| draft-arkko-internet-consolidation-00.txt | draft-arkko-internet-consolidation.txt | |||
|---|---|---|---|---|
| Internet Engineering Task Force J. Arkko | Network Working Group J. Arkko | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Intended status: Informational B. Trammell | Intended status: Informational B. Trammell | |||
| Expires: April 26, 2019 ETH Zurich | Expires: January 10, 2020 ETH Zurich | |||
| M. Nottingham | M. Nottingham | |||
| Fastly | ||||
| C. Huitema | C. Huitema | |||
| Private Octopus Inc. | Private Octopus Inc. | |||
| M. Thomson | M. Thomson | |||
| Mozilla | Mozilla | |||
| J. Tantsura | J. Tantsura | |||
| Nuage Networks | Apstra, Inc. | |||
| October 23, 2018 | N. ten Oever | |||
| University of Amsterdam | ||||
| July 09, 2019 | ||||
| Considerations on Internet Consolidation and the Internet Architecture | Considerations on Internet Consolidation and the Internet Architecture | |||
| draft-arkko-iab-internet-consolidation-00 | draft-arkko-iab-internet-consolidation-02 | |||
| Abstract | Abstract | |||
| Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
| distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
| services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
| Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
| centralised entities in many areas. This phenomenon could be looked | centralised entities in many areas. This phenomenon could be looked | |||
| at from many different angles, but this memo considers the topic from | at from many different angles, but this memo considers the topic from | |||
| the perspective of how available technology and Internet architecture | the perspective of how available technology and Internet architecture | |||
| skipping to change at page 1, line 46 | skipping to change at page 1, line 48 | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on April 26, 2019. | This Internet-Draft will expire on January 10, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | ||||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | ||||
| 2. Consolidation . . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
| 2.1. Economics . . . . . . . . . . . . . . . . . . . . . . . . 4 | ||||
| 2.2. Data- and Capital-intensive Services . . . . . . . . . . 4 | ||||
| 2.3. Permissionless Innovation . . . . . . . . . . . . . . . . 5 | ||||
| 2.4. Fundamentals of Communication . . . . . . . . . . . . . . 5 | ||||
| 2.5. Technology Factors . . . . . . . . . . . . . . . . . . . 5 | ||||
| 3. Action . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | ||||
| 4. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 6. Informative References . . . . . . . . . . . . . . . . . . . 8 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 1. Introduction | 1. Introduction | |||
| Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
| distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
| services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
| Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
| centralised entities in many areas. | centralised entities in many areas. | |||
| Is Internet traffic consolidating, i.e., moving towards a larger | We use the term Internet consolidation to refer to the process of the | |||
| fraction of traffic involving a small set of large content providers | increasing control over Internet infrastructure and services by a | |||
| or social networks? It certainly appears so, though more | small set of organizations. Such concentration has an obvious effect | |||
| quantitative research on this topic would be welcome. | on traffic flows or on services and systems that are daily used by a | |||
| large population of Internet users. However, it can also create | ||||
| secondary effects, where the ability to collect information or to | ||||
| affect something is concentrated in that small set of organizations. | ||||
| Consolidation may also affect technology choices and the evolution of | ||||
| the Internet architecture. For example, large organizations or | ||||
| organizations providing important technology components may have a | ||||
| significant impact on what technology is deployed for large numbers | ||||
| of users or by other organizations. | ||||
| Our first question is whether the Internet is indeed consolidating. | ||||
| It certainly appears so, but more quantitative research on this topic | ||||
| would be welcome. It is also possible that there is only a | ||||
| perception of consolidation, as market forces have caused business | ||||
| changes in new areas of business. Arguably, today's consolidation | ||||
| areas seem to be more in the application layer than further down in | ||||
| the stack or in operating systems, as was the case some years ago. | ||||
| The second question is if we are seeing consolidation simply moving | ||||
| to new areas. | ||||
| This phenomenon could be looked at from many different angles, but | This phenomenon could be looked at from many different angles, but | |||
| this memo considers the topic from the perspective of how available | this memo considers the topic from the perspective of how available | |||
| technology and Internet architecture drives different market | technology and Internet architecture drives different market | |||
| directions. How are technology choices and fundamentals of | directions. Our third question is if the Internet technology has | |||
| communication affecting some of these trends? | influenced the consolidation trends in some manner. And conversely, | |||
| Our engineering remit is to focus on technology, but of course we | the fourth question asks how Internet consolidation is influencing | |||
| also want to understand the implications and externalities of the | the development of the Internet infrastructure and architecture. | |||
| technical arrangements we design. Technology affects economics and | ||||
| vice versa. The Internet technology community continues to make | ||||
| decisions that have ramifications on Internet systems, just as we are | ||||
| subject to forces that affect them. | ||||
| As technologists, one question we have is whether there are changes | The engineering remit at the IETF is to focus on technology, but of | |||
