum 235 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA schools and so on. band cut across all bands. And cut across toward Edge City, Suburbia, the size of the television and FAA and everything else. market starts dropping. And then you get into COOK Report: It becomes another way to [Editor’s note: on April 21, 2000 Paul Allen rural and small towns. Well, when it really crack the local loop. announced through his Vulcan Ventures starts dropping, then there’s a crossover point holding company that he has closed Inter- where DSL is just not economic. Most of Hughes: Oh, definitely. It is absolutely a val Research Corp after eight years of pur- rural America will just never see it. local loop issue. A large number of them are suing advanced research. Approximately 30 in pretty awkward locations. They’re in ru- of the staff will be offered an opportunity to COOK Report: If you’re looking at wire- ral areas where we’re talking about towers join a newly formed Allen venture, which less for the lower cost issue or the issue of for the radios. will focus purely on advanced development more or less immediate competition to cable for Vulcan’s broadband-oriented portfolio and DSL for broadband into local loop, how COOK Report: And right now, we are talk- companies. ] important are line-of-sight issues with some ing local loop broadband, which as of two of those radios? years ago, we weren’t COOK Report: Because spread spectrum is so good that it can just, it can do its thing Hughes: It’s very important. However, it’s Hughes: That is exactly right. Right now and not interfere with others? interesting that Cisco, as part of their mar- you have a lot of people looking at keting, even on the frequency they’re using WaveSpan. UNII band. You can buy their Hughes: They used Paul Shepherd’s MIT for LMDS, maintains that they have devel- Stratum 20 radio that goes 20 megabits per thesis in which he mathematically demon- oped technologies that limit severely the line second UNII for about five miles and they strated millions of radios in Manhattan, not of sight problem. In other words, diminish maintain it can go more than that. [Editor’s interfering with each other, and passing the problem technically. Note: Wave Span was acquired by Proxim hundred’s of megabits per second, with ra- in December 1999.] But, you can upgrade dios, architecture, and of course FCC rules, Line of Sight and the that radio to a Stratum 100 at 100 megabits to permit it. Signal processing, it isn’t just per second. There are a couple of other com- spread spectrum, spread spectrum’s almost Fresnel Zone panies which claim products in the area as a passe name now. But the idea is still, across well. many frequencies, sharing with other emit- And one of them is called the Fresnel Zone. ters and receivers, very low power - some- The Fresnel Zone is the fact that Radio Well, that’s significant enough that I imme- times below the ‘background noise’ level in waves when they travel from radio A to ra- diately referred the San Diego the area, and digitally processed. dio B, travel in kind of an elliptical enve- Supercomputer center folks to that. Because lope. So depending on the frequency, de- they had an immediate, obvious need for it. So there are a whole series of proposals at pending on the range, you have to have so The Cooperative Association for Internet the FCC taking place and some are being much clearance above intervening obstacles, Data Analysis (CAIDA) has to move its of- brought in by some pretty substantial com- or from the ground at where your radio an- fices a mile away from the high speed net- panies. For example, the MMDF by MCI tenna is located. work links at the Center. CAIDA needs high Worldcom, who spent $400 million getting bandwidth for its network research. PacBell, frequencies in the 2.5 to 2.7 giga hertz range. I’ll give a very, very specific example that I could only talk to them maybe about a DS3, Their Warped One would be a 1.5 megabit, was involved with, down in the San Luis but you damn well know what telco DS3’s a T-1, for $300 to $600 a month. But the Valley. There was a tower that was down cost. And two would be horrendous for small 310 would be, called Warp 310, $40 a month close to San Luis, which was down in a de- operation needs really fast bandwidth. for 300 KBS. MCI Worldcom, using li- pression, with a ridge up above it. From the censed MMDS is talking about consumer top of that ridge — and from San Luis to the So the 100 meg radios are here. Most of them level now and about direct competition with top of the ridge is only a half a mile, maxi- in the UNII band. Thus limited. But the FCC DSL and cable. mum. But from the ridge top it’s 30 miles is also opening its mind, because there’s line-of-sight to downtown Alamosa. It’s a pressure now being put on from many, many COOK Report: You have the continual slow clean laser-light shot there. directions. In fact, there’s proceedings tak- movement of the RBOC’s on DSL and, I ing place right now in which the widening think, the growing perception that DSL ser- The tower that we wanted to use was down of more bandwidth even at the 2.4 gigahertz, vice is just going to degrade, the more DSL’s on the shoulder of the ridge just above San is a possibility. And there are big companies you have on your copper loop from the cen- Luis but only peeping over the top of the and it’s controversial. Because a lot of people tral office. The Bell-headed telcos not do- ridge to Alamosa, 30 miles away. By hav- think the little guy’s going to get squashed. ing a terrific job of rolling DSL out. The ing a surveyor go up on the ridge and check- But with Cisco in the game we are talking current AT&T/TCI strategy and now the ing it, we found out that there was only ten now about even bigger companies. And there AOL-Time Warner strategy for broadband feet of clearance from the top of the tower are now proposals at the FCC for ultra-wide access via cable TV is bogged down in con- looking over the ridge line-of-sight to bands. troversy. Consequently, it begins to look like Alamosa. Well, it was line-of-sight from the the shine on both DSL and cable TV as a top of the tower and it was line-of-sight down COOK Report: Ultra-wide band meaning? broadband mechanism for TCP/IP is look- ten feet, but no further. ing rather tarnished. Hughes: Ultra-wide band means wider than Fresnel Zone calculations for that radio at the current no-license bands that are permit- Hughes: You’re absolutely right. Remem- that range and at that frequency say you want ted for various no-license radios. In fact, ber that DSL, is based upon the central of- 50 feet of clearance. And as a consequence, there is an ultra-wide band — you got to be fice locations and an investment of about when, getting up on the tower, we put up a real careful of the terms here — that means $150,000 to get a DSLAM into each central standard radio there, we found that it would low power and ultra-wide to some. And no office. This is according to figures that I have not connect, because a big chunk of its power less than the engineering staff of Paul Allen’s heard directly from COVAD. And then, re- was diffused by hitting the ground before it Interval Corporation, filed with the FCC. gardless of the overload, you start out run- went all the way. And yet, standing on the Their filing basically recommended that the ning into another problem. As you get out ridge at ground level with the same radio, with a handheld yagi antenna, with the same 236 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 power, where the ground dropped away in radios, you can do lots of rule of thumb work. While the U.S. rule is a maximum of one front of you - obviously down about 50 feet, The Aironet radio has software that permits watt of power at the radio (much of Europe we got a good, 30 mile connection. Conse- you to walk around with a laptop and see, limits it to 100 milli-watts) and then there quently the only way to get around that was visually, the margin of connectivity power are rules for maximum permitted antenna to go to higher power. Because we were an you have between points, with different an- gain, what’s called the EIRP, the effected NSF funded experiment, we were able to tennas. Its the long reaches, when people try radiated power. And then there’s a whole get a waiver to do higher power. According to get that last mile, out of 25, that takes skill. science in antennas. And there are rules about to Cisco, they are now able to handle up to how much total effective radiation you can 49% blockage by the Fresnel Zone and still Special Skills Needed by have, radio power plus antenna gain. One get through. So, technically, they say they watt at 902megahertz is going to go a lot have basically overcome some of the line- the Wireless ISPs further and through a lot more interference of-sight problems. than at 2.4 gigahertz with the same power. Hughes: Exactly right. And so you have that. A good example was the Mongolian instal- COOK Report: But with some of these ra- So there are companies... in fact, a great deal lation that my CO-PI Dewayne Hendricks dios, if you’re talking about using them to of the discussion on the ISP list is about what did. Because the Mongolian Engineers get a broadband connection from residen- does it take in distance and so on with given hadn’t answered our questions about build- tial homes to an ISP, you presumably would radios and how do you get around it? There’s ings in Ulaanbaatar, and what you could see have to have that ISP radio attached to an a guy in Texas who is superb on the subject from their downtown building roof - we antenna on the roof of its building. You of installations. His name is Jaime Solorza. asked for a video tape - before Dwayne ar- would also quite possibly have to have an 915-778-5966. And ask for Jaime. rived in Mongolia, we weren’t sure whether antenna on the roof of your house? In other we were going to have outside antennas on words, if there’s trees in the way, that’s go- The point is, they are installers. They are every one of those seven sites ing to hurt also? resellers. They are site surveyors. They do an enormous amount of business and they Well, it turns out the Russians didn’t put steel Hughes: You cannot generalize about things really know this stuff from top to bottom. bars in a damn lot of those concrete build- like trees. Because it all is a function of fre- And you can ask him any of these questions, ings. And so up to about 3 kilometers, there quency, effective power and range and the but also you can even ask him for some good was no requirement for an external antenna, nature of the obstacles. And that cannot be examples that he would know of there. because the 902mhz signal went through the generalized about. So one of the fundamen- walls to the little rubber duck antennas on tal realities of wireless, no matter what it is COOK Report: For example, I’m getting the the 1 watt. FreeWave serial port radios. Had and where it is, is you must have a profes- impression that if you’ve got an ISP in a city there been metal in those walls, that wouldn’t sional site survey before you buy and install of a couple of hundred thousand population have been the case. And we had to guess the radios. That is unavoidable. and it’s sort of semi-rural you have to have when we shipped thousands of dollars worth specialists. Or even if your ISP is in a city of of associated gear and antennas besides the COOK Report: That’s still the case, even 500 or a million population, that ISP either radios. We would be there for just 10 days - with the better interfaces, and so on? has to have, among its own employees or no time for later shipment. Because we were with a partnership company, someone who experienced and had a little luck, we guessed Hughes: Yes, because you’re basically mea- can do this kind of survey if it wants to ad- right. suring RF signal strength Fresnel Zone ob- vertise for wireless customers. stacles. The trees, deciduous trees are not But this doesn’t always mean that you’ve the same thing as pine trees. Wet trees are Hughes: Yes, on the initial set up. But it got to go up to the roof to get more range not the same thing as dry trees. Dense trees depends upon the skills of the ISP. than a rubber duck antenna can give you. It are not the same thing as sparse trees. Trees can also mean that you have a little flat an- with snow hanging on the branches are not COOK Report: In what sense? tenna just outside the window. Or a direc- the same thing as branches in a snowstorm - tional antenna, even inside the building, that when a properly sited radio will work just Hughes: Now, who are ISP’s? Well, these concentrates the power and so may make fine. Both through snow and rain. are people who can handle Linux or Sun the difference between success and failure. machines and IP and routers and so on. One of my NSF projects was ‘Local His- COOK Report: That web site picture with You’ve got to have that in your organiza- tory by Wireless’ in which I put an NT web the great gobs of snow on your trees, by the tion. But the ISP technical people must also server in the computer room of an old church way, was a good visual. That picture was learn the radio work. Siting and installation building, now a museum for an historical worth 10,000 words. doesn’t take an RF Engineering degree, but society, and connected it up 3/4 of a mile - it does take some rigorous stuff, so there’s through trees and even a big brick building Hughes: That, of course, is it. It even lots of talk about spectrum analyzers and so - wirelessly . blocked my little half a mile signal that’s on and rules of the thumb. I’m experienced six-tenths of a watt from a Canadian Wi-Lan enough so that I can take a look at your set- An inside ground floor antenna would not Radio. A good radio that is up 99.9% of the up and I can usually tell you whether it’ll connect. An outside yagi antenna on the roof time, rain or shine over the past year. work or not. And if not what it would take of an historically restored church would look to make it work. Know who the best friends incongruous. So I put in the attic, above the COOK Report: That snow on the trees was of local ISPs can be? Ham radio operators. insulation blankets, but directional. An 18dbi like pulling down a window shade between They may know little spread spectrum well gain yagi. It worked, and is still working 2 you and the ISP. - even though there is an entire branch of years later. Radios are as much an art as a Hams, the Tucson Amateur Packet Radio science. Hughes: Yes, that’s why unless you use a group who special- professional installer, you better learn a lot ize in digital radio - but they sure know an- So there’s lots of ways to adjust things, but about how radio waves work. It’s not rocket tennas, and wave propagation and reception. that’s part of the site survey. It’s experimen- science. Certainly no harder than configur- And even local laws and ordinances about tation, or it is on a big network, it’s really a ing Routers and Servers. Just different. And placing antennas and towers or masts. professional thing. And the larger compa- if distances are short, and you have good nies, like Solectek if you’re going to buy a

