| draft-arkko-iab-internet-consolidation-01.txt | draft-arkko-internet-consolidation.txt | |||
|---|---|---|---|---|
| Network Working Group J. Arkko | Network Working Group J. Arkko | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Intended status: Informational B. Trammell | Intended status: Informational B. Trammell | |||
| Expires: September 13, 2019 ETH Zurich | Expires: January 10, 2020 ETH Zurich | |||
| M. Nottingham | M. Nottingham | |||
| Fastly | Fastly | |||
| C. Huitema | C. Huitema | |||
| Private Octopus Inc. | Private Octopus Inc. | |||
| M. Thomson | M. Thomson | |||
| Mozilla | Mozilla | |||
| J. Tantsura | J. Tantsura | |||
| Nuage Networks | Apstra, Inc. | |||
| N. ten Oever | N. ten Oever | |||
| University of Amsterdam | University of Amsterdam | |||
| March 12, 2019 | July 09, 2019 | |||
| Considerations on Internet Consolidation and the Internet Architecture | Considerations on Internet Consolidation and the Internet Architecture | |||
| draft-arkko-iab-internet-consolidation-01 | draft-arkko-iab-internet-consolidation-02 | |||
| Abstract | Abstract | |||
| Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
| distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
| services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
| Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
| centralised entities in many areas. This phenomenon could be looked | centralised entities in many areas. This phenomenon could be looked | |||
| at from many different angles, but this memo considers the topic from | at from many different angles, but this memo considers the topic from | |||
| the perspective of how available technology and Internet architecture | the perspective of how available technology and Internet architecture | |||
| skipping to change at page 1, line 48 | skipping to change at page 1, line 48 | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 13, 2019. | This Internet-Draft will expire on January 10, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 31 | skipping to change at page 2, line 31 | |||
| Many of us have held a vision of the Internet as the ultimate | Many of us have held a vision of the Internet as the ultimate | |||
| distributed platform that allows communication, the provision of | distributed platform that allows communication, the provision of | |||
| services, and competition from any corner of the world. But as the | services, and competition from any corner of the world. But as the | |||
| Internet has matured, it seems to also feed the creation of large, | Internet has matured, it seems to also feed the creation of large, | |||
| centralised entities in many areas. | centralised entities in many areas. | |||
| We use the term Internet consolidation to refer to the process of the | We use the term Internet consolidation to refer to the process of the | |||
| increasing control over Internet infrastructure and services by a | increasing control over Internet infrastructure and services by a | |||
| small set of organizations. Such concentration has an obvious effect | small set of organizations. Such concentration has an obvious effect | |||
| on traffic flows or whose services and systems are in daily use by | on traffic flows or on services and systems that are daily used by a | |||
| large population of Internet users, but it can also create secondary | large population of Internet users. However, it can also create | |||
| effects, where the abiity to collect information or to affect | secondary effects, where the ability to collect information or to | |||
| something is concentrated in the small set of organizations. | affect something is concentrated in that small set of organizations. | |||
| Consolidation may also affect technology choices and the evolution of | Consolidation may also affect technology choices and the evolution of | |||
| the Internet architecture, e.g., large organizations or organizations | the Internet architecture. For example, large organizations or | |||
| providing important technology components may have a significant | organizations providing important technology components may have a | |||
| impact on what technology is deployed for large numbers of users or | significant impact on what technology is deployed for large numbers | |||
| by other organizations. | of users or by other organizations. | |||
| Our first question is whether Internet is indeed consolidating? It | Our first question is whether the Internet is indeed consolidating. | |||
| certainly appears so, though more quantitative research on this topic | It certainly appears so, but more quantitative research on this topic | |||
| would be welcome. It is also possible that there's only a perception | would be welcome. It is also possible that there is only a | |||
| of consolidation, as market forces have caused business changes in | perception of consolidation, as market forces have caused business | |||
| new areas of business. Arguably, today's consolidation areas seem to | changes in new areas of business. Arguably, today's consolidation | |||
| be more in the application space than further down in the stack or in | areas seem to be more in the application layer than further down in | |||