| in technology that would help reduce technically-driven large-player | course we also want to understand the implications and externalities | |||
| advantages. | of the technical arrangements we design. Technology affects | |||
| economics and vice versa. The Internet technology community | ||||
| continues to make decisions that have ramifications on Internet | ||||
| systems, just as we are subject to forces that affect them. | ||||
| As technologists, our fourth question is whether there are changes in | ||||
| technology that would help reduce those large-player advantages that | ||||
| are technically-driven. | ||||
| This memo reviews areas where consolidation may be occurring in the | This memo reviews areas where consolidation may be occurring in the | |||
| Internet, and discusses the potential reasons for this. Section 2 | Internet, and discusses the potential reasons for this. The memo | |||
| starts by reviewing other work in this area in Section 2. Section 3 | ||||
| discusses consolidation and the reasons behind the creation of larger | discusses consolidation and the reasons behind the creation of larger | |||
| entities, and Section 3 looks at some actions that might alleviate | entities, and Section 4 looks at some actions that might alleviate | |||
| the situation. | the situation. | |||
| Note: If you are interested on this or other architecture-related | If you are interested on this or other architecture-related topics, | |||
| topics, please subscribe to the IAB architecture-discuss mailing list | please subscribe to the IAB architecture-discuss mailing list as one | |||
| as one forum for discussion. | forum for discussion. Similarly, the Internet Society has chosen | |||
| consolidation as a focus topic for their year 2019 activities. Their | ||||
| report is in [ISOC]. | ||||
| 2. Consolidation | 2. Other Work | |||
| One of the causes for the current consolidation of the Internet | ||||
| infrastructure can be traced back to some of the assumptions that | ||||
| were made during the commercialization of the Internet in the early | ||||
| 1990s [Abbate], despite [RFC1192] describing some potential issues | ||||
| that could arise. Overall it was expected the combination of | ||||
| commercialization, together with the technical and architectural | ||||
| characteristics of the Internet, such as its modularity and layering | ||||
| principles, would lead to perfect markets, free competition and | ||||
| decentralized structures [LitanRivlin]. | ||||
| But as we know now, this did not happen entirely as expected. Some | ||||
| even argue that 'market concentrations, control and power struggles | ||||
| are categories to adequately describe the fundamental dynamics of the | ||||
| commercial Internet' [DolataSchrape]. While the privatization was | ||||
| supposed to lead to competition and innovation [Cowheyetal] | ||||
| [VanSchewick], some argue that it actually led to the emergence of | ||||
| Internet oligopolies [Mansell] [Smyrnaios]. | ||||
| Current scientific economic thinking harbors two different schools of | ||||
| thought vis-a-vis efficient markets and monopolies. The school of | ||||
| thought based on Adam Smith argues that unfettered markets tend to | ||||
| concentration of wealth and income, whereas liberal economists | ||||
| believe in efficient markets that stimulate competition. | ||||
| On the other hand, according to Joseph Stiglitz, 'many sectors - | ||||
| telecommunications, cable TV, digital branches from social media to | ||||
| Internet search, health insurance, pharmaceuticals, agro-business, | ||||
| and many more - cannot be understood through the lens of competition' | ||||
| [Stiglitz]. The considerations of technologists and policy makers at | ||||
| the time of the commercialization and privatization of the Internet | ||||
| infrastructure might have been based on a belief in efficient | ||||
| markets, whereas we are now finding out this might not always be how | ||||
| markets function. | ||||
| Recently there is a growing body of literature that the currently | ||||
| observed consolidation into oligopolies and monopolies can be | ||||
| described as a failure of economic policy, which could be addressed | ||||
| with revamped, or improved anti-trust policies [Wu] [Khan]. On the | ||||
| other hand there are those who criticize these proposals for their | ||||
| economic determinism; merger reviews, company break-ups and | ||||
| 'trustbusting' do not necessarily change the structure of a market. | ||||
| Technology might actually have a role to play in this as well. The | ||||
| IETF in specific, and the Internet governance regime complex [Nye] in | ||||
| general, has been designed as a distributed arrangement to prevent | ||||
| capture of the infrastructure by a single interest group or actor. | ||||
| Where power or control was centralized, specific governance | ||||
| arrangements were put into place to counter the centralization of | ||||
| power. | ||||
| It cannot be denied that 'market actors have contributed immensely to | ||||
| the evolution of the Internet in terms of investment, products, | ||||
| services, and infrastructure, and the government's light-handed | ||||
| approach to regulation has given producers and consumers substantial | ||||
| freedom to innovate and to self-regulate with respect to many issues | ||||
| affecting the Internet community in ways that have produced | ||||
| substantial social benefits' [Frischmann]. But the current | ||||
| consolidation in ownership of and control over the Internet | ||||
| infrastructure was not foreseen [Clark], and arguably the loss of | ||||
| decentralized control goes against its design objectives. For | ||||
| instance, [RFC1958] says: | ||||
| This allows for uniform and relatively seamless operations in a | ||||
| competitive, multi-vendor, multi-provider public network. | ||||
| and | ||||
| Heterogeneity is inevitable and must be supported by design. | ||||
| And [RFC3935] says: | ||||
| We embrace technical concepts such as decentralized control, edge- | ||||
| user empowerment and sharing of resources, because those concepts | ||||