237 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA whole network for a company in a town that towns, or suburbs. $2,000 a month to the telco PLUS $1,200 to may have six branch offices around town the upstream ISP. Or $3,200 a month to the will send out an RF engineer, who first of So you can’t really generalize on it. But for school district that is 40 miles away from all does a path analysis with software. I have small towns, it’s a killer, because your cost the big city. Buy a pair, or even three, $500 a piece of software that costs $1,100. It ba- of a small town ISP is not simply getting 2mbps radios, which incur a one time cost sically takes into account the terrain, from down to your customers, your cost is also of less than one month of telco connectivity U.S.G.S map sheets, range and then applies getting up to the larger city and wireless be- (which still requires that you buy a DSU to frequency calculations. It will give you the comes very significant there — it’s called connect to them), you suddenly are down to calculations that get you really close. From microwave. And microwave is up to 100 $1,200 a month. That’s the comparative eco- that point on, it’s Reality Time, and you do megabits per second now. And microwave nomics of wireless. what needs to be done on site. costs have come down. And so licensed mi- crowave, which work pretty damn well when And remember also that many ISP’s have COOK Report: So of the 300 to 500 wire- you’re pushing this 50 mile range, is some- awakened to this, partly as a result of being less ISP’s, are most of them connecting times the method of choice to get from your approached by their customer, where the mainly a few small businesses? town to a larger city. customer owns a pair of radios. The cus- tomer provides the extension from the busi- Hughes: Yes, most ISPs offering wireless, COOK Report: But if you’re 20 or 10 miles ness to the premises of the ISP, not the other offer it to businesses first. So they can learn or something like that and you can go line way around. It’s a very smart thing to do, from it, among other things. And expand of sight, then there’s some other high speed because then you own a pair, you could take from there. Until Teletronics came out with radios that are pretty good. them wherever you want. And all you’re their WLAN product line, with end user ra- doing is getting permission from the ISP or dios as low as $100, the radio cost was too Hughes: Right. Cisco has an LMDS radio the building owner that they’re in. That, of stiff for residential connectivity. And as these that can do up to 30 miles, line of sight at 45 course, is what I did with Colorado Supernet companies learned, by putting little connec- megabits. Also Jaime Solorza would be a 3 years ago — permission to put the antenna tors on even the PC Card radios, so external good one to ask this question, because re- in there and the radio in there. Because of antennas could be connected, it becomes member the thing I got into with Texas ver- this 10 Base T general method, you’re hand- more and more possible to connect economi- sus the FCC. That the FCC, as you know, ing the ISP an RJ45 to connect directly into cally to home owners, and profitable for the has this god awful rule, involving the e-rate. his router. He’s not paying the phone com- ISP. At rates equal to or above dedicated telco Because the rule in e-rate is that the school pany to come back to you! So the upstream services, or DSL, or cable. Bypassing them cannot, or the library, cannot own the equip- Internet carrier is paying less too! Conse- all. ment. That is they cannot buy either the mi- quently, they charged me less. crowave equipment or even a satellite There’s a whole range of companies includ- ground station (they’re never cheap) or a pair So there is that absurd FCC level decision ing a large one in Utah that specializes in of radios using e-rate funds. And provide on the e-rate. You better believe I had that providing high speed connections to large their own connection between their build- on my mind when I was invited to speak businesses, in direct competition with U.S. ing, or to the upstream ISP. Dumbest damn before the Texas Infrastructure Fund which West. In many places wireless is the only decision the FCC ever made. is a Texas version of the national E-rate. And direct competition with the telcos. I wish it was set up on the same principle. It comes Congress and the FCC understood that. They COOK Report: That’s just absurd. out of rate-payers pockets and goes into a flap their lips about ‘competition’ and about $1 billion, ten-year fund. Managed at the ‘the digital divide’ - then virtually ignore a Hughes: Well, it’s absurd because it’s ex- state level. And it was for subsidy of schools, whole emerging industry under their noses, pensive. And it’s absurd because it’s forced libraries and, in the Texas case particularly, while trying to regulate older technologies. the schools into an annual recurring cost health centers. contractual arrangement with telcos, even Wireless Business though it’s subsidized cost. If and when the All right. The rule was, before I made my Congress decides to kill that program, speeches to them, that you had to have a ser- Models they’re all going to be standing there hold- vice. If you were in Cut and Shoot, Texas, ing the bag with their infrastructure built 40 miles outside of Houston, you had to use COOK Report: What are the wireless ISP around that annual cost set up. The telephone the phone company. And if that 40 miles cost business models? Three flavors perhaps? companies are laughing all the way to the $2,000 a month, that’s it. You’d get the sub- ISP’s that are using wireless to get to their bank. sidy out of that fund of $2,000 a month until upstream, might be one; ISP’s that are using the end of time. And then once you’re in- wireless to connect businesses and business Now, today, for example, in the San Luis side Cut and Shoot, there’s the separate is- offices to each other and to the ISP in place Valley is a good case, the 30-40 or more sue of how you distribute the T-1 signal, even of leased lines would be another. And then miles in the rural areas still have a $2,000 a between buildings of a company or build- is there a third where ISP’s, if you want to month local loop charge for even a T-1. And ings of a health center, like clinics, or the have a radio in your home and you’re just with yet the radios now exist that down in library or the school or all of the above. More an individual user, who are beginning to do the San Luis Valley, we could go on top of monthly telephone line costs. that, that’s probably the most recent and the that ridge and we could easily be going five fewest? megabits per second true throughput for that So I went down there to Austin, and showed 30 mile distance and down to that school. the Infrastructure Fund what it could do with Hughes: Yes, but that’s not a very good char- Doing this would cut out, totally, the $2,000 wireless. I said, for god’s sakes, if you Tex- acterization. Because, there’s a totally dif- a month local loop bill for that school dis- ans have any brains, you’ll change your rules ferent problem going upstream than going trict. And the district would then pay only from the way Washington and the FCC does downstream. If you’re in a big city, there’s for the five megabit per second Internet it. They changed the rule. They may be Tex- very little advantage, if you’re doing really bandwidth cost from the ISP, or the ISP and ans, but they aren’t rubes when it comes to high bandwidth to be going wireless up to the school district could agree to ‘choke dollars and cents. And it’s a very nice for- that upstream ISP. The real opportunity is to down’ their bandwidth to say, T-1, and pay mula. The formula is, since it’s based upon be found wireless in delivery that last mile less. Like maybe $1,200 a month. Now, its the phone company subsidy, essentially, if a or that last five miles. Or between two small T-1 from the ILEC or CLEC, is going to cost 238 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 $2,000 a month, they normalize it to T-1, to tems. I don’t need them. I get perfect con- rules. The radios now can be smart, intelli- Cut and Shoot, or from wherever. You mul- nection, because the distance is not that great. gent and self-regulating, like the Internet. But tiply the monthly figure by 12 and you get I’m not fighting anything. But if I were fight- that’s another way to get not only more bang $24,000. And you add to it any cost of equip- ing something, I would take the $750 Young for the buck, but also to minimize interfer- ment that you’d have to have under the T-1. Design’s 2.4 gig one watt amplifier. You can ence in congested areas. For example a DSU, CSU, or whatever. buy up to a one watt amplifier on a 2.4 gig radio. And you’re still inside of the FCC If you have smart radios, built to FCC speci- You cowboys in Cut and Shoot may now rules. So amplification is becoming a very fications so the ‘self-regulation’ really works, apply all of that to an alternate means of popular solution to the difficult site, the long then the FCC could raise the power rules! connectivity. And it can be no license wire- site, the one in which the radios, even with To 10, 20 watts! Then in the really rural ar- less, it can be licensed MSDS wireless, it good antennas, don’t do the best job. eas, where distance is the problem, but where could be microwave. And $24,000 will buy interference in those bands is minimal or one hell of a lot of radio delivered bandwidth, COOK Report: But you still can’t use an non-existent, they could run full power - 20 both to the town and within it. Even relay amplifier to exceed the FCC limits. watts, with higher gain antennas. 50, 100, points and everything else. And then you’re 250 miles. But at shorter distances and in only left paying for the upstream ISP. But as Hughes: That’s right. But on the other hand, urban areas where interference is, or can be, you know, an upstream ISP in many cases is these radios are so damn good that you’re a problem, the radios set themselves to, say, not necessarily a commercial ISP. It may be talking about 20 miles with one-tenth of one a quarter watt. Cause that’s all they need! a government. It may be a university. That’s watt. And a pair of the lowest cost radios But it has to be approved by the regulators, a very common thing. have been measured at almost 70 miles with the FCC, which is way behind the power As a result in Texas, any school, library, or line amplifiers. All within FCC rule. It curve on approving these new possibilities. health center, now has an alternative to con- works. Its legal, It’s reliable. And it’s secure. Maybe the recent creation of the Telecom- tinue paying monthly-telco bills with the sole And it’s free, free, free. Who needs Ma Bell munications Advisory Council to the FCC future prospect of rate hikes and unending for bandwidth? will help speed up change. My colleague dependence on the telcos.. Would that Wash- Dewayne Hendricks is on it. And he is do- ington would get that smart. But then one COOK Report: I hear you. ing through his Dandian company on the has the feeling that the politicians are so cozy island of Tonga, in the South Pacific. There, with the Telcos, they can’t see over their Hughes: Well, do you know how far some as they strive to link hundreds of islands, shoulder to the Wireless Future, which is have gone? When I was in San Diego, I the Crown Prince sets the spectrum rules, gaining on them fast. talked to Frank Vernon, a geophysicist who not the FCC. works with Scrips Oceanographic Institute. Vernon is a seismologist. He monitors earth- I submit the principle of ‘smart radios’ (and Flexibility from Extreme quake data. He’s got a huge bunch of three- smart antennas) is a very fundamental an- Low Power and way radios that are coming back up to tow- swer to lots of ‘scarce spectrum’ issues na- ers and so on. But he flat said, out loud, in tionally, and internationally, when coupled Antennas front of an audience of high end scientists, with digitally massaged data across wide without amplification, he’s got one watt bands of spectrum. George Glider talks about There’s one other thing I’d better say in be- FreeWave radios going 100 kilometers. I these things theoretically. We are doing them tween this. In the 2.4 gigahertz area almost keep running across some pretty long in the field, practically. everybody makes radios that only operate stretches. 70 miles. 50 miles. Their perfor- with 100 milli-watts of power. One-tenth of mance is a function, within the rules, of the And remember that most of these radios also one watt, or one-tenth the authorized power height, the clear air and, if necessary, and an have sub channels that you can jump to. by the FCC. amplifier in there. That’s one way that they can it make so that everybody doesn’t have to be in the same COOK Report: And why do they make at Software Defined Smart sub set. For example, in the Freewave ra- only a tenth of a watt? dio, you can have 15 different settings within Radios 902 to 928Mhz. And what does that mean? Hughes: Because it’s cheaper. It’s much That means you can have this radio sitting costlier to make a one watt radio. And they COOK Report: So what are they doing at here and communicating with a distant ra- can sell the same radio in Europe, where the the FCC? dio while you can place a radio right next to rule is 100 milli-watts everywhere. So they the first, operate it on the same general fre- make their base radio that way because there Hughes: There’s a Notice of Inquiry out and quencies, and not have it interfere with the are now many companies making amplifi- it will be discussed next week at the recently first radio. ers to put on line between the back of the formed FCC Telecommunciations Advisory radio and the antenna. And YDI, Young Council - TAC. - The NOI is brand new and Now, that can be set manually, of course, or Designs, in the D.C. area, is one of the best that is on the subject of a Software Defined they can even be set by being logged into. of them. And almost every company now Radio (SDR). One where smart software Now you’re starting to talk about having makes amplifiers. You put the amplifier be- controls the radio - its power, its frequency about the little buggers scan their operating tween the radio and the antenna. If a radio spread, and other technical characteristics. environment where they might find other puts out 100 milli-watts, you add a 1/2 watt Breezecoms in the area with some potential amplifier, you are still inside FCC rules, and That’s what Dewayne and I recommended interference. Having done this, they make you can get longer range. So, again, one way back in April of ’98 in our Scientific Ameri- sure they do not interfere by setting them- to solve the problem of connectivity range can article. We must permit the manufac- selves to operate in a different part of the or interference by trees and so on, is if you ture of smart radios which set their frequen- authorized spectrum. And the FCC with the can’t get through at one-tenth of one watt, cies. And set their own power levels. Keep- NOI (Notice of Inquiry, where it is asking you then buy a plug-in amplifier to bring ing the power to the minimum. It’s a very, ‘the industry’ to comment) has thrown the you up to a full watt. very important idea. We are moving away possibility of a world with such capabilities from the idea that radios have to be dumb out there. There’s going to be a debate, both Now, I have no amplifiers on my three sys- and fixed and made for one set of emission technical and regulatory, because technol- 239 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA ogy that operates under these premises Hughes: You get what you pay for in the ers. And learn what it does. It’s a cheap way makes it possible change the very way that company and the support. And the total cor- for an upstream ISP to get some experience the FCC regulates spectrum. porate follow through, ease of configuration, and exposure. good documentation, best possible perfor- It’s not just the dumb hardware of the past, mance. And all those little diagnostic fea- COOK Report: But you said there’s a physi- grand fathered in forever, and it’s not just tures. cal device that you can bring to him that is the fact that it’s no license and it’s spread the receiving radio that he plugs in where? spectrum. But now we’re getting into the COOK Report: So when you get the cheaper area with the software defined radios, where, thing, you may be a little bit more on your Hughes: Into a garden variety Ethernet hub! if the FCC is smart, they will also shorten own. The back side of the radio has an Ethernet the life of licenses. Manufacturers must up- port. Let me talk you through this. In my grade their capabilities or lose their certifi- Hughes: A little bit more on your own, a house, I have this laptop. And it’s got a PC cation for their unsold radios. For we know little bit fewer return phone calls. But a card in it that’s wireless. One megabit per greater capabilities are coming along in soft- whole mail list to ask questions on. second. It’s older. It cost $650 four years ago. ware, radios, modulation, and antenna de- I can do it now at 2mbps for $100 today. sign. We are in an era of accelerating Customer Driven The PC card radio talks to an access point. progress of digital radio design and opera- Well, what the hell is the access point? It’s tion. Advancement nothing but a little white box into which an COOK Report: Well, who are doing some identical radio is plugged, like the one that of the offerings of the smart radios? Hughes: Yes and this leads to the concept goes to the PC cards. (Did you know that that the end users can connect among them- the much touted Apple Airport wireless is Hughes: Ask Jaime. I just don’t memorize selves and then one of a connected group nothing more than Lucent wireless LAN all the makes and models. There are at least can link to an ISP. It’s not all downstream. cards in Apple’s box?) But the only thing 80 companies now, of radio manufacturers. the box does, it turns the radio signal into an He’s in touch with damn near every one of COOK Report: Okay, because what evi- Ethernet signal. And it has a 10 Base T fe- them and he would be able to answer that dence is there that, if I know the capabilities male connector there. That’s plugged down real quick. Proxim just bought up one of of doing these various and sundry things, to this little $59, five port hub. Ethernet is these outfits —Wavespan but Proxim was and I know there is a Sprint Earthlink POP Ethernet. already in this game. Research is going both is in Trenton, New Jersey, near my house for example, I could knock on the door and So, between the two radios, it’s radio proto- ways, it’s going into more powerful radios, col. But down to that hub, it is Ethernet. Now, but it’s also going down to miniature radios. ask them to let me connect? With these big national systems, there’s no way in hell, with coming out of the hub beneath my desk is the commitment of any reasonable amount another Ethernet that plugs into the back of Now, I put out a question all over the place this Wi-lan radio, from Canada. Which goes — what’s the smallest radio in the world? of my time they would agree to connect my radio. But what you are saying is that if the up to the roof to a Yagi antenna. Which is By god, I got answers. I got a reference to a pointed towards my office. When it gets to Dan Withers up near Seattle and the organi- owner of a small ISP has a POP that you can reach on a reasonable basis and is aware of my office wirelessly, it comes down into zation is called www.worldwireless.com. I another radio made by the same company am now able to buy, a Freewave for $1,250. what can be done, even if he doesn’t have a radio program yet, you can call him up and and set to be point to multi-point. Meaning Oh, easy, up to 115 kilobits per second, se- it comes to me, but it also points down to rial. One watt. Frequency hopping. Really say, can I come in? You see the question I’m asking. my son David’s house, so he’s got a con- good radio. Very, very useful. But, whoa. I nection. And to the History Center’s radio. just ordered from old Dan Withers a kit, i.e., Three of us share a T-1 connection. Could two radios, which are 56 KB, one watt, al- Hughes: That’s exactly what I did with Colo- rado Supernet. Giant MCI would not let me be 15 of us, in the neighborhood. Heck, one most everything else the same characteris- early adopter could set up an omni antenna tics. Per radio the cost is $335. And the com- do it, even though they are in the same build- ing. They didn’t have, or understand digital on his house, serve 5, 10, 20 neighbors with bination is $700 for the kit, including all a 2mbps or faster connection, then turn kinds of stuff. And you might get up as much radios. I’m the one who went to them. They blew me off. So I went with Supernet. Now around and connect to the upstream ISP as $500, but the fact is the pair of radios now wirelessly, and split the cost 20 ways. It could can be bought, a serial, that’ll do 56 KB or MCI keeps calling with me, pleading with me to look at their upstream prices. I blow be cheaper than DSL or Cable, and go where 115. For lots of uses that is plenty fast - cer- they can’t or won’t. tainly for the environmental scientists I work them off now. with, whose $3,000 data loggers put out only 9,600 baud of data. COOK Report: But when you go to them, 802.11 Interoperability do you make the argument that you should COOK Report: At what bandwidth or what cooperate with me because even at some So I’ve got three different brands of radios range? retail price base hook-up, I am not occupy- and they’re all connected and they operate ing local loop infrastructure to get into and at different speeds — 1 meg, T-1 and 10 Hughes: Same range, it can go up to 30 miles out of your pop? megs per second. They’re all normalized to or 40 miles. And being 902-928 megahertz, an Ethernet. That’s why it’s not coinciden- punch through walls. Now we’re talking Hughes: Sure. That’s part of the argument. tal that the 10 meg is Ethernet speed. I could about an end user radio inside one’s house, You know what the other argument is? even go further. I could take one of these serial. At the 902 to 928 range, frequency serial radios now and buy a little $40 con- hopping stuff. But then there is Teletronics COOK Report: What? nector that goes serial to Ethernet. and their low cost 2mbps radios. Hughes: Consider the ISP as captive to the COOK Report: Go further? COOK Report: Well, a minute ago you said telephone company. If the upstream ISP co- operates with you, you’re essentially show- Hughes: Meaning that it is not going to go you get what you pay for. Have you tested it Ethernet speed but it’s going to go as fast as yet? ing him how he may go into the wireless business by using your equipment for start- the serial port will let it. Either 56 KB or 115. But there is a demand for lower speed 240 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 radios, especially for these scientists and a And the earliest computer bulletin boards. This allows the ISP to price to his custom- lot of things, there’s still a lot of serial stuff Before AOL. Remember them? There’s a ers’ needs. Everybody doesn’t need ten around. What I’m trying to get across here woman in the wireless ISP mail list who is megabits per second. They don’t want to pay is, that you have inter connectability. It’s all just so ingenious, she just drives me up the for it. It’s just like any ISP. You’re paying an extension of the LAN. And, of course, wall. But the fact is, I’ve been watching her for bandwidth, right? the 100 megabits is not accidental. That’s ask all these questions, she acts like she’s a 100 megabit LAN. So when you come in, dumb blond. But by god, she’s running the COOK Report: So are you saying if I’m a you come out the back of the radio into your thing and it’s working. And she’s not super distributor of radios that I can make some premises, you have 100 megabit LAN, you high tech, but once again, where is the ex- modifications to them? better have the 100 megabits, across that pertise coming from? room to your router and so on to go up- Hughes: Well, not modifications to the ra- stream. From the mail list. E-mail. Talking to them. dio. You can use software that runs in the And there’s expertise, obviously. You’ve got Linux system, for example. Or in the router. COOK Report: As long as we’re talking to do a lot of learning. Eight or nine years Add-ons that give you the capability to both about this topology, I had heard that it is the ago it was Ethernet. And routers. It was the track but also to monitor, but also to set a 802.11 standard that enables the radios to whole evolution of the Internet as it migrated maximum flow rate to any given customer. interoperate. I had heard that if I have a good down. 5 years ago it was the Web, and connection in my house, I could connect up HTML coding. Where the hell was the ex- COOK Report: Okay, in other words, if I’m my neighbors to my house and then to the pertise in the early 1990s? Well, it was paying for an upstream bandwidth connec- ISP? among the hackers at the bottom and they tion, if I have a radio that can come in and were on the ISP list. And they were talking go 10 megabits and I want to put that on the Hughes: Yes. You took the words right out routers. The point is, it’s still in this — while guy’s Ethernet, he doesn’t want to give me of my mouth, because I was about to say, it’s serious stuff for a lot of ISP’s and it’s the capability to suck up 10 megabits from and this little $150, two megabit per second real business. The fact is there’s a huge his system. Teletronics radio will talk to the $2,000 amount of innovation and entrepreneurship BR500 Aironet radio. The 802.11 standard that’s taking place in communications Hughes: That’s right. Because if the radio interconnects them! At 2mbps. among wannabe wireless ISP’s or ISP’s that is capable of delivering ten megs to you, and want to add wireless to their operations. And he doesn’t want to let you have the ten megs, COOK Report: So if I had a $2,000 radio in they are thumbing their noses at the telcos. because if he does, you will put a service on my house, I could spread out a couple of And setting up services where no telco dares it. You will resell your connection to your dozen 2 megabit $100 radios throughout my to go. Too unprofitable for such a behemoth. neighbors. I’m doing that in Old Colorado neighborhood. City Communications. I could, if I wanted, COOK Report: Well, it’s this same grass spread my wireless ISP business all over Hughes: You got exactly what the ISP’s are roots kind of stuff which served as the train- 500,000 population Colorado Springs. But doing. ing ground for all the network engineers for I have to spend half my time showing bio- the commercial services. logical and environmental scientists, from COOK Report: Well, which ISP’s? those around the San Diego Supercomputer Hughes: You’re exactly right. There is re- Center, to one Hispanic researcher studying Hughes: A whole bunch of them. For ex- ally two layers to this. Cisco and the rest of frogs on the top of Mount Toro in Puerto ample Jason Simonds, Midcoast Wireless. the corporate world is coming down into this. Rico. 207-563-8080. See for example: http:// For fixed wireless stuff. Either servers or like www.midcoast.net/wirelessfaq.html ISP for Cisco, to sell the thing and do it as a turnkey COOK Report: So on a small scale, you’ve Wireless ISP’s he calls himself. Now, he is kind of set up operation. And you’re having put in your own infrastructure. an ISP. And he is doing it. As I explained these grassroots ISP’s coming up from the much earlier in this interview, I am doing it. bottom. And they’re not very small. I mean, Hughes: Oh, absolutely. And have had it up you talk to Jaime and just ask him straight for 30 months. And part of it is true wireless An ISP in Nome, Alaska, (www.nook.net) ahead what’s his annual billings. I got a from me. I’m using the wireless. But things is doing it. He is operating a dial up ISP ser- hunch this guy’s got a hell of a growing com- like throttling down, the ability to do that in vice in Nome, connected to the net via sat- pany. software, there’s another thing. There is al- ellite. However, he took three FreeWave ra- ready, for Linux (there must be for bigger dios, attached one to his dial up server in Coming from the Bottom ones), it’s called EPPP. Ethernet PPP. Now Nome. He then placed a second radio with you know how PPP works? battery and solar power, as a relay way up Up on a high mountain ridge 45 miles northeast COOK Report: Yes. of Nome. Then 25 miles beyond the relay And these are in-between guys, these are not ridge lies the village of White Mountain. He Hughes: The ISP has a block from a Class took the third radio and attached it to a dial the ISP’s themselves. They are resellers. But they’re oh so much more than resellers. B, he’s got a block of numbers. And he’s got up serviver in the village. The relay radio X number of telephone lines, say he’s got on the ridge can see both Nome and They’re distributors and they’re resellers and they are themselves expert in this stuff. And 25 lines. So he has a block of maybe 30 IP Whitemountain. So he delivers a commer- addresses. But he has 8 clients or 8 custom- cial 56kbps connection in Whitemountain, they go out and do the site survey. And Jaime’s answering questions right and left ers for every one of his 25 lines. Well, why which gets to Nome for free, and goes from do you have DHCP and PPP? So that when there to the net via satellite. He uses the ra- at the same time he asks some, because this stuff is exploding in many directions. you dial in, it temporarily assigns you an IP dios to extend his connection at zero address. additionalcost to him and at a rate of 56 kbs For example, there’s the issue already of from Nome to White Mountain where he has But, now there’s EPPP which permits you paying customers. And makes a profit! throttling. This means that the ISP can ad- just your radio to give you only 256 KB to do that over the Ethernet. So I could have which you pay for. Even though your radio a wireless based DHCP, because right now, Now, a lot of this stuff is still done by hack- and I’ve learned about that on this list, be- ers. Like those who ran the early Internet. is capable of 10 megabits per second. 241 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA cause I basically for $5 a month, renting IP One that is very, very significant I haven’t out. See http://www.tachyon.net for more addresses from my fund of 256. And I’ve talked much about. That’s the satellite de- information. The Tachyon model of course got them to rent, but at some point, I will livery of IP. also fits the most difficult, remote, field re- run out. And so basically by having EPPP search. One ground station, on a hill, and 10 with the wireless, I can preserve my supply. COOK Report: That ties with Tachyon into to 100 data loggers out in every direction - your recent San Diego Supercomputer Cen- all linked to it, wirelessly. COOK Report: In other words you can take ter meeting, doesn’t it? a subset of them and you can multiplex them COOK Report: Is the business model emerg- amongst a larger group of customers. Hughes: Well, it does tie it in, but Tachyon ing that Concentric will offer a family of is just one of them. The generalization is that, services via Tachyon for small, remote com- Hughes: Yes. And with bandwidth throttling IP delivered right down to the individual by munities who can link into the Tachyon sys- of wireless, you basically can price and mea- satellite is coming on eventually, with lots tem and then from Tachyon to Concentric sure what you do all the way up and down of services. Well, that’s, okay. However, an to the rest of the Internet? the line. That accounts for a whole lot of the intermediate step is being able to come down innovation that’s going on. to the point in a metro area, and I don’t care Hughes: Yes, that’s what they are trying to if it’s a neighborhood center or a to business do. But it also fits field scientific research, COOK Report: So at the grassroots, every- or to a school system, at such a rate of band- which is why I am pursuing it. Globalstar is body, you can develop a whole mesh of width that it is practical to distribute the sig- also a good bet. Now it went down in stock interconnectedness of everybody connect- nal laterally by no license wireless. Now that price when Iridium collapsed. But what’s the ing to everybody else. is one hell of a model if you think about it. huge difference? Iridium was analog. Globalstar, uses Qualcomm CDMA radios. Hughes: You betcha. Now, here’s the tele- In other words, everybody thinks that the And Quaalcom is coming out with their 2.4 phone number and the guy you want to talk upstream ISP has got to be someplace down- mbs ‘HDR’ wireless technology. http:// to, Michael Young, YDI, Young Designs. town. But what happens when you are able www.qualcomm.com/cda/tech/hdr/ He’s in Falls Church, Virginia. Telephone to hook up at 2 meg up, at 2 meg down into 703-237-9108. And he sells radios. He’s your little ISP operation, from a satellite, or COOK Report: Well, McCaw took a look at unhappy that I bought Teletronics radios and your small business operation with four of- Iridium and passed on it, but McCaw I think not all from him. His radios are good, but fices. Or with your school system. Or with is investing in Globalstar, isn’t he? they’re a higher price. And I’ve been there your government office. And have your IP and done that. But I have bought his ampli- go straight to the net from a 1 meter dish Hughes: Don’t know. But Globalstar, has fiers. They are better than Teletronics. Now aimed at a satellite, delivering standard IP the Qualcomm CDMA spread spectrum ra- he’s measured some of these other things. packets. But then you reach your other of- dio. It is basically only able to deliver right fices or your clients laterally by wireless that now 9600 baud. But, when I made a recent But, for me what is important is the fact that also travels at a rate of at least 2 megabits cold call to Qualcomm, they were so solici- I was actually able to buy these things and per second. Out to 1, 5, 10, 20 miles. tous of me, that on the same day they deliv- get them up and get them going between two ered to me the cable I needed to both charge systems just lickety-split. It’s almost getting Tachyon so far is the only one doing this the damn thing and use the data at the same to be plug-and-play. And that’s from a little and Tachyon has its critics. But if they de- time. Consequently out in the sticks un- PC card that cost me $99 and I only paid liver what they promise who cares? They tended it could be getting power and trans- $400 for the access point. Which could talk are just beginning to attach customers. They mit the scientific data that we want to gather. to multiple radios, at 2 meg per second across state that the customer ground station that Before they had two separate cables. You the room. talks to the satellite is only $5,000 and you had to manually shift them to go between can do bi-directional, true TCP/IP, at 2 mega- data use and recharging. And then go into the Ethernet hub. You see, bits down and 256k up, for $2000 a month, that’s the key. The key is that by going into or 300kbps down and 64k up, for $795. This COOK Report: This happened at the San either a 10 Base T Ethernet series or going will include full IP services from any spot Diego Supercomputer Center Wireless meet- into the 100 megabit level, you’re plugged in Europe or the Western Hemisphere. They ing? into a purely normal networking environ- will plug your earth station into a terrestrial ment. There’s no magical interface. And the wireless ISP one of which is Concentric. Hughes: Yes. With the Qualcomm radio, as radios can be modulated within that frame- There is the Tachyon business model. they issue it right now, you get a plug, there’s work. So that’s really what’s been happen- a plug in the bottom of the radio and you go ing with wireless ISPs. But you have my business model, when you into the recharger. Charge the radio. You extend from that base station, out 20 miles unplug that thing and then you put another in every direction, wirelessly, and split the plug in to do a data cable, RS232 to a com- Part 2: cost of the monthly service between 20 cli- puter. Two different plugs. But not two dif- ents. Because then this investment is eco- ferent sockets. There’s only a single socket The NSF Field nomic in every small town in America. Sud- for the two plugs. denly you don’t have any phone company Science Research involved at all. And that model is really sig- COOK Report: Yeah, you have to do one or nificant, because that basically becomes a the other, but you wanted to do both. real solution for the most remote towns in Tachyon, Globalstar and the U.S. Hughes: Exactly. And for their techs, they Qualcomm were doing both. But for their business Tachyon is one of the first satellite provid- model, they didn’t think of that. So in their COOK Report: OK. Tell me how the NSF ers which does this inside a tolerable cost lab they had the cables. Field Science Project ties into all of this? envelope. It is using the SatMex5 satellite system, launched in July 1999. Therefore it I actually made a cold call in the morning Hughes: There are two studies underway. should be a while before the satellite wears and talked to the business section. Didn’t come on real strong, all I said is that I’m

242 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 doing research for the National Science Total throughput is measured. For example ence, said Larry Smarr. Meaning you can’t Foundation. I spent $2,600 on your stuff, the total through put for the lowest priced afford to have high paid university research- including the car kit and everything else. service is three gigabytes per month. If cus- ers going out and getting all the data. This is $1,500 phone. And I said, But what I need tomer exceeds this, he will pay 20 cents a a direct quote from him — you need to train is the cable that I understood before I bought megabyte for the extra data. The high end 9-year-olds to collect data. it exists, but back at Qualcomm, not at service allows ten gigabytes per month Globalstar. I need it to hook up biological COOK Report: Because they want so much scientist’s data loggers way out there where COOK Report: So that pays for both the of it, it’s so widespread? there is no cellular, no place close enough to Tachyon prices and the Concentric link to link up with 20 mile terrestrial wireless, and the Internet. Hughes: Because you have to. When you’re of course, no telco or cableco. talking environmental and ecological, you’re Hughes: Yes. But what is somewhat signifi- dealing with a huge number of data points And I got home at night at 9 o’clock and cant on that one, it’s like a telephone com- and all over and you’ve got a data collec- they had delivered to my hotel the cable that pany demarc the Tachyon rep says, (where tion problem that up till now has been a basically plugs in the bottom and has it half- the phone company terminates at your pre- manual operation. Or a problem with lim- way down the cable is a little plastic box mises). A demarc is where you plug into ited resources. For example the federal gov- that has an input to it. But much more sig- our ground station. What you do with it on ernment down in Puerto Rico, (the Forest nificantly, I had a call back request to call the other side, it doesn’t matter. The Tachyon Service) is out there with more expensive the guy at home, the international market- cost is not one of these things, where if you stuff than even the colleges use. They ing guy and when I did, he said, we’ll brief use five computers, it costs you one thing, if showed me the Sutron data collector on a you, we’ll show you the next generation. I’ll it’s ten, it’s another. You’re paying for band- stream. Sutron especially sells to govern- get that briefing in late July. width. ments. It’s not just better equipment, it’s more pricey. But it’s also designed to sit out Satellite to No License And that system — only because of the FCC there forever on water courses, it isn’t just — can go uplink and downlink at two mega- for science engineering. It’s also for moni- Wireless Distribution bits per second. The point is that Tachyon toring flow rates, Army Corps of Engineer can offer a service at two megs now. Not kinds of things. But then, it was going to a Qualcom is wireless. It is digital, not ana- what I’m getting, which is the low end 64 satellite, but in terms of cost effectiveness, log, as Iridium foolishly was. And it is a up and 300 KBS down. That’s correct. But they shut it off, it just wasn’t justifiable, be- variation of spread spectrum. It’s not free. you see that neat little combination, because cause it used to cost a lot to get data to the But it’s a lot less expensive than any other that opens the door. That opens the door not satellites. terrestrial solutions for really remote sites. just to the U.S. That opens the door to the rest of the world. What was NEON? The steps here is that COOK Report: What kind of a satellite sys- NEON is a proposed project and they’re tem is Tachyon using? National Environmental having workshops, (this was the second) for which they bring in scientists. The focus is Hughes: They can use anybody’s. They are Observatory Network across disciplines from biological through not stuck to one. They did that intentionally. environmental networking and computa- Now they are on SatMexV. They can spread COOK Report: Take us through a summary tional. And the concept is interconnecting their service by renting space on other birds. of the things that you saw at the San Diego the scientists, the data and the databases and meeting. the visualizations and the standardization of COOK Report: So, in other words, they’re data across disciplines. All of which requires really kind of an uplink, downlink infrastruc- Hughes: I’ll mention NEON, which every- a step up in data collection and reporting ture. body seems to know about. National Envi- infrastructure. ronmental Observatory Network. And the Hughes: Exactly. But bi-directional IP. word ‘observatory’ is kind of key here, be- What’s the purpose of the meeting? The first That’s very important. Other satellite opera- cause what they’re doing is gathering huge part was for those of us who knew of tech- tors are selling downlinks by satellite where amounts of data from remote monitors. nical capabilities, or in other words who the return to the Internet goes by phone lines. knew what could be done, to be sure that Of course if you are out in the wilderness COOK Report: So you’re seeing a huge the scientists sitting around there represent- with no phone this model doesn’t do much movement under foot in environmental sci- ing these various disciplines learned about good. ence and in other parts of the science world the technology available to them. When they to use wireless monitors. decide how the money ($100 million) should I talk a lot about this, because I think that’s be spent, we also want to be certain that they an integral part of the wireless revolution. Hughes: I would describe it as a sudden don’t think in terms of how they would have It’s wireless terrestrially, horizontally, and awareness that wireless is a big piece of the done it last year. Whether it is wireless, data it’s wireless vertically - to satellites. It’s the answer - data collection - to what they want bases, networking, visualization, or compu- combination that really makes it. I might just to do. tation and number crunching. do this for kicks in my company. I’ll get that satellite sitting on my roof here and I’ll of- COOK Report: And it’s now economically Bringing the Scientists fer a separate ISP service to my neighbors, feasible to do it and, if they get out and do it, wireless. That model will work. I will get it’s going to be another huge input of band- up to Wireless Speed 64 KBS up and 300 KBS down for a total of width into the Internet? about $795 a month, flat rate. $596 is Ta- COOK Report: You’re educating them about chyon only. Tachyon plus the Concentric Hughes: Yes. Because you must also under- data gathering. Internet connection is $795. Customers will stand the observatory concept here, the ob- normally purchase the service from Concen- servatory means it isn’t just the scientists Hughes: Yes, how to gather data remotely, tric — including the Tachyon ground sta- getting data, it means that you and I can look real time, and through the Internet right to tion installation and four static IP addresses. at the damn thing. Everybody. Citizen sci- the sensors themselves. Instead of gather- 243 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA ing the data through data loggers manually, by making visits to where the data loggers sit in the wilderness. What became very clear was that I needed to rub elbows with more of these biological scientists than I’m see- ing. With just two projects right now (Puerto Rico and Wisconsin) and I needed to see what they’re doing in other places and other ways.

COOK Report: You saw it there big time.