| the operating systems, as was the case some years ago. The second | the stack or in operating systems, as was the case some years ago. | |||
| question is if we're seeing consolidation simply moving to new areas. | The second question is if we are seeing consolidation simply moving | |||
| to new areas. | ||||
| This phenomenon could be looked at from many different angles, but | This phenomenon could be looked at from many different angles, but | |||
| this memo considers the topic from the perspective of how available | this memo considers the topic from the perspective of how available | |||
| technology and Internet architecture drives different market | technology and Internet architecture drives different market | |||
| directions. Our third question is if the Internet technology has | directions. Our third question is if the Internet technology has | |||
| influenced the consolidation trends in some manner? And conversely, | influenced the consolidation trends in some manner. And conversely, | |||
| the fourth question asks how is Internet consolidation influencing | the fourth question asks how Internet consolidation is influencing | |||
| the development of the Internet infrastructure and architecture? | the development of the Internet infrastructure and architecture. | |||
| The engineering remit at the IETF is to focus on technology, but of | The engineering remit at the IETF is to focus on technology, but of | |||
| course we also want to understand the implications and externalities | course we also want to understand the implications and externalities | |||
| of the technical arrangements we design. Technology affects | of the technical arrangements we design. Technology affects | |||
| economics and vice versa. The Internet technology community | economics and vice versa. The Internet technology community | |||
| continues to make decisions that have ramifications on Internet | continues to make decisions that have ramifications on Internet | |||
| systems, just as we are subject to forces that affect them. | systems, just as we are subject to forces that affect them. | |||
| As technologists, our fourth question is whether there are changes in | As technologists, our fourth question is whether there are changes in | |||
| technology that would help reduce those large-player advantages that | technology that would help reduce those large-player advantages that | |||
| are technically-driven. | are technically-driven. | |||
| This memo reviews areas where consolidation may be occurring in the | This memo reviews areas where consolidation may be occurring in the | |||
| Internet, and discusses the potential reasons for this. The memo | Internet, and discusses the potential reasons for this. The memo | |||
| starts by review other work in this area in Section 2. Section 3 | starts by reviewing other work in this area in Section 2. Section 3 | |||
| discusses consolidation and the reasons behind the creation of larger | discusses consolidation and the reasons behind the creation of larger | |||
| entities, and Section 4 looks at some actions that might alleviate | entities, and Section 4 looks at some actions that might alleviate | |||
| the situation. | the situation. | |||
| If you are interested on this or other architecture-related topics, | If you are interested on this or other architecture-related topics, | |||
| please subscribe to the IAB architecture-discuss mailing list as one | please subscribe to the IAB architecture-discuss mailing list as one | |||
| forum for discussion. Similarly, the Internet Society has chosen | forum for discussion. Similarly, the Internet Society has chosen | |||
| consolidation as a focus topic for their year 2019 activities. Their | consolidation as a focus topic for their year 2019 activities. Their | |||
| report is in [ISOC]. | report is in [ISOC]. | |||
| 2. Other Work | 2. Other Work | |||
| One of the causes for the current consolidation of the Internet | One of the causes for the current consolidation of the Internet | |||
| infrastructure can be traced back to some of the assumptions that | infrastructure can be traced back to some of the assumptions that | |||
| were made during the commercialization of the Internet in the early | were made during the commercialization of the Internet in the early | |||
| 1990s [Abbate], even though [RFC1192] already describes some | 1990s [Abbate], despite [RFC1192] describing some potential issues | |||
| potential issues that could arise. Overall it was expected the | that could arise. Overall it was expected the combination of | |||
| combination of commercialization, together with the technical and | commercialization, together with the technical and architectural | |||
| architectural characteristics of the Internet, such as its modularity | characteristics of the Internet, such as its modularity and layering | |||
| and layering principles, would lead to perfect markets, free | principles, would lead to perfect markets, free competition and | |||
| competition and decentralized structures [LitanRivlin]. | decentralized structures [LitanRivlin]. | |||
| But as we know now, this did not happen entirely as expected. Some | But as we know now, this did not happen entirely as expected. Some | |||