| resonate with the core values of the IETF community. | ||||
| 3. Factors Driving Consolidation | ||||
| Consolidation is driven by economic factors relating to scale and | Consolidation is driven by economic factors relating to scale and | |||
| ability to reach a large market over the Internet. In general, an | ability to easily reach a large market of users over the Internet. | |||
| efficient market such as the Internet tends to enable winners to take | This kind of setting tends to enable winners to take large market | |||
| large market shares. | shares, whether those winners came about through the model that | |||
| liberal economists believe in or the model that Adam Smith believes | ||||
| in. | ||||
| The most visible aspects of this involve well-recognised Internet | The most visible aspects of this involve well-recognized Internet | |||
| services, but it is important to recognise that the Internet is a | services. The Internet Society's report summarised the market | |||
| complex ecosystem. There are many underlying services whose | position of popular Internet service brands as follows [ISOC]: | |||
| diversity, or lack thereof, are as important as that of, say, | ||||
| consumer-visible social networks. For instance, the diversity of | ||||
| cloud services, operating systems, browser engines is as important as | ||||
| that as of application stores or the browsers themselves. | ||||
| Of course, the Internet allows plenty of choice both in these and | o Facebook and Google have been estimated to account for 84% of | |||
| other areas. Too many or too few choices create different kinds of | global digital advertising investment (excluding China). | |||
| o Amazon is expected to account for 49.1% of all online retail | ||||
| spending in the US. Similarly, Alibaba is estimated to have close | ||||
| to 60% of the e-commerce market in China. | ||||
| o Google alone holds 90% of the global search market, over 60% of | ||||
| web browsers, and has the number 1 (by far) mobile operating | ||||
| system (Android). | ||||
| o Facebook - incorporating Facebook Messenger, WhatsApp, and | ||||
| Instagram - holds 4 of the world's top 6 social media platforms. | ||||
| But it is important to recognize that the Internet is a complex | ||||
| ecosystem. There are many underlying services whose diversity, or | ||||
| lack thereof, are as important as that of, say, consumer-visible | ||||
| social networks. For instance, the diversity of cloud services, | ||||
| operating systems, and browser engines is as important as that as of | ||||
| application stores or the browsers themselves. | ||||
| Of course, the Internet allows plenty of choice in these and other | ||||
| areas. Too many or too few choices create different kinds of | ||||
| problems. | problems. | |||
| It would be useful to break these general factors and observations | It would be useful to break these general factors and observations | |||
| down a bit further. In particular, it is useful to distinguish | down a bit further. In particular, it is useful to distinguish | |||
| market or economic factors from technical factors. | market or economic factors from technical factors. | |||
| 2.1. Economics | 3.1. Economics | |||
| Scaling benefits are natural for many types of businesses. And many | Scaling benefits are natural for many types of businesses. And many | |||
| Internet-based businesses can potentially serve a very large customer | Internet-based businesses can potentially serve a very large customer | |||
| base, as the cost of replicating and delivering their service to new | base, as the cost of replicating and delivering their service to new | |||
| customers or areas is small. | customers or areas is small. | |||
| However, typically the network effect has an even more pronounced | However, typically the network effect has an even more pronounced | |||
| impact. Each additional user adds to the value of the network for | impact. Each additional user adds to the value of the network for | |||
| all users in a network. In some applications, such as the open web, | all users in a network. In some applications, such as the open web, | |||
| this value grows for everyone, as the web is a globally connected, | this value grows for everyone, as the web is a globally connected, | |||
| interoperable service for anyone with a browser can use. | interoperable service for anyone with a browser can use. | |||
| There is an important distinction between different applications of | There is an important distinction between different applications of | |||
| the network effect, however. Consider email as another example; | the network effect, however. Consider email as another example; | |||
| anyone with an account at any email server can use it globally. | anyone with an account at any email server can use it globally. | |||
| However, here we have seen much more consolidation into few large | However, here we have seen much more consolidation into few large | |||
| email providers, both due to innovative, high-quality services but | email providers, both due to innovative, high-quality services but | |||
| also because running email services by small entities is becoming | also because running email services by small entities is becoming | |||
| difficult; among other things due to spam prevention practices that | difficult; among other things due to spam prevention practices that | |||
| tend to recognise well only the largest entities. | tend to recognize well only the largest entities. | |||
| In some other applications, such as social media, the services have a | In some other applications, such as social media, the services have a | |||
| more closed nature. The value of being a customer of one social | more closed nature. The value of being a customer of one social | |||
| media service depends highly on how many other customers that | media service depends highly on how many other customers that | |||
| particular service has. Hence, the larger the service, the more | particular service has. Hence, the larger the service, the more | |||