Hughes: Well, in two ways I saw it. What I was totally unprepared for, because I was just going to be an observer in this thing, was how oblivious these people were to what’s available right now or has even be- come available in the last couple of years. They are still in the 9600 baud, RS232, com- ing out of a little piece of equipment, manu- Data radioed from a Wisconsin lake ally connected by short cables world. But Frank had not seen that data. Then there ing things. They don’t think about that. It’s was meeting of the scientists, where I made just too damn expensive. And anyway, your And they don’t need a lot more, because a the second presentation. To hear that you can Internet’s got to get to the forward research lot of the data gathering is nothing but a be doing 10 megabits per second with $500 station, too. Which it doesn’t do down in handful of numbers. But, so I showed them, radios just blew their mental doors off. Or Puerto Rico. And the research station across the board, all the stuff that you can when Frank, sitting in the back of the room, Internet link was only 56 KB when I went do at higher speed. And I also went to said, “at Scripps I go 100 kilometers with a up to Wisconsin. Scripps. pair of three-way radios.” And I said, “Boosted?” And here’s another very concrete example COOK Report: Where you saw all the earth- — and I haven’t got the solution, yet, but quake sensors. No! Right out of the box, he replied. FCC it’s very typical. Right there in Madison, standard regulations. Anybody can do it. Wisconsin, the main university campus sits Hughes: All the earthquake stuff. They were on Lake Medora. And the University has a using a very elaborate set-up, all based upon Methods of Data Center of Limnology, which is the study of the Freewave 115 KBS radio. But they could great water bodies. Now they have satellites do it, because the radio can handle the data Collection pass over and taking very costly, scientific rates that they needed. And they were using measurements, where the colors in a photo- Glenayre radios also for going to a couple Okay, so they saw that, but this whole data graph represent temperatures and certain of points. But I knew more about radio than collection stuff is based upon sensors and chemical properties of the water and so on. they did. And they were still messing around entering devices and data loggers and data The problem is calibrating actual conditions with compression as a solution to getting loggers from Sutron or Campbell — on the lake with what the satellite sees. more bandwidth through. That is an impor- Campbell is one of the big ones — these tant point, because that’s getting easier to things are boxes that are smart as hell. They So the point is that they’ve been sending do. cost from $2, 000-10,000. They sit out there people on boats out to some 60 different hooked to devices, like weather stations, points on the lake. With a graduate student Then, I took him to Tachyon. And I also underwater sensors, light sensors, motion, and on each boat, as the satellite passes over, found that there was Mr. Wireless for the wildlife sensors. And you can have many, the student grabs the temperature and a test university. There was Mr. Infrastructure. many devices, hundreds of them. And then tube full of the water. And they come back There was from up in a different campus, they collect it. to the lab and analyze it. They then get from Mr. Data Processing guy. These were the key those points, temperature and water compo- central guys who run the systems. And there But in, almost every case, they collect it sition that they use to calibrate the colors on was a discussion about what they needed to manually into a module which then can be the satellite. They have no way to ‘calibrate’ do to get the data, but they kept mentioning detached from the data collector. The mod- the satellite, with real time lake data. To do how expensive satellite was and they just ule, which just a memory storage device is it real time, instantaneously, on a mass ba- kind of ruled it out of their minds. And I brought back into the lab, which is at a for- sis. The methodology is a labor intensive use said, right here under your nose is your an- ward research station and dumped into a of many people in many boats. swer. And then, they didn’t even know. computer with the software. Obviously, wireless comes in there, be- COOK Report: And Tachyon’s headquarters COOK Report: Well, that’s the old way of cause, if one power boat came roaring is San Diego, yes? doing it, right? around the lake and dropped off a little tiny buoy that had a radio which basically broad- Hughes: Of course. They didn’t even know Hughes: Yes. That’s the way that’s very cus- cast that data instantaneously, on command that Tachyon has a ground station on top of tomary. Unless it’s inside a lab. But this is or whatever, then that suddenly changes the the Supercomputer Center and it goes into the field stuff. And so that’s the way they’re nature of what they are doing. Paul Hanson, their network at the San Diego NAP. And, doing it. who is their chief tech, heard my pitch and of course, if it goes into their NAP, you don’t ran out so fast they couldn’t see straight. have to go out by Concentric, right? If it’s a Hughes: Now, even Campbell does sell a They now have $20,000 buoys and they research and education application. connection to a traditional satellite transpon- bought Aironet radios. In order to see what der service. Big cost. Expensive way of do- kind of range the radio had, they put the thing 244 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 in a boat to go all the way across the lake. ter, or it may go directly to a satellite. And They ran out of water before they ran out of that’s where the Qualcomm phone comes radio. And so all of a sudden, that’s big stuff in. If 9600 baud’s all you need, you simply to them. Then up in northern Wisconsin, their plug it in and send your data back via satel- problems are not a matter of the labor on the lite. Unless you need to send the data con- data points, but in getting the data from in- stantly, you can do it periodically, at a cost struments, situated out in the middle of a of $1.50 a minute. Maybe 4 minutes a day. lake, on a raft. But let’s look at the third level where you’re Now, let’s talk about the levels. Ned Fetcher getting into a little bit more. The Coqui frogs. is a researcher in Scranton, Pennsylvania, at Here we want sound. Not just some sound, the university. One of the things he’s been but quality sound. A subspecies of Coqui doing down there is modeling the light on frog that only live on the top of mount Toro. the bottom of the forest floor. There’s two The Coqui Frog Requiring that researchers had to climb the parts to what he does. He has a data logger. can put that little thing out there without mountain, after dark, in the nearly perpetual And then they have these little $15, sophis- wires, then all you have worry about is rain, go into a blind, record after midnight ticated, photosensitive light diodes. His col- theradio itself being stepped on. when the frogs sing, and then come down league puts out twelve at a time. They have in the morning. Very labor intensive. about 40 of them out there at once. But you’ve got another advantage here. It’s real time. What really turned on everybody Why not use radio they asked me? Sure I Okay, but here's the problem. They only go on was the ability to look at the data in real said. Now I have to deliver. So we’ve got to out to about 25 meters, 75 feet. But they have time. Not just to get it, because it goes back have enough bandwidth to make sure this is to lay a wire on the floor of the forest. But not just to the research station, it also goes not distorted. Enough that they can’t, when people and animals and falling branches into the Internet at the same time. And it may they record it, back at the university, lose break the wire and they lose the data. have to be wireless from that point back to that all the flavor. Because I noticed that the university. Because the research stations when we went there, and they asked me, can So he said, is there any way you can get a are usually out in the woods. And that’s ex- we go up this mountain to do this? They had low-cost, $50 or less, radio. And so that’s actly what we’re going to be doing in Puerto even gone back to Sony to have them opti- when I went to this smallest radio in the Rico. With wireless we will get from the field mize the microphone to improve its recep- world outfit and I’m having a kit shipped to research station back to the main university tion in certain frequencies, to match the frog. me, I think it will do the job. It has a chip on and from that out to the ‘Net, so that the re- And so the question becomes do you have it and everything else. These cheap radios searcher, who may be at any university in to have enough bandwidth for fidelity of become themselves data collectors. Data just the world can not only see this stuff, but also sound? Therefore a low end 56kbps serial goes there and into a bigger radio, back to see if something’s gone wrong. And then radio is probably not enough. the center and then into the data logger and theresearcher can talk to a graduate student be processed. who can go out there and remove the leaf But then the last project I was asked to do is that fell over the sensor or repair whatever pretty interesting because it is full motion In other words twelve or more of these little has to be repaired. video from down in Puerto Rico. The guy radios, each with a light sensor and a pat- who wants me to do it heard me when I was tern on the floor of the forest will communi- Now I have covered two ways of research- down there last summer talking to 40 scien- cate back to a central point no more than ers getting back wireless data. One is going tists. For eight years his work has been track- 300 feet away. The data is sent into a radio, directly from the sensor by wireless. The ing freshwater shrimp under water. And he where it will be passed back to he field other is going from a data logger by wire- has underwater camera doing part of the data sation. less, which in turn is collecting stuff from collection. He wants me to interface the un- sensors, that may be very close to it. The derwater camera to a high enough bandwidth COOK Report: So the $50 radio goes about gathered data may then go either terrestri- to have full motion video, which can be seen, 300 feet. ally with a relay back to some research cen- back in the upper 48 states, real time. Not Hughes: Right. And then the radio that doesn’t even have to be an Ethernet radio, it can be a serial radio, like the $300 radio. That data gets collected, then, in the data logger back at the research station which may be a mile or two away. New Technobiology Enables New Methodologies So that is a way to do what he wants and he was really excited about that possibility. He said it would totally transform the way that he now has to work in order to get his mod- eling data. The experimenter down there, a woman scientist in Puerto Rico, Jill Thomp- son, said they have so much bad data be- cause of broken wires that the experiment may be useless. And all of a sudden, if they The Puerto Rican rain forest habitat of the coqui frog 245 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA just have a graduate student, as he does now, Well, one of the things that he was playing World Wireless, whom I contacted, is not go out and manually hold a waterproof cam- with there and I jumped on when I heard only a reseller for World Wireless’ very tiny, era down there, tape record the shrimp, and about it, is the concept of a very small, so- low-cost stuff, super-miniature radios that send the tapes by snail mail to the distant lar-powered, mobile data sensor capture, include website capability. Tiny short range researcher. database and communicator. With this you ones as well as one that’s only going to be grab the data on the move, not with fixed $300 to go a distance. He will be presenting Now, you’re talking about higher speed ra- points. So he’s doing that right now on a his engineering at a national convention of dios, 5 to 10 meg radios or above. And yet subcontract, and we call it WANDER 2000. sensor manufacturers. Because at that level that’s cheap to do now. Distance is not great (Wireless Acquisition of Networked Data for at which he is operating we can actually open in this case and you’re not going to go to Environmental Research). It’s a prototype, the door to transmission from the individual satellite with that 10 megs. But you sure as which will be done by this summer. The sensor. A weather sensor or something and hell can go back to your research center, you device will be under 15 pounds total weight. not just a big complex testing device of some may have to compress, and do all sorts of It will have a miniature Linux running in kind. Pushing the radio and the wireless data other things, but nevertheless, the radios will RAM and a database in it and a variety of collection really down to a point. permit this. They will go through the for- sensors can be hooked to it. ward research station to the university, And the way you do that is you don’t expect wirelessly, 15 miles away. From thence into And so whether you’re on the water mov- to go all the way with that little radio, but the global Internet. I’ve already got cameras ing or whether you’re on a trail moving, with you go to a next point of aggregation and from Axis, a Swedish company (http:// a backpack, horse, motorized vehicle, or the next point of aggregation. But it’s not www.axis.com). The cameras themselves whatever, you can take sensors and put it only going up to the ‘Net, it is bi-directional. are web servers. With individual IP addresses into the database, which can also be a And so you can have a very tiny, special- inside the camera. With a serial port, and an website, using Apache, if you can reach it. ized website with the data shown on it and Ethernet port. The Swedes only thought you And communicate it by either Globestar or remote access it. Note also that this fits in could communicate from them by either whatever, and by other means. with the Globe project, the observatory idea. slow cell phone, or in-building Ethernet. They never thought of 2mbps wireless ra- But there’s a very important point here. And COOK Report: The data is collected auto- dios connecting them up. However, I have. it was reinforced at that meeting. You’ve got matically and would go into these little Da- We are doing it. Not full motion, only 10 to have reliable capture of data even if all tabases contained in the RAM of the Linux jpeg frames a second. But a step above still other communication is severed, such as operating system on board the radio. And pictures, while below full motion with during a hurricane. And so the small Linux the sensors, then, are feeding into a radio sound. comes into play, not just that it puts up a within a few hundred yards or something? little website and a database, but it captures And as part and parcel of all this you auto- Watch out UUNET, the frogs and the shrimp reliably the data even if your communica- matically fed into a remote distributed se- are coming - using your bandwidth. tions are down for one reason or another. It ries of Linux databases that do things with it gets sent when you have re-established com- there and then feed the data back upstream? And so when I was holding up these radios munications. The ability to cache in a data in front of these biological scientists, they base. That is already mastered in Data Log- Hughes: Yes and you used a very signifi- really jumped on me after it was over, and gers. And in institutional computers. Now cant statement there. started asking me about coming to their we must do it when linked, wirelessly. The projects. Including for example, one up in tool to do this is a tiny Linux server, which COOK Report: Distributed? Michigan who uses parabolic dishes to cap- may be in RAM. ture sounds of both insects and bird life. And Hughes: Distributed. Because one of the they would love to have those things sitting And I was even asked is there any way I can things that was even discussed at the Neon out there all the time. And not trying to keep go out on the plains of mid America where meeting was how are you going to crunch a tape recorder going and all that stuff. they have firestorms, prairie fires. Can I all this data? One way is centralized, come up with a way to communicate the terraflop computers with high bandwidth Tiny Linux, Forest Fires temperature of the fire at ground level and between them. The other one is the distrib- the gases that are being emitted, real time, uted process. And, see, already, there’s been and Sensors while the fire is just feet away from the ra- a model for this. I can’t give you the details dio? on it, but there was a miniature Linux that COOK Report: All right, can we finish up went up that was in RAM with extremely with the forest fires and the sensors? Challenge? Not for wireless, that’s easy. But low-powered electrical draw on a space survival has to be dealt with. Okay, the com- Hughes: The tiny Linux thing, including bination of these things is what drove me to Web, is the project that I have basically asked this wireless outfit and I’m really excited, Steve Roberts, the hacker who used a re- because first of all, that prototype called cumbent bicycle in Mountain View, to do. WANDER 2000 will be done by this sum- Remember him? mer and we will basically exercise it. And the full plans of that, including the wireless COOK Report: The Internet-connected bi- connectivity to it, will be basically on the cycle? website, www.worldwireless.com. But at the same time, on that other island, Whidbey Hughes: Yeah, through radio. Then, but he Island, is where this other guy is that I tracked now, he’s working right now on canoes. He’s down yesterday. got project going down the Missouri River and the Mississippi and going up the inland COOK Report: Whidby Island, near Seattle? waterway and then back across Canada. It’ll World Wireless Communications 900 SS take two years. Hughes: Whidby, I guess that’s where it is. 56kbps low cost radio, in field protection But what happened is Dan Withers with case. 246 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 shuttle that was used for the data processing the Gulf of Mexico. But that’s, of course, fundamental to the and data collection for experiments that were Internet. And it’s fundamental to the IP flow on board. Hughes: But that’s going to be, I think it’s that’s there and the wireless just permits this going to be almost equally true in the big, in places that are inconceivable. And it’s The Tiny Linux has three capabilities. Well, urban areas. Particulates and all that. Wire- going to be extremely important to biolo- first of all, it’s IP to begin with. And number less, low-cost, no license, from low to pretty gists and environmental scientists, because two, it can have a true database. And num- high bandwidth. Sophisticated sensors. And their problem is dealing with data and sens- ber three, it can process. Programs can pro- the ability to connect to and adjust or other- ing and knowing what’s going on in the most cess the stuff. And then number four, it can wise interoperate with the censor in real time. remote ways, way beyond where any com- actually also be a web point, an accessible mercial wire line is ever going to go. point. I mean, two-way, not just a broadcast You have the ability to use miniature Linux way or not just a capture way. And the wire- as a true IP handling device, and as an IP Well, in closing, everything I am doing with less connection from it gives you the bi-di- router. It can be a router from different sen- wireless, from remote cabins in the moun- rectional access to it. The only thing is, sors. Remember the conviction of those who tains to frogs in the rainforest, is laying down you’ve got to control that, you can’t have say that everything in the world is going to the techniques for using wireless to every 10,000 people all trying to look at the damn have an IP number in it. In the summing up human being on this planet, wherever they thing at once. So you have a management after they huddled up into groups and came are. And at data rates up to full motion real problem there. But the whole idea of the back with reports, on the last afternoon and time video, affordably. There is a revolution observatory is that you could call up a sen- I said every damn Cocqui frog’s going to coming for the Internet, thanks to terrestrial, sor sitting in the middle of a hurricane out have an IP number. We may be putting some- no license wireless, digital signal processors, on the tip of Manhattan and what’s it saying thing around his neck or embedding in its smart software, IP servers, satellites and the right now? ear. Or if we’re really sophisticated, we’ll universal connectability of the entire global read it out of his DNA. DNA as IP numbers. net. COOK Report: A better example would be What a gasser! the estuary of the Mississippi River out into July 2000 COOK Report

247 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Akamai Pushes Web Content to Edge Content Distribution Overlay Independant of Tier 1 Backbones and Peering Is Created Using Proprietary Tools Based on DNS Avi Freedman as Chief Architect Heads Effort to Place Servers in Networks of 1,000s of ISPs Worldwide via Incentives of Bandwith Saving & Better Response

Editor’s Note: While still in college Avi Freedman: We have a pretty big network mature into one of the Internet’s more widely Freedman founded Net Access, and, although we don’t talk about specific known and respected technical figures. From Philadelphia’s first ISP in 1992. In the size, tens of gigabits per second of capacity my personal knowledge of Avi I believe his COOK Report basement in 1995, he put in can actually be delivered into hundreds of remarks to be absolutely sincere and genu- a 56k-connected “POP;” however, in the networks. ine. Let me say also that I have no financial mean time, he discovered DS3s, backbones, interests in or ties to Akamai.] and routing. Consequently the POP never How Akamai Captures got beyond the 100-pair copper cable from It is a revolutionary concept to me, having the pole to our roof. Since 1995 Avi has Talent spent the last year essentially in California been one of the most widely known advo- seeing mainly Silicon Valley companies. cates for small and mid size ISPs. In 1998 To answer your first question, I went there, Whereas, for a company as mature as he joined AboveNet as VP of Engineering I interviewed and it was like being back in Akamai today, given that they were doing and in late 1999 he joined Akamai as Vice the university. I really enjoy being in envi- gigabit per second stuff, and just about to President and Chief Network Architect. We ronments where there are lots of people who go public, to say to me: “We really need all interviewed Avi on March 17, 2000. are smarter than I am. It means that you’re this networking knowledge in the company. guaranteed to learn anything you want, if We want to hire you. If you accept, you’re COOK Report: What happened that caused all of you are interested in the same things. hired on the spot because we want you to you to leave you VP of Engineering posi- And I’ve been in environments where there hire your own staff and we want you to get tion at Abovenet and go to Akamai? are some smart people. But it’s perhaps true them on board in the next 4 days” really got that there are more smart people here than my attention. Freedman: Akamai is a customer of average. AboveNet. And it was clear that while they COOK Report: I can certainly understand had already accomplished a tremendous COOK Report: Are a lot of them MIT? why. Help build some background, though, amount by late fall of last year, they didn’t for the reader who doesn’t know anything have people who had understood or had Freedman: I think there are well over 100. web about caching, the problems of the web worked on big networks and knew how net- For example the sales engineers at Akamai as the world wide wait and things like that. works break and how they work. have computer science degrees from MIT. Take me how we went through web cach- ing beginning in 1996 and show me how COOK Report: So did you sign on with them COOK Report: What about some of the MIT we got from there to Akamai. in part to get them going in a shift from what TCP/IP gurus, like Dave Clark. Are any of the rest of us think of as caching to this in- them directly involved with the company? Freedman: Okay, I will disclaim that I can telligent routing that one sees discussed on give you absolutely authoritative back- their website or were they already well un- Freedman: No, not directly. That’s the in- ground here, but people like Peter Danzig, der way? teresting thing. Most of the MIT people who who invented web caching, who also work got involved were the algorithms people, at Akamai, might be better sources. And es- Freedman: They were already well under who really have an important role on their pecially, don’t ask me to give exact dates. way. They already had a solution which no own to play. To the extent people who de- one else has, as far as I know. BGP tries to sign the algorithms were with treating net- COOK Report: Understood. find the closest network by AS path. But works as black boxes, they had already done that’s not really always correct, in fact, it’s a better job than everyone else. Now if you Origins of Caching often not correct. Akamai’s solution uses the add to that the actual understanding of sev- dynamic performance topology of the eral specific networks and what goes on in Freedman: In terms of caching, I realized Internet to choose the best route. All perfor- networks overall, you get even more pow- sometime in the ’96 range that people were mance things being equal, the algorithms erful algorithms. doing some caching. I spent a bunch of time may also try to push you towards a box, in Australia working with people who did where the data that you want already is. If it Now I’ve also never seen a company where networking and everyone of them did cach- is not there, then it will go get it. It can look all the management is super excellent at what ing, because the cost of getting data there like caching, but there’s a lot of other stuff they do. You could view this as a put-down was 19 cents per megabyte, which, by the going on. So that’s a diversion, but to an- of other companies, but I really haven’t seen way, it still is. It is still so costly because swer your question, I went to talk to Akamai any other company where every person in even Telstra can’t get the quantity of band- and was completely blown away by the num- management is a so outstanding in their (and width, it would like to have. So caching was ber of actually smart, thoughtful people that sometimes other) fields. I mean, it involves used for two things. Abroad, caching was they have and the openness of the work en- everyone, in every different phase of the used to save bandwidth and therefore to save vironment. company — and, they’re completely open money. In the U.S., and pretty much only to ideas. [Editor’s Note: At this point, sens- the U.S. performance was the issue. COOK Report: Judging by its website, ing marketing hype I’d begin to get nervous. Akamai has a huge network. But I have known Avi Freedman since the COOK Report: In other words, move your fall of 1994 and have watched him grow and content out closer to your user, so you don’t 248 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 have to go all the way across submarine COOK Report: Presumably, the cost of disk major U.S. backbone that actually imple- cables or satellite to the U.S. to get it. space is going way down. mented hostile caching in their network a couple of years ago and wound up screwing Freedman: Exactly. And people even did Freedman: Oh, it’s like a couple of pennies up a bunch of financial transactions. reverse caching, which then looks a bit like per megabyte, if that. So you might as well what Akamai is doing. In a place like Aus- save everything you’ve ever seen on the off COOK Report: What kind of caching? tralia, if they had web content that they chance, and if 50%, you know, if anyone wanted available in the US they would send ever asks for it again, you win. Freedman: I call it hostile. Other people call it to a sever located in the U.S. and serve it it different things, like ‘transparent’. You from there, so it didn’t have constantly to be COOK Report: But then it gets stale, though, are doing it when you intercept users’ pack- shipped across the Pacific from Australia. doesn’t it? ets. For example, in Australia, what they do is, they block port 80. Full disclosure. You COOK Report: In other words, Australian Freedman: Yes and if bandwidth costs 19 cannot use our Internet connectivity to get websites would be placed in the U.S.? cents a megabyte, you’re actually inclined to port 80, you must use our proxy. Full dis- to do really strange things, like tokenize closure. Freedman: In the U.S., yes. Which is some- html. Now, “tokenize” is a computer science what like reverse caching. Which is what term. That means that instead of , COOK Report: And the proxy goes through is selling to people who want to you’d use the number 1. Instead of , the cache first? compete with Akamai, but it’s not what you’d use the number 2. You convert strings Akamai does. This gets pretty subtle. of html numbers so that you can store stuff Freedman: The proxy is the cache. without having to run through a very CPU If you look at what Akamai does, it is some- expensive compression, anyway. In fact, COOK Report: And if what you want is not thing that looks much more like a network there were people that were stripping ban- in the cache, does it let you out port 80? than like a bunch of caches. In the U.S. in ner ads back then, because they didn’t want the ’96 ’97 time frame even, the purpose of to have to pay to bring them across and ocean Freedman: No, it goes gets it for you and caching was to improve performance. So, to give them to the users. gives it you. But you still can’t talk on port in fact, you had this box performing the cach- 80. What the backbone was doing and what ing and doing it in a way which doesn’t al- COOK Report: But if they stripped banner caching vendors like Inktomi are encourag- ways save bandwidth. It actually goes and ads in order to save some money, did the ing people to do is intercept port 80 packet pre-fetches extra data on the chance that the advertiser still get the value or was the ad- flows and run them into a box containing user might want it. vertiser bummed out? their cache without telling the user what’s going on. There’s a euphemistic term for it, COOK Report: You might infer that it was Freedman: They simply threw the ads away. called transparent proxying or caching.. I call actually using more bandwidth than they And then the other thing was that people it hostile caching. claimed to save. would use what I called SECP, Social Engi- neering Cash Protocol. It’s where you tell COOK Report: I see. But if you’re doing Freedman: That’s true, some solutions use your users what was and you do it by look- that, also, and on the website that depends more bandwidth than they claim to save. But ing at your cache logs. You tell you users: on a lot of my revenue on accurately count- it had a benefit which was that, had you in- these are the really fast sites, and the recom- ing hits and so on, that portion of what my finite amounts of bandwidth, it would get mended sites for tomorrow. You are confi- site has seen elsewhere in the world, then I extra stuff. dent of their speediness because you know have no idea of what’s going on. I can’t cap- that they are already in your cache. So it’s a ture that data. True? COOK Report: From your point of view, little bit of social engineering. extra stuff more quickly. That was the pur- Freedman: Yes. pose? But that’s the way it happened in many places outside the US. COOK Report: And I would think people Freedman: It would attempt to have the would become quite upset about that. content that the user would want a minute Now in the U.S., it was a move towards faster from now in the ready, whether or not it connectivity. But how does a content pro- Freedman: Well, they are, that’s why they’re would actualy be asked for. It was a calcu- vider react to all this? Akamai customers. Akamai gives the ben- lated gamble, which is okay if you have a T- efit of caching, it’s not quite the same tech- 3. When bandwidth costs $1,000 a megabit, A content provider says things like: what nology, but if you’re an Akamai customer, you’re not nearly as concerned as when this means is we can’t get tracking data. magically, your content is served inside hun- bandwidth costs $60,000 a megabit. And, Without tracking data we cannot bill our dreds of locations worldwide, but you get remember, until a year ago, bandwidth was banner advertisers and get good demograph- the usage data. You know who’s using what still $10,000 a megabit in Europe. It’s only ics, so we don’t like you. That’s what they images and stuff like that. now been slowing down into the couple of mean. thousand a megabit or less. COOK Report: The BBN Exodus thing was What they say is copyright. They say, you something entirely different? COOK Report: Megabit per second? can’t store this; that’s a copyright issue. Or they might say: we can’t support scaling Freedman: That was just plain peering poli- Freedman: Right.. In Australia, it’s mega- because of size constraints on number of tics. The reason that a network cannot com- byte. But that translates into $60,000 or peers, when what they really mean is, We pete with Akamai is because their peering $80,000 per megabit per second. Let’s use don’t want you to be a better competitor of politics prevents them from buying connec- Australia to understand both the value of ours. tivity where needed to solve the spot band- caching and why in some ways they were width problem. the world’s experts at it for a while. If band- There is also the issue for the ISP that, after width costs you 18 cents per megabyte, how a certain period of time, the content might COOK Report: I am hearing about changes much did disk space cost you? become stale. And if you recall, there was a that would encourage business-oriented net- 249 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA works to develop along horizontal lines of to sitting in a ISP content hosting web farm back and forth to you. No one else does that, connectivity and a horizontal mesh overlay somewhere? really. of the older, more standard vertical peering practices, where everybody’s either a down- Freedman: Well, no, because Akamai However, you still have to go get peering stream or an upstream customer of some- doesn’t have a network. Akamai doesn’t with people, some of whom do and some body else. Content delivery networks is also have leased lines to connect its boxes to- who don’t want to peer with you. You have the newest buzzword for it. It sounds like gether. Which is good. People say, don’t you to wait for telco circuits to come in and wait part of what Akamai is all about. want to buy a network? And it’s like, no. If I to get them upgraded as you grow. And in bought a network, I’d have to turn it off five many places, most of the ISPs that actually Freedman: Let’s answer that by looking at times a day, because I have to make sure make up the bulk of the Internet aren’t actu- Akamai’s origins. Do you know how that I could survive if you turned off. Akamai ally at peering points. And a lot of the broad- Akamai started? is immune to fiber cuts. band guys don’t want to peer well. COOK Report: I’m not entirely familiar. My COOK Report: Help me understand, then, COOK Report: So you are saying, then, that perception is that it started to solve the cach- how this is put together in as much detail as Abovenet does have a business practice ing problem or to solve the slow World Wide you possibly are able to. where putting your content into its network Web problem. and bringing your content close to its back- Freedman: The base goal is to have servers bone, perhaps does make sense, in compari- Freedman: Right. Tim Berners Lee, who at the edge of the Internet. What does that son at least with the alternatives. invented the Web, came to Tom Layton and mean? It means ideally they’re not sitting Danny Lewin said, you know, we’re going inside UUNET’s hosting center, Abovenet’s Freedman: Right, but the alternatives there, to have spot congestion problems. hosting center, or whomever else’s center. you know, are a couple of large, well-known Ideally, they’re sitting at the ISP’s, at the DSL commercial networks. Most networks will COOK Report: At MIT surely. Well, the providers, the cable head-ins. Locating in say Oh, I handed it to them. If they can’t get WC3 brought Berners Lee there, so that in- this way minimizes the problems getting to it cross-country, that’s their problem. But teraction was probably a byproduct of that, the last mile. Abovenet doesn’t do that. I was well-trained right? in what a good network looks like. Now, COOK Report: Oh, that’s interesting, be- most networks do not look like good net- Freedman: Right, and as a result, they cause for a while the idea was don’t have works. Why? because rumors to the contrary, started thinking about the problem. But they them sitting there at the last mile, get them IP bandwidth is not a commodity. came about it from an algorithmic perspec- closer to the backbones, right? tive, not with a super understanding of how COOK Report: OK. For example, if you’re networks connect. If you ask why does the Freedman: Some people might have said on those other commercial networks and you Internet suck, the answer is because packets that. On the other hand that may not be par- hand the packet off to UUNET and the per- are being lost between networks. Even ticularly smart if you’re trying to do content son that wants to receive the packet is down- though there are networks that can’t get distribution. stream on Sprint, one potential problem is packets from one side of the network to an- how does it bounce from UUNET over to other. Most of the loss, a wide percentage, COOK Report: I heard people saying that Sprint’s network, right? is between networks. one way to get your stuff from one end to the other of the Internet real fast is to bring Freedman: Right, exactly. So that makes What Akamai Really Does it into something like an Abovenet content sense, that’s a good model. But there are tens hosting center, where you are very close to of thousands of ISP’s in the world. Some of COOK Report: So in other words, what the backbone and your ISP has a connection them do not go near where Abovenet’s fiber you’ve described it for me was the network that’s close to the backbone, bump, you’re goes. And how do you get to those ISP’s? geek solution. It was created by the network on the backbone or OC3 or somewhere else people, people like the Avi Freedman’s, in a millisecond, relatively speaking. COOK Report: No. How do you get to who were doing the routing and so on. What them? you’re saying now is that with Berners Lee Freedman: Right. But here’s another way and the other people at MIT you’ve been of looking at Akamai. Akamai is an inverse Freedman: The way Akamai does it is, it describing, there was a rather different way hosting center, is an inverse ISP. This is the puts boxes in hundreds and then thousands of going about it that involved algorithmic way I described it to people who knew I of places around the world. For example, considerations, and so on. Tell me more came from Abovenet. So, at Abovenet, the there are ways that Akamai could get a good about this. charter is take the packets and deliver them estimate of where all the biggest ISP’s were. packets where they want to go with as high After this is done my group would combine Freedman: For something really authorita- quality as possible. Abovenet is still the only their traffic utilization data with BGP data tive you’d have to talk to Tom or Denny, but company that I’m aware of that does it this and come back with the complete ranked list I will give you the picture as I understand it. way — your customer puts packets into your of how big every network is with respect to There are a number of different types things network by putting a box at an Abovenet Akamai’s traffic. There’s some very inter- that you need to do in order to get to what hosting center. The way that Abovenet does esting data in there that shows that a num- you could call a content distribution network. that is it peers with as many people as it can. ber of networks that are not nearly as big as You need to be able to solve the problem of, It does cold potato routing and pulls the traf- they think are. say, ensuring freshness. Akamai has solved fic as far along its own network as possible, the problem. If you use Akamai’s network because its network is, on the whole, less COOK Report: What about the MCI Cable to distribute your content, you will not have congested than other people’s. Now there is and Wireless backbone? stale content being delivered. still no one else that I’m aware of that has gigabits per second that will go to every little Freedman: The AS3561 network was COOK Report: Will you not have stale con- rinky dink peering point in the world and shrinking before it got divested. tent being delivered because your server will say, hey, I’ll peer with you and I’ll carry all literally be on the network itself? As opposed my traffic from everywhere in the world COOK Report: And that AS number was 250 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 MCI’s? of my business model. If I want to get my charges are our customers, our content pro- website on the Akamai network, I agree that viders. So let’s say that you sitting at home, Freedman: Yes. I don’t know the reasons I’m going to pay by some kind of traffic al- have a computer. And you want to get to but I do know people were having issues gorithm of data to and from my website. Yahoo.com, you want to get an image that’s getting off that network. off of Yahoo.com. So the Yahoo.com web Freedman: It looks just like a network. You page says go to COOK Report: Can you give me perhaps a pay X dollars per megabit on a 95th percen- something.something.akamai.tech.net or it little more detailed answer as to how you tile addressable basis. In order to do that, says something or other that hits Akamai’s look at how the traffic of people who have we need to collect that log data, the billing name servers. Your request for this URL will their websites on your network, you can trace data from all of our computers about to hit your ISP’s name server. In effect if your this traffic and how you monitor it? whom they served how much data. So it ISP is Akamaized, you are telling its name turns out that’s the same data that tells us, if server, hey, I want this image, which is iden- Freedman: Networks that are well-routed you mix it up real hard and run it through a tified by this domain name. want to know where their traffic goes, so little BGP structure of the Internet data to that they can make sure that at least the large which networks you are sending traffic. It’s Then your ISP’s Akamai name server asks a bits of traffic get delivered well. Abovenet actually where your traffic wants to go, set of eight out of Akamai’s total bunch of is still the only multi-gigabit network that where demand is. Now, if I don’t have con- top level name servers saying, hey, what is lets you see the state of all their backbone nectivity in Joe.net, I may temporarily send the correct IP address for this domain name? links. Whether it’s problems or whether it’s that into UUNET or Sprint until I get a box (You can only specify eight at any single good or whatever. So Abovenet is actually a inside Joe.net. So that’s the way of looking time, but there are really more than eight.) very good partner for Akamai. But that’s a at it. And Akamai’s name server says, over time, different topic. the best place to go is this IP address, which COOK Report: Help me understand how is in such and such a region. Or if it doesn’t COOK Report: OK so Akamai does go out you get boxes inside Joe.net. How do serv- know, What it says is you’ll have to ask and place its boxes all over the place, help ers get where they need to be? someone else. me understand exactly what that means. Freedman: I’ll just describe to you how it COOK Report: What would that someone Freedman: First, networks that are using works. So the boxes magically appear in else be? Junipers and the other big BFR’s cannot get networks, so we start with an Akamai net- data on the new high speed router cards work that has 250 locations. In other words, Freedman: Being another Akamai name about where the traffic’s going. we have boxes in 250 locations in a couple server set. So the first set, the first time that of hundred networks. They’re the networks’ your ISP’s name server asks the question, it COOK Report: This is an inherent problem locations. We just rent a rack. For a small asks it from eight top level name servers that with the design of the router? ISP, we say, if you put our boxes in your are always the same. And, again, it’s eight network, here’s the value proposition. You of the top level name servers, but there are Freedman: It’s a problem with scalability. don’t charge us money. We won’t charge you more than eight top level name servers in And Junipers don’t do it at all. So with Cisco, for the boxes. The data on the boxes, will all. only recently and only on the low speed card, always be fresh. You’ll even get streams of which only goes to four OC3’s, can you get data, like radio, audio, video, which caches COOK Report: Are these top level name the data. don’t do. servers roughly analogous to thirteen root DNS servers? COOK Report: So if you’ve got an OC48 If you’re broadband, we even have custom- pipe, you can’t get any data. ers who will be able to use our boxes as com- Freedman: Something like that, except puters and serve different kinds of content they’re distributed on the across different Freedman: That’s right, OC48 cannot tell to you. If you have DSL customers in Ma- networks and they’re supposed to give a you where the traffic is going on an OC48 nila, now we can serve your customers there good breadth of connectivity quality to far pipe or on a OC12 pipe on a four by OC12 effectively. If Yahoo wants to have a bigger away places. The top level “eight” does not card. What they’ve said is maybe at some picture or a stream come to someone who’s get hit that often. For all the requests to all point we’ll give you statistical sampled data. on broadband, well, we know which of your of Akamai’s customers, you’re going to have But to the best of my knowledge, they don’t users are on broadband and which are not. to do that top level query once an hour or so have that yet. Whereas, one of the best things or twice an hour. So it’s not hit that often. about looking at Akamai was, oh, here’s a Now to a backbone we say, put our boxes Because the way the BIND works, it tries multi-gigabit network, in which I know ex- next to every one of your major routers and all the name servers over time and, over time, actly where the traffic’s going. if one of your users wants traffic from one it settles on the one that seems to be the best. of our content providers, they’re going to So then the top level Akamai name server COOK Report: How is that possible? get it from one of our servers. And why not says, Oh, for this customer, you’ll have to have it be from one of servers sitting in the ask these secondary eight name servers what Freedman: If Akamai didn’t know where same city on your network versus elsewhere the actual answer is. Now, of the list of eight the traffic was going, then it couldn’t bill its or versus coming in from a peering pipe? that is returned say, six or seven of those customers. In order to be able to bill its cus- So the value proposition to a big backbone eight, are sitting in the same place. They’re tomers, it has to know where the traffic is is, again, there’s no caching, you don’t have sitting right in a, let’s say, Netaccess or going. to redirect any of your traffic to us. You’re Surf.net in New Jersey or in Philadel- not going to have any complaints of stale- phia. Wherever Akamai thinks is a first good The Akamai Business ness, because the content providers are get- stab at close to where you are located. How- ting the data about who’s using what. But ever, notice I said six of the eight. Because Model - an Intelligent you’ll magically save bandwidth. two of the eight are sitting somewhere com- Virtual Qverlay pletely different that’s completely network Akamai is a bandwidth-saving proposition topologically different and doesn’t tend to to networks. The only people that Akamai go down at the same time. COOK Report: So in other words, it’s part 251 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA

COOK Report: In other words, in case Freedman: Right. So if I try to go from A to COOK Report: I’m still trying to focus on there’s a problem in my locality, I can go C, I’m going to go over a poor peering pipe. exactly how this works. Is what you’re do- somewhere else. And I can’t change what that router’s going ing, have you developed, it sounds like to do. I can’t tell that network, oh, to get to you’ve developed a means for putting intel- Freedman: For the name servers, we’re still the our content provider, don’t use C. The ligent devices all over the Internet that talk at the name servers. Now, when you actu- network is transparent to me. I can’t change to each other, that figure out traffic paths and ally query them, our name servers know the what it’s going to do. So, but I have, that then can figure the right traffic path to state of the Internet to within a few seconds. let’s say that Network A peers well with five the main web server or server at some big And they know whether they should serve out of fifty of its partners. I have boxes in web farm somewhere? you or whether they should refer you, (it’s those five networks and can, instead of go- called overflow) to another region. Bump- ing right to C, can reflect my traffic off of B. Freedman: That’s part of it. But there is an ing you to another region might occur be- So I can find the correct, the unfilled, the even finer granularity to what we do. Be- cause performance is bad or because they’re good quality peering pipes to use to go be- cause our content providers tell us, we know too busy or because a machine has failed or tween networks what content changes when. We can push for whatever reason. content from the content provider to our It doesn’t mean that all traffic from A to C boxes all over the world and then leave it COOK Report: In a general sense, can you goes well. It just, our content providers’ data there till it changes. Or, if the content is dy- explain how they know the state of the gets where it needs to go faster. namic, we can build a communication path Internet to within a few seconds? back from wherever the user is to the end Because we even work with things that are dynamic content site. Or we can do streams Freedman: It’s a big, distributed not static objects, we can do live streaming over the Internet, where we reflect them in a computanetwork who has pretty bad peer- and things like that. Streaming is not a ques- sort of zigzag pattern, blasting through con- ing to the world. But note that we have boxes tion of putting the content there once and gestion to make sure that we have enough in that network. So once the data gets to that then serving it many times. You need to build redundancy to be able to serve from, say, box, we can serve the end users well. But a data stream back. IDP. We can do many different things. the question is, how do we get our content provider’s data to that box? COOK Report: It’s almost a connection-ori- COOK Report:. What you’re saying is, you ented stream, then, isn’t it? have this rather large network of name serv- COOK Report: On the poorly peered net- ers but also machines that in effect can func- work. “Akamaizing” Content tion as web servers, data storage devices and so on. Your network knows where your main Freedman: Right. So if I just try to do a customer content originating hubs are. Your BGP transfer, I’d ride over the Internet. And Freedman: Well, yes, and again, there’s no underlying network, because, if I had an network figures out how to get people who get packet loss. Which would kill my trans- want the content to those hubs. But your fer and make it really tricky. S o underlying network, I’d have to worry about fiber cuts and having it fail. Instead I just network also then apparently knows how to now I look at where is the content provider work with the hubs or the main web farms centered? Let’s see the content provider. rely on having lots of different networks that I can choose from at any given time. We’ve or websites of your customers and how to declared a strategy called Edge Advantage. bring appropriate parts of that content on an COOK Report: In other words, you may intelligently scheduled regular basis out to have multiple ways of achieving the goal of This means we’re going to give people a software interface so that they can run pro- your own local disk storage that is scattered getting the packets where they need to be all over hell and gone, right? sent and one of the first things you do is look grams on some of our computers that are distributed out in the world. The programs at the various ways that that goal can be Freedman: Bingo. You can see why I achieved. allow our content providers to do, what’s called Akamize their traffic and their thought this was interesting. websites. Which is an automated process. Freedman: We can do a very precise test to COOK Report: Indeed. And helped along tell us how our regions can get to each other Once they do that, they’ll be able to invoke banner ad insertion with just putting a simple by the revolution in the crashing costs of and all our customers, all our content pro- local disk storage, too, it makes such strat- vider customers. single line of html in there principal servers. They can do this because we have banner egy, I would think, awfully attractive. COOK Report: What you’re describing to ad insertion companies. In fact we have ev- ery important customer on the Internet. Ev- Freedman: Yes, but remember for example, me (I just haven’t found the right words to we don’t have to push a whole stream. If articulate it yet) is that kind of horizontal eryone that, you know, Global Center, Abovenet and Exodus all say that they have someone’s watching a movie, we don’t nec- overlay concept way of thinking about mov- essarily have to go get the movie so they ing traffic. One of the current buzzwords 40% of the content. Well, we have all those customers for real. can look at it, we can go get chunks of the for it is Content Distribution Network. movie at a time. So, having cheap disk space COOK Report: I’m not quite sure what you is cool, but we don’t rely on that. We don’t Freedman: But we are not making net- have that many super disk farms around. works. I mean, we are sitting on top of the mean by that. Are you saying some of your customers also have boxes in web farms at networks. We’re not helping networks to COOK Report: But the disk farms you do peer better with each other, we’re just rout- those other three as well as being your cus- tomers? have presumably are highly flexible and ing around them. So if, let’s say the content highly intelligent and they can have some provider is on Network C. And our user and Freedman: All of our customers have boxes number of gigabytes or even terabytes of our boxes, one set of our boxes are on Net- data that probably... I mean, if you look at work A. If I try to go from A to C.... in web farms somewhere. And many of our customers have boxes in web farms at an average disk farm that brings your customer’s data out closer to the periphery, COOK Report: And A is the poorly peered Globalcenter, Exodus, Abovenet, UUNET, one. AT&T, BBN.