| even argue that 'market concentrations, control and power struggles | even argue that 'market concentrations, control and power struggles | |||
| are categories to adequately describe the fundamental dynamics of the | are categories to adequately describe the fundamental dynamics of the | |||
| commercial Internet' [DolataSchrape]. While the privatization was | commercial Internet' [DolataSchrape]. While the privatization was | |||
| supposed to lead to competition and innovation [Cowheyetal] | supposed to lead to competition and innovation [Cowheyetal] | |||
| [VanSchewick], some argue that it actually led to the emergence of | [VanSchewick], some argue that it actually led to the emergence of | |||
| Internet oligopolies [Mansell] [Smyrnaios]. | Internet oligopolies [Mansell] [Smyrnaios]. | |||
| Current scientific economic thinking harbors two different schools | Current scientific economic thinking harbors two different schools of | |||
| vis a vis efficient markets and monopolies. The school based on Adam | thought vis-a-vis efficient markets and monopolies. The school of | |||
| Smith argues that unfettered markets tend to concentration of wealth | thought based on Adam Smith argues that unfettered markets tend to | |||
| and income, whereas liberal economist believe in efficient markets | concentration of wealth and income, whereas liberal economists | |||
| that stimulate competition. | believe in efficient markets that stimulate competition. | |||
| On the other hand, according to Joseph Stiglitz 'many sectors - | On the other hand, according to Joseph Stiglitz, 'many sectors - | |||
| telecoms, cable TV, digital branches from social media to Internet | telecommunications, cable TV, digital branches from social media to | |||
| search, health insurance, pharmaceuticals, agro-business, and many | Internet search, health insurance, pharmaceuticals, agro-business, | |||
| more - cannot be understood through the lens of competition' | and many more - cannot be understood through the lens of competition' | |||
| [Stiglitz]. The considerations of technologists and policy makers at | [Stiglitz]. The considerations of technologists and policy makers at | |||
| the time of the commercialization and privatization of the Internet | the time of the commercialization and privatization of the Internet | |||
| infrastructure might have been based on a belief in efficient | infrastructure might have been based on a belief in efficient | |||
| markets, whereas we are now finding out this might not always be how | markets, whereas we are now finding out this might not always be how | |||
| markets function. | markets function. | |||
| Recently there is a growing body of literature that the currently | ||||
| observed consolidation into oligopolies and monopolies can be | ||||
| described as a failure of economic policy, which could be addressed | ||||
| with revamped, or improved anti-trust policies [Wu] [Khan]. On the | ||||
| other hand there are those who criticize these proposals for their | ||||
| economic determinism; merger reviews, company break-ups and | ||||
| 'trustbusting' do not necessarily change the structure of a market. | ||||
| Technology might actually have a role to play in this as well. The | ||||
| IETF in specific, and the Internet governance regime complex [Nye] in | ||||
| general, has been designed as a distributed arrangement to prevent | ||||
| capture of the infrastructure by a single interest group or actor. | ||||
| Where power or control was centralized, specific governance | ||||
| arrangements were put into place to counter the centralization of | ||||
| power. | ||||
| It cannot be denied that 'market actors have contributed immensely to | It cannot be denied that 'market actors have contributed immensely to | |||
| the evolution of the Internet in terms of investment, products, | the evolution of the Internet in terms of investment, products, | |||
| services, and infrastructure, and the government's light-handed | services, and infrastructure, and the government's light-handed | |||
| approach to regulation has given producers and consumers substantial | approach to regulation has given producers and consumers substantial | |||
| freedom to innovate and to self-regulate with respect to many issues | freedom to innovate and to self-regulate with respect to many issues | |||
| affecting the Internet community in ways that have produced | affecting the Internet community in ways that have produced | |||
| substantial social benefits' [Frischmann]. But the current | substantial social benefits' [Frischmann]. But the current | |||
| consolidation in ownership of and control over the Internet | consolidation in ownership of and control over the Internet | |||
| infrastructure was not foreseen [Clark], and arguably the loss of | infrastructure was not foreseen [Clark], and arguably the loss of | |||
| decentralized control goes against its design objectives. For | decentralized control goes against its design objectives. For | |||
| skipping to change at page 5, line 15 | skipping to change at page 5, line 28 | |||
| 3. Factors Driving Consolidation | 3. Factors Driving Consolidation | |||
| Consolidation is driven by economic factors relating to scale and | Consolidation is driven by economic factors relating to scale and | |||