| valuable it is. And the bigger the value difference to the | valuable it is. And the bigger the value difference to the | |||
| customers, the less practical choice they have in selecting a | customers, the less practical choice they have in selecting a | |||
| service. | service. | |||
| In some cases, these developments also allow asymmetric relationships | In some cases, these developments also allow asymmetric relationships | |||
| to form, with the customers having less ability to affect the service | to form, with the customers having less ability to affect the service | |||
| than they would perhaps wish. | than they would perhaps wish. | |||
| 2.2. Data- and Capital-intensive Services | 3.2. Interdependencies | |||
| Entities with a large role in a market place tend to have inertia, of | ||||
| course through having many customers, but also due to their | ||||
| interconnectedness with the rest of the ecosystem. These | ||||
| interconnections can range from business relationships to peering | ||||
| connections, linking, and the use of various infrastructure services | ||||
| from an entity as building blocks in applications. | ||||
| These interconnections make it difficult for a market to move away | ||||
| from a large entity. Indeed, even for an individual it can be a | ||||
| challenge not to use the most commonly used Internet services | ||||
| [Gizmodo]. | ||||
| Optimistic technologists ("digital libertarians") tend to believe | ||||
| that states have limited ability to regulate the Internet: "The Net | ||||
| interprets censorship as damage and routes around it" [Gilmore]. | ||||
| However, as argued by [Boyle] states may have multiple ways to | ||||
| influence and monitor the Internet. One of the issues related to | ||||
| consolidation is that it tends to be easier to exert control of few | ||||
| large entities, than a large set of small, distributed players. This | ||||
| concern is particularly acute around intellectual property rights or | ||||
| surveillance capabilities, particularly when extra-territorial | ||||
| requirements are placed on the large entities. These entities cannot | ||||
| avoid comforming to regulation and laws in any of the locations they | ||||
| have presence in. | ||||
| As a result, there's an added angle of interconnectedness with | ||||
| governments. At the same time, this of course also provides an | ||||
| avenue for control of market forces, e.g., in the form of competition | ||||
| law. | ||||
| 3.3. Data- and Capital-intensive Services | ||||
| The scaling advantages are only getting larger with the advent of AI- | The scaling advantages are only getting larger with the advent of AI- | |||
| and machine learning -based technologies. | and machine learning-based technologies. | |||
| The more users a service has, the more data is available for training | The more users a service has, the more data is available for training | |||
| machine learning models, and the better the service becomes, bringing | machine learning models, and the better the service becomes, bringing | |||
| again more users. This feedback loop and the general capital- | again more users. This feedback loop and the general capital- | |||
| intensive nature of the technology (data and processing at scale) | intensive nature of the technology (data and processing at scale) | |||
| makes it likely that the largest companies are ahead in the use of | makes it likely that the largest companies are ahead in the use of | |||
| these technologies. | these technologies. | |||
| 2.3. Permissionless Innovation | One could also take the pessimistic view that many of the ongoing | |||
| disputes in standards organizations relate to which market actors | ||||
| will ultimately be able to collect the more data from private persons | ||||
| and how. The question isn't as much about the protection of these | ||||
| persons' privacy but rather whether some industry (or country) will | ||||
| be able to benefit from access to data. | ||||
| 3.4. Permissionless Innovation | ||||
| The email vs. social media example also highlights the interesting | The email vs. social media example also highlights the interesting | |||
| roles of interoperability and the "permissionless innovation" | roles of interoperability and the "permissionless innovation" | |||
| principle -- the idea that a network can be simple but still powerful | principle - the idea that a network can be simple but still powerful | |||
| enough that essentially any application could be built on top of it | enough that essentially any application could be built on top of it | |||
| without needing any special support from anyone else. Permissionless | without needing any special support from anyone else. Permissionless | |||
| innovation has brought us all the innovative applications that we | innovation has brought us all the innovative applications that we | |||
| enjoy today, on top of a highly interoperable underlying network, | enjoy today, on top of a highly interoperable underlying network, | |||
| along with advances in video coding and other techniques used by | along with advances in video coding and other techniques used by | |||
| applications. | applications. | |||
| Paradoxically, if the underlying network is sufficiently powerful, | Paradoxically, if the underlying network is sufficiently powerful, | |||
| the applications on top can evolve without similar pressures for | the applications on top can evolve without similar pressures for | |||
| interoperability, leading to the closed but highly valuable services | interoperability, leading to the closed but highly valuable services | |||
| discussed above. We call this the Permissionless Completeness | discussed above. We call this the Permissionless Completeness | |||
| Problem. | Problem. | |||
| 2.4. Fundamentals of Communication | 3.5. Fundamentals of Communication | |||
| There are also fundamental issues. For instance, speed of light; | There are also fundamental issues, such as the speed of light. Low- | |||
| low-latency services can fundamentally only be provided through | latency services can fundamentally only be provided through globally | |||