252 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 how often does the content of this data copies of the data so that there’s lossless through Akamai, if I choose to do so and change? Very, very frequently, I would connectivity all the way to the end user. that this is data for which I don’t have to guess. pay you? COOK Report: Lossless? Freedman: Well, it depends. If it’s an ob- Changing Topology to ject that doesn’t change, it doesn’t change. Freedman: Lossless. So, that doesn’t relate A lot of the content we serve doesn’t change. to storage at all. That just gets split and com- Ensure Reliability A lot of the content we serve are live streams, bined and ultimately the clean packets are which are one to many, and dynamic. And served, ideally, right at the edge, a few IP Freedman: Right. The Akamai system has some of the content we serve is dynamic in hops away from where the end user is sit- never failed, but it means that were there a nature, like in SSL, so it’s one-to-one and ting because there’s nothing we can do with problem, you could just instantly stop using dynamic. that to make it sit on a hard disk. Akamai. COOK Report: Okay, I think Washington COOK Report: How much of this stuff, COOK Report: Or in the so-called “tem- Post is Akamaized on your website. You though, does the customer want, perhaps, plate” that I’m just beginning to play around have a big newspaper like Washington Post, cached, so if I miss it, I can come back and with thinking about, you can stop using the are you saying, for example, that they would get it 30 minutes later? horizontal mesh for distribution and go to have their main web servers that they them- the older more traditional vertical stream of selves are responsible for getting content Freedman: Well, okay, but there’s live the backbone networks and their down changes into and out of, but that you would streaming and there’s not live streaming and streams. In other words, the horizontal way take their basic page format and their struc- they’re different. But, cached is no longer of distributing, the Akamai way of distrib- tural skeletal formats that presumably don’t an appropriate description. uting versus the traditional, vertical, send it change all that often and store it all over the up from wherever I am into the backbone, place. COOK Report: Captured? let it go across backbones and back down to the edge again. Up, across and down. Freedman: Right. Freedman: Captured or put to the edge, whatever. Akamaized. The content provider Freedman: We’d perhaps describe it a little COOK Report: What do you do with the has to change the name of their things so differently. Let’s just say from our perspec- stuff that changes? If you have stuff on lo- that they’ll fit schema expected by the tive, it’s a two-dimensional space in terms cal storage and I’m requesting it through Akamai name servers. of where the packets will go. We ripped them your local storage, there must be some kind out of their plane into a higher plane, which of a mating process that goes on between COOK Report: In other words, if I had a is the Akamai plane, shuffled them around the dynamic, brand-new, fresh data you live stream, I could give it one sort of Akamai and then drip them back into the what we might have to grab from somewhere else and URLnumber and it would be treated as a live view as the two-dimensional Internet. some of the static data that you might have stream. If I wanted that live stream also cap- locally? tured and held on disks for people to get later, There are other people — like Sandpiper, I would presumably have some other code who is now owned by Digital Island — who Freedman: Let’s say you’re a content pro- that I would assign to the data as well, is actually had similar concepts, although they vider, you have a web page. The web page that how it works? don’t do dynamic stuff as much, and, as a lists the objects and other web pages. It’s in result, they look more like web caching. And the source code for the web page. The ob- Freedman: That’s not quite the way it you say, what are the differences? The dif- ject is defined as, let’s just say url 1. So then, works, because the live streaming versus not- ferences are we have more servers in more each region, when our network notices that live streaming is a slightly different format, places and we’ll always, and we know ex- there’s a new url that seems to be popular, actually. actly where to put our servers. Our networks it’ll be distributed out through our network. works, it has never failed, like most of our Now, as soon as the content provider changes COOK Report: But do you have a general other competitor’s networks have. And the their web page, it’ll be distributed, just so principle that if I’m a customer and I have reason is because of our good algorithms. long as it’s a customer. data and I want to treat it in various and sun- dry different ways, you can give me a menu You know, what algorithms people look at. Now, let’s say that they want to change the that says here’s all the things we can do with For example, Tom Leighton, the head of the image that’s at the top of their web page, your data. The numbers on the menu might algorithms department of the math depart- that effectively looks like it’s the top of their run from 1 through 75. ment of MIT, so he’s not a dumb person. web page. They make it a different url. Then Some of the questions on which they must it magically is fresh, because people stop Freedman: We call them type codes and, focus are, will my algorithm terminate? Will asking for the old url. The new url gets magi- yes, you can do that. And, yes, that’s part of it terminate and give the correct computa- cally distributed throughout our network. the ARL or Akamai Resource Locator. It’s tion? As I scale, how much extra time for it There’s no freshness issue, because when the an extension of the URL. take per unit input? So what’s the order of name of the object changes, we know that the algorithm? As I scale from 100 nodes to we have to redistribute. But what I meant to say specifically was, if a million, am I going to see the super-expo- you’re CNN, you can change the objects to nential breaking of the network? That same website may have streaming go- not refer to Akamai’s name servers and then ing on of a live interview. Let’s say CNN, you’re not paying Akamai to distribute that. This is the kind of analysis that yields a net- because CNN is a customer of ours. We can’t You have control at any time over whether a work and design that scales and doesn’t push that onto a hard disk because, it’s live. portion of your content is being distributed break, which most of our competitors have So we then set up these virtual communica- through Akamai. had problems with scaling and breaking. tion paths inside our network that enable us This is the head start we have. The fact that to take the data from CNN, distribute it in COOK Report: What you’re telling me also networks want us in their network, because such a way that it’s replicated in to each node. is that I can send out, web data, streaming we have a few percent of their traffic — you It’s not binary. It just adaptively sends extra data, whatever, that doesn’t get distributed know, we have Yahoo, CNN, , Mot- 253 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA ley Fool, all these websites, Barnes & Noble, likely that you’re paying to take packets from COOK Report: So your argument is when Amazon — means people really want us in our customers to your customers. you come into me and want to put boxes in their network, which makes our job easier. my POP’s, that you’re going to give me ac- When someone, if I wanted to start up a net- COOK Report: Okay. Because it’s the eco- cess to your network and your customers. work to compete with Akamai, how would nomic argument that I’ve been missing here You’re also going to give me access to some I convince people to put my computers in and that’s what I want you to give me. of your bandwidth, for which you’re not the pops of their network, give up the colo going to charge me. But on the other hand, space and all that, when I have no traffic Freedman: Or, well, there are two econom- you get what is a win-win situation, because and therefore I have to pay them for it? ics. One is the economics of our relation- I can show you how, how in return, for that ships with our network providers, which is X percentage of your bandwidth that you’re COOK Report: What you’re getting at is this sort of what I’ve been involuntarily pro- going to give me without charging, you can is a thing that probably can be done success- moted to be in charge of. And the other side save Y amounts of money in transit charges fully once, period. is why it makes sense for our customers. and Z additional amounts of money in pack- Which is very simple, they serve more traf- ets that you only have to get to the edge of Freedman: Right. But of course you never fic to their customers, more quality traffic, your network and onto our boxes one time. say never. We’re certainly not cocky. I mean, their customers are happier, they buy more. Or you only have to get them there once a someone will come up with the next most Or they view more, which lets them charge day instead of a thousand times a day or brilliant idea. money for the services they are in business whatever. to deliver. COOK Report: Or you can do it once and Freedman: Right. But let’s look at what probably only do it once the way you did it? COOK Report: In other words, hey, guy, happens when you hit a network that doesn’t you’re a network, you’ve got to serve con- want to work with you? The reason why Freedman: Right. I’ve had people ask me, tent now, as well as e-mail and mail lists, networks don’t want to work with you is even inside Akamai who are not technical, people are not going to be happy with you if because they think they can do what you do. say, okay, so we respect your opinion, Avi. you don’t do a good job of serving content. They don’t like the fact that when one of Is what we’re doing really rocket science? Therefore, we have certain content service their customers Akamaizes, their traffic goes Is it really true that we have all these smart solutions to offer you. down. Let me just tell you this, I know within things? What I tell them is, Yes, but, at this a pretty good amount how much traffic ev- point mostly we’re writing code. The thing Freedman: More importantly, your users are ery autonomous system on the Internet sends is, at any point, we can get 50 people to- requesting content from Yahoo. There’s no and receives. And who they’re connected to. gether and have more brain power than any- question about this. And I can tell you how one else in the network industry to solve any much traffic per second I’m sending into COOK Report: And you know this because problem or react to any threat or, if the next your network. Even if I’m not sending it di- of the number of boxes you already have big thing comes along. I mean, that’s the cool rectly, I can tell you how much is finding its out there on the ‘Net? thing about working with all these smart way into your network. And it’s probably people. Because you never want to say no finding its way either via transit, which is Freedman: I know this because I serve gi- one else can do this, it’s just harder. expensive, or in just two locations, whatever gabits per second of traffic, I know where it your East Coast and West Coast peering is goes. I have partnerships that let me get COOK Report: You feel like you have a and then you have to carry it to all its desti- netflow data and cache logs from people, so better critical mass of talent that you can nations. It’s using your long haul capacity. I know where the eyeballs are. I also, on the bring to bear on any given problem. Not only is it using potentially your transit, flip side, know where the content producers or your peering, which is limited in the sense are. How much they are by net, what net- Freedman: Right. We have 150 super-smart that it has to be integrated and costs some works they’re on. Let’s just say I have a net- people in R&D. The company grew from money. But it’s also using your long haul work. Most networks sell to ISP’s. The ISP’s R&D, really. capacity. want us in their network, we go there. Now, they’ve got T-3’s that they’re pulling more COOK Report: At one level, I see what COOK Report: Okay, so you can save me data than they’re sending. Remember a DS3 you’re doing, but at another level, I still don’t money, how? is full duplex. As much data out as in. In see one thing in it, and I think it’s terribly such a situation this network will have some important and maybe you can take me Freedman: So if you put my boxes in every unused out bound bandwidth. So I can go through it step-by-step-by-step. And that is, one of your POP’s, then you have to pay to that ISP and say, Hey, I’ll pay you a couple I mean, you have a network, but you don’t less money. For your backbone is not used of hundred bucks to get my data out. have a network. You don’t own any leased as much. You can still charge your customer lines. I think what you’ve been telling me in for delivering the packet to them if that’s COOK Report: I saw you do this a month part is you’ve built up a critical mass of cus- what your business model is, but you didn’t ago on a mail list. So this is what all your tomers and tools and servers and so on where have to pay to bring it from the East Coast queries were all about?. you can go to someone like a Cable & Wire- to the West Coast to Ohio. less and you can tell them it’s to your ad- Freedman: Yes, exactly. So if a network vantage to give us rack space for our equip- COOK Report: Well, in other words, you’ll doesn’t want to let us in their network, what’s ment... I mean, what would you tell a big, have to pay once or twice to bring it there, going to happen is, we’re going to serve from new network that you’re going into and but you won’t have to pay to do it 10,000 their down stream customers and they still knocking on the door for the first time, what times a day. get no money. Their customer’s utilization is that you tell them? winds up creeping up or being symmetric, Freedman: Right. And, if you have a prob- but they still aren’t getting any money them- The Economics of lem in your network, we can do the dynamic selves, so they might as well let us in their routing thing, so your customer (for the con- network. Distribution tent they get that’s Akamaized) will still get a good experience so they don’t get as an- COOK Report: And telling them this was Freedman: We say, right now, it’s quite gry with you if you have a problem. essentially just another way of causing 254 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 people who might be resisting working with because god help you, that might encourage signed up. And by the end of 2000, we think you to realize that, if you can get the traffic people to use bandwidth. Really, that is the we’ll have 2000-3000 ISPs in the Akamai out and the ISP can get the traffic out, and, way that many people in the Internet think. Accelerated Network Program. To put that if both of you can do it with highest quality into context, and lowest cost, then they too ought to work COOK Report: And Abovenet did not think the biggest networks may have as many as with you? that way. For this is one reason that the web 300 peering partners. hosting centers, other than Abovenet, would Freedman: Yes, but some networks it’s true have problems with people who wanted to COOK Report: A hundred of these guys think that they are going to buy some magic use serious data in a bursty fashion. being big data center guys? boxes, perhaps from Inktomi, and do exactly what we do. Which they can’t, because they Freedman: Yes. But to give credit where it Freedman: No, being ISP’s. So by the time don’t have boxes in other networks. They’re is due, let me just say that Globalcenter was I got there full time in December, they had restricted to using their own network. pretty early on with the gigabit product also. two things going. They had buying from But Abovenet was like, here, take gigabits, networks and data centers and deploying in COOK Report: But how all of a sudden did because Abovenet realized, if people don’t ISP’s. What they didn’t have was a set of you grow this critical mass so damn quickly have gigabit speed attachments and they people that were comfortable laying hands- and when did you grow it? want to do gigabit bandwidth, they can’t. on routers and such. And capable of talking to networks and making it clear that if they COOK Report: So in other words, some didn’t give the bandwidth that they prom- Akamai Started Its other people began to grok the Abovenet ised, that there would be detection and Deployment from the Big model as well. speedy complaining about said lack of band- width delivery. Hosting Centers Freedman: Right. But groking and chang- ing are two different things. The first gen- COOK Report: So when you go into a net- Freedman: Yep. Well, one answer is Akamai eration data centers were simply not of the work and they agree ... went into all the big hosting centers. Most correct scale. But note also, that AboveNet, of them turned out to be incapable of deliv- who tried to peer with everyone, still can’t Freedman: To put it bluntly, if I talk to some- ering much traffic, because of congestion, get into the super edges without years of ef- one and work out the architecture, they know bad design. You know, most hosting centers fort. It’s much easier for Akamai to ship a that if they don’t do it right, that I have un- say, oh, sure, you can burst to 300 megs per couple of boxes into JoeNet, Omaha’s local derstood exactly what we agreed to and I’m second, but when you try bursting at 50, they ISP, than it is to get a telco cross-connect in, going to go back, trace the cables and get on call you up and say you’re hurting their other or to justify the cost of a ds3 into the 8000 their case. But unless the ISP’s steal our customers. networks who only use a t1 or so of band- hard disks or plug their boxes into our width. switches or try to break into our computers, COOK Report: So you came in there with a then we cannot get unhappy with the ISP’s. technical solution to a problem that initially COOK Report: I infer what you said just by they didn’t realize they had. But they were my knowledge of the history of the Internet COOK Report: Okay, give me one sentence realizing it that they had it when you came that the first generation one were those built that describes how you then come into an in. primarily by the carriers, by the large tele- ISP and what you expect, what you put there. phone phone companies. The huge size of And then contrast that to what you come into Freedman: Yes. They were recognizing that, the Tier ones did not allow them to move as a data center with, because you’re saying Abovenet was the only place they could fast as you would want in the internet age to the two are quite different. burst to a gigabit on demand. expand the data centers they had. As a re- sult, the first generation data centers built How Being Paid for COOK Report: And some of the carrier ori- by the first generation of internet backbone ented hosting centers were suffering from a providers are the ones where you’re least Traffic Changes the certain Bell-headed mentality that caused likely to be able to do a 100 megabits a sec- them to be slow to understand their envi- ond. Business Model. ronment. Freedman: Some reasonable inferences. In Freedman: With an ISP installation, we ship Freedman: And not very interested in shar- this context Akamai is going to be doing a switch, some computers, a terminal server, ing that reality with you. In other words, peering which for us is a very strange con- consoles, a power supply. Basically, it’s all what date am I going to get the circuit in- cept. When someone says to me: come to set up, except they have to type the IP ad- stalled on? Well, they’ll give you a date, even my peering point, I say, what AS’s are there dresses into the computers. if they know they have no intention of even and who is likely to peer with me there? The putting fiber into the building by then. answer to these questions determines COOK Report: To make the configuration whether it’s a cost benefit for me to go there. mesh into their network. So the position they were in was, the naive And as far as that goes, I know how much assumption of someone coming from a pure traffic goes to each AS, so I can just do the Freedman: Yes. So, obviously, they have science background is that if someone’s in numbers very easily and say, I need to send physical access, they can steal the equip- the business of selling bandwidth and they this much traffic to, these AS’s are there, and ment. They could plug their computers into want you to be able to give you the band- they’re the ones to which I need to send traf- our switch. They could plug our computers width so they can deliver it. Makes sense, fic. into their switch so they can try to sniff the right? They didn’t understand that the traffic. I mean, we’ve deployed in countries Internet came from a model where you sell At the same time as Akamai was deploying where they’ve tried to reverse engineer what someone a pipe and hope they use none of the big data centers, it started the outreach we’ve done. They can take the memory out it. This mindset sees the network as an ex- program that it called the Akamai Acceler- thinking we wouldn’t notice, because each pense and everyone wants to minimize ex- ated Network Program. By the end of 1999, of our boxes ships with a gigabyte of penses. You don’t want to over-provision it, they already had a hundred of these guys memory, which is worth a few thousand dollars. 255 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA So our concerns about ISP’s are only that and bill them and all that. got five places on the face of the Earth that they don’t mess around with our gear, basi- your OC3’s are going to begin, where are cally. We’re not expecting, and they’re not But I haven’t answered the question about they going to be terminated? promising us that they’re going to give us what is being drafted on Akamai, what net- 400 megs per second connectivity. Really, work people bring. We’re buying OC12’s Freedman: In the hosting center. We’ll stay they only hurt themselves if they don’t give into the biggest networks that don’t have in the hosting center. We’ll just get an OC12 us the best connectivity they can. And they good hosting centers. into their backbone, instead of riding in their understand that. They want us to be able to hosting center aggregation architecture. And steer them traffic to the users, because their COOK Report: So you are saying that you if they don’t want us in their data center do- users want the data that our content provider are prepared to go to some lengths to get ing OC12, we’ll get a little hut in the back customers have. around this problem of people in hosting or closet somewhere and, because if the centers saying: “oh, my god. You want me OC12 falls offline every now and then, it’s Now our problem in dealing with hosting to be able to hold off a vast percentage of no big deal, since we have more capacity to centers tends to be that we can’t get the band- my traffic for you just in case you need it.” I that network than we had before. width we want. Because we say, we want to gather from what you said, they’re rather be able to burst 100 megabits a second. We resistant to that. COOK Report: So you’ll wind up having to tell them that we’re going to commit to you pay some kind of X quantity of money to that we’ll do 10 megabits a second. There- Freedman: Well, the business people agreed each of these five hypothetical centers that fore, you’re going to keep available 90 to it, but their technical people refused to you wouldn’t otherwise be paying for, but megabits per second. But when we find that implement it. in return for the benefits that you see getting we want to use the extra 90 megabits per out of it, it’s a worthwhile expense. second, the chances are it isn’t there. Why? COOK Report: So are you saying, then, that Because they’ve aggregated everyone into in order to deliver the kind of Quality of Freedman: Well, that’s the other stupid their routers. Because they don’t understand Service you want to and the kind of service thing, is that people charge more in their that unless you give people the capacity you that gets you paid for the bits you deliver, hosting centers than they do for their back- said you would for their traffic, you can’t your business model now is changing such bone connectivity. bill them for delivering the bits. And people that you are going to begin or you actually still want to aggregate the hosting centers. have begun to buy some of your own bit COOK Report: So the amount of money is pipes? non-trivial? COOK Report: Well, they want to make sure that their traffic capacity in and out is fully Freedman: Yes. We are now beginning to Freedman: I’m just saying it doesn’t wind used. manage routers, because that’s, not because up necessarily costing us more money to get we want to, but because that’s the only way a burst of OC12s than to try to get into the Freedman: Yes. That’s the problem. Be- we can get into some of these large networks, data centers. Because the dollars per mega- cause the way IP works, you don’t want to because you can’t get in through their host- bit is lower on OC12s than it would be were get to where you’re fully utilized. You want ing centers, because their hosting centers are I inside big peoples data centers. to get to where you keep your versatility and not scalable. So, fine, we’ll make pipe con- capacity. You can’t engineer to be almost nectivity to you. No problem. COOK Report: Give me a specific situation. fully used, because then you’ll hit conges- tion. It has to do with the way TCP works. COOK Report: And you’ve got to attach Freedman: Joe Very Large Network wants those big pipes of connectivity somewhere to charge me $550 per megabit inside their People are looking at five minute averages, else. hosting center. That’s their bottom line price and therefore are not seeing the instanta- because their backbone charges them $500 neous, less than one second bursts that hap- Freedman: We’ll just rent some space, find a megabit, because they want to make profit pen quite often. Naive people think that you the closest place where the OC12 can ter- centers. But they’ll sell to an ISP at $400 can keep 90% utilization and that’s a good minate into their network, get some space per megabit. thing to do, because you are using your re- and stick some boxes right next to it. sources efficiently. In reality, if you’re do- COOK Report: Why do they do that? ing 90% utilization, you’re squeezing your COOK Report: But now for the first time customer’s traffic, which means their flows you’re going to start to build and physically Freedman: They try to sell their hosting are smaller, which means they can’t send you run your own network. center to content providers as a premium traffic, which means you can’t bill them for space and power and one, theoretically, some it, which means your revenue’s lower. Freedman: Ah, but it’s not a physical net- redundancy and scalability of facilities. But work. The point of it is, to get the OC12 in, that’s a different question. A lot of people are very confused about traf- we’re not aggregating that OC12. Nor are fic engineering and what the goal of run- we aggregating the network A’s OC12 with COOK Report: There are extra charges for ning a network is. The goal is quantity of the network B’s OC12’s and making mega- the physical facilities, but they make the service, not Quality of Service. POP’s. We want as fine an overlay mesh as bandwidth a little bit cheaper? possible. We don’t want more than a per- As Dave Rand (AboveNet CTO) says, Qual- cent of our connectivity going through a Freedman: No, they make the bandwidth ity of Service is where you say, if you ping single point of failure. more expensive at hosting centers. They me more, I’ll drop his packets first. Isn’t it charge $500, $600 a megabit per second in better to be in a state where you don’t have COOK Report: I understand that. But what the hosting centers. But remember that these to drop packets? Where you charge every- if you’ve got, say, on the face of the Earth, older hosting centers are each connected by one enough money that you can just afford to choose an arbitrary number, five data cen- only two OC3’s and they have a hundred to have essentially infinite bandwidth avail- ters that are giving you problems of being customers in them. Now how could they able for their use? I mean, that’s the point, able to get the right connectivity into them. possibly give Akamai 300 megabits per sec- right? That’s the point of doing network- Let’s say you’re thinking of an OC3 into ond in connectivity if they only have 300 ing is to be able to make happy customers each of these five data centers. OK, you’ve megabits per second into their hosting cen- 256 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 ters which have a different AS number than get this damn OC12 from exactly where to it. their network. That’s how seriously these are exactly where? You get it from the web farm different networks. around to the backbone such that you’ve got COOK Report: If back in February, Yahoo a separate link that may be 100 feet or some- was seen from several parts of the U.S., if I An ISP is not going to be buying into a host- thing? remember correctly, to be essentially un- ing center. An ISP is going to get a T-3 or an available. But from other parts in the world, OC3 into a big carrier’s router. So we say, Freedman: It might be sitting inside Joe’s Canada and I think abroad, it was quite avail- we’re congested. They say, oh. Okay, we Network, where our rack has more connec- able. How come? could in four months give you a port on this tivity than the whole data center does, be- router rather than running through a switch. cause that’s what we need. And the leased Freedman: This is actually a pretty long Well, but what router? Oh, the customer at- line guys, leased lines don’t get aggregated answer and there’s another product that we tached router, okay put us on the backbone as much. And by buying OC12’s, you make have that really helps with this, which I’m router. Okay, we’ll put you on the backbone sure, I guarantee you, if somebody’s aggre- not sure I can tell you about. But this is a router. Where’s the router? Oh, the backbone gating an OC12, they’re under congested in complicated answer to get correct, because router still only has an OC3 into the big car- a lot of their backbone. Most people don’t Yahoo is a customer and they do buy a few rier network. And still has a hundred megs have customer-attached routers you can put different services from us. But the bottom per second of traffic on it. OC12’s on. Or, if their hosting center is full line is if someone is only serving html from or they see what we’re doing and they don’t a couple of places in the world, then it has They can’t provision additional OC3’s, be- like it, then we’ll rent a room somewhere, nothing to do with Akamai. Unless they’re cause they’re not doing a gigabit architec- put the OC12 in or we’ll bring it into an- serving their front page through us, if they ture. The other carriers are all the same way other data center. Or whatever, but we will get attacked, they’re not going to be avail- because they are all using Cisco 7500’s and do it in such a way that we begin to aggre- able, they’re going to be offline. But there is a couple of OC3’s. But the irony of it is gate multiple sites, but not grow a long haul a lot that relates to what we do and how we they’re charging more, because this guy who network. And I don’t want, if I’m sitting at do that provides good protection against wants three megabits per second of connec- Abovenet, and I have a gigabit to them that denial of service attacks. tivity, it’s worth it to him to pay 50% more I can actually use, I don’t want to start bring- for the bandwidth to not have to worry about ing OC12’s in there, because that means, if COOK Report: So where is all this headed? running a router. But for us, that’s unac- Abovenet has a power problem — they ceptable. never have, but let’s say they do — a lot of Freedman: Well, my group at Akamai is my connectivity is affected. I don’t want to integrated. We have two main functions. We COOK Report: And the ISP hopes he gets aggregate these things and put them near work with R&D, especially in the realms of adequate service. Or does he really get ad- each other. So it might be inside the same how the computer is attached to the infra- equate service? hosting center, it might be somewhere else, structure, because that’s sort of controlled whatever, we get an OC12 into their router. by R&D, so moving from fast DSL to Gig Limits to Scalability of Ethernet and beyond, that’s a network ar- COOK Report: Well, I have one other par- chitecture issue. And my group is network the Vertical Peering and allel question. Does the structure that you architecture. We work with the map- have provide a means of helping big ping group to better understand how the Backbone Connectivity websites deal with distributed denial of ser- Internet fails. Model vice attacks? Or is that totally orthogonal? COOK Report: The mapping group being Freedman: But he does get adequate ser- Freedman: Yes, it does. But wait: are you the group that looks at traffic patterns? vice. Because if you have fifty people using talking networks or customers? Networks or 3 megabits per second, most of them don’t content providers. Freedman: Yes, there’s a group that builds start using 3 megs per second the next day. a map that’s supposed to be accurate to Most of them grow very slowly. That’s how COOK Report: Content providers. within seconds of the complete performance the carrier makes the model work for the reachability information of the Internet. I ISPs. But for the big websites huge need is Freedman: Oh, yes, sure. Because if some- wish I could spend all my time in that group, there right now. Therefore, they can’t be one attacks one of our regions, the region but my people are needed to help with the accommodated in this architecture. just falls offline. Our network operation cen- building of the network also, because that’s ter doesn’t, isn’t required, really. Because the really interesting stuff. So what does that mean? That means that network self-heals. Akamai was already on the path towards Thus we work with the mapping and per- moving out to the edge. Broadband, big Now, we don’t go out there saying, buy our formance analysis groups in R&D, but we ISP’s, like that. But some of the, but how do product and you’ll never be down. Buy our are, for now, really directing the network you get into the bigger networks? The an- product and you’re immune. But if some- architecture and strategy and deployment swer is not through the hosting centers. The one attacks, let’s say they’re attacking con- parts of the company to ensure three things. answer is now Akamai needs to start look- tent provider A and one of our regions in a We want our networks to be burstable, with ing like a network — even though it isn’t... hosting center is right next to that, that re- excellent performance and to also be the Now this is where it can hurt your brain. gion may go offline. But our algorithms au- most effective at the lowest cost. tomatically redirects the requests somewhere COOK Report: Yeah, right, go ahead. else. Remember when I told you the map- COOK Report: But your network’s not re- ping, some of the name servers handling ally a network, it’s kind of a virtual overlay. Freedman: So we’ll get OC12’s. Now there each region are actually elsewhere. So if a are some networks that don’t want to put us big hosting center in Bay Area goes offline Freedman: Right. Our virtual overlay net- in their network, but have completely open because of a denial of service attack, it work. Our bunches of boxes. peering policies. doesn’t effect anything in our network and to the extent that the content was pushed onto COOK Report: And where you are needing COOK Report: But you get an OC12, you our network previously, then we still have them, you are getting either semi-permanent 257 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA or temporary patch solutions within a data work A. And I say to you, okay, you’re cost combined ASNs of ATT Worldnet, Cerfnet, center to get from point A to point B through is $25 per megabit for these circuits. Let’s and the old IBM Global Network (now the data center’s network or if the network say I put boxes next to each one of your peer- called AGNS). AOL’s > 10% is the combi- is performing poorly, you’re in there to ne- ing pipes and pay you $100 per megabit. nation of a number of AS numbers. gotiate, how you will go from point A to Now you’re sending more traffic to that net- point B, via detour of this separate OC3 cable work, so you look more attractive as a peer Note again that the following networks are if need be. and you’re making some money and you’re listed in terms of where the eyeballs making three times what your cost is. (Akamaized bits are being sent) are, not from Freedman: Right, or into the backbone. But where the bits are originating. Only ISPs and we’re also deploying peering regions. Be- That’s another way we can deploy. So it’s other networks that are multi-homed; truly cause there are bunches of providers out just using creativity to figure out what the Tier 1; or got an ASN before 1996 or so will there. And there are some people think, like best way is to get our customer’s traffic to appear in this list. Finally one must note that from your question, who think that we’re the end users of networks who, in some the table counts all traffic that CAN cross caching which is OK. What they don’t real- cases, aren’t yet on the page in terms of let- any given network. So let’s say that on its ize is, if they just BGP peer with us, data ting us deploy all over them. way to Joe’sNet which terminates 0.20 of magically appears. Consequently, we’re Akamai’s total traffic, the traffic transits going to set up a router. We’re going to peer- COOK Report: And so obviously they’ve UUNET or Sprint or any other backbone. ing points. We’re going to be peering with come to you as someone who, over the last In such a case the traffic in question is people over peering points and begin look- several years, has developed a very, very counted both for the transit backbone and ing sort of like a network from that perspec- good knowledge of the players and how it for the net where it terminates. The actual tive. works; who the people are; the technical totals of the percentages add up to roughly scalability issues. Plus, if somebody tells 277% of aggregate traffic meaning that the COOK Report: So you’re extending your you they’re going to do such-and-such at a average IP prefix is multi-homed 2.77 times. virtual network, you’re extending it a bunch big data center, you know and they know of different and new ways. that you know they know, that you can check up on them and hold them to what they’ve There are 2 networks > 15.00 %, Freedman: Yes. And in Europe and Asia, agreed to do. UUNET and Sprint bandwidth isn’t necessarily costly, necessar- ily, if I do it right, because let’s say you’re a Freedman: Yes, that about wraps it up. There are 2 networks > 10.00 %, network that’s peered in Asia. And I come AOL, and ATT to you and say, I can give you ten megabits per second to give to all your peering part- Some Akamai Traffic There are 4 networks > 4.00 %, ners and I’m not going to charge you for it. There are 6 networks > 2.00 %, What’s the value proposition? Those peer- Statistics There are 4 networks > 1.00 %, ing partners would otherwise have to pay to There are 34 networks > .50 % bring that data in over international circuits. [Editor’s Note: An email discussion with There are 56 networks > .25 % That’s very valuable data. I call our boxes Avi Freedman on April 15 - 16 yielded the There are 22 networks > .20 % sometimes Magic Traffic Generators. I can following postscript..] There are 44 networks > .15 % put them there and make more traffic ap- There are 85 networks > .10 % pear, as long as the quality’s good. Since Akamai bills its content providing web There are 61 networks > .075 % sites in terms of the aggregate content re- There are 139 networks > .05 % So it helps them. When you’re in their net- quested from each of the sites world wide, it There are 77 networks > .04 % work, if you can double bandwidth at no cost must keep good track of the aggregate data There are 95 networks > .03 % to you, you all of a sudden look more attrac- shipped to its servers at the edges of the There are 197 networks > .02 % tive to peers internationally, because you’re Internet. Or, in more traditional e-commerce There are 487 networks > .01 % giving them much more traffic. Therefore it terms, data delivered to end user “eyeballs.” There are 196 networks > .0075 % helps us to widely deploy in peering points There are 378 networks > .0050 % there and even if we don’t peer with people, When Akamai aggregates this data, it does There are 721 networks > .0025 % just by physically putting our content there, so in terms of the AS (Autonomous System There are 885 networks > .001 % they may decide to give us their good con- Number) of each network. While there are a There are 2849 more networks nectivity. few AS numbers that would generally not be thought of in terms of ISPs numbers and Traffic to Europe is accounted under each Now in the U.S., let’s there’s a network A, a few ISPs that have more than one AS num- large transit AS. Europe is about 8%, Asia that doesn’t want us to deploy inside their ber, ISPs globally tend to have a single AS about 3%, South America about .5-1%. network. But they peer with 50 other net- number for routing purposes. While the size works. They don’t want to peer with us be- of the Internet can be measured in more than Listed in alphabetical order the 14 networks cause they think they want to compete with one way - for example by numbers of email in the greater than 1 percent but less that 10 us. accounts - when networks are ranked accord- percent categories are Abovenet, BBN, Bell ing to their percentage of Akamai traffic re- Canada, Concentric, , Exodus, But they peer with all these people. There- ceived one can certainly get some idea of Globalcenter, @Home, Level3, PSI, Qwest, fore all I have to do is go to the people they their relative size. The top four globally in Splitrock, Teleglobe, and Verio. peer with. Now let’s say you, Gordon, are terms of percentage are UUNET, Sprint, one of these networks that peers with net- AOL and ATT. The total for ATT here is June 2000 COOK Report

258 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001

Part Six

ICANN

ICANN's performance in 2000 was just as reprehensible as the year before. Considering it to be a known and potentially dangerous entity about which mere 'humans" can do very little, we repint here only two articles. One is our own analysis from our May 2000 issue. The other is our summary of Michael Froomkin's 168 page Duke University law review article that finds the Commerce Department to have acted illegally in the creation of ICANN.

259 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA

reverse argument," it is "its single point of encing the outcome. However the play act- Executive Summary failure." ing also serves ICANN interests in that it can be spun by ICANN’s public relations With something as powerful as the Internet, firm in such a way that the casual press lack- Breaking the ICANN everyone wants more and more to seize con- ing the time and ability to do its own research may be fooled. Therefore ICANN has trol, if only to keep others from controlling Code, pp. 262- 268 it. It certainly can be argued, as Gerck does, bought the administration some short term that the struggle for control of DNS has be- time to regroup and maneuver. Various court decisions are making ever come the focal point over the last four years more clear the advantage that possession of of a diverse coalition of actors (trade mark What we have done in this article is demon- the root gives to the US in maintaining its interests, IBM, ATT and others) that have strate (1) why ICANN can be nothing more than a temporary fix (2) how ICANN is commanding lead in global e-commerce. gathered together to form ICANN. It is gen- This is leading to resentment abroad. Given erally assumed under US law that the orga- likely to fail (3) why the consequences of the course on which we are all headed nization which controls an entity bears le- this failure will hurt the United States more than it will hurt other nations, (4) why from ICANN is likely to be at best a temporary gal responsibility (liability) for the use of its band aide on a festering sore until decisions power. Gerck suggests that under the condi- ICANN's efforts designed at all costs to of foreign courts or governments fracture the tions of a single handle of control over the shore up what is really an untenable effort to maintain long term central control over US-controlled, authoritative root. We dis- Internet, the controlling organization’s liabil- cuss both some of the ways in which this ity is potentially total. Thus given the nature Internet addressing there needs to be a switch fracture might take place and what impact it of ICANN’s use of DNS as a means of grab- to efforts aimed at placing in the hands of each user the means by which he or she shall would likely have on the Internet's opera- bing control over the Internet, the liability tion. facing ICANN and anyone else who would be able to address and find Internet objects. emulate it is essentially unlimited. As a re- ICANN was created as a diversion on the While a fractured root would certainly not sult, in structuring ICANN it has been nec- destroy e-commerce, the very fact that it essary to insulate all players from the con- part of Ira Magaziner who conveniently left happened would be likely to pop the specu- sequences of their otherwise unlimited liabil- the administration and returned to private consulting as soon as it was established. It lative bubble supporting the stratospheric ity. prices of Internet stocks. It would demon- is a smokescreen cleverly designed to give strate that a globally-unified forward march We have taken Gerck's essay and used it as the illusion to the rest of the world that the US is transferring control of administrative of the global economy running on internet a template on which we have applied our "rails" is only a pipe dream. Many investors own knowledge of ICANN. This process functions over the net to a world body where and VCs would be forced to rethink the price has helped to bring a number of issues into the Europeans and Asians would be led into thinking they could play a significant role value equations on which their actions have focus for the first time. In its eagerness for been based. Should contention over the root control those who have promoted ICANN in policy making. get serious enough to throw prices of Internet have taken all the critical administrative in- stocks into a nose dive, the United States frastructure of the Internet DNS, IP num- And indeed just so long as they don’t try to would loose far more than any other nation bers and protocols and dumped them into grab the root, American policy is to play in the world. This is very likely what John the single ICANN basket. ICANN along with the Europeans and Asians and Patrick and Vint Cerf and Esther Dyson had acting through ICANN do such things as in mind when they asked the venture capital But having all our eggs in one basket and granting them direct control of their own community to contribute to ICANN last having in the DNS a single point of failure country codes, and the power to enable their summer cryptically warning that if ICANN creates the kind of prize that, as long as we corporations to have preferential treatment failed e-commerce would also fail. Certainly still have national economies competing over domain names on the excuse that such the ongoing uncertainty of how much of a against each other, the US government and names can be treated as trademarks. Many global market for business to business e- its major corporate allies will do what ever other powerful groups have been given an commerce would be easily reachable in the is necessary to protect from foreign capture, opportunity to play in the great ICANN cha- event of trouble for the authoritative root or even from foreign influence. Since rade. would take the buzz off of most e-commerce ICANN is the basket holding all the eggs it, business plans. in the meantime, must be protected from its As long as ICANN is there, it gives the im- unlimited liability by being made virtually pression that others besides the US govern- We arrived at the above conclusions after unsuable. ment will be allowed a role in root server pondering Ed Gerck’s essay "Thinking" policy making and control. In reality the (April COOK Report, pp. 23-25). We find But in order to make ICANN unsuable, its continued heavy hand behavior of Roberts Gerck's article to be a useful point of view backers have had to create for it an arbitrary and Dyson has made it possible to drag out for analyzing some unresolved issues relat- structure that renders it immune from the the ICANN foundation process for another ing to ICANN and the Department of Com- inputs of those communities that it is sup- year getting it conveniently past the upcom- merce on the one hand and the DNS and posed to serve. This arbitrary structure has ing touchy US Presidential elections. As a alleged need for a single authoritative root in turn prevented ICANN from inheriting result the Clinton Administration has been on the other. Gerck sees DNS as the major the political legitimacy within the Internet able to extend the dual relationship of the centralized component of an otherwise de- community that Jon Postel’s exercise of ICANN DoC cooperative agreement. centralized Internet. In his essay "Thinking" these functions once enjoyed. ICANN fol- he says that some of the choices made long lows a carefully scripted routine that sup- The extension makes it possible to preserve ago in the design of the DNS not only make ports its role as guardian of all the Internet's ICANN as a maneuver designed to deflect it depend on a single root but also "without administrative eggs that have been in its attention from the stark fact that without the DNS there is no email service, search single "basket." This scripting greatly an- ICANN, the US administration would seize engines do not work, and webpage links gers those who having mistaken the ICANN the root servers by force rather than loose fail." DNS is " the single handle of infor- process for being one of actual openness control. This is the secret of why ICANN mation control in the Internet. And, in the have invested their time in hope of influ- cannot be allowed to fail. ICANN’s central

260 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 purpose is to divert attention from the fact ICANN Deemed Illegal, In either case, the relationship violates ba- that the Clinton administration has made a sic norms of due process and public policy decision to treat the root servers as a strate- pp. 17 - 21 designed to ensure that federal power is ex- gic telecommunications resource over which ercised responsibly.” it is perhaps even prepared to use the police We summarize and comment on Michael Froomkin’s 166 page 711 footnote long land- power of the state to protect from falling into We believe that it is very important to use the wrong hands. mark paper: “Wrong Turn in Cyperspace: Using ICANN to Route Around the APA and Froomkin’s compelling insights to educate both citizens and the executive and legisla- It would be encouraging to see some inter- the Constitution” to be published by the est in Washington in the incubation of the Duke University Law Journal, October tive branches of the US government. We understanding necessary for the internet and 2000, Volume 50, No. 1. Froomkin’s indict- need to understand quickly what has hap- e-commerce to cooperate in working its way ment in his opening paragraph is succinct: pened and why we should “be afraid.” Out out of the win-lose control situation in which “The United States government is manag- of such education it is to be hoped that legal it finds itself. The route of control has been ing a critical portion of the Internet’s infra- or legislative redress may be found. In a tried. As we have shown in this discussion, structure in violation of the Administrative brief interview with us Larry Lessig explains not only has it not worked, it also looks to Procedures Act (APA) and the Constitution. that Froomkin has provided a road map for be untenable on a long term global basis. It For almost two years the legal that under the right circumstances could is to be hoped that if our policy makers un- Internet Corporation for Assigned Names be used to compel ICANN to change its derstand that we are likely to loose more than and Numbers (ICANN) has been making ways. The almost final draft of the Froomkin anyone else in a struggle to maintain our domain name policy under contract with the paper is a 1.1 meg pdf file at http:// control, they may also come to understand Department of Commerce (DoC). ICANN is www.law.miami.edu/~froomkin/articles/ that they have the most to gain by removing formally a private non-profit California cor- icann1.pdf We also offer comments on the all possible levers of control from everyone's recently concluded ICANN membership at grasp. If it becomes clear that no single en- poration created, in response to a summon- ing by U.S. government officials, to take large elections. We suggest that the deter- tity can hope to control the Internet, many mination of ICANN’s fate is a decision that strains in the present system could be quickly regulatory actions that the Department of Commerce was unable or unwilling to take will impact whether we live in a nation state dissipated. We are a "can do" nation. If the with a legal system accountable to individual administration were to understand that ev- directly. If the U.S. government is launder- ing its policy making through ICANN, it vio- citizens or a corporatist state that is run on eryone would have more to gain from such behalf of the private profits of global corpo- an outcome we believe that there is adequate lates the APA; if ICANN is in fact indepen- talent available to ensure a success. dent, then the federal government’s decision rations. If it is the latter we will find that we to have ICANN manage a public resource have given up the critical philosophical foun- of such importance, and to allow - indeed, dation on which our nation was built. That require - it to enforce regulatory conditions our government exists first and foremost to on users of that resource, violates the non- preserve and protect the rights of each of its delegation doctrine of the U.S. Constitution. citizens.