| ability to easily reach a large market of users over the Internet. | ability to easily reach a large market of users over the Internet. | |||
| This kind of setting tends to enable winners to take large market | This kind of setting tends to enable winners to take large market | |||
| shares, whether those winners came about through the model that | shares, whether those winners came about through the model that | |||
| liberal economists believe in or the model that Adam Smith believes | liberal economists believe in or the model that Adam Smith believes | |||
| in. | in. | |||
| The most visible aspects of this involve well-recognized Internet | The most visible aspects of this involve well-recognized Internet | |||
| services. Internet Society's report summarised the market position | services. The Internet Society's report summarised the market | |||
| of popular Internet service brands as follows [ISOC]: | position of popular Internet service brands as follows [ISOC]: | |||
| o Facebook and Google have been estimated to account for 84% of | o Facebook and Google have been estimated to account for 84% of | |||
| global digital advertising investment (excluding China). | global digital advertising investment (excluding China). | |||
| o Amazon is expected to account for 49.1% of all online retail | o Amazon is expected to account for 49.1% of all online retail | |||
| spending in the US. Similarly, Alibaba is estimated to have close | spending in the US. Similarly, Alibaba is estimated to have close | |||
| to 60% of the e-commerce market in China. | to 60% of the e-commerce market in China. | |||
| o Google alone holds 90% of the global search market, over 60% of | o Google alone holds 90% of the global search market, over 60% of | |||
| web browsers, and has the number 1 (by far) mobile operating | web browsers, and has the number 1 (by far) mobile operating | |||
| system (Android). | system (Android). | |||
| o Facebook - incorporating Facebook Messenger, WhatsApp, and | o Facebook - incorporating Facebook Messenger, WhatsApp, and | |||
| Instagram - holds 4 of the world's top 6 social media platforms. | Instagram - holds 4 of the world's top 6 social media platforms. | |||
| But it is important to recognize that the Internet is a complex | But it is important to recognize that the Internet is a complex | |||
| ecosystem. There are many underlying services whose diversity, or | ecosystem. There are many underlying services whose diversity, or | |||
| lack thereof, are as important as that of, say, consumer-visible | lack thereof, are as important as that of, say, consumer-visible | |||
| social networks. For instance, the diversity of cloud services, | social networks. For instance, the diversity of cloud services, | |||
| operating systems, browser engines is as important as that as of | operating systems, and browser engines is as important as that as of | |||
| application stores or the browsers themselves. | application stores or the browsers themselves. | |||
| Of course, the Internet allows plenty of choice both in these and | Of course, the Internet allows plenty of choice in these and other | |||
| other areas. Too many or too few choices create different kinds of | areas. Too many or too few choices create different kinds of | |||
| problems. | problems. | |||
| It would be useful to break these general factors and observations | It would be useful to break these general factors and observations | |||
| down a bit further. In particular, it is useful to distinguish | down a bit further. In particular, it is useful to distinguish | |||
| market or economic factors from technical factors. | market or economic factors from technical factors. | |||
| 3.1. Economics | 3.1. Economics | |||
| Scaling benefits are natural for many types of businesses. And many | Scaling benefits are natural for many types of businesses. And many | |||
| Internet-based businesses can potentially serve a very large customer | Internet-based businesses can potentially serve a very large customer | |||
| skipping to change at page 6, line 43 | skipping to change at page 7, line 9 | |||
| Entities with a large role in a market place tend to have inertia, of | Entities with a large role in a market place tend to have inertia, of | |||
| course through having many customers, but also due to their | course through having many customers, but also due to their | |||
| interconnectedness with the rest of the ecosystem. These | interconnectedness with the rest of the ecosystem. These | |||
| interconnections can range from business relationships to peering | interconnections can range from business relationships to peering | |||
| connections, linking, and the use of various infrastructure services | connections, linking, and the use of various infrastructure services | |||
| from an entity as building blocks in applications. | from an entity as building blocks in applications. | |||
| These interconnections make it difficult for a market to move away | These interconnections make it difficult for a market to move away | |||
| from a large entity. Indeed, even for an individual it can be a | from a large entity. Indeed, even for an individual it can be a | |||
