draft-arkko-iab-internet-consolidation-01.txt   draft-arkko-internet-consolidation.txt 
Network Working Group J. Arkko Network Working Group J. Arkko
Internet-Draft Ericsson Internet-Draft Ericsson
Intended status: Informational B. Trammell Intended status: Informational B. Trammell
Expires: September 13, 2019 ETH Zurich Expires: January 10, 2020 ETH Zurich
M. Nottingham M. Nottingham
Fastly Fastly
C. Huitema C. Huitema
Private Octopus Inc. Private Octopus Inc.
M. Thomson M. Thomson
Mozilla Mozilla
J. Tantsura J. Tantsura
Nuage Networks Apstra, Inc.
N. ten Oever N. ten Oever
University of Amsterdam University of Amsterdam
March 12, 2019 July 09, 2019
Considerations on Internet Consolidation and the Internet Architecture Considerations on Internet Consolidation and the Internet Architecture
draft-arkko-iab-internet-consolidation-01 draft-arkko-iab-internet-consolidation-02
Abstract Abstract
Many of us have held a vision of the Internet as the ultimate Many of us have held a vision of the Internet as the ultimate
distributed platform that allows communication, the provision of distributed platform that allows communication, the provision of
services, and competition from any corner of the world. But as the services, and competition from any corner of the world. But as the
Internet has matured, it seems to also feed the creation of large, Internet has matured, it seems to also feed the creation of large,
centralised entities in many areas. This phenomenon could be looked centralised entities in many areas. This phenomenon could be looked
at from many different angles, but this memo considers the topic from at from many different angles, but this memo considers the topic from
the perspective of how available technology and Internet architecture the perspective of how available technology and Internet architecture
skipping to change at page 1, line 48 skipping to change at page 1, line 48
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 13, 2019. This Internet-Draft will expire on January 10, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 31 skipping to change at page 2, line 31
Many of us have held a vision of the Internet as the ultimate Many of us have held a vision of the Internet as the ultimate
distributed platform that allows communication, the provision of distributed platform that allows communication, the provision of
services, and competition from any corner of the world. But as the services, and competition from any corner of the world. But as the
Internet has matured, it seems to also feed the creation of large, Internet has matured, it seems to also feed the creation of large,
centralised entities in many areas. centralised entities in many areas.
We use the term Internet consolidation to refer to the process of the We use the term Internet consolidation to refer to the process of the
increasing control over Internet infrastructure and services by a increasing control over Internet infrastructure and services by a
small set of organizations. Such concentration has an obvious effect small set of organizations. Such concentration has an obvious effect
on traffic flows or whose services and systems are in daily use by on traffic flows or on services and systems that are daily used by a
large population of Internet users, but it can also create secondary large population of Internet users. However, it can also create
effects, where the abiity to collect information or to affect secondary effects, where the ability to collect information or to
something is concentrated in the small set of organizations. affect something is concentrated in that small set of organizations.
Consolidation may also affect technology choices and the evolution of Consolidation may also affect technology choices and the evolution of
the Internet architecture, e.g., large organizations or organizations the Internet architecture. For example, large organizations or
providing important technology components may have a significant organizations providing important technology components may have a
impact on what technology is deployed for large numbers of users or significant impact on what technology is deployed for large numbers
by other organizations. of users or by other organizations.
Our first question is whether Internet is indeed consolidating? It Our first question is whether the Internet is indeed consolidating.
certainly appears so, though more quantitative research on this topic It certainly appears so, but more quantitative research on this topic
would be welcome. It is also possible that there's only a perception would be welcome. It is also possible that there is only a
of consolidation, as market forces have caused business changes in perception of consolidation, as market forces have caused business
new areas of business. Arguably, today's consolidation areas seem to changes in new areas of business. Arguably, today's consolidation
be more in the application space than further down in the stack or in areas seem to be more in the application layer than further down in
the operating systems, as was the case some years ago. The second the stack or in operating systems, as was the case some years ago.
question is if we're seeing consolidation simply moving to new areas. The second question is if we are seeing consolidation simply moving
to new areas.
This phenomenon could be looked at from many different angles, but This phenomenon could be looked at from many different angles, but
this memo considers the topic from the perspective of how available this memo considers the topic from the perspective of how available
technology and Internet architecture drives different market technology and Internet architecture drives different market
directions. Our third question is if the Internet technology has directions. Our third question is if the Internet technology has
influenced the consolidation trends in some manner? And conversely, influenced the consolidation trends in some manner. And conversely,
the fourth question asks how is Internet consolidation influencing the fourth question asks how Internet consolidation is influencing
the development of the Internet infrastructure and architecture? the development of the Internet infrastructure and architecture.
The engineering remit at the IETF is to focus on technology, but of The engineering remit at the IETF is to focus on technology, but of
course we also want to understand the implications and externalities course we also want to understand the implications and externalities
of the technical arrangements we design. Technology affects of the technical arrangements we design. Technology affects
economics and vice versa. The Internet technology community economics and vice versa. The Internet technology community
continues to make decisions that have ramifications on Internet continues to make decisions that have ramifications on Internet
systems, just as we are subject to forces that affect them. systems, just as we are subject to forces that affect them.