| globally distributed data centers. These are often provided built by | distributed data centers. These are often provided and/or built by | |||
| large organisations, although collaborative and data center or cloud | large organizations, although collaborative data center or cloud | |||
| computing service approaches also exist. | computing service approaches also exist. | |||
| A similar issue has arisen in recent years around large-scale denial- | A similar issue has arisen in recent years around large-scale denial- | |||
| of-service attacks, and how various entities can deal with them. | of-service attacks, and how various entities can deal with them. | |||
| While the largest attacks affect all players (see, for instance, the | While the largest attacks affect all players (see, for instance, the | |||
| Dyn attacks in October 2016), it is also true that large cloud- and | Dyn attacks in October 2016), it is also true that large cloud- and | |||
| content delivery providers can better deal with such attacks due to | content-delivery providers can better deal with such attacks due to | |||
| their scale. This is one reason that attracts many network services | their scale. This is one reason that attracts many network services | |||
| to such providers. | to such providers. | |||
| 2.5. Technology Factors | 3.6. Technology Factors | |||
| One of the key questions is whether we are seeing developments that | One of the key questions is whether we are seeing developments that | |||
| are driven by economic factors or whether fundamental reasons or lack | are driven by economic factors or whether fundamental reasons or lack | |||
| available technology drives particular models. For instance, | of available technology drives particular models. For instance, | |||
| centralised solutions might desirable due to business incentives, or | centralised solutions might be desirable due to business incentives, | |||
| they might be necessary because there is no distributed, | or they might be necessary because there is no distributed, | |||
| collaborative solution. | collaborative solution. | |||
| For instance, some technical issues have historically not been easy | Some technical issues have historically not been easy to solve, such | |||
| to solve, such as e-mail spam, which has lead to reliance on non- | as e-mail spam, which has led to reliance on non-technical solutions. | |||
| technical solutions. Today, it is becoming increasingly difficult to | Today, it is becoming increasingly difficult to run your own mail | |||
| run your own mail services, essentially forcing many organisations | services, essentially forcing many organizations and individuals to | |||
| and individuals to employ larger providers. The issues relate | employ larger providers. The issues relate directly to size of | |||
| directly to size of entities; no one can afford to disconnect from | entities; no one can afford to disconnect from the largest providers. | |||
| the largest providers. But as a small entity, there is little | But as a small entity, there is little leverage to convince peer | |||
| leverage to convince peer entities or various supporting white/ | entities or various supporting white/blacklist entities to deal with | |||
| blacklist entities to deal with you properly. | you properly. | |||
| Many Internet services are based on gathering data about users, and | Many Internet services are based on gathering data about users, and | |||
| using that data for, for instance, targeted advertisements. More | using that data for targeted advertisements. More data from more | |||
| data from more users makes it possible to run a service more | users makes it possible to run a service more accurately or with | |||
| accurately or with better results; here again scale brings | better results; here again scale brings advantages. | |||
| advantages. | ||||
| Another trend is that more and more content is becoming available | Another trend is that more and more content is becoming available | |||
| locally, from a content delivery or provider function directly on | locally, from a content delivery or provider function directly on | |||
| your own ISP's network. We predict that eventually most content will | one's own ISP network. We predict that eventually most content will | |||
| be delivered this way, reducing the role that global IP connections | be delivered this way, reducing the role that global IP connectivity | |||
| across the Internet play. By some metrics this has already happened; | across the Internet plays. By some metrics this has already | |||
| what practical - positive or negative - impacts might this have on | happened; what practical - positive or negative - impacts might this | |||
| the Internet technology? | have on the Internet technology? | |||
| There are also security tradeoffs. Large entities are generally | There are also security tradeoffs. Large entities are generally | |||
| better equipped to move to more recent and more secure technology. | better equipped to move to more recent and more secure technology. | |||
| For instance, the Domain Name System (DNS) shows signs of ageing but | For instance, the Domain Name System (DNS) shows signs of ageing but | |||
| due to the legacy of deployed systems, has changed very slowly. | due to the legacy of deployed systems, has changed very slowly. | |||
| Newer technology developed at the IETF enables DNS queries to be | Newer technology developed in accordance with IETF standards enables | |||
| performed confidentially, but its deployment is happening mostly in | DNS queries to be performed confidentially, but its deployment is | |||
| browsers that use global DNS resolver services, such as Cloudflare's | happening mostly in browsers that use global DNS resolver services, | |||
| 1.1.1.1 or Google's 8.8.8.8. This results in faster evolution and | such as Cloudflare's 1.1.1.1 or Google's 8.8.8.8. This results in | |||
| better security for end users. | faster evolution and better security for end users. | |||
| However, if one steps back and considers the overall security effects | However, if one steps back and considers the overall security effects | |||