261 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Cracking the Code: an Analysis of US Internet Governance, E-Commerce and DNS Policy Why US Dominance of E-commerce Indeed is Dead if ICANN Fails & Why the US Has Most to Lose from Continuing a Policy Founded on Indefinite Control of the Root We have found Ed Gerck’s essay “Think- being at least, to escape the potentially un- tration of all technical aspects of the internet ing” (April COOK Report, pp. 23-25), to be limited liability. The registrar and registry to fall into the hands of a single unaccount- a useful point of view for analyzing some can say they are just doing what ICANN able entity whose only interest is in control unresolved issues relating to ICANN and the forces them to do. In turn ICANN can say achievable through the manipulation of DNS Department of Commerce on the one hand that it cannot supervise every step made by and the root. and the DNS and alleged need for a single over 100 registrars and one huge registry. authoritative root on the other. Gerck sees Furthermore in the case of relations between We also contend that the enormous power DNS as the major centralized component of Network Solutions Registry and ICANN involved in control of the root acts like a an otherwise decentralized Internet. In his each entity can skillfully sidestep the neces- magnet to draw the attention of all those who essay “Thinking” he says that some of the sity to deal directly with each other since are dissatisfied by current policies or by the choices made long ago in the design of the the Department of Commerce has inserted fact that their hands are not the ones on the DNS not only make it depend on a single itself squarely in the middle levers of control. Unfortunately instead of root but also “without the DNS there is no trying to ascertain whether there may be email service, search engines do not work, The Clinton Administration has quite skill- technical changes that could render the and webpage links fail.” DNS is “ the single fully freed itself from the controversial po- Internet controllable by no one, as Gerck handle of information control in the Internet. sition of overtly controlling or otherwise suggests, the administration has placed all And, in the reverse argument,” it is “its single regulating the internet by setting ICANN up its (and our) eggs in the ICANN basket. point of failure.” as a private industry organization designed to achieve perfected and total regulatory con- We believe that the decision to vest the lo- With something as powerful as the Internet, trol over the internet through putting IP num- cation of control of the DNS in ICANN has everyone wants more and more to seize con- bers, and protocols in the same single regu- required a chain of supporting decisions to trol, if only to keep others from controlling latory egg basket as DNS. The liability how- render its control viable over time. How- it. It certainly can be argued, as Gerck does, ever is too hot for anyone to handle. In the ever this also has meant that in order to gain that the struggle for control of DNS has be- case of ICANN the very government that immediate viability it has been necessary to come the focal point over the last four years set this up has solved the hot liability prob- create an ICANN whose unlimited liability of a diverse coalition of actors (trade mark lem by approving the design of a set of by- is protected by isolating it from any possi- interests, IBM, ATT and others) that have laws and procedures that makes ICANN, as bility of influence by those whom it is sup- gathered together to form ICANN. It is gen- an organization, accountable to no one. To posed to serve. Such an ICANN has to pre- erally assumed under US law that the orga- the great consternation of many people tend to be what it is not and without any nization which controls an entity bears le- ICANN simply does what ever it chooses. genuine support (save for that of its control gal responsibility (liability) for the use of its Of course as Gerck also suggests it is in the seeking founders) is unlikely to survive over power. Gerck suggests that under the condi- interests of the US Government to see that time. tions of a single handle of control over the control of DNS does not fall into the hands Internet, the controlling organization’s liabil- of some foreign power or powers whose in- Let’s restate what we just said. The point ity is potentially total. Thus given the nature terests are inimical to those of the US. we are making is critical to breaking the code of ICANN’s use of DNS as a means of grab- ICANN under the control of the Department and understanding what the ICANN process bing control over the Internet, the liability of Commerce places ICANN on a leash with is really about. All eggs in one basket and a facing ICANN and anyone else who would the illusion but not the reality that ICANN single point of failure creates in DNS the emulate it is essentially unlimited. As a re- will soon be set fully free. kind of prize in control of the single authori- sult, in structuring ICANN it has been nec- tative root that, as long as we still have na- essary to insulate all players from the con- Therefore, in this article we contend that this tional economies competing against each sequences of their otherwise unlimited liabil- total divorce of ICANN from the bottom up, other, the US government will do what ever ity. consensus-based behavior that it was alleg- is necessary to protect from foreign capture, edly founded on is the result of, as Gerck or even from foreign influence. ICANN it- As ICANN has become the sole authority suggests, as struggle for the single handle self meantime must be protected from its for the administration of DNS, it has acted of control over the DNS and over the single unlimited liability by being made virtually to separate itself from the consequences of control point for DNS - the single authorita- unsuable. the administration of that authority by fran- tive root for the generic top level domain chising it out to one registry and 100 regis- names - especially com, net and org. But in order to make ICANN unsuable, its trars. The entities act as ICANN’s agents backers have had to create for it an arbitrary and are give the ability by means of their We observe that our own government was structure that renders it immune from the franchise agreement with ICANN to act on founded on a separation and balance of pow- inputs of those communities that it is sup- ICANN’s behalf. With the insertion of three ers, in other words on the assumption that posed to serve. This arbitrary structure has new parties (Registrars, ICANN, and US the American political system would rest on in turn prevented ICANN from inheriting Government into a process that last year had diversity and not on a single point of con- the political legitimacy within the Internet only two parties (registrant and registry) a trol. However, given the perhaps inadvert- community that Jon Postel’s exercise of multi-party process has been established. ent single handle of control for the Internet, these functions once enjoyed. ICANN fol- Now instead of one entity (registrar) having the Clinton administration has taken the easy lows a carefully scripted routine that sup- liability for what it does to the interests of way out and for the protection of national ports its role as guardian of all the the registrant, ICANN is able, for the time security interests has allowed the adminis- administrative eggs that have been in its 262 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 single “basket.” This scripting greatly an- is to do precisely what is being done now. as a diversion on the part of Ira Magaziner gers those who having mistaken the ICANN Keep control of the root while all the time who conveniently left the administration and process for being one of actual openness grooming ICANN as an organization that returned to private consulting as soon as it have invested their time in hope of influ- “real soon now” will achieve globalization was established. It is a smokescreen clev- encing the outcome. However the play act- of internet control by giving away to for- erly designed to give the illusion to the rest ing also serves ICANN interests in that it eigners the United States' most important of the world that the US is transferring con- can be spun by ICANN’s public relations cyberspace strategic asset, namely, control trol of administrative functions over the net firm in such a way that the casual press lack- of the DNS root. We have just seen how to a world body where the Europeans and ing the time and ability to do its own research this pattern played out in ICANN’s March Asians would be led into thinking they could may be fooled. So ICANN has bought the 7th to 10th Cairo meeting with the statements play a significant role in policy making. administration some short term time to re- that four members of the current board group and maneuver. would stay on another year beyond their al- And indeed just so long as they don’t try to ready expired terms and the assertion that, grab the root, American policy is to play What we intend to do in this article is dem- in view of unfinished business, ICANN along with the Europeans and Asians and onstrate (1) why ICANN can be nothing would ask the DoC to extend its coopera- acting through ICANN do such things as more than a temporary fix (2) how ICANN tive agreement beyond the September 30th, granting them direct control of their own is likely to fail (3) why the consequences of 2000 expiration date. country codes, and the power to enable their this failure will hurt the United States more corporations to have preferential treatment than it will hurt other nations, (4) why from ICANN currently has all the goods needed over domain names on the excuse that such ICANN's efforts designed at all costs to to become a global Internet regulatory body names can be treated as trademarks. Many shore up what is really an untenable effort save one, control of the root. In the mean other powerful groups have been given an to maintain long term central control over time it has set in motion the necessary ma- opportunity to play in the great ICANN cha- Internet addressing there needs to be a switch chinery for allowing trademark interests to rade. And the cast of characters who have to efforts aimed at placing in the hands of run the Internet’s naming system. ICANN’s fallen for the deception is quite impressive. each user the means by which he or she shall world girdling road show has been played be able to address and find Internet objects. against a back drop of the most arcane and Some like Dave Farber (who should know complicated politics in a way such that ob- the game being played) go along with the The Weakness of the servers have only two choices. dance. For example on Thursday March 9th Farber complained to his IP mail list that Jeri Current Game Plan Those who are part time specialists can ac- Clausing of the New York Times should not cept the official version of events and be re- continue to call ICANN an oversight body. The administration is not getting good guid- assured that ICANN is doing nothing more She should let Times readers decide for ance because it is asking the wrong ques- serious than administering otherwise ob- themselves. What is bizarre about this epi- tions. In our most charitable interpretation, scure parts of the internet’s plumbing. The sode it that several months ago Farber sent prior to the failure of the WTO in Seattle in cacauphony of complaints and accusations out without comment a similar message. For December 1999, the administration may by insiders surrounding ICANNs twists and his effort, Farber was chided by Esther have thought that, with ICANN, it had a turns, must seem dreadfully confusing to Dyson. Now with ICANN’s oversight role single body which it could use to run the general observers unable to give ICANN clearer to everyone than ever before, Dave Internet in the name of a single global matters much attention. To those of us who Farber takes issue with Clausing’s obvious economy. We contend however that in an have become nearly full time captive observ- description. Why will this intelligent man election year with the stock markets at record ers of how ICANN has manuevered the pro- go to such lengths to protect and shield heights and no matter what its actual inten- cess, it seems that the current confusion may ICANN from the facts obvious to all disin- tion, the administration is playing a danger- be of value to the game that is being played. terested onlookers? ous game by turning loose an entity designed Namely one of encouraging European and to run the Internet in the interests of a small Asian interests to hope that the US will give Because, we suggest, that as long as ICANN number of global corporations and at the ex- up control of the root when politically there is there, it gives the impression that others pense of vast numbers of small businesses is no way that this can happen under the besides the US government will be allowed both in the US and abroad. current DNS technical system. Given the a role in root server policy making and con- current confusion there is no way of telling trol. In reality the continued heavy hand The world is more and more a collection of under which shell, ICANN or DoC’s the behavior of Roberts and Dyson has made it nation states with different languages, cul- winning cards in the on going game of three possible to drag out the ICANN foundation tures, religions and economies despite all the card Monte lie. Since as we have seen with process for another year getting it conve- attempts of media pundits to talk about its continual changes of its bylaws, ICANN’s niently past the upcoming touchy US Presi- globalism, global culture and a single glo- rules are to have no rules, it is all a very clever dential elections. As a result the Clinton Ad- bal economy - just ask the citizens of Se- game of deception. So far the rest of the ministration has been able to extend the dual attle. In this context with the election of a world has played along with the charade. relationship of the ICANN DoC coopera- US president and congress only six months tive agreement. away, the administration is not about to give Why Can’t ICANN Be away the control of the DNS root - not even The extension makes it possible to preserve to a global body ICANN that it put together Allowed to Fail? ICANN as a maneuver designed to deflect in such a way that it would be almost im- attention from the stark fact that without possible for foreign interests to control and At various times John Patrick, Vint Cerf and ICANN, the US administration would seize use against the United States. Dave Farber have all claimed that ICANN the root servers by force rather than loose must not be allowed to fail or the Internet control. This is the secret of why ICANN Let us state outright what we have effectively will be in danger and electronic commerce cannot be allowed to fail. ICANN’s central implied above. One way to keep the enor- will collapse. We have repeatedly asked purpose is to divert attention from the fact mous liability given by control of the DNS them to explain their veiled warnings. They that the Clinton administration has made a from landing squarely on the shoulders of have repeatedly refused. We believe that we decision to treat the root servers as a strate- ICANN or the US Department of Commerce have figured out why: ICANN was created gic telecommunications resource over which 263 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA it is perhaps even prepared to use the police sole point of failure of the Internet. ICANN is designed, on the one hand, with power of the state to protect from falling into a schzoid charter to enable American secu- the wrong hands. With ICANN in existence Fast Forward rity and big business interests to hold on to those who want control of the root have two the root no mater what. While at the same obstacles to deal with. On the one hand the time, the public’s attention is diverted from goals of ICANN’s backers and on the other But suppose ICANN fails. A collapse of the corporate-governmental real politik what the US government might do in the ICANN would end the game of “root root agenda of naked self-interest by the false future to maintain US control of the root. who’s got the root” because Commerce then assertion that ICANN is really about Ameri- stands as the lone guardian of the root. With can democracy and bottom up processes. the ICANN deception ended, we suggest that Such claims are dogs that won’t hunt. But Some History the root will splinter because the rest of the sanity will not happen because Commerce world will not accept, without hope of can’t afford to have ICANN succeed. It can- It was not always this way. Through the ef- change, a global system having a single point not afford it because Commerce cannot af- forts of IAHC, control of the root was al- of failure and control under the sole sover- ford to have to give ICANN the root on a most lost in 1997 before Clinton, Gore, eign power of the US government. The permanent basis. The arrogance of ICANN’s Magaziner wised up and the turf on which American desire to maintain a system de- pronouncements will therefore continue. the game was being played changed. To sta- signed to serve the needs of a tiny elite of And ICANN operating in defense of its con- bilize the situation Ira ran around the globe big government and big corporations at the trol mission above all else will get the re- convincing folk that the US would share the expense of foreign economies and ordinary spect of those who are ready to exert con- “cookies” with them and that “NewCo” soon citizens will collapse for the same reasons trol at all costs. The rest of us will eventu- to become ICANN was the vehicle to ac- that the WTO went down in flames in Se- ally figure out that we are being manipu- complish the sharing. Relatively few people attle in December. lated. noticed that in the last months of Jon Postel’s life Ira made it very plain to Jon that the root The number of scenarios by which this could The question then becomes why hasn’t some was regarded as a strategic economic and happen are of course vast. For example: No! one moved long ago to eliminate such a security resource that the feds and not Jon China says we will run our own root, France single handle of control? One answer is controlled. says the same thing. Others follow. Now a engineering inertia. It still works so don’t splintered root will not mean the end of the fix it. But perhaps the other answer is that a ISOC wasn’t pleased to hear this assertion Internet. Email and web sites will still work, significant part of the federal mission is con- of federal authority, so in the Spring of 1998, but depending on how the root splintered trol, the administration people may be loath to placate ISOC, it was given an opportu- and for how long, they may work for far to even think about whether there could be nity to run the ICANN strategy. It could be fewer people. E-commerce will be less glo- a solution that would bar everyone from argued that during the next 18 months ISOC bal and more local. The United States then control and whether such a solution would tried to grab the single handle of control and might find that the global playing field which have a more beneficial impact on the world alienated everyone except for the ISOC it presently dominates has been leveled. But economy than their pursuit of control faithful. The controversy, as ICANN was trillions of dollars are at stake because al- through ICANN. born (in still undefined circumstances) and ready absurdly over valued Internet stocks began to do its business was fine with the could suddenly find themselves presiding White House. It would give the feds the op- over a diminished market for their goods and portunity to extend DoC control and pro- services. Market capitalizations of many Part Two vide both the opportunity and the excuse to companies could melt down if the vision of build a DoC claim to the root. Finally it a single global market for e-commerce were would permit the extension of its indirect shaken. Some Thoughts on control over the root indefinitely while it Possible Fates of the waited “ just a few more months” for Consequently the stability of the global ICANN to settle down and prove itself wor- economy is endangered by this bizarre Root thy of accepting the root. But as long as struggle for control over the power inherent ICANN was controversial, there was no in the Internet’s single point of failure. This While we have of course not been able to need to transfer the root. Therefore as a root- reminds one of the Ring of the Nibelungen. make anything like an authoritative survey holder-in-waiting ICANN takes the pressure In Wagner’s ring cycle - everyone kills we have made several inquiries among off what otherwise might be seen by the rest nearly everyone else because each must members of the Internet technical commu- of world as a naked assertion of the strate- possess the power of the ring ( err.... root). nity as to how stresses and strains on the gic interests and power of the US. No one has the creativity to ask whether re- root may play out over the next year. Con- moving all possibility of control by a single cern over the fragility of the authoritative ICANN was needed to divert attention from entity could work to the global advantage root servers is a widely shared but seldom if what was really going on. The White House of all stakeholders? (Anyone for tossing the ever publicly acknowledged. It is felt how- couldn’t afford to loose ICANN in the sum- ring back into the Rhine as happens in Die ever that the fragility is largely legal and, or mer of 1999 and have attention shifted to- Gotterdammerung ....Twilight of the [net] political. tally to it and the Department of Commerce. Gods?) In the meantime we still contend that That is very likely why when in June of 99 ICANN is needed to dupe some folk into Some of the more conservative engineers Mike Roberts wrote Tom Kalil at the White believing that the game is about something speak of changes to the roots as an incipient House and asked Tom to help raise money other than “root, root who’s got the root?” Armagedon. Bind 9 is expected to be re- to keep the diversionary deception going. leased by year’s end. It will allow more and Tom welcomed the ICANN foot soldiers to ICANN is running out of steam. All the key- more root server data to be cached locally, his office and pledged his help. The contin- stone cops vignettes of Esther Dyson’s val- so that the roots have to be queried as sel- ued existence of ICANN is of great value to iant efforts to explain why ICANN is run dom as possible. Even so, to these folk the the US government because it enables it to like a banana republic where any actions that single authoritative root is so fragile that we avoid being the sole focal point for the li- smack of democratic respect for due pro- dare not talk about its problems to anyone. ability involved in being responsible for the cess are forbidden, are wearing thin. Furthermore to enable the continuance of a

264 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 single control point they compound the prob- from within the U.S. legal system that brings Summit at George Mason University. “It’s lem of eggs in one basket by decreeing for about the death penalty for an “outlaw” op- set to get worse if nothing changes.” . . . . example in mapping telephone numbers to erator that happens to be a tld country code.. “The problem is made worse by national objects in the internet, nothing other that governments having very difficult ideas DNS will be used because they can’t admit But we must ask what would NSI and DoC [about what should be legal],” Thorpe said.” any possibility that anything else that could do if asked by a court in Britain to remove a used for locating something on the Internet. second level domain name from the ICANN The rest of the news report concluded that To these folk the single authoritative root is registry? Let’s make things worse. What if Thorpe agonized about what might be done the sacred cow of all sacred cows in the a British company wants the name of a to salvage the situation. His ideas focused Internet. But legal or political action could French company pulled and the French com- mainly upon changes in the software struc- reveal its immutability as myth. To some pany wants it left in and gets a French court ture of the web including modifications of people the problem is not DNS but creating to tell NSI to leave it in? What does NSI do http to include a separate family of regulated a situation where the 13 servers are no longer then? As foreign governments come to un- financial URLs. We believe that if he pur- authoritative and where one or more of the derstand that ICANN is primarily a shell sued this direction of thinking that he would 13 may decided to point to a regional non game designed to mask the dominance that soon see that such attempts to control are authoritative root. People ask how can such possession of the root gives the US, how long unworkable. a global resolution system be protected before each country asserts its national sov- against political interference? ereignty by setting up its own national root? Regulatory frustration will be one source of discontent with American hegemony exer- The point is that it very likely cannot be pro- Should such a scenario unfold it would frac- cised over the single handle of control. With- tected. Since the DNS infrastructure is here ture the authoritative root and set back the out far better leadership there is another the breach would likely begin within the US. Internet as a mechanism for global e-com- source of discontent that will increase pres- Say a US agency goes to court against an merce for some number of years. Angry sure abroad for political challenges that are off shore banking entity that it doesn’t like politicians in Britain and France and a host designed to right the imbalance likely di- or a gambling operation, or a prescription of other countries might like that just fine rected at the root. This source is the geo- drug selling operation and the plaintiff gets because it would harm the current Ameri- graphic advantage that now may be given wise. If the name is .com, .org, or .net, the can dominance of global e-commerce far to dot com registrants located in the US. US Agency will ask for removal of the of- more than it would harm their own econo- fending name from Network Solutions Reg- mies. Also they could argue that such ac- Consider also the March 15 press release istry Database. tion would encourage the building of Internet from one of the UK law firms involved in a commerce which is more local and regional case decided by a Virginia court on March Suppose however that the rogue or “outlaw” in character, thus positively assisting those 5, 2000. “US SEIZES JURISDICTION operation is using one of the roughly 240 foreign nations whose local businesses are OVER DOT.COM COMPANIES · US com- country code TLDs, the court could ask the being stifled or diverted by American panies able to seize worldwide registrations administrator of the country code data base internet dominance, not to mention the sup- · US trademark owners able to have domain to remove it from the country code data base. pression and diversion of their own com- names of others expropriated,” If the administrator of those country codes mercial legal and tax and regulatory systems. was a business located on American soil, he “In its Decision of Friday 5th March 2000, or she would likely comply with the orders Examples of foreign discontent are popping Caesars World, Inc -v- Caesars-Palace .Com of the American court. If that administrator up all over. Consider Declan MCCullagh’s and others (Civil Action No 99-550-A), were located on foreign soil and were hos- March 14 Wired news report: - http:// Judge Albert Bryan effectively decreed that tile to the position of the American court and www.wired.com/news/politics/ his court would be the arbiter of the prop- refused then the only remaining viable op- 0,1283,34937,00.html erty rights in respect of all the approx. tion for the American court is to order net- 7,000,000 .COM, .EDU, and .ORG top level work solutions to remove the country TLD UK Wants Tighter E-Trading Laws “It’s not domains registered. Although the Decision from the root. If it were a small country that Phillip Thorpe hates the Internet, not dealt solely with the motions of two of the code like the Pitcairn Islands the argument exactly. But he sure wishes the problems it defendants to dismiss an action for lack of would be made that it never would be causes him would vanish as quickly as Bill jurisdiction, the effect of the Decision is to missed. If it were some what larger (Niue or Bradley’s presidential ambitions. Thorpe has open the floodgate to litigation by holders Tonga say) with hundreds or thousands of one of the most difficult jobs anyone can of US trademarks against domain name pro- businesses registered there, then all hell hold nowadays: He’s a regulator. And not prietors based outside the US (or at least would break loose as those organizations just any regulator, but the head of the Brit- outside Virginia...... However, for the would take legal actions of their own to de- ish agency responsible for overseeing the bulk of the Internet community the issue is fend their identity in cyberspace. NSI might financial services and securities industries. not one of the substantive issues but one of find itself stuck in a withering crossfire. In the U.K., London-based Financial Ser- jurisdiction and being subject to the juris- vices Authority can shut down any unaccept- diction of the US courts.” Since the root sits in the US as a national able Web site that doesn’t follow British law, strategic asset, NSI, after consulting with its but the agency’s reach is limited.” David Flint, Partner in MacRoberts Solici- DoC and ICANN masters, would very likely tors Glasgow (who advised one of the de- have to obey an American court order to re- “Thorpe is concerned that British subjects fendants in this case) comments: - “This move a dot com registrant from its database. can connect to any Web site anywhere in decision may have the greatest effect ever Removal of an entire country code fromthe the world to deposit money or spend their of any US cyberlaw case to date. Effectively root would be less likely and would certainly cash on risky — though perhaps profitable, all those international businesses using Top involve NSI’ s asking DoC for permission and probably unregulated -– ventures. Level Domains (which is now the norm) before it did so.. A DoC backed order to re- There’s precious little Thorpe or his FSA may find their domains being challenged by move a single country code second level cohorts can do about it. “Someone 10,000 US businesses. Even if ultimately success- from the country code miles away simply refuses to recognize your ful, the cost to business in fighting challenges zone file would be more like likely. In any authority,” Thorpe griped during a speech before the US courts is not insubstantial and case it is possible to imagine a future action Monday afternoon at the Global Internet the possibility of little or no recovery of ex-