As technologists, our fourth question is whether there are changes in As technologists, our fourth question is whether there are changes in
technology that would help reduce those large-player advantages that technology that would help reduce those large-player advantages that
are technically-driven. are technically-driven.
This memo reviews areas where consolidation may be occurring in the This memo reviews areas where consolidation may be occurring in the
Internet, and discusses the potential reasons for this. The memo Internet, and discusses the potential reasons for this. The memo
starts by review other work in this area in Section 2. Section 3 starts by reviewing other work in this area in Section 2. Section 3
discusses consolidation and the reasons behind the creation of larger discusses consolidation and the reasons behind the creation of larger
entities, and Section 4 looks at some actions that might alleviate entities, and Section 4 looks at some actions that might alleviate
the situation. the situation.
If you are interested on this or other architecture-related topics, If you are interested on this or other architecture-related topics,
please subscribe to the IAB architecture-discuss mailing list as one please subscribe to the IAB architecture-discuss mailing list as one
forum for discussion. Similarly, the Internet Society has chosen forum for discussion. Similarly, the Internet Society has chosen
consolidation as a focus topic for their year 2019 activities. Their consolidation as a focus topic for their year 2019 activities. Their
report is in [ISOC]. report is in [ISOC].
2. Other Work 2. Other Work
One of the causes for the current consolidation of the Internet One of the causes for the current consolidation of the Internet
infrastructure can be traced back to some of the assumptions that infrastructure can be traced back to some of the assumptions that
were made during the commercialization of the Internet in the early were made during the commercialization of the Internet in the early
1990s [Abbate], even though [RFC1192] already describes some 1990s [Abbate], despite [RFC1192] describing some potential issues
potential issues that could arise. Overall it was expected the that could arise. Overall it was expected the combination of
combination of commercialization, together with the technical and commercialization, together with the technical and architectural
architectural characteristics of the Internet, such as its modularity characteristics of the Internet, such as its modularity and layering
and layering principles, would lead to perfect markets, free principles, would lead to perfect markets, free competition and
competition and decentralized structures [LitanRivlin]. decentralized structures [LitanRivlin].
But as we know now, this did not happen entirely as expected. Some But as we know now, this did not happen entirely as expected. Some
even argue that 'market concentrations, control and power struggles even argue that 'market concentrations, control and power struggles
are categories to adequately describe the fundamental dynamics of the are categories to adequately describe the fundamental dynamics of the
commercial Internet' [DolataSchrape]. While the privatization was commercial Internet' [DolataSchrape]. While the privatization was
supposed to lead to competition and innovation [Cowheyetal] supposed to lead to competition and innovation [Cowheyetal]
[VanSchewick], some argue that it actually led to the emergence of [VanSchewick], some argue that it actually led to the emergence of
Internet oligopolies [Mansell] [Smyrnaios]. Internet oligopolies [Mansell] [Smyrnaios].
Current scientific economic thinking harbors two different schools Current scientific economic thinking harbors two different schools of
vis a vis efficient markets and monopolies. The school based on Adam thought vis-a-vis efficient markets and monopolies. The school of
Smith argues that unfettered markets tend to concentration of wealth thought based on Adam Smith argues that unfettered markets tend to
and income, whereas liberal economist believe in efficient markets concentration of wealth and income, whereas liberal economists
that stimulate competition. believe in efficient markets that stimulate competition.
On the other hand, according to Joseph Stiglitz 'many sectors - On the other hand, according to Joseph Stiglitz, 'many sectors -
telecoms, cable TV, digital branches from social media to Internet telecommunications, cable TV, digital branches from social media to
search, health insurance, pharmaceuticals, agro-business, and many Internet search, health insurance, pharmaceuticals, agro-business,
more - cannot be understood through the lens of competition' and many more - cannot be understood through the lens of competition'
[Stiglitz]. The considerations of technologists and policy makers at [Stiglitz]. The considerations of technologists and policy makers at
the time of the commercialization and privatization of the Internet the time of the commercialization and privatization of the Internet
infrastructure might have been based on a belief in efficient infrastructure might have been based on a belief in efficient
markets, whereas we are now finding out this might not always be how markets, whereas we are now finding out this might not always be how
markets function. markets function.
Recently there is a growing body of literature that the currently
observed consolidation into oligopolies and monopolies can be
described as a failure of economic policy, which could be addressed
with revamped, or improved anti-trust policies [Wu] [Khan]. On the
other hand there are those who criticize these proposals for their
economic determinism; merger reviews, company break-ups and
'trustbusting' do not necessarily change the structure of a market.
Technology might actually have a role to play in this as well. The
IETF in specific, and the Internet governance regime complex [Nye] in
general, has been designed as a distributed arrangement to prevent
capture of the infrastructure by a single interest group or actor.
Where power or control was centralized, specific governance
arrangements were put into place to counter the centralization of
power.