| challenge to not use the most commonly used Internet services | challenge not to use the most commonly used Internet services | |||
| [Gizmodo]. | [Gizmodo]. | |||
| Optimistic technologists ("digital libertarians") tend to have a | Optimistic technologists ("digital libertarians") tend to believe | |||
| beliefs that states have limited ability to regulate the Internet: | that states have limited ability to regulate the Internet: "The Net | |||
| "The Net interprets censorship as damage and routes around it" | interprets censorship as damage and routes around it" [Gilmore]. | |||
| [Gilmore]. However, as argued by [Boyle] states may have multiple | However, as argued by [Boyle] states may have multiple ways to | |||
| ways to influence and monitor the Internet. One of the issues | influence and monitor the Internet. One of the issues related to | |||
| related to consolidation is that it tends to be easier to exert | consolidation is that it tends to be easier to exert control of few | |||
| control of few large entities, than a large set of small, distributed | large entities, than a large set of small, distributed players. This | |||
| players. This concern is particularly acute around intellectual | concern is particularly acute around intellectual property rights or | |||
| property rights or surveillance capabilities, particularly when | surveillance capabilities, particularly when extra-territorial | |||
| extra-territorial requirements are placed on the large entities. | requirements are placed on the large entities. These entities cannot | |||
| These entities cannot avoid comforming to regulation and laws in any | avoid comforming to regulation and laws in any of the locations they | |||
| of the locations they have presence in. | have presence in. | |||
| As a result, there's an added angle of interconnectedness with | As a result, there's an added angle of interconnectedness with | |||
| governments. At the same time, this of course also provides an | governments. At the same time, this of course also provides an | |||
| avenue for control of market forces, e.g., in the form of competition | avenue for control of market forces, e.g., in the form of competition | |||
| law. | law. | |||
| 3.3. Data- and Capital-intensive Services | 3.3. Data- and Capital-intensive Services | |||
| The scaling advantages are only getting larger with the advent of AI- | The scaling advantages are only getting larger with the advent of AI- | |||
| and machine learning -based technologies. | and machine learning-based technologies. | |||
| The more users a service has, the more data is available for training | The more users a service has, the more data is available for training | |||
| machine learning models, and the better the service becomes, bringing | machine learning models, and the better the service becomes, bringing | |||
| again more users. This feedback loop and the general capital- | again more users. This feedback loop and the general capital- | |||
| intensive nature of the technology (data and processing at scale) | intensive nature of the technology (data and processing at scale) | |||
| makes it likely that the largest companies are ahead in the use of | makes it likely that the largest companies are ahead in the use of | |||
| these technologies. | these technologies. | |||
| One could also take the pessimistic view that many of the ongoing | One could also take the pessimistic view that many of the ongoing | |||
| disputes in standards organizations relate to which market actors | disputes in standards organizations relate to which market actors | |||
| will ultimately be able to collect the more data from private persons | will ultimately be able to collect the more data from private persons | |||
| and how. The question isn't as much about the protection of the | and how. The question isn't as much about the protection of these | |||
| user's privacy but rather whether one or another industry (or | persons' privacy but rather whether some industry (or country) will | |||
| country) will be able to benefit from access to data. | be able to benefit from access to data. | |||
| 3.4. Permissionless Innovation | 3.4. Permissionless Innovation | |||
| The email vs. social media example also highlights the interesting | The email vs. social media example also highlights the interesting | |||
| roles of interoperability and the "permissionless innovation" | roles of interoperability and the "permissionless innovation" | |||
| principle - the idea that a network can be simple but still powerful | principle - the idea that a network can be simple but still powerful | |||
| enough that essentially any application could be built on top of it | enough that essentially any application could be built on top of it | |||
| without needing any special support from anyone else. Permissionless | without needing any special support from anyone else. Permissionless | |||
| innovation has brought us all the innovative applications that we | innovation has brought us all the innovative applications that we | |||
| enjoy today, on top of a highly interoperable underlying network, | enjoy today, on top of a highly interoperable underlying network, | |||
| skipping to change at page 8, line 7 | skipping to change at page 8, line 25 | |||