265 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA penses may lead to a swing in the balance of ously.” as the address) infrastructure works ‘cause power to the powerful US trademark lobby. everybody agrees that it works — Mitch Developments in this case will be watched “In practice, I think it all pretty much comes Kapor called it “the Tinkerbelle effect”. with interest by world-wide Internet users”. down to whatever Bernie Ebbers wants, or Anyone can do anything they want, how- maybe Bernie, Steve Case, and a couple of ever if you want a consistent and universal Might the DNS Root Split? other big ISPs. They point their DNS at the effect, everybody has to do the same thing. Official ICANN-sanctioned Root, and it As most people want consistency, most counts. They point elsewhere, and ICANN’s people do the same thing. As people outside the United States are in- eggshells are empty. Not a likely scenario, creasingly realizing, the Internet e-com- but not one dictated by the gummint. After merce playing field has a distinctly Ameri- COOK Report: some tend to see fracturing all, there’s no law directing them to follow of the current root as a major disaster for can tilt to it, the ICANN US Department of anybody’s DNS. (For a govt. contract, they Commerce shell game notwithstanding. On the net and for e-commerce, but, when one might have to, but they can always give those tries to find out why they are so alarmed they March 14, we initiated, on the cybertelecom- customers a different DNS to point at.)” l list, a discussion of some of the points of tend not to respond. uncertainty facing the global administration COOK Report: Suppose France did the same of DNS. Conrad: If you have inconsistent views of and added French language TLDs of its the DNS, one person’s www.foo.com results choosing to its root. COOK Report: What is to prevent China in a different Internet site that another person’s www.foo.com with all that implies. from setting up its own root and legally re- Conrad: One of the issues that is likely to quiring all Chinese ISPs to carry its This would be a disaster if the multiple roots face ICANN in the very near future is the are not coordinated in some fashion (that is, root.cache? Suppose China were to grab a fact that several countries, particularly in the copy of the NSOL/DOC/ICANN root zone moving the root into an administrative arena AP region, want to use non-US-ASCII for instead of the DNS protocol arena). files and remove offensive domain names domain names (e.g., daigaku.nihon (== from it before putting it into its new Chi- ac.jp) encoded in Japanese). If ICANN does nese government approved root, Note that this isn’t really an issue for the not address this issue, I suspect you’ll see internationalized DNS folks — by defini- country based root nameservers established tion they won’t be any issues of coordina- David Conrad former director of the Asia in fairly short order... Pacific IP number registry and currently tion, the character sets are entirely disjoint. Of course, if IBM wants IBM encoded in working with Paul Vixie in an effort to com- COOK Report: Might events like these cause mercialize the BIND software on which Japanese, they get to talk to/pay the folks a look at some technology issues surround- who are administering the Japanese charac- DNS servers throughout the Internet depend, ing the DNS? responded to our question: Nothing at all, in ter set TLD. fact... In a country like China, it is also (theo- Conrad: There are numerous technology is- COOK Report: I am suggesting that if a US retically) possible to force folks to point at a sues surrounding the DNS, however I don’t certain root. Of course, this would merely court tells NSI to remove the second level expect this is the right mailing list to discuss domain from of an American company .... slow people down if they really wanted to them. get to the server represented by the name. say “hotporn.com’ from its database and hence from the root....NSI might well have COOK Report: Why would a foreign gov- to comply. But if a British or French court Fred Goldstein (internet analyst formerly ernment take the extreme step of lessening with BBN): “Exactly. China presumably has raised the issue it is less likely that NSI would its connectivity globally? We suggest that it have to do anything. strict regulation of its ISPs, unlike western might do so in order to gain more control democracies. So they could muck with DNS over what was happening on its own soil. as part of the firewall function, and, in theory, Conrad: Right. As a decision by a US court After all, despite the vaunted global would have little affect in .UK or .FR. block users from accessing DNS ports out- economy, nation states STILL exist. side of the country. Of course a determined user could arrange for zone files to be, say, COOK Report: Also I was not suggesting Conrad: This would be unnecessary. The any kind of trans national mailed in, but that’s the usual cat-and-mouse fact that a country can have their own lan- game that people play with censors. Or us- retaliation....merely foreign frustration if guage/character set names inserted into the because the root is in the US, American ers could access desired sites by number, or DNS would likely create a strong market via a proxy, until the proxy is blocked, etc.” based plaintiffs could get their way when incentive to do just that — people who don’t foreign ones could not. use English normally would prefer to not “But in the USA and other countries that have to remember the English words for the don’t regulate the Internet per se, the only Conrad: The root is, fortunately, fairly bor- places they want to visit on the web. Internet ing. It has the gTLDs and the ccTLDs. As reason that ICANN or NSOL has any au- doomed, MPEG at 11:00. When I first thority at all is because people accept it. It’s such, it is unlikely to be a target of frustra- started mucking about with the Internet tion (at least in this context). a free market, so if for some reason an ISP (ARPANet in those days), I was absolutely wanted to point its own DNS at, oh, Alternic stunned that it worked at all. Now that vast or something else, then it could, unless its COOK Report: Fred and David: let me see sums of money depend on the Internet, I if I can bear right down to the nub of the user contracts specifically prohibited it suspect the owners of those vast sums will (which of course said ISP wouldn’t do). And issue. Are you one or both saying that you do whatever is necessary to keep the Internet don’t see the presence of the root authority for that matter, and end user can set his own from breaking. DNS pointer at anything willing to serve in the hands of the US government as a situ- him, not just his own ISP’s. So if there were ation where any court or legislative action COOK Report: at a high level I hear you (eg. Congress critters pass a law that all off an alternate root, it would have the author- saying that if you muck around with the cur- ity granted to it by the number of people shore gambling sites “dot com names” get rent authoritative root and break it there are removed from the NSI database for example) pointing at it (directly or indirectly). Sort of lots of way to get around such a break. like a prophet standing on a soapbox — he might cause the kind of strain where foreign the politicians and their government would can say whatever he wants; his authority is Conrad: As Fred noted, the DNS (as well based on how many people take him seri- be willing to sacrifice global consistency for 266 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 more control within their national borders. roots some percentage of a businesses cli- tainly possible, unless there were many splits The result being a decision to set up a com- ents wouldn’t be able to get where they and they were of an extremely raucus na- peting root within their borders? wanted to go, but the majority of email ture, he thought the longevity of their im- would work if there were reasonable coor- pact would be short. To be of any global Conrad: As NSI is the administrator for the dination would it not? value, the root.cache file of the new root current set of gTLDs, I’d argue the organi- started by a single country would need to be zations that register in those TLDs are im- Conrad: Maybe. Maybe not. Depends on picked up and carried by one or more of the plicitly agreeing to be bound by US laws. If what happens to be in what caches and which 13 global root servers in order to be able to they do not agree, they can register in a non- caches a client DNS talks to and whether or be seen outside national borders. He thought US-administered TLD (e.g., .TO) which not the primary is looking at the same roots that achieving this agreement would be may have different laws and/or regulations. as the secondaries and whether or not the likely. But he also pointed out that because connectivity to the roots is sufficient and if of the long time voluntary nature of the root Can action by the US Gov’t cause political the root name servers can handle the load server operations as a contribution to the strain? Of course. However, I’d argue that and [so on] “Internet community” that he believed that non-US Gov’ts have already implicitly or the root server administrators would coop- explicitly acknowledged the US’s authori- COOK Report: From your earlier remark erate among themselves to heal breaches in tative role in the administration of the DNS about the “use of non-US-ASCII for domain DNS connectivity caused by national defec- by not objecting to Ira Magaziner unilater- names (e.g., daigaku.nihon (== ac.jp) en- tions from the DoC/ICANN root. He as- ally declaring the US had this right and ac- coded in Japanese), “ i understand you to be serted that unless the episodes splitting the cepting and/or participating in ICANN. I’m saying that this WILL require a new gTLD root were extremely violent, the impact on doubtful that the US Gov’t would do any- for each non ascii alphabet? the net would be minimal because the thing stupid enough with the DNS to rattle breaches in DNS connectivity would be the foreign gov’ts (perhaps I’m too optimis- Conrad: My personal preference would be quickly ironed out. “The entire issue of sta- tic?). Will the role of the US gov’t in the for the creation of new ccTLDs, encoded in bility goes to the good-will and agreement management of the root result in pressure UTF-8 as CNAMEs off to the existing of the root operators. All it takes is one of for the creation of alternate roots? Maybe, ccTLD. E.g., them to announce the existence of the new but I’m doubtful. More likely to result in CNAME jp. This would imply the current country root’s (possibly new) TLDs”. alternate roots is either the actions (e.g., com- ccTLD administrators also manage the in- ing up with offensive new TLDs) or inac- ternationalized DNS version of their Some critics believe that this person’s views tions (e.g., not dealing with the question of country’s TLD, avoiding a whole raft of reflect the world-view of the idealized, co- internationalizing the DNS) of ICANN. political nightmares. operative, pre commercial internet. They assert that DoC could quickly obtain a re- COOK Report: What about the .coms which With respect to gTLDs, I would be _very_ placement for any operator of a global top- are located out side the US? What is the per- surprised if NSI is not looking at supporting level root server that failed to cooperate. centage? Is it 20 %, or 30%, or even more internationalized DNS names within .COM/ How effective this threat of “follow-our-or- than 35%? If these dot coms start getting .NET/.ORG — the number of usable names ders-or-you-will-be-replaced” would be is screwed because they are not physically in in those domains is asymptotically reaching untested. One reason that it is untested and the US, is there likely to be any recourse for zero and opening up new character sets will a lot of people would like to leave it that them? Or can the US government possess result in a huge increase in available names way is that it is highly probable that many the root indefinitely without creating a for- (albeit to non-English speakers). secondary and tertiary level servers would eign backlash, especially if the ICANN dis- have to change their root.cache in order to pute process works predominantly in favor As to the creation of new i18n’s gTLDs, I be able to use a newly designated DoC/ of the US based holders of US trademarks? would imagine ICANN hasn’t thought too ICANN server much about it and if they do, I would guess Conrad: .COM/.NET/.ORG are US-based they’d probably make a requirement that any A side conversation with Bill Woodcock domains. Registrants in those domains must new gTLD (and perhaps any existing gTLD (which he gave us permission to quote), deal with the implications of that. [Also note too) should have i18n’d names CNAME’d cleared up some issues regarding the per- that] The root is relatively static and (should off to the US-ASCII version (or, if they want missible number of global root servers. be) fundamentally boring. I have trouble to be really PC, allow the non-US-ASCII seeing how US trademark law is applicable version to be the canonical name with the Woodcock: A quick note with regard to 13- to names in the root. There are about 250 of US-ASCII version CNAME’d to it). root limit. The limit is on 13 _ip addresses_ them, they are 2 (~240), 3 (7), and 4 (1) char- of root servers in a UDP packet, not upon acters in length and don’t run much risk of The end result of all of this is what I call the 13 _servers_. Multiple servers may share a confusing consumers (I would imagine). babelization of the Internet. Unfortunate, in single IP address and be topologically load- that it means we’re about to embark on a balanced. This also works to help overseas As the for the gTLDs, they are administered deliberate disenfranchisement policy, how- users, since they don’t get stuck having to by a US-based company, it should be obvi- ever this merely reflects the real world: it is go transoceanic to hit roots all the time. I ous to anyone registering in those TLDs that difficult for me to speak with a (say) Hakka spoke on this at the Montreal IEPG (circa they are subject to US laws and regulations. only speaker... Oh yeah, and there is the 1997), and I believe Bill Manning actually Further, it isn’t clear to me that the uniform minor problem that the use of UTF-8 will gave it a try. That work was based on some dispute resolution policy is predominantly likely break most existing application pro- redundancy work we’d done previously for in favor of US based holders of US trade- tocol software (e.g., mailer user agents, Oracle. marks. This may be true for NSI adminis- netnews user agents, etc), Conrad concluded. tered TLDs, but is most likely not the case COOK Report: Could such servers be on for non-US-based TLDs. COOK Report: In addition to this online different sides of a wan sharing the same IP exchange we had an hour long conversation address? COOK Report: (to Conrad’s response on with a technical friend who is knowledge- the disaster represented by inconsistent re- able about DNS. This person pointed out Woodcock: Yes, or more to the point, you sponses from multiple roots) Under multiple while a split or splits in the root were cer- could have an _instance_ of j.root- 267 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA servers.net in Tokyo, another _instance_ of making a mess of Internet implementations. [But how to get the distance?] “Readers may j in London, and a third _instance_ of it in There just ain’t no way that us techies are ask what is the schedule to propose new stan- Cape Town. The routing tables would auto- going to be allowed to dictate domain struc- dards based on what I and my group are matically direct you to the nearest instance, tures beyond the current bounds of the ARPA working on for domain names? As I see it, since they share the same IP address. Hypo- and DDN sub-nets. Gerck continues, time is not a trigger for the thetically. You’ll need to talk with Bill Man- events needed to get us out of our predica- ning to determine how far deployment has Reset, Restart ... Stef ment, but understanding is. Cooperation has actually gotten. its own dynamics and we must allow for But since the root currently works, the easy things to gel, naturally. We can motivate, we COOK Report: To sum up: it is hard to fore- way out has been ICANN, IETF and DOC can be proactive but we must not be domi- see with any certainty exactly what would to elevate the necessity of a monolithic root nating. We seek collaboration, not domina- happen if ICANN went away and the glo- (rather than any diverse and locally account- tion. Both technically as well as market-wise. bal e-commerce players were left to fend for able infrastructure) into a fatalistic doctrine their own interests vis-a-vis the root. Cer- designed to stifle any possible effort to en- The issue is also user awareness. A perfect tainly the Internet would continue to work gineer diversity. With all the eggs in the same technical solution to a non-perceived prob- but with more uncertainty and less efficiency. basket a myriad of unforeseen perturbations lem is a perfect market flop. This [DNS as Furthermore, the ongoing uncertainty of how could break them. To sum up the argument a single handle of control and point of fail- much of its market and e-business would be we have made, the level of fear that an alter- ure] needs to be overcome with another reachable in the event of trouble would take nate resolution model could emerge is very design, under a more comprehensive prin- the buzz off of most e-commerce business real. One classic scenario would be that the ciple, but one which must also be backward- plans. Chinese or some other authoritarian govern- compatible with the DNS.” ment could order their ISP’s to point to a Conclusion “approved” root structure is real. It also not Ed Gerck does not claim have the sole work- too far fetched to see the US Government able solution handed down to him from on demand exclusion from the root for certain We are faced now with the very question high like the tablets to Moses on Mt. Sinai. activities deemed totally illegal under US To the contrary, he is defining a means of that Einar Stefferud asked on May 13, 1984 law like off shore betting. Plus ca change nearly 16 years ago: joining together to work our way out of this plus la meme choose. dilemma. It would be encouraging to see So, we can choose to spend our time sorting some interest in Washington in the incuba- In his thinking essay, Ed Gerck makes a call tion of the understanding necessary for the through this political morass without either well worth heeding when he says: “It is my the political savvy nor political clout to re- internet and e-commerce to cooperate in belief that the interests of small business, of working its way out of the win-lose control solve anything, or we can go back to work- big business, the public and that of govern- ing on the technical syntactic structure within situation in which it finds itself. The route ments would be better served by helping to of control has been tried. As we have shown which the political decisions will eventually seek a solution to the domain name issue, be made. in this discussion, not only has it not worked, rather than by fighting the symptoms of the it also looks to be untenable on a long term Domain Name Syndrome. The rhetoric global basis. The main criterion for success will be around ICANN has been so intense though, whether we can invent a technical structure and with such bad animus, that it requires a May 2000 COOK Report that will prevent political decisions from certain distance to see the forest for what it is.