It cannot be denied that 'market actors have contributed immensely to It cannot be denied that 'market actors have contributed immensely to
the evolution of the Internet in terms of investment, products, the evolution of the Internet in terms of investment, products,
services, and infrastructure, and the government's light-handed services, and infrastructure, and the government's light-handed
approach to regulation has given producers and consumers substantial approach to regulation has given producers and consumers substantial
freedom to innovate and to self-regulate with respect to many issues freedom to innovate and to self-regulate with respect to many issues
affecting the Internet community in ways that have produced affecting the Internet community in ways that have produced
substantial social benefits' [Frischmann]. But the current substantial social benefits' [Frischmann]. But the current
consolidation in ownership of and control over the Internet consolidation in ownership of and control over the Internet
infrastructure was not foreseen [Clark], and arguably the loss of infrastructure was not foreseen [Clark], and arguably the loss of
decentralized control goes against its design objectives. For decentralized control goes against its design objectives. For
skipping to change at page 5, line 15 skipping to change at page 5, line 28
3. Factors Driving Consolidation 3. Factors Driving Consolidation
Consolidation is driven by economic factors relating to scale and Consolidation is driven by economic factors relating to scale and
ability to easily reach a large market of users over the Internet. ability to easily reach a large market of users over the Internet.
This kind of setting tends to enable winners to take large market This kind of setting tends to enable winners to take large market
shares, whether those winners came about through the model that shares, whether those winners came about through the model that
liberal economists believe in or the model that Adam Smith believes liberal economists believe in or the model that Adam Smith believes
in. in.
The most visible aspects of this involve well-recognized Internet The most visible aspects of this involve well-recognized Internet
services. Internet Society's report summarised the market position services. The Internet Society's report summarised the market
of popular Internet service brands as follows [ISOC]: position of popular Internet service brands as follows [ISOC]:
o Facebook and Google have been estimated to account for 84% of o Facebook and Google have been estimated to account for 84% of
global digital advertising investment (excluding China). global digital advertising investment (excluding China).
o Amazon is expected to account for 49.1% of all online retail o Amazon is expected to account for 49.1% of all online retail
spending in the US. Similarly, Alibaba is estimated to have close spending in the US. Similarly, Alibaba is estimated to have close
to 60% of the e-commerce market in China. to 60% of the e-commerce market in China.
o Google alone holds 90% of the global search market, over 60% of o Google alone holds 90% of the global search market, over 60% of
web browsers, and has the number 1 (by far) mobile operating web browsers, and has the number 1 (by far) mobile operating
system (Android). system (Android).
o Facebook - incorporating Facebook Messenger, WhatsApp, and o Facebook - incorporating Facebook Messenger, WhatsApp, and
Instagram - holds 4 of the world's top 6 social media platforms. Instagram - holds 4 of the world's top 6 social media platforms.
But it is important to recognize that the Internet is a complex But it is important to recognize that the Internet is a complex
ecosystem. There are many underlying services whose diversity, or ecosystem. There are many underlying services whose diversity, or
lack thereof, are as important as that of, say, consumer-visible lack thereof, are as important as that of, say, consumer-visible
social networks. For instance, the diversity of cloud services, social networks. For instance, the diversity of cloud services,
operating systems, browser engines is as important as that as of operating systems, and browser engines is as important as that as of
application stores or the browsers themselves. application stores or the browsers themselves.
Of course, the Internet allows plenty of choice both in these and Of course, the Internet allows plenty of choice in these and other
other areas. Too many or too few choices create different kinds of areas. Too many or too few choices create different kinds of
problems. problems.
It would be useful to break these general factors and observations It would be useful to break these general factors and observations
down a bit further. In particular, it is useful to distinguish down a bit further. In particular, it is useful to distinguish
market or economic factors from technical factors. market or economic factors from technical factors.
3.1. Economics 3.1. Economics
Scaling benefits are natural for many types of businesses. And many Scaling benefits are natural for many types of businesses. And many
Internet-based businesses can potentially serve a very large customer Internet-based businesses can potentially serve a very large customer
skipping to change at page 6, line 43 skipping to change at page 7, line 9
Entities with a large role in a market place tend to have inertia, of Entities with a large role in a market place tend to have inertia, of
course through having many customers, but also due to their course through having many customers, but also due to their
interconnectedness with the rest of the ecosystem. These interconnectedness with the rest of the ecosystem. These
interconnections can range from business relationships to peering interconnections can range from business relationships to peering
connections, linking, and the use of various infrastructure services connections, linking, and the use of various infrastructure services
from an entity as building blocks in applications. from an entity as building blocks in applications.
These interconnections make it difficult for a market to move away These interconnections make it difficult for a market to move away
from a large entity. Indeed, even for an individual it can be a from a large entity. Indeed, even for an individual it can be a
challenge to not use the most commonly used Internet services challenge not to use the most commonly used Internet services
[Gizmodo]. [Gizmodo].
Optimistic technologists ("digital libertarians") tend to have a Optimistic technologists ("digital libertarians") tend to believe
beliefs that states have limited ability to regulate the Internet: that states have limited ability to regulate the Internet: "The Net
"The Net interprets censorship as damage and routes around it" interprets censorship as damage and routes around it" [Gilmore].