| of these developments, the resulting effects can be different. While | of these developments, the resulting effects can be different. While | |||
| the security of the actual protocol exchanges improves with the | the security of the actual protocol exchanges improves with the | |||
| introduction of this new technology, at the same time this implies a | introduction of this new technology, at the same time this implies a | |||
| move from using a worldwide distributed set of DNS resolvers into, | move from using a worldwide distributed set of DNS resolvers into, | |||
| again, more centralised global resolvers. While these resolvers are | again, more centralised global resolvers. While these resolvers are | |||
| very well maintained (and a great service), they are potentially | very well maintained (and a great service), they are potentially | |||
| high-value targets for pervasive monitoring and Denial-of-Service | high-value targets for pervasive monitoring and Denial-of-Service | |||
| (DoS) attacks. In 2016, for example, DoS attacks were launched | (DoS) attacks. In 2016, for example, DoS attacks were launched | |||
| against Dyn, one of the largest DNS providers, leading to some | against Dyn, one of the largest DNS providers, leading to some | |||
| outages. | outages. | |||
| 3. Action | 4. Call to Action | |||
| Are there assumptions about the Internet architecture that no longer | Are there assumptions about the Internet architecture that no longer | |||
| hold in a world where larger, more centralised entities provide big | hold in a world where larger, more centralised entities provide big | |||
| parts of the Internet service? If the world changes, the Internet | parts of the Internet service? If the world changes, the Internet | |||
| and its technology/architecture may have to match those changes. | and its technology/architecture may have to match those changes. | |||
| It appears that level the playing field for new entrants or small | It appears that leveling the playing field for new entrants or small | |||
| players brings potential benefits. Are there technical solutions | players brings potential benefits. Are there technical solutions | |||
| that are missing today? | that are missing today? | |||
| Of course, it may well be that technology improvements are hard to | Of course, it may well be that technology improvements are hard to | |||
| come by. Nevertheless, recognising the risks of consolidation in | come by. Nevertheless, recognizing the risks of consolidation in | |||
| both current and proposed future technologies is the first step in | both current and proposed future technologies is the first step in | |||
| proactively avoiding those risks where possible. | proactively avoiding those risks where possible. | |||
| Assuming that one does not wish for regulation, technologies that | Assuming that one does not wish for regulation, technologies that | |||
| support distributed architectures, open source implementations of | support distributed architectures, open source implementations of | |||
| currently centralised network functions, or help increase user's | currently centralised network functions, or helping increase users' | |||
| control can be beneficial. Federation, for example, would help | control can be beneficial. Federation, for example, would help | |||
| enable distributed services in situations where smaller entities | enable distributed services in situations where smaller entities | |||
| would like to collaborate. | would like to collaborate. | |||
| Similarly, in an asymmetric power balance between users and services, | Similarly, in an asymmetric power balance between users and services, | |||
| tools that enable the user to control what information is provided to | tools that enable the user to control what information is provided to | |||
| a particular service can be very helpful. Some such tools exist, for | a particular service can be very helpful. Some such tools exist, for | |||
| instance, in the privacy and tracking-prevention modes of popular | instance, in the privacy and prevention-tracking modes of popular | |||
| browsers but why are these modes not the default, and could we | browsers, but why are these modes not the default, and could we | |||
| develop them further? | develop them further? | |||
| It is also surprising that in the age of software-defined everything, | It is also surprising that in the age of software-defined everything, | |||
| we can program almost anything else except the globally provided, | we can program almost anything else except the globally provided, | |||
| packaged services. Opening up interfaces would allow the building of | packaged services. Opening up interfaces would allow the building of | |||
| additional, innovative services, and better match with users' needs. | additional, innovative services, and better match users' needs. | |||
| Silver bullets are rare, of course. Internet service markets | Silver bullets are rare, of course. Internet service markets | |||
| sometimes fragment rather than cooperate through federation. And the | sometimes fragment rather than cooperate through federation. And the | |||
| asymmetric power balances are easiest changed with data that is in | asymmetric power balances are easiest changed with data that is user- | |||
| your control, but it is much harder to change when someone else holds | controlled, but it is much harder to change when someone else holds | |||
| it. Nevertheless, the exploration of solutions to ensure the | it. Nevertheless, the exploration of solutions to ensure the | |||
| Internet is kept open for new innovations and in the control of users | Internet is kept open for new innovations and in the control of users | |||
| is very important. | is very important. | |||
| What IETF topics that should be pursued to address some of the issues | o What IETF topics that should be pursued to address some of the | |||
| around consolidation? | issues around consolidation? Some of the topics for consideration | |||
| are discussed in Section 4.1 and Section 4.2. | ||||
| What measurements relating to the developments centralization or | o Are there open source efforts that should be pursued or continue | |||