| applications. | applications. | |||
| Paradoxically, if the underlying network is sufficiently powerful, | Paradoxically, if the underlying network is sufficiently powerful, | |||
| the applications on top can evolve without similar pressures for | the applications on top can evolve without similar pressures for | |||
| interoperability, leading to the closed but highly valuable services | interoperability, leading to the closed but highly valuable services | |||
| discussed above. We call this the Permissionless Completeness | discussed above. We call this the Permissionless Completeness | |||
| Problem. | Problem. | |||
| 3.5. Fundamentals of Communication | 3.5. Fundamentals of Communication | |||
| There are also fundamental issues. For instance, speed of light; | There are also fundamental issues, such as the speed of light. Low- | |||
| low-latency services can fundamentally only be provided through | latency services can fundamentally only be provided through globally | |||
| globally distributed data centers. These are often provided built by | distributed data centers. These are often provided and/or built by | |||
| large organizations, although collaborative and data center or cloud | large organizations, although collaborative data center or cloud | |||
| computing service approaches also exist. | computing service approaches also exist. | |||
| A similar issue has arisen in recent years around large-scale denial- | A similar issue has arisen in recent years around large-scale denial- | |||
| of-service attacks, and how various entities can deal with them. | of-service attacks, and how various entities can deal with them. | |||
| While the largest attacks affect all players (see, for instance, the | While the largest attacks affect all players (see, for instance, the | |||
| Dyn attacks in October 2016), it is also true that large cloud- and | Dyn attacks in October 2016), it is also true that large cloud- and | |||
| content delivery providers can better deal with such attacks due to | content-delivery providers can better deal with such attacks due to | |||
| their scale. This is one reason that attracts many network services | their scale. This is one reason that attracts many network services | |||
| to such providers. | to such providers. | |||
| 3.6. Technology Factors | 3.6. Technology Factors | |||
| One of the key questions is whether we are seeing developments that | One of the key questions is whether we are seeing developments that | |||
| are driven by economic factors or whether fundamental reasons or lack | are driven by economic factors or whether fundamental reasons or lack | |||
| available technology drives particular models. For instance, | of available technology drives particular models. For instance, | |||
| centralised solutions might desirable due to business incentives, or | centralised solutions might be desirable due to business incentives, | |||
| they might be necessary because there is no distributed, | or they might be necessary because there is no distributed, | |||
| collaborative solution. | collaborative solution. | |||
| For instance, some technical issues have historically not been easy | Some technical issues have historically not been easy to solve, such | |||
| to solve, such as e-mail spam, which has led to reliance on non- | as e-mail spam, which has led to reliance on non-technical solutions. | |||
| technical solutions. Today, it is becoming increasingly difficult to | Today, it is becoming increasingly difficult to run your own mail | |||
| run your own mail services, essentially forcing many organizations | services, essentially forcing many organizations and individuals to | |||
| and individuals to employ larger providers. The issues relate | employ larger providers. The issues relate directly to size of | |||
| directly to size of entities; no one can afford to disconnect from | entities; no one can afford to disconnect from the largest providers. | |||
| the largest providers. But as a small entity, there is little | But as a small entity, there is little leverage to convince peer | |||
| leverage to convince peer entities or various supporting white/ | entities or various supporting white/blacklist entities to deal with | |||
| blacklist entities to deal with you properly. | you properly. | |||
| Many Internet services are based on gathering data about users, and | Many Internet services are based on gathering data about users, and | |||
| using that data for, for instance, targeted advertisements. More | using that data for targeted advertisements. More data from more | |||
| data from more users makes it possible to run a service more | users makes it possible to run a service more accurately or with | |||
| accurately or with better results; here again scale brings | better results; here again scale brings advantages. | |||
| advantages. | ||||
| Another trend is that more and more content is becoming available | Another trend is that more and more content is becoming available | |||
| locally, from a content delivery or provider function directly on | locally, from a content delivery or provider function directly on | |||
| your own ISP's network. We predict that eventually most content will | one's own ISP network. We predict that eventually most content will | |||