[Gilmore]. However, as argued by [Boyle] states may have multiple However, as argued by [Boyle] states may have multiple ways to
ways to influence and monitor the Internet. One of the issues influence and monitor the Internet. One of the issues related to
related to consolidation is that it tends to be easier to exert consolidation is that it tends to be easier to exert control of few
control of few large entities, than a large set of small, distributed large entities, than a large set of small, distributed players. This
players. This concern is particularly acute around intellectual concern is particularly acute around intellectual property rights or
property rights or surveillance capabilities, particularly when surveillance capabilities, particularly when extra-territorial
extra-territorial requirements are placed on the large entities. requirements are placed on the large entities. These entities cannot
These entities cannot avoid comforming to regulation and laws in any avoid comforming to regulation and laws in any of the locations they
of the locations they have presence in. have presence in.
As a result, there's an added angle of interconnectedness with As a result, there's an added angle of interconnectedness with
governments. At the same time, this of course also provides an governments. At the same time, this of course also provides an
avenue for control of market forces, e.g., in the form of competition avenue for control of market forces, e.g., in the form of competition
law. law.
3.3. Data- and Capital-intensive Services 3.3. Data- and Capital-intensive Services
The scaling advantages are only getting larger with the advent of AI- The scaling advantages are only getting larger with the advent of AI-
and machine learning -based technologies. and machine learning-based technologies.
The more users a service has, the more data is available for training The more users a service has, the more data is available for training
machine learning models, and the better the service becomes, bringing machine learning models, and the better the service becomes, bringing
again more users. This feedback loop and the general capital- again more users. This feedback loop and the general capital-
intensive nature of the technology (data and processing at scale) intensive nature of the technology (data and processing at scale)
makes it likely that the largest companies are ahead in the use of makes it likely that the largest companies are ahead in the use of
these technologies. these technologies.
One could also take the pessimistic view that many of the ongoing One could also take the pessimistic view that many of the ongoing
disputes in standards organizations relate to which market actors disputes in standards organizations relate to which market actors
will ultimately be able to collect the more data from private persons will ultimately be able to collect the more data from private persons
and how. The question isn't as much about the protection of the and how. The question isn't as much about the protection of these
user's privacy but rather whether one or another industry (or persons' privacy but rather whether some industry (or country) will
country) will be able to benefit from access to data. be able to benefit from access to data.
3.4. Permissionless Innovation 3.4. Permissionless Innovation
The email vs. social media example also highlights the interesting The email vs. social media example also highlights the interesting
roles of interoperability and the "permissionless innovation" roles of interoperability and the "permissionless innovation"
principle - the idea that a network can be simple but still powerful principle - the idea that a network can be simple but still powerful
enough that essentially any application could be built on top of it enough that essentially any application could be built on top of it
without needing any special support from anyone else. Permissionless without needing any special support from anyone else. Permissionless
innovation has brought us all the innovative applications that we innovation has brought us all the innovative applications that we
enjoy today, on top of a highly interoperable underlying network, enjoy today, on top of a highly interoperable underlying network,
skipping to change at page 8, line 7 skipping to change at page 8, line 25
applications. applications.
Paradoxically, if the underlying network is sufficiently powerful, Paradoxically, if the underlying network is sufficiently powerful,
the applications on top can evolve without similar pressures for the applications on top can evolve without similar pressures for
interoperability, leading to the closed but highly valuable services interoperability, leading to the closed but highly valuable services
discussed above. We call this the Permissionless Completeness discussed above. We call this the Permissionless Completeness
Problem. Problem.
3.5. Fundamentals of Communication 3.5. Fundamentals of Communication
There are also fundamental issues. For instance, speed of light; There are also fundamental issues, such as the speed of light. Low-
low-latency services can fundamentally only be provided through latency services can fundamentally only be provided through globally
globally distributed data centers. These are often provided built by distributed data centers. These are often provided and/or built by
large organizations, although collaborative and data center or cloud large organizations, although collaborative data center or cloud
computing service approaches also exist. computing service approaches also exist.
A similar issue has arisen in recent years around large-scale denial- A similar issue has arisen in recent years around large-scale denial-
of-service attacks, and how various entities can deal with them. of-service attacks, and how various entities can deal with them.
While the largest attacks affect all players (see, for instance, the While the largest attacks affect all players (see, for instance, the
Dyn attacks in October 2016), it is also true that large cloud- and Dyn attacks in October 2016), it is also true that large cloud- and
content delivery providers can better deal with such attacks due to content-delivery providers can better deal with such attacks due to
their scale. This is one reason that attracts many network services their scale. This is one reason that attracts many network services
to such providers. to such providers.
3.6. Technology Factors 3.6. Technology Factors
One of the key questions is whether we are seeing developments that One of the key questions is whether we are seeing developments that
are driven by economic factors or whether fundamental reasons or lack are driven by economic factors or whether fundamental reasons or lack
available technology drives particular models. For instance, of available technology drives particular models. For instance,
centralised solutions might desirable due to business incentives, or centralised solutions might be desirable due to business incentives,
they might be necessary because there is no distributed, or they might be necessary because there is no distributed,
collaborative solution. collaborative solution.