| consolidation should be pursued? | to be pursued to ensure that a diversity of operators and networks | |||
| can use a particular technology? This is further discussed in | ||||
| {{opensource]]. | ||||
| What research -- such as distributed Internet architectures -- should | o What measurements relating to the development of centralization or | |||
| be driven forward? | consolidation should be pursued? And what other research, such as | |||
| distributed Internet architectures, should be driven forward? | ||||
| Some potential topics are discussed in Section 4.4. | ||||
| 4. Contributors | 4.1. Open Interfaces | |||
| Standards and open source efforts continue to build many open | ||||
| interfaces and APIs that allow systems interoperability and tailoring | ||||
| of services. In some cases, however, the availability of open | ||||
| interfaces definitions and software has not led to the realization of | ||||
| actual interfaces in this open manner. For instance, different | ||||
| instant messaging systems have had a technical ability to be | ||||
| interoperable with other systems, just like e-mail is interoperable | ||||
| across systems, but have chosen to be disconnected. | ||||
| Work in determining what open interfaces can provide benefits to | ||||
| users as well be successfully deployed in the Internet ecosystem | ||||
| would of course be useful. | ||||
| 4.2. Specific Standardization Choices | ||||
| Sometimes the issue is not the availability of interfaces as such, | ||||
| but rather fundamental architectural choices with regards to how | ||||
| Internet systems should be built. | ||||
| Often this relates to how centralized or distributed deployments are | ||||
| targeted. And even if a distributed, broad deployment model is | ||||
| targeted, expectations may not match reality when economies of scale, | ||||
| DDoS resilience, market consolidation, or other factors have come | ||||
| into play. These factors can result in the deployed reality being | ||||
| highly concentrated. | ||||
| This is a serious issue for the Internet, as concentrated, | ||||
| centralized deployment models present risks to user choice, privacy, | ||||
| and future protocol evolution. On occasion, the differences to | ||||
| expectations can be immediate, but can also occur much later. | ||||
| Some examples of these issues include current work in DNS where we | ||||
| may see concentration through the use of globally available common | ||||
| resolver services, which evolve rapidly and can offer better | ||||
| security. But the concentration of these queries into a few services | ||||
| creates new security and privacy concerns. | ||||
| Another example is email, which started out as many providers running | ||||
| in a largely uncoordinated fashion, but which has since then seen | ||||
| significant market consolidation and a need for coordination to | ||||
| defend against attacks such as spam. The coordination and | ||||
| centralized defense mechanisms scale better for large entities, which | ||||
| has fueled additional consolidation. | ||||
| Awareness of these issues while working on standards would be useful, | ||||
| so that the issues can be taken into account and appropriately | ||||
| mitigated. To begin with, those of us interested in the broader | ||||
| questions about Internet research and development are needed to | ||||
| identify some of the effects that new technology developments may | ||||
| pose. | ||||
| 4.3. Open Source | ||||
| Many key Internet infrastructure services (e.g., DNS servers), end- | ||||
| user applications (e.g., browsers) and technology components (e.g., | ||||
| operating systems or protocol implementations) are commonly | ||||
| implemented using open source solutions. | ||||
| This is often true even if there is a large entity that is in charge | ||||
| of a large fraction of development and deployment for a particular | ||||
| technology. This is a good thing, as it provides a means for others | ||||
| to have a fair chance of changing the technology in question, should | ||||
| the large entity drive their use of the technology in some direction | ||||
| that does not benefit the users. For instance, users and other | ||||
| organizations have traditionally been able to either run their own | ||||
| browser versions or provided extensions that suit their needs better | ||||
| than the default system. | ||||
| As a result, continuing to have this ecosystem is an important safety | ||||
| valve and competition opportunity. | ||||
| 4.4. Research Challenges | ||||
| There are a number of different research directions for which further | ||||
| work would be useful. | ||||
| The first is about measurements; is the Internet indeed | ||||
| consolidating, and if so, by how much, and in what aspects? Also, | ||||
| where are the Internet's traffic flows concentrating, and how is this | ||||
| changing over time? | ||||
| There are also questions about the trends and their relationships to | ||||
| technology: Has Internet technology influenced the consolidation | ||||
| trends in some manner? And conversely, how does Internet | ||||
| consolidation influence the development of Internet infrastructure | ||||
| and architecture? | ||||
| Finally, research on topics that would likely yield results that | ||||
| increase the diversity and de-centralization in the Internet would | ||||
| obviously be welcome. This can include any de-centralized | ||||
| technologies, but in particular distributed Internet architecture is | ||||
| an interesting topic. | ||||
| 5. Contributors | ||||
| Much of the text in this memo is from a blog article written by Jari | Much of the text in this memo is from a blog article written by Jari | |||
| Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | |||
| Trammell for the Internet Architecture Board (IAB), and from a blog | Trammell for the Internet Architecture Board (IAB), and from a blog | |||
| article written by Jari Arkko and Brian Trammell APNIC and RIPE. | article written by Jari Arkko and Brian Trammell APNIC and RIPE. | |||
| Some parts of the text have also come from a future workshop | ||||