268 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 Commerce Department Formation of ICANN Seen as Illegal End Run Around the Administrative Procedures Act and the United States Constitution Michael Froomkin's Findings to Be Published in Duke Law Journal - Lawrence Lessig Lauds Froomkin's Creation of Framework that Could Force Reform Since the Internet is decentralized and con- live in a nation state with a legal system ac- States begins to enfranchise only corpora- trolled at the edge, the only tool offering the countable to individual citizens or a corpo- tions and confiscates what used to be rights hope of affecting control of the entire Internet ratist state that is run on behalf of the pri- of citizens. has been the DNS. Without a fully functional vate profits of global corporations. If it is DNS the Internet is unusable. Control of the the latter we will find that we have given up Froomkin has looked at the creation of DNS hierarchy starts with control single glo- the critical philosophical foundation on ICANN and has carefully crafted an expla- bal root relied upon by the 13 global root which our nation was built. That our gov- nation of why the creation of ICANN by the servers to enable users to get to the globally ernment exists first and foremost to preserve Department of Commerce violates Ameri- unique destinations they wish to reach. Con- and protect the rights of each of its citizens. can law. This article will summarize his trol over the sole authoritative root is the only chain of reasoning. In so doing it will seek thing that in a broadly misunderstood effort Instead of holding these rights sacred, our to disseminate more widely an articulation to privatize the DNS, that the US govern- government has taken the example set by of why ICANN’s ascendancy can and should ment has not yet given to ICANN. Esther Dyson and Mike Roberts in their be challenged. We believe that it is very “leadership” of ICANN to make clear the important to use Froomkin’s compelling in- For almost four years the COOK Report has insidious nature of the attraction of the sights to educate both citizens and the ex- chronicled the unfolding struggle for con- Clinton WTO mantra of self-regulation for ecutive and legislative branches of the US trol of the DNS and the root. A struggle that those internet players involved in content and government. We need to understand quickly for the last two years has been focused on intellectual property. Here self-regulation what has happened and why we should “be ICANN. The rise of ICANN is a story of is self-dealing and constant conflict of in- afraid.” Out of such education it is to be hideous complexity. Most people without terest. Here the purpose of the self-regula- hoped that legal or legislative redress may vested interests in ICANN’s success have tion is to avoid government responsibility be found. turned away in dismay as they observe its for the due process rights of the little guy. arbitrary acts, arrogant behavior and Byz- Self-regulation of the physical network has ICANN is preparing to grant new gTLD antine structure. It leaves the lay person with so far worked adequately. Howver, franchises to powerful corporate and inter- a gut level sense that something is horribly ICANN’s self-regulation of the DNS on be- national agency applications. Once these are wrong. But it is difficult for such a person half of trademark holders is a self-serving in place it is difficult to imagine a success- to articulate with clarity precisely what is attempt to pretend that conflict of interest ful challenge to what has been done on wrong and why it is wrong. The reason is can be wished away and that a century or ICANN’s behalf. Individual and small busi- that until now there has been no road map more of American administrative law is no ness users of the internet need to be grateful that identifies with precision what went longer meaningful. The administration’s to Professor Froomkin for his research and wrong. At long last, University of Miami law self-regulation propaganda will continue to to the Duke University Law Review for its professor Michael Froomkin has provided prevail only if the legal system of the United publication of this extraordinarily important this road map in a landmark paper: “Wrong article. Turn in Cyperspace: Using ICANN to Route The October issue of the Law Journal is Around the APA and the Constitution” to be devoted to the law school’s thirtieth an- Editor's Note: This article is based on the published by the Duke University Law Jour- nual symposium on administrative law. draft of September 27, 2000. The article has nal, October 2000, Volume 50, No. 1. The This symposium was dedicated to under- been under going continuous revision since printer is expected to deliver the physical standing the issues presented by ICANN. then. A check of most of our quoted pas- copies themselves before December 1, 2000. In addition to the Froomkin article it con- sages shows no significant change between The article will be available of the Law Re- tains an Introduction by Professor James the draft of September 27 and that of Octo- view web pages. The penultimate draft was Boyle of Duke University School of Law ber 16, which except for some cross corre- placed at http://www.law.miami.edu/ and a second article “ICANN and the lation of footnotes to be done by the Duke ~froomkin/articles/icann1.pdf on October Problem of Legitimacy by Professor Law Journal editors is final.] 16, 2000. Jonathan Weinberg of Wayne State Uni- versity. When we asked Professor DoC ICANN Violates What follows is our attempt to distill the Weinberg for a very brief summary of his essential chain or arguments in this mam- article he responded: “The article exam- Either APA Or the moth 166 page and 711 footnote long paper. ines three ways in which ICANN has We do so because we believe that the ques- sought to establish its own legitimacy. It Constitution tion of what happens to ICANN will be pos- concludes that neither ICANN’s adoption sibly the most important legal issue of the of the trappings of an administrative Froomkin’s indictment in his opening para- new decade. If this ICANN succeeds, there agency, nor its adoption of structures that graph is succinct: “The United States gov- will be others to follow. Therefore we sug- make it resemble a representative (that is ernment is managing a critical portion of gest that the determination of ICANN’s fate to say, elective) government body, nor its the Internet’s infrastructure in violation of is a decision that will impact whether we invocation of “Internet consensus,” are the Administrative Procedures Act (APA) and successful in supplying legitimacy.” the Constitution. For almost two years the 269 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Internet Corporation for Assigned Names the Internet thus evading notice, comment, v. United States, the private non-delegation and Numbers (ICANN) has been making due process, and judicial review.” doctrine focuses on the dangers of arbitrari- domain name policy under contract with the ness, lack of due process, and self-dealing Department of Commerce (DoC). ICANN is Froomkin suggests that arguments for when private parties are given the use unac- formally a private non-profit California cor- privatization are often made on grounds of countable private body that many feel has poration created, in response to a summon- economic efficiency. In this case however already abused its authority in at least small ing by U.S. government officials, to take “rather than privatizing a revenue-generat- ways and is indisputably capable of abusing regulatory actions that the Department of ing function, the government is privatizing it in big ways, and nearly (but, as argued Commerce was unable or unwilling to take a policy-generating function and because the below, not quite) eliminated the possibili- directly. If the U.S. government is launder- privatization is subject to sufficient strings ties for judicial review of critical decisions ing its policy making through ICANN, it vio- to make ICANN’s actions fairly chargeable regarding the DNS. So far, ICANN appears lates the APA; if ICANN is in fact indepen- to the government.” He correctly points out to be accountable to no one except the DoC dent, then the federal government’s decision that not enough is known about the details itself, a department with a strong vested in- to have ICANN manage a public resource of how much authority the DoC exerts to terest in declaring its DNS ‘privatization’ of such importance, and to allow - indeed, enable one to ascertain whether DoC tells policy to be a success.” require - it to enforce regulatory conditions ICANN what it must do in deciding matters on users of that resource, violates the non- of policy. If this is the case Froomkin finds ICANN suffers virtually no constraints in delegation doctrine of the U.S. Constitution. that “DoC’s use of ICANN to make rules what it does. It is not constrained by the due In either case, the relationship violates ba- violates the APA.” process, public review and comment proce- sic norms of due process and public policy dures designed to ensure the accountability designed to ensure that federal power is ex- There follows a powerful paragraph that of government administrative agencies. ercised responsibly.” deserves quotation in full: “There is substan- While the actions of corporations are re- tial evidence, discussed below, that DoC has strained by competitors and shareholders, He assumes that the Department of Com- directly instructed ICANN on policy mat- ICANN has no competitors and because it merce was serious when, in response to ters. Furthermore, as ICANN is utterly de- is non profit, no shareholders. While many presidential directive in the summer of 1997, pendent on DoC for ICANN’s continuing non profits have members who can challenge it talked about rule making. However when authority, funding, and indeed its reason for misbehavior, ICANN has gone to great the Green Paper of late January 1998 was being, it would be reasonable to conclude lengths to deny its members the redress that poorly received in Europe the Department that the corporation is currently so captive they would normally have available to them of Commerce changed its course and that all of ICANN’s decisions can fairly be under the California public benefits corpo- authored what became known as the White charged to the government. If so, the DNS ration statute by which they are incorporated. Paper policy statement in early June 1998. has not in fact been privatized at all, even While most non profits are restrained in their Froomkin correctly characterizes this White temporarily. At least in cases where ICANN ability to raise funds, ICANN has turned its Paper policy as: “Abandoning earlier hopes does what DoC tells it, and arguably in all DNS registration franchises into sources of of issuing a substantive rule, which requires cases, DoC’s use of a private corporation to substantial income and with ICANN’s re- statutory authorization and is subject to ju- implement policy decisions represents an cent fund-raising tactic of charging substan- dicial review, the policy statement instead end run around the APA and the Constitu- tial fees for reviewing new top level domain set out goals that the administration thought tion. To the extent that DoC launders its applications, ICANN is getting even more could be achieved without rulemaking.” policy choices through a catspaw, the funding. public’s right to notice and meaningful com- At the end of November of 1998, the De- ment, to accountable decision-making, to Froomkin concludes: “The result is a body partment of Commerce signed a Memoran- due process, and to protection against arbi- that to date has been subject to minimal ac- dum of Understanding with ICANN indi- trary and capricious policy choices, self- countability. Only the Department of Com- cating the two would seek to work together dealing or ex parte proceedings are all at- merce (and in one special set of cases NSI to carry out the goals of the White Paper. tenuated or eliminated; so too is the pros- or its registry) currently has the power to pect of any meaningful judicial review. The hold ICANN to account. NSI currently has Evading Notice, result is precisely the type of illegitimate no incentive to use its limited power and agency decision-making that modern admin- DoC has nothing to complain of so long as Comment, Due Process istrative law claims to be most anxious to ICANN is executing the instructions set out and Judicial Review prevent.” in the White Paper. The accountability gap will get worse if DoC gives full control of One of ICANN’s most significant acts has Delegation of Public the DNS to ICANN.” been its imposition of the Uniform Dispute Resolution Policy (UDRP). Froomkin Power to Private Groups Froomkin examines in detail the question points out that DoC has in some cases cov- Ensures No of whether ICANN is engaged in rule mak- ered up what he later shows to be policy ing in carrying out its DNS policy. He finds making by ICANN as if “they were matters Accountability that “ if ICANN is engaged in policy-mak- ing, and if DoC is reviewing these decisions, of contract” falling “outside the rulemaking The only logical choice to make if one be- strictures of the Administrative Procedure and retains the authority to countermand lieves that DoC does not dictate policy de- them, then DoC’s adoption of or approval Act.” In other cases he finds that that the cisions to ICANN is that it has decided to DoC treats ICANN as “ an arm’s-length pri- of ICANN’s regulatory and policy decisions allow ICANN to make its own decisions. If are subject the APA.” vate body exercising autonomous choices this is the case Froomkin finds that DoC that could take effect spontaneously, with- “violates an even more fundamental public “If, on the other hand, ICANN is engaged out DoC’s participation or responsibility. policy against the arbitrary exercise of pub- in policy-making and DoC does not retain DoC has thus made, or acquiesced in lic power, the constitutional doctrine prohib- the power to countermand ICANN’s deci- ICANN’s making, via research contracts iting the delegation of public power to pri- sions, then DoC has delegated rulemaking rather than agency adjudication or vate groups. Most famously expounded in and policymaking power to ICANN. This rulemaking, some of the most important two pre New Deal cases, Carter v. Carter probably violates the APA since it was done decisions relating to the near-term future of Coal Co. and A.L.A. Schechter Poultry Corp. without a proper rulemaking; regardless of 270 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 the applicability of the APA, it violates the nificance, as it forces ICANN to be exquis- dination” that would rebut the claim of an Due Process Clause and the non-delegation itely conscious of DoC’s requirements. If unconstitutional delegation of power. In fact, doctrine of the U.S. Constitution, as well as ICANN fails to meet DoC’s expectations, as detailed below, the standard setting story basic public policy norms designed to hold DoC can choose another body to replace ignores reality. While some of what ICANN agencies and officials accountable for their ICANN. All of the relevant agreements pro- does can fairly be characterized as standard- use of public power.” vide that if DoC recognizes another entity setting, key decisions would certainly have as ‘NewCo” in ICANN’s place, then the been rule making if done directly by DoC, Froomkin finds that “since ICANN’s Board obligations to ICANN in those agreements and remain regulatory even when conducted and staff operate largely in secret, it is diffi- immediately terminate. “Froomkin contin- by its proxy [ICANN].” cult for outsiders to know how much influ- ues “ICANN’s only reason for existence, and ence the DoC has over ICANN’s decision the sole source of its power over the DNS is making. As a result, the statutory and con- that the thirteen root servers treat it as au- Avoiding All stitutional arguments in this paper are pre- thoritative, and that the government in- Accountability sented in the alternative. The two arguments structed NSI, another contractor, to both are very closely related, however, in that both defer to ICANN’s policy and to pay it money Later in his paper Froomkin finds that “DoC rely on legal doctrines designed to promote . The root servers recognize ICANN only is not the first agency to seek to use the cor- accountability and prevent the arbitrary ex- because DoC signed an MoU with ICANN porate form or to create a private corpora- ercise of government power.” and announced that ICANN is the relevant tion to achieve desired ends. The Govern- authority. Were the U.S. government to trans- ment Corporation Control Act (GCCA) is The DoC ICANN Defence: fer its recognition to another authority, the Congresses most comprehensive modern root servers would be under no more legal attempt to define when and how federal of- Private Party obligation to recognize that new authority ficials may use private corporations for pub- than they were to recognize ICANN, but lic purposes.” He then notes that corpora- Froomkin explains how DoC and ICANN their move is all but certain. So long as the tions by the executive branch ‘to act as an defend themselves against his charges: DoC root servers recognize ICANN’s authority, agency’ without specific legal authoriza- claims that ICANN is a private party oper- ICANN is able to dictate contractual terms tion.” A page later Froomkin notes that the ating at arm’s length removal from DoC and to registries and registrars who wish to be GAO’s General Counsel in its examination that ICANN is a standards setting rather than included in the legacy root. By dictating of the FCC’s creation of the Schools and a policy making body. Government agen- terms to registrars, ICANN can also enforce Libraries Corporation and the Rural Heath cies are forced by the Administrative Proce- terms on registrants, since ICANN can (and Care Corporation dismissed the idea that dure Act to pay attention to due process con- does) require that registrars include standard either organization was independent of the cerns designed to see that citizens do not terms in contracts with registrants.” FCC by stating that the GCCA “prohibits suffer from the arbitrary use of government an agency from creating or causing the cre- power. DoC argues that because ICANN is “Third, DoC and ICANN have a warm and ator of a corporation to carry out govern- a private corporation it is not bound by the cooperative relationship, although whether ment programs without explicit statutory APA. that relationship is best characterized as a authorization.” In short one way that partnership, master-servant, or self-regula- ICANN could be created outside the con- Froomkin’s rebuttal is vigorous and correct: tory body and supervising agency is hard to straints placed by the Government Corpo- “In fact, as detailed below, ICANN’s rela- discern. Whatever the precise nature of the ration Control Act was for the DoC to de- tionship to DoC is nothing like the arm’s relationship, it certainly is not arm’s-length. cide to publish the White Paper as a “for- length relationship suggested by the private In particular, it cannot reasonably be char- mally non-binding policy statement.” Do- party story. Although ICANN is private, it acterized as DoC calling ICANN into be- ing this appeared “to be a successful end- is no ordinary corporation, and its relation- ing, signing an MoU with it to give it au- run around the GCCA - which suggests that ship with DoC is highly unusual. ICANN is thority, and letting it go off on its own.” the GCCA may need amendment.” For totally beholden to DoC for its creation, its Froomkin concludes: “By calling for NewCo initial policies, and especially DoC’s loan Standards Making to form ‘spontaneously’ government offi- of control over the root. This control over cials avoided directly creating the corpora- the root is the sole basis of ICANN’s rel- Since ICANN is not a private arm’s length tion.” In doing so they avoided the account- evance, power and financing, and DoC can entity free to adopt its own policy, Froomkin ability that the GCCA would have brought take it away on 120 days notice. More than next explains why Dyson, Roberts and Sims to ICANN. anything, ICANN seeks to achieve perma- always go to such lengths to claim that nent and perhaps irrevocable control of the ICANN does nothing more than technical Under a heading called “Structural Failures root when the current MoU expires. DoC coordination. If this were true then ICANN / self-dealing” and a sub heading of”Time” has some control over ICANN through the would be only a standards setting body and the Froomkin draft states: “ICANN’s struc- stick of the MoU, but the real control comes Froomkin points out that there is substantial ture taxes time as well as money. The profu- from the carrot. ICANNs ability to retain or legal precedent for the federal government sion of constituencies, working groups, ad expand its control over the root is entirely at to grant standards setting authority to pri- hoc committees and the like means that only DoC’s discretion.” vate corporations. As Froomkin puts it those those with an enormous amount of time to who defend ICANN say: “ICANN does not devote to ICANN issues can stay abreast of Froomkin explains three reasons why DoC do ‘policy’; if there was any policy to be every developing ‘consensus’ policy. In prac- cannot be considered to have an arm’s length done (DoC is a little vague on this), it was tice, those who can afford to pay someone relation ship with ICANN. First ICANN done in the White Paper-a statement of to represent them - predominantly commer- does not have the authority to create a new policy. And ICANN most certainly does not cial interests who hire lawyers or delegate TLD without DoC approval. Neither NSI do ‘regulation’ or ‘governance’. ICANN is managers to be their spokespersons - are able may change the content of the root without at most implementing the key pieces of the to dominate. Un-organized groups such as written DoC approval. “Second, DoC’s re- White Paper policy - privatization, Internet users or small businesses must rely on vol- tention of the power to take control of the stability, increasing competition, bottom-up unteers, and tend to be outnumbered in com- root away from ICANN is of enormous sig- coordination.” He continues: “if it were true mittee.” that ICANN was limited to “technical coor- 271 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA On the following page Froomkin adds: “For nate it. Many believe that the need for some some idea of the ‘quality’ or ‘usefulness’ of an entity designed to make rules relating to sort of management of the DNS is so press- the proposed gTLD, or the extent to which the Internet, ICANN and its subsidiaries ing that, until they see a viable alternative, the applicant promises to enact social poli- seem oddly dependant on attendance at ICANN is the only game in town (others, cies such as privacy or trademark protection, physical meetings. Because ICANN sees it- who wish to preserve the status quo as long then ICANN will have clearly crossed the self as global, its meetings are peripatetic. as possible, may see ICANN as the least bad line into making social rather than technical This policy, which has the advantage of way of blocking change). To many of the policy. It cannot seriously be suggested that making it more possible for geographically participants in the DNS wars, especially old choosing whether the world is better served disparate groups to attend the occasional ICANN hands imbued with the libertarian by”.banc,” “.shop,” or “.xxx” is an issue with Board meeting also makes consistent par- traditions of the founders of the Intemet, any “technical” content whatsoever. This is ticipation by those without substantial ex- anything that takes power away from gov- a question of social and political import only, pense accounts impossible. People who can- ernment is presumptively, and sometimes the technical issues are identical whatever a not attend meetings of the Board are able to irrebuttably, better than a governmental so- TLD happens to be called. As such, the se- take part in debates in only the most limited lution.” lection among technically qualified appli- and derivative way - the few remote com- cants on social merit is an adjudication that ments read to the meeting are filtered and “These views are mistaken, if only because DoC cannot delegate to ICANN so long as edited by the readers, as contrasted to attend- there is more at stake here than the Internet. the DNS remains in DoC’s ultimate control.” ees who queue for a microphone and can Even if ICANN were thought to be a good say whatever they like.” So much for the thing, [seeing it just in the context of] a nar- Froomkin shows some approaches that public notice and comment rule-making pro- row focus on the Internet ignores the perni- might be made toward correcting the trav- cedures of the APA. cious effect of ICANN on the U.S. govern- esty of justice that ICANN has become. He ment itself and on our democracy for there concludes: “If the current quasi-privatization is a real danger that ICANN will not be a of the DNS is illegal, then DoC needs a new Beware— More ICANNs fluke, but will be used a model for additional policy to deal with the DNS. (Indeed, I am to Come erosions of responsible government. DoC’s certain that uncertainty as to how to answer use of ICANN undermines accountability. the question, “If not ICANN, then what?” is “The issue then is whether an attempt to vest Every government power must be exercised an important part of the reason why opposi- power in an agency or a private body is con- in accordance with law and with the Consti- tion to ICANN has yet to reach critical stitutional. In the case of ICANN, there is tution. But ICANN is a private non-profit mass.) DoC has at least four options.” no statute. Congress at no time determined California corporation; unless it is a govern- that the DNS should be privatized, or indeed ment actor or advisory committee, neither Having promised Professor Froomkin that legislated anything about national DNS the APA nor the Constitution apply to it. we’d stop here we refer our readers to the policy. Instead, DoC itself chose to delegate concluding pages of his article - available the DNS functions to ICANN, relying on The APA and the Constitution apply to DoC, we hope in about 30 days. its general authority to enter into contracts. however, and this is where the main viola- ICANN is also a very unusual corporation. tion of law is to be found. Allowing DoC to Froomkin’s final call is appropriately elo- There are many government contractors, use ICANN to make non-technical policy quent. We can only wonder who will hear both profit-making and non-profit. But it is decisions violates basic norms of governance it? “The ultimate problem with DoC’s reli- unusual for a nonprofit corporation to be and accountability. DoC cannot quasi-priva- ance on ICANN is not the corporation’s se- created for the express purpose of taking tize the DNS in a manner that allows the US cretiveness, or its decisions, or its fight over a government policy-making function.” to retain ultimate control of the root zone against accountability. Rather the problem file but achieve deniability about everything is that DoC’s reliance on ICANN, and en- “There is a danger, however, that ICANN that its agent or delegate does with day to dorsement of its activities, undermines ba- may not be unique for long. One adminis- day control. Depending on one’s view of the sic elements of accountability and due pro- tration spokesman has already suggested that DoC-ICANN relationship, the violation may cess on which the administrative state is ICANN should be a model for regulation of be a failure to make a general and prospec- based. By lending ICANN its control over other Internet-related issues such as accredi- tive rule in conformity with the APA’s pro- the DNS, DoC created a system in which tation standards for distance learning, and cedural requirements, or it may be the del- social policy is made not by due process of e-commerce over busness-to-business egation of so much control to ICANN that it law, but by something that begins to re- “closed”networks.” [Froomkin cites: DoC violates the Carter Coal doctrine [of non- semble government-sponsored extortion.” General Counsel Andrew Pincus, Remarks delegation of public functions without con- at the Meeting of the Bar of the District of gressional authorization] under the guise of Lawrence Lessig Columbia (Apr. 25, 2000); see also Brian technical standard setting.” Additionally, the Krebs, Regulators Would Do Well To Mimic DoC-ICANN alliance is an endrun by the Comments ICANN - White House (visited Aug. 18, federal executive branch which circumvents 2000) ] Froomkin sional and federal judiciary functions. Stanford Law School Professor and ex can- continues; “The specter of a series of didate for the ICANN board Larry Lessig ICANN clones in the U.S. or in cyberspace ICANN’s Choice of New complimented Professor Foomkin for hav- should give one pause, because ICANN is a ing drawn a well argued road map of grounds very bad model, one that undermines the TLD’s Not a Technical for legal action against the US Department process values that motivate both the APA Matter of Commerce for its actions in creating and the due process clause of the Constitu- ICANN. Lessig said that with the legal re- tion.” Given that ICANN has received 47 applica- search solidly done it would now be much tions for more than 100 new TLDs ICANN easier to convince those opposed to ICANN Toward the end of his paper Froomkin re- is likely to find that as Froomkin says “there to unite around a legal challenge that would turns to this theme: “For all of its problems, are more technically qualified applicants for most likely be class action in form. ICANN commands substantial support, and new gTLDS than ICANN wishes to create, not all of it from the stakeholders who domi- and ICANN chooses among them based on Lessig said that he would prefer an ICANN 272 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 done right, namely one that did only techni- role and the role of individuals. I don't know Winner is resident in DC area! Number one cal coordination and not policy, to a Depart- much about Campos, but his replies on the goal listed at http://www.mkatoh.net/ ment of Commerce entity that did make forms suggest he thinks ICANN is basically FAQ.htm#Goals is: "To make ICANN a 21st policy subject to what he regards as a cum- ok, not too many new TLDs needed, but Century model for international organiza- bersome, bureaucratic and expensive Ad- UDRP and other reforms are. tions" See also http://www.mkatoh.net/ ministrative P rocedure Act. The question speech/icann_katoh072000-e.ppt (arguing of course becomes how to convince ICANN 2) The rich West: Not happy with ICANN. ICANN should be model for 21st century and DoC to change their agenda.. To this organizations). More than half the voters end a group ready to bring suit could ap- N.A. Almost a marginal. Only 3,449 votes are in the Asia/Pacific region. And they proach with demands. If the demands were cast. Only 32% for ICANN nominated can- picked a DC IP lawyer [who is a Japanese not met, the group could file suit. One way didates, including Lessig. Almost 3/4 voted citizen and an employee of Fujitsu]." of obtaining a change in DoC ICANN be- to repudiate current icann policy if you just havior could be a settlement that is put in count count Simons, Lessig & Auerbach. place as a condition for dropping the suit. The anti-icann crowd beat the pro-icann Faced with an unambiguous certainty of up crowd. Auerbach and Lessig were ALLIES The October issue of the Law Journal is de- to three years of litigation, the forces behind and cooperated in slating with Simons; to- voted to the law school’s thirtieth annual DoC's and ICANN's position would listen gether they got 75% of the first choice bal- symposium on administrative law. This sym- to reason rather than have the suit go for- lots in N.America. posium was dedicated to understanding the ward, or so Lessig hopes. issues presented by ICANN. In addition to Europe. A third of the total ballots. Only the Froomkin article it contains an Introduc- ICANN Member at Large about 1/4 for ICANN nominated candiates. tion by Professor James Boyle of Duke Both victors are ICANN critics. Expect fire- University School of Law and a second ar- Elections works. ticle “ICANN and the Problem of Legiti- macy by Professor Jonathan Weinberg of 3) Asia. The big one: A vote for ICANN sta- On October 11, it was heartening to see Kal Wayne State University. When we asked tus quo. 17,745 votes - more than half the Professor Weinberg for a very brief summary Auerbach and Andy Müller-Maguhn win total cast. 95% for ICANN nominess. The member at Large board seats. Also on Octo- of his article he responded: “The article ex- winner says "In my opinion, ICANN has in- amines three ways in which ICANN has ber 11 a BWG member wote: "There were terpreted its mission in a cautious but still 3 different elections: sought to establish its own legitimacy. It proper manner. ICANN has a coordination concludes that neither ICANN’s adoption of function to perform to ensure the seamless the trappings of an administrative agency, 1) The marginals: Africa & Latin America: operations of the Internet. In exercising its Players ride. 130 votes cast in Africa; 1,402 nor its adoption of structures that make it coordination function, ICANN must take resemble a representative (that is to say, elec- in L.A. In both ICANN nominated candi- into account the legal and policy impacts of dates got over 80% of the votes. tive) government body, nor its invocation of its management decisions, and therefore its “Internet consensus,” are successful in sup- scope of mission is not limited to purely tech- plying legitimacy.” Note however that the person elected from nical issues." Thinks the UDRP is at least Africa, although not an ICANN critic at all, OK, maybe great. is very fair minded and supports the GA's December 2000 COOK Report

273 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Light, IP and Gigabit Ethernet: The COOK Report on Internet Annual Report 2001

Introduction

Light, IP and Gigabit Ethernet A Road Map for Evaluation of Technology Choices Driving the Future Evolution of Telecommunications - 2000 COOK Report Interviews p. 1

Part One

The Internet Way p. 3

Executive Summary p. 4

Packet Design Has Unique Research Role Seeks Improved Routing to Offset Problems Inherent in MPLS Judy Estrin, Kathie Nichols, Van Jacobson Want Cost Benefits of Convergence By Leveraging Strengths of TCP/IP Architecture p. 7

Gigabit Ethernet Rides Economy of Scale As It Erases LAN WAN Boundary Gigabit Ethernet Makes Network Less Complex, Easier to Manage — 10 Gig Standards Will Demand Choices Affecting ATM SONET WAN Functionality p. 13

Gig and Ten Gig Ethernet Bypassing Carriers and Revolutionizing Transport at Internet’s Edges — Gigabit Ethernet Combined with Metropolitan Area Fiber Enables New Data Network Business Model in Montreal p.23

10 Gigabit Ethernet Draft Almost Out Gig & 10 Gig E Enable SONET Free IP Data Nets Availability of Cheap Transport Technology for Both MAN and Wan Enables Enterprises to Drop Carrier Managed Services p. 32

Gigabit Ethernet Empowers Fiber to Home Increasing Availability of Fiber from Utilities & CATV Enables Creation of Micro Telecommunications Providers — World Wide Packets’ Gigabit Ethernet Gear to

274 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001

Enable Delivery of Vast Bandwidth to Home and Small Business p.38

Cogent Communications Guarantees 100 Mbs Internet for $1000 per Month Buys Dark Fiber and Builds National Network Optimized Entirely for Data Business Model Emphasizes 100 BaseT LAN Connections in Buildings it Serves p. 44 Part Two

National Trials of “True Internet” p. 50

Executive Summary p. 51

Canada and the Next Internet Revolution Canarie Builds Next Generation Optical Internets Government and R&E Leadership Push IP Cost Advantage — Special Report Shows Prospects for Customer Owned Fiber Networks in Rare Innovative National Environment p. 55

Canarie’s Role in Charting Canada’s Telecom Future Increasing Bandwidth & Lowering Costs for R & E Community St Arnaud Offers Overview of OBGP, Fiber Infrastructure Growth, Condominium Fiber Business Model and Scaling Issues p. 57

A Revolution in the Cost of New Fiber Networks IMS Executive Explains His Role in the Creation of Fiber Brokering and Condominium Dark Fiber Networks —Plummeting Cost Makes it Possible to Bring Fiber to Most End Users p. 63

Clash of Broadband Private vs Public Sector Business Models Will Impact Canadian Economy Francois Menard Describes Complexity of Canadian Regulatory, Carrier, and Content Struggles — Suggests That Viable Outcome Likely Only With Community

275 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA Networks Infrastructure p. 69

“Scaling the Internet” - Excerpts from a Draft Bill St Arnaud in New Paper Examines Traffic Issues His Hypothesis Suggests That Scaling Problems May Force Traffic Off Backbones p. 90

Optical Community Networks - A Canarie Presentation - September, 2000 - excerpts p. 92

CA* Design Document - A Canarie Presentation - October 30, 2000 - excerpts p. 99

Optical Border Gateway Protocol is CA*Net3 Experiment To Enable Peering Without Purchase of Transit Through Carrier Cloud — Direct Connection of Lambdas Could Reduce Backbone Transit Traffic Enabling Internet to Cope with Gig E Bandwidth Explosion p. 104

Some Optical Networking News p. 112

Explosion in Capacity Chased by Explosion in Use p. 113

SURFnet Users Pay Cost of Connection While Gov’t Funding Buys Advanced Infrastructure Capabilities — Technology Direction Similar to Canadian While Emphasis on Infrastructure as Enabler of Applications Results in Independent Approach to European Networking p.114

Swedish Ruling Party Endorses Building National Broadband Infrastructure: Goal Vital to Sweden’s Security Interview With Swedish Commission Member Explores Development of Infrastructure Policy Goals of Five Megabits per Second IP to Every Swedish Home and Apartment p. 122 Part Three

Toward a Bandwidth Commodity Market p. 126

Executive Summary p. 127

Driven by Need for Risk Management Bandwidth Commodity Market Coming Efforts Underway to Create Tools Where Rapid Market Changes in Demand and Supply Can Quickly Match Buyers and Sellers Stan Hanks Explains How These

276 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001

Developments Will Reshape Internet Industry p. 130

Bringing Risk Management to the Internet Lin Franks Explains Issues Involved in Commoditzation Describes Her Evangelist Role in Management and Training Issues Inherent in Trading Bandwidth p. 139

Commoditization of IP Bandwidth Some Unresolved Technical and Structural Issues Interview With Noel Chiappa Emphasizes Uncertainty About Ability of Routing System To Cope With Massive Changes p. 143

Bandwidth Commoditization Technology Enablers Sycamore Networks Focuses On Intelligent Optical Networks Using Software To Control Light Paths — Web Based Interfaces To Give Users Ability To Set Up end Tear Down Circuits Permitting Bandwidth Management p. 149

Ceo Of AIG Telecomm Emphasizes Difficulty Of Commoditizing Bandwidth Reaction to Commodization Issue Depends on Amount of Dark Fiber Owned and Affect on Control Over One’s Customers According to Eric Raab p. 155

Scaling the Internet via Exchange Points Many Players Jumping into Rapidly Expanding Global Market Technology and Business Model Issues as Seen By Equinix p. 161 Part Four

Internet Telephony Issues p. 170

Executive Summary p. 171

Assessing the Current State of IP Telephony Data and Voice Converging at the Protocol and Application Levels Telephony Becomes Tool To Be Activated From a Web Page While New Web Oriented Applications Make QoS Less an Issue p. 175

ENUM Protocol Seen as Directory Lookup Tying Internet Telephony Services to PSTN — All Numbers in PSTN Can Be ENUM Provisioned to Identify What Services Their Owner Uses - ENUM Enables VOIP Services to Find Ordinary PSTN End Points - Is

277 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA

Seen as Driver of Convergence p. 182

ITU and IETF in Agreement on ENUM Administration Letter from ITU To ICANN Blocks .tel gTLD Applications As Competition to ENUM — Administration Modeled on Neutral Tier 1 Database Holder of Pointers to Records of Provisioned Services p. 192

Klensin Internet Drafts Propose Radical DNS Revamp - New Class Means New Root — Drafts Are Aftermath of Network Solutions Split With IETF on ENUM and Internationalized Domain Names p. 194

Instant Messaging Coordination of People and Devices Becomes Standards Track High Priority — Serves as an Enabler for Many New Applications, New Uses of Bandwidth and Intelligent User Agents p. 198 Part Five

Other Oncoming Technical Developments that Devour Bandwidth p. 204

Executive Summary p. 205

Three Dimensional Data Web Set To Emerge New Protocols Enable Manipulation of Quantitative Data by Data Web Browsers — Open Standards Likely to Give Huge Boost to Data Mining Activities — Work Pushed By Terabyte Challenge Consortium Enables Remote Interaction of Data Sets p. 208

IPv6 from the Viewpoint of Mobile Wireless Continued Cell Phone Growth to Cause Deployment of IPv6 Nets Interconnected to Non Disappearing IPv4 Infrastructure Substantial Work Remains to Bring V6 and Data to Cell Phones p. 220

Among Scaling Issues IPv6 Solves Only IP Number Problem NATs Depend on Both IP Numbers and Routing Issues Since IPv4 and v6 Interconnect But Do Not Interoperate -Introducing v6 Means Running Two Networks — 3G Makes v6 Cellular Viable p. 227

Napster - MP3 File Sharing Application - A Hugely Popular Bandwidth Sink Defies Control Efforts of Network Administrators p. 230

Broadband Spread Spectrum Wireless Extends Internet Reach of ISPs & Field Research Scientists — Increased Radio Speed and Decline in Price Enabling Smaller

278 The COOK Report on Internet Light, IP, and Gig E - Annual Report February 2001 ISPs to Compete with Cable and DSL Internet Access NSF PI Dave Hughes Explains How Wireless Data Gathering by Environmental Scientists Will Yield Huge Increase in Network Traffic p. 233

Akamai Pushes Web Content to Edge Content Distribution Overlay Independant of Tier 1 Backbones and Peering Is Created Using Proprietary Tools Based on DNS — Avi Freedman as Chief Architect Heads Effort to Place Servers in Networks of 1,000s of ISPs Worldwide via Incentives of Bandwith Saving & Better Response p. 248 Part Six

ICANN p. 259

Executive Summary p. 260

Cracking the Code: an Analysis of US Internet Governance, E-Commerce and DNS Policy — Why US Dominance of E-commerce Indeed is Dead if ICANN Fails & Why the US Has Most to Lose from Continuing a Policy Founded on Indefinite Control of the Root p. 262

Commerce Department Formation of ICANN Seen as Illegal End Run Around the Administrative Procedures Act and the United States Constitution Michael Froomkin’s Findings to Be Published in Duke Law Journal - Lawrence Lessig Lauds Froomkin’s Creation of Framework that Could Force Reform p.269

Table of Contents p. 274

279 COOK Network Consultants, 431 Greenway Ave, Ewing, NJ 08618 USA

280