For instance, some technical issues have historically not been easy Some technical issues have historically not been easy to solve, such
to solve, such as e-mail spam, which has led to reliance on non- as e-mail spam, which has led to reliance on non-technical solutions.
technical solutions. Today, it is becoming increasingly difficult to Today, it is becoming increasingly difficult to run your own mail
run your own mail services, essentially forcing many organizations services, essentially forcing many organizations and individuals to
and individuals to employ larger providers. The issues relate employ larger providers. The issues relate directly to size of
directly to size of entities; no one can afford to disconnect from entities; no one can afford to disconnect from the largest providers.
the largest providers. But as a small entity, there is little But as a small entity, there is little leverage to convince peer
leverage to convince peer entities or various supporting white/ entities or various supporting white/blacklist entities to deal with
blacklist entities to deal with you properly. you properly.
Many Internet services are based on gathering data about users, and Many Internet services are based on gathering data about users, and
using that data for, for instance, targeted advertisements. More using that data for targeted advertisements. More data from more
data from more users makes it possible to run a service more users makes it possible to run a service more accurately or with
accurately or with better results; here again scale brings better results; here again scale brings advantages.
advantages.
Another trend is that more and more content is becoming available Another trend is that more and more content is becoming available
locally, from a content delivery or provider function directly on locally, from a content delivery or provider function directly on
your own ISP's network. We predict that eventually most content will one's own ISP network. We predict that eventually most content will
be delivered this way, reducing the role that global IP connections be delivered this way, reducing the role that global IP connectivity
across the Internet play. By some metrics this has already happened; across the Internet plays. By some metrics this has already
what practical - positive or negative - impacts might this have on happened; what practical - positive or negative - impacts might this
the Internet technology? have on the Internet technology?
There are also security tradeoffs. Large entities are generally There are also security tradeoffs. Large entities are generally
better equipped to move to more recent and more secure technology. better equipped to move to more recent and more secure technology.
For instance, the Domain Name System (DNS) shows signs of ageing but For instance, the Domain Name System (DNS) shows signs of ageing but
due to the legacy of deployed systems, has changed very slowly. due to the legacy of deployed systems, has changed very slowly.
Newer technology developed at the IETF enables DNS queries to be Newer technology developed in accordance with IETF standards enables
performed confidentially, but its deployment is happening mostly in DNS queries to be performed confidentially, but its deployment is
browsers that use global DNS resolver services, such as Cloudflare's happening mostly in browsers that use global DNS resolver services,
1.1.1.1 or Google's 8.8.8.8. This results in faster evolution and such as Cloudflare's 1.1.1.1 or Google's 8.8.8.8. This results in
better security for end users. faster evolution and better security for end users.
However, if one steps back and considers the overall security effects However, if one steps back and considers the overall security effects
of these developments, the resulting effects can be different. While of these developments, the resulting effects can be different. While
the security of the actual protocol exchanges improves with the the security of the actual protocol exchanges improves with the
introduction of this new technology, at the same time this implies a introduction of this new technology, at the same time this implies a
move from using a worldwide distributed set of DNS resolvers into, move from using a worldwide distributed set of DNS resolvers into,
again, more centralised global resolvers. While these resolvers are again, more centralised global resolvers. While these resolvers are
very well maintained (and a great service), they are potentially very well maintained (and a great service), they are potentially
high-value targets for pervasive monitoring and Denial-of-Service high-value targets for pervasive monitoring and Denial-of-Service
(DoS) attacks. In 2016, for example, DoS attacks were launched (DoS) attacks. In 2016, for example, DoS attacks were launched
against Dyn, one of the largest DNS providers, leading to some against Dyn, one of the largest DNS providers, leading to some
outages. outages.
4. Call to Action 4. Call to Action
Are there assumptions about the Internet architecture that no longer Are there assumptions about the Internet architecture that no longer
hold in a world where larger, more centralised entities provide big hold in a world where larger, more centralised entities provide big
parts of the Internet service? If the world changes, the Internet parts of the Internet service? If the world changes, the Internet
and its technology/architecture may have to match those changes. and its technology/architecture may have to match those changes.
It appears that level the playing field for new entrants or small It appears that leveling the playing field for new entrants or small
players brings potential benefits. Are there technical solutions players brings potential benefits. Are there technical solutions
that are missing today? that are missing today?
Of course, it may well be that technology improvements are hard to Of course, it may well be that technology improvements are hard to
come by. Nevertheless, recognizing the risks of consolidation in come by. Nevertheless, recognizing the risks of consolidation in
both current and proposed future technologies is the first step in both current and proposed future technologies is the first step in
proactively avoiding those risks where possible. proactively avoiding those risks where possible.
Assuming that one does not wish for regulation, technologies that Assuming that one does not wish for regulation, technologies that
support distributed architectures, open source implementations of support distributed architectures, open source implementations of
currently centralised network functions, or help increase user's currently centralised network functions, or helping increase users'
control can be beneficial. Federation, for example, would help control can be beneficial. Federation, for example, would help
enable distributed services in situations where smaller entities enable distributed services in situations where smaller entities
would like to collaborate. would like to collaborate.