| be delivered this way, reducing the role that global IP connections | be delivered this way, reducing the role that global IP connectivity | |||
| across the Internet play. By some metrics this has already happened; | across the Internet plays. By some metrics this has already | |||
| what practical - positive or negative - impacts might this have on | happened; what practical - positive or negative - impacts might this | |||
| the Internet technology? | have on the Internet technology? | |||
| There are also security tradeoffs. Large entities are generally | There are also security tradeoffs. Large entities are generally | |||
| better equipped to move to more recent and more secure technology. | better equipped to move to more recent and more secure technology. | |||
| For instance, the Domain Name System (DNS) shows signs of ageing but | For instance, the Domain Name System (DNS) shows signs of ageing but | |||
| due to the legacy of deployed systems, has changed very slowly. | due to the legacy of deployed systems, has changed very slowly. | |||
| Newer technology developed at the IETF enables DNS queries to be | Newer technology developed in accordance with IETF standards enables | |||
| performed confidentially, but its deployment is happening mostly in | DNS queries to be performed confidentially, but its deployment is | |||
| browsers that use global DNS resolver services, such as Cloudflare's | happening mostly in browsers that use global DNS resolver services, | |||
| 1.1.1.1 or Google's 8.8.8.8. This results in faster evolution and | such as Cloudflare's 1.1.1.1 or Google's 8.8.8.8. This results in | |||
| better security for end users. | faster evolution and better security for end users. | |||
| However, if one steps back and considers the overall security effects | However, if one steps back and considers the overall security effects | |||
| of these developments, the resulting effects can be different. While | of these developments, the resulting effects can be different. While | |||
| the security of the actual protocol exchanges improves with the | the security of the actual protocol exchanges improves with the | |||
| introduction of this new technology, at the same time this implies a | introduction of this new technology, at the same time this implies a | |||
| move from using a worldwide distributed set of DNS resolvers into, | move from using a worldwide distributed set of DNS resolvers into, | |||
| again, more centralised global resolvers. While these resolvers are | again, more centralised global resolvers. While these resolvers are | |||
| very well maintained (and a great service), they are potentially | very well maintained (and a great service), they are potentially | |||
| high-value targets for pervasive monitoring and Denial-of-Service | high-value targets for pervasive monitoring and Denial-of-Service | |||
| (DoS) attacks. In 2016, for example, DoS attacks were launched | (DoS) attacks. In 2016, for example, DoS attacks were launched | |||
| against Dyn, one of the largest DNS providers, leading to some | against Dyn, one of the largest DNS providers, leading to some | |||
| outages. | outages. | |||
| 4. Call to Action | 4. Call to Action | |||
| Are there assumptions about the Internet architecture that no longer | Are there assumptions about the Internet architecture that no longer | |||
| hold in a world where larger, more centralised entities provide big | hold in a world where larger, more centralised entities provide big | |||
| parts of the Internet service? If the world changes, the Internet | parts of the Internet service? If the world changes, the Internet | |||
| and its technology/architecture may have to match those changes. | and its technology/architecture may have to match those changes. | |||
| It appears that level the playing field for new entrants or small | It appears that leveling the playing field for new entrants or small | |||
| players brings potential benefits. Are there technical solutions | players brings potential benefits. Are there technical solutions | |||
| that are missing today? | that are missing today? | |||
| Of course, it may well be that technology improvements are hard to | Of course, it may well be that technology improvements are hard to | |||
| come by. Nevertheless, recognizing the risks of consolidation in | come by. Nevertheless, recognizing the risks of consolidation in | |||
| both current and proposed future technologies is the first step in | both current and proposed future technologies is the first step in | |||
| proactively avoiding those risks where possible. | proactively avoiding those risks where possible. | |||
| Assuming that one does not wish for regulation, technologies that | Assuming that one does not wish for regulation, technologies that | |||
| support distributed architectures, open source implementations of | support distributed architectures, open source implementations of | |||
| currently centralised network functions, or help increase user's | currently centralised network functions, or helping increase users' | |||
| control can be beneficial. Federation, for example, would help | control can be beneficial. Federation