| description developed in the IAB, primarily by Christian Huitema and | ||||
| Ted Hardie. | ||||
| 5. Acknowledgements | 6. Acknowledgements | |||
| The authors would like to thank IAB members, Geoff Huston, Gonzalo | The authors would like to thank IAB members, Geoff Huston, Amelia | |||
| Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf Kolkman, and many | Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf | |||
| others for interesting discussions in this problem space. | Kolkman, Greg Skinner and many others for interesting discussions in | |||
| this problem space. The authors would also like to thank all | ||||
| participants in the 2019 Design Expectations vs. Deployment Reality | ||||
| (DEDR) IAB workshop held in Kirkkonummi, Finland, as well as the | ||||
| participants in the 2019 EuroDIG workshop on "Internet consolidation | ||||
| - opportunities and challenges". | ||||
| 6. Informative References | 7. Informative References | |||
| [Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000, | ||||
| <https://mitpress.mit.edu/books/inventing-internet>. | ||||
| [Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and | ||||
| Hardwired Censors", Duke Law School, | ||||
| https://scholarship.law.duke.edu/ | ||||
| faculty_scholarship/619/ , 1997. | ||||
| [Clark] Clark, D., "The Design Philosophy of the DARPA Internet | ||||
| Protocols", In Symposium Proceedings on Communications | ||||
| Architectures and Protocols, 106-114. SIGCOMM '88. New | ||||
| York, NY, USA, ACM https://doi.org/10.1145/52324.52336 , | ||||
| 1988. | ||||
| [Cowheyetal] | ||||
| Cowhey, P., Aronson, J., and J. Richards, "Shaping the | ||||
| Architecture of the US Information and Communication | ||||
| Technology Architecture: A Political Economic Analysis", | ||||
| Review of Policy Research 26 (1-2), pp. 105-125. , 2009. | ||||
| [DolataSchrape] | ||||
| Dolata, U. and J. Schrape, "Collectivity and Power on the | ||||
| Internet: A Sociological Perspective", Springer | ||||
| International Publishing. Page 85. , 2018, | ||||
| <www.springer.com/de/book/9783319784137>. | ||||
| [Frischmann] | ||||
| Frischmann, B., "Privatization and Commercialization of | ||||
| the Internet Infrastructure", Colum. Sci. & Tech. L. Rev. | ||||
| 2, pp. 1-25. , 2001. | ||||
| [Gilmore] "First Nation in Cyberspace", TIME International (see | ||||
| http://kirste.userpage.fu-berlin.de/outerspace/ | ||||
| internet-article.html) , December 1993. | ||||
| [Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was | ||||
| Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut- | ||||
| the-big-five-tech-giants-from-my-life-it-was-hell/ , | ||||
| February 2019. | ||||
| [ISOC] "Consolidation in the Internet economy", Internet Society, | ||||
| https://future.internetsociety.org/2019/ , 2019. | ||||
| [Khan] Khan, L., "Amazon's Antritrust Paradox", The Yale Law | ||||
| Journal 126:710 , 2017. | ||||
| [LitanRivlin] | ||||
| Litan, R. and A. Rivlin, "Projecting the Economic Impact | ||||
| of the Internet", American Economic Review 91 (2), pp. | ||||
| 313-317 , 2001. | ||||
| [Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies: | ||||
| A Political Economy Analysis", In Miller, Edythe S.and | ||||
| Samuels, Warren J., (eds.) An Institutionalist Approach to | ||||
| Public Utilities Regulation. Michigan State University | ||||
| Press, East Lansing, Michigan, pp. 162-201. ISBN | ||||
| 9780870136245 , 2002, <https://core.ac.uk/download/ | ||||
| pdf/204420.pdf>. | ||||
| [Nye] Nye, J., "The Regime Complex for Managing Global Cyber | ||||
| Activities. Global Commission on Internet Governance", | ||||
| CIGI, Global Commission on Internet Governance , 2014. | ||||
| [RFC1192] Kahin, B., "Commercialization of the Internet summary | ||||
| report", RFC 1192, DOI 10.17487/RFC1192, November 1990, | ||||
| <https://www.rfc-editor.org/info/rfc1192>. | ||||
| [RFC1958] Carpenter, B., Ed., "Architectural Principles of the | [RFC1958] Carpenter, B., Ed., "Architectural Principles of the | |||
| Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | |||
| <https://www.rfc-editor.org/info/rfc1958>. | <https://www.rfc-editor.org/info/rfc1958>. | |||
| [RFC3935] Alvestrand, H., "A Mission Statement for the IETF", | ||||
| BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, | ||||
| <https://www.rfc-editor.org/info/rfc3935>. | ||||
| [Smyrnaios] | ||||
| Smyrnaios, N., "Internet Oligopoly: The Corporate Takeover | ||||
| of Our Digital World", Emerald Publishing Ltd. , 2018. | ||||
| [Stiglitz] | ||||
| Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or | ||||
| do they tend towards monopoly? The verdict is in", 2016, | ||||
| <https://www.weforum.org/agenda/2016/05/joseph-stiglitz- | ||||
| are-markets-efficient-or-do-they-tend-towards-monopoly- | ||||
| the-verdict-is-in/>. | ||||
| [VanSchewick] | ||||
| van Schewick, B., "Internet Architecture and Innovation", | ||||
| MIT Press , 2012. | ||||
| [Wu] Wu, T., "The Curse of Bigness", Columbia Global Reports, | ||||
| New York, New York , 2018. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Jari Arkko | Jari Arkko | |||
| Ericsson | Ericsson | |||
| Kauniainen 02700 | ||||
| Finland | ||||
| Email: jari.arkko@piuha.net | Email: jari.arkko@piuha.net | |||
| Brian Trammell | Brian Trammell | |||
| ETH Zurich | ETH Zurich | |||
| Email: ietf@trammell.ch | Email: ietf@trammell.ch | |||
| Mark Nottingham | Mark Nottingham | |||
| Fastly | ||||
| Email: mnot@mnot.net | Email: mnot@mnot.net | |||
| Christian Huitema | Christian Huitema | |||
| Private Octopus Inc. | Private Octopus Inc. | |||
| Email: huitema@huitema.net | Email: huitema@huitema.net | |||
| Martin Thomson | Martin Thomson | |||
| Mozilla | Mozilla | |||
| Email: martin.thomson@gmail.com | Email: martin.thomson@gmail.com | |||
| Jeff Tantsura | Jeff Tantsura | |||
| Nuage Networks | Apstra, Inc. | |||
| Email: jefftant.ietf@gmail.com | Email: jefftant.ietf@gmail.com | |||
| Niels ten Oever | ||||
| University of Amsterdam | ||||
| Email: mail@nielstenoever.net | ||||
| End of changes. 55 change blocks. | ||||
| 120 lines changed or deleted | 461 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||