Similarly, in an asymmetric power balance between users and services, Similarly, in an asymmetric power balance between users and services,
tools that enable the user to control what information is provided to tools that enable the user to control what information is provided to
a particular service can be very helpful. Some such tools exist, for a particular service can be very helpful. Some such tools exist, for
instance, in the privacy and tracking-prevention modes of popular instance, in the privacy and prevention-tracking modes of popular
browsers but why are these modes not the default, and could we browsers, but why are these modes not the default, and could we
develop them further? develop them further?
It is also surprising that in the age of software-defined everything, It is also surprising that in the age of software-defined everything,
we can program almost anything else except the globally provided, we can program almost anything else except the globally provided,
packaged services. Opening up interfaces would allow the building of packaged services. Opening up interfaces would allow the building of
additional, innovative services, and better match with users' needs. additional, innovative services, and better match users' needs.
Silver bullets are rare, of course. Internet service markets Silver bullets are rare, of course. Internet service markets
sometimes fragment rather than cooperate through federation. And the sometimes fragment rather than cooperate through federation. And the
asymmetric power balances are easiest changed with data that is in asymmetric power balances are easiest changed with data that is user-
your control, but it is much harder to change when someone else holds controlled, but it is much harder to change when someone else holds
it. Nevertheless, the exploration of solutions to ensure the it. Nevertheless, the exploration of solutions to ensure the
Internet is kept open for new innovations and in the control of users Internet is kept open for new innovations and in the control of users
is very important. is very important.
o What IETF topics that should be pursued to address some of the o What IETF topics that should be pursued to address some of the
issues around consolidation? Some of the topics for consideration issues around consolidation? Some of the topics for consideration
are discussed in Section 4.1 and Section 4.2. are discussed in Section 4.1 and Section 4.2.
o Are there open source efforts that should be pursued or kept being o Are there open source efforts that should be pursued or continue
pursued to ensure that a diversity of operators and networks can to be pursued to ensure that a diversity of operators and networks
use a particular technology? This is further discussed in can use a particular technology? This is further discussed in
{{opensource]]. {{opensource]].
o What measurements relating to the developments centralization or o What measurements relating to the development of centralization or
consolidation should be pursued? And what other research, such as consolidation should be pursued? And what other research, such as
distributed Internet architectures, should be driven forward? distributed Internet architectures, should be driven forward?
Some potential topics are discussed in Section 4.4. Some potential topics are discussed in Section 4.4.
4.1. Open Interfaces 4.1. Open Interfaces
Standards and open source efforts continue to build many open Standards and open source efforts continue to build many open
interfaces and APIs that allow systems interoperability and tailoring interfaces and APIs that allow systems interoperability and tailoring
of services. In some cases, however, the availability of open of services. In some cases, however, the availability of open
interfaces definitions and software has not lead to the realization interfaces definitions and software has not led to the realization of
of actual interfaces in this open manner. For instance, different actual interfaces in this open manner. For instance, different
instant messaging systems have had a technical ability to be instant messaging systems have had a technical ability to be
interoperable with other systems, just like e-mail is interoperable interoperable with other systems, just like e-mail is interoperable
across systems, but have chosen to be disconnected. across systems, but have chosen to be disconnected.
Work in determining what open interfaces can provide benefits to Work in determining what open interfaces can provide benefits to
users as well be successfully deployed in the Internet ecosystem users as well be successfully deployed in the Internet ecosystem
would of course be useful. would of course be useful.
4.2. Specific Standardization Choices 4.2. Specific Standardization Choices
Sometimes the issue is not the availability of interfaces as such, Sometimes the issue is not the availability of interfaces as such,
but rather fundamental architectural choices with regards to how but rather fundamental architectural choices with regards to how
Internet systems should be built. Internet systems should be built.
Often this relates to how centralized or distributed deployments are Often this relates to how centralized or distributed deployments are
targeted. And even if a distributed, broad deployment model is targeted. And even if a distributed, broad deployment model is
targeted, he expectations may not match reality when economies of targeted, expectations may not match reality when economies of scale,
scale, DDoS resilience, market consolidation, or other factors have DDoS resilience, market consolidation, or other factors have come
come into play. These factors can result in the deployed reality into play. These factors can result in the deployed reality being
being highly concentrated. highly concentrated.
This is a serious issue for the Internet, as concentrated, This is a serious issue for the Internet, as concentrated,
centralized deployment models present risks to user choice, privacy, centralized deployment models present risks to user choice, privacy,
and future protocol evolution. On occasion, the differences to and future protocol evolution. On occasion, the differences to
expectations can be immediate, but can also occur much later. expectations can be immediate, but can also occur much later.
Some examples of these issue include current work in DNS where we may Some examples of these issues include current work in DNS where we
see concentration through the use of globally available common may see concentration through the use of globally available common
resolver services, which evolve rapidly and can offer better resolver services, which evolve rapidly and can offer better
security. But the concentration of these queries into few services security. But the concentration of these queries into a few services
creates new security and privacy concerns. creates new security and privacy concerns.
Another example is email, which started out as many providers running Another example is email, which started out as many providers running
in a largely uncoordinated fashion, but which has since then seen in a largely uncoordinated fashion, but which has since then seen
significant market consolidation and a need for coordination to significant market consolidation and a need for coordination to
defend against attacks such as spam. The coordination and defend against attacks such as spam. The coordination and
centralized defense mechanisms scale better for large entities, which centralized defense mechanisms scale better for large entities, which
has fueled additional consolidation. has fueled additional consolidation.
Awareness of these issues while working on standards would be useful, Awareness of these issues while working on standards would be useful,
so that the issues can be taken into account and appropriately so that the issues can be taken into account and appropriately
mitigated. To begin with, those of us Interested in the broader mitigated. To begin with, those of us interested in the broader
questions about Internet development and Internet researchers are questions about Internet research and development are needed to
needed to identify some of the effects that new technology identify some of the effects that new technology developments may
developments may pose. pose.
4.3. Open Source 4.3. Open Source
Many key Internet infrastructure services (e.g., DNS servers), end- Many key Internet infrastructure services (e.g., DNS servers), end-
user applications (e.g., browsers) and technology components (e.g., user applications (e.g., browsers) and technology components (e.g.,
operating systems or protocol implementations) are commonly operating systems or protocol implementations) are commonly
implemented using open source solutions. implemented using open source solutions.
This is often true even if there's a large entity that is in charge This is often true even if there is a large entity that is in charge
of large fraction of development and deployment for a particular of a large fraction of development and deployment for a particular
technology. This is a good thing, as it ensures that others have a technology. This is a good thing, as it provides a means for others
fair chance of changing the technology in question, should the large to have a fair chance of changing the technology in question, should
entity drive their use of the technology in some direction that does the large entity drive their use of the technology in some direction
not benefit the users. For instance, users and other organizations that does not benefit the users. For instance, users and other
have traditionally been able to either run their own browser versions organizations have traditionally been able to either run their own
or provided extensions that suit their needs better than the default browser versions or provided extensions that suit their needs better
system. than the default system.
As a result, continuing to have this ecosystem is important safety As a result, continuing to have this ecosystem is an important safety
valve and competition opportunity. valve and competition opportunity.
4.4. Research Challenges 4.4. Research Challenges
There are number of different research directions for which further There are a number of different research directions for which further
work would be useful. work would be useful.
The first is about measurements; is the Internet indeed The first is about measurements; is the Internet indeed
consolidating, and if so, by how much, and in what aspects? Also, consolidating, and if so, by how much, and in what aspects? Also,
where are Internet's traffic flows concentrating, and how is this where are the Internet's traffic flows concentrating, and how is this
changing over time? changing over time?
There are also questions about the trends and their relationships to There are also questions about the trends and their relationships to
technology: Has Internet technology influenced the consolidation technology: Has Internet technology influenced the consolidation
trends in some manner? And conversely, how Internet consolidation trends in some manner? And conversely, how does Internet
influences the development of the Internet infrastructure and consolidation influence the development of Internet infrastructure
architecture? and architecture?
Finally, research on topics that would likely yield results that Finally, research on topics that would likely yield results that
increase the diversity and de-centralization in the Internet would increase the diversity and de-centralization in the Internet would
obviously be welcome. This can include any de-centralized obviously be welcome. This can include any de-centralized
technologies, but in particular distributed Internet architecture is technologies, but in particular distributed Internet architecture is
an Interesting topic. an interesting topic.
5. Contributors 5. Contributors
Much of the text in this memo is from a blog article written by Jari Much of the text in this memo is from a blog article written by Jari
Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian
Trammell for the Internet Architecture Board (IAB), and from a blog Trammell for the Internet Architecture Board (IAB), and from a blog
article written by Jari Arkko and Brian Trammell APNIC and RIPE. article written by Jari Arkko and Brian Trammell APNIC and RIPE.
Some parts of the text have also come from a future workshop Some parts of the text have also come from a future workshop
description developed in the IAB, primarily by Christian Huitema and description developed in the IAB, primarily by Christian Huitema and
Ted Hardie. Ted Hardie.
6. Acknowledgements 6. Acknowledgements
The authors would like to thank IAB members, Geoff Huston, Amelia The authors would like to thank IAB members, Geoff Huston, Amelia
Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf
Kolkman, and many others for interesting discussions in this problem Kolkman, Greg Skinner and many others for interesting discussions in
space. this problem space. The authors would also like to thank all
participants in the 2019 Design Expectations vs. Deployment Reality
(DEDR) IAB workshop held in Kirkkonummi, Finland, as well as the
participants in the 2019 EuroDIG workshop on "Internet consolidation
- opportunities and challenges".
7. Informative References 7. Informative References
[Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000, [Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000,
<https://mitpress.mit.edu/books/inventing-internet>. <https://mitpress.mit.edu/books/inventing-internet>.
[Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and [Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and
Hardwired Censors", Duke Law School, Hardwired Censors", Duke Law School,
https://scholarship.law.duke.edu/ https://scholarship.law.duke.edu/
faculty_scholarship/619/ , 1997. faculty_scholarship/619/ , 1997.
skipping to change at page 14, line 5 skipping to change at page 14, line 22
internet-article.html) , December 1993. internet-article.html) , December 1993.
[Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was [Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was
Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut- Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut-
the-big-five-tech-giants-from-my-life-it-was-hell/ , the-big-five-tech-giants-from-my-life-it-was-hell/ ,
February 2019. February 2019.
[ISOC] "Consolidation in the Internet economy", Internet Society, [ISOC] "Consolidation in the Internet economy", Internet Society,
https://future.internetsociety.org/2019/ , 2019. https://future.internetsociety.org/2019/ , 2019.
[Khan] Khan, L., "Amazon's Antritrust Paradox", The Yale Law
Journal 126:710 , 2017.
[LitanRivlin] [LitanRivlin]
Litan, R. and A. Rivlin, "Projecting the Economic Impact Litan, R. and A. Rivlin, "Projecting the Economic Impact
of the Internet", American Economic Review 91 (2), pp. of the Internet", American Economic Review 91 (2), pp.
313-317 , 2001. 313-317 , 2001.
[Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies: [Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies:
A Political Economy Analysis", In Miller, Edythe S.and A Political Economy Analysis", In Miller, Edythe S.and
Samuels, Warren J., (eds.) An Institutionalist Approach to Samuels, Warren J., (eds.) An Institutionalist Approach to
Public Utilities Regulation. Michigan State University Public Utilities Regulation. Michigan State University
Press, East Lansing, Michigan, pp. 162-201. ISBN Press, East Lansing, Michigan, pp. 162-201. ISBN
9780870136245 , 2002, <https://core.ac.uk/download/ 9780870136245 , 2002, <https://core.ac.uk/download/
pdf/204420.pdf>. pdf/204420.pdf>.
[Nye] Nye, J., "The Regime Complex for Managing Global Cyber
Activities. Global Commission on Internet Governance",
CIGI, Global Commission on Internet Governance , 2014.
[RFC1192] Kahin, B., "Commercialization of the Internet summary [RFC1192] Kahin, B., "Commercialization of the Internet summary
report", RFC 1192, DOI 10.17487/RFC1192, November 1990, report", RFC 1192, DOI 10.17487/RFC1192, November 1990,
<https://www.rfc-editor.org/info/rfc1192>. <https://www.rfc-editor.org/info/rfc1192>.
[RFC1958] Carpenter, B., Ed., "Architectural Principles of the [RFC1958] Carpenter, B., Ed., "Architectural Principles of the
Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996,
<https://www.rfc-editor.org/info/rfc1958>. <https://www.rfc-editor.org/info/rfc1958>.
[RFC3935] Alvestrand, H., "A Mission Statement for the IETF", [RFC3935] Alvestrand, H., "A Mission Statement for the IETF",
BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004,
skipping to change at page 14, line 45 skipping to change at page 15, line 20
Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or
do they tend towards monopoly? The verdict is in", 2016, do they tend towards monopoly? The verdict is in", 2016,
<https://www.weforum.org/agenda/2016/05/joseph-stiglitz- <https://www.weforum.org/agenda/2016/05/joseph-stiglitz-
are-markets-efficient-or-do-they-tend-towards-monopoly- are-markets-efficient-or-do-they-tend-towards-monopoly-
the-verdict-is-in/>. the-verdict-is-in/>.
[VanSchewick] [VanSchewick]
van Schewick, B., "Internet Architecture and Innovation", van Schewick, B., "Internet Architecture and Innovation",
MIT Press , 2012. MIT Press , 2012.
[Wu] Wu, T., "The Curse of Bigness", Columbia Global Reports,
New York, New York , 2018.
Authors' Addresses Authors' Addresses
Jari Arkko Jari Arkko
Ericsson Ericsson
Email: jari.arkko@piuha.net Email: jari.arkko@piuha.net
Brian Trammell Brian Trammell
ETH Zurich ETH Zurich
Email: ietf@trammell.ch Email: ietf@trammell.ch
Mark Nottingham Mark Nottingham
Fastly Fastly
Email: mnot@mnot.net Email: mnot@mnot.net
skipping to change at page 15, line 23 skipping to change at page 16, line 4
Christian Huitema Christian Huitema
Private Octopus Inc. Private Octopus Inc.
Email: huitema@huitema.net Email: huitema@huitema.net
Martin Thomson Martin Thomson
Mozilla Mozilla
Email: martin.thomson@gmail.com Email: martin.thomson@gmail.com
Jeff Tantsura Jeff Tantsura
Nuage Networks Apstra, Inc.
Email: jefftant.ietf@gmail.com Email: jefftant.ietf@gmail.com
Niels ten Oever Niels ten Oever
University of Amsterdam University of Amsterdam
Email: mail@nielstenoever.net Email: mail@nielstenoever.net
 End of changes. 54 change blocks. 
138 lines changed or deleted 167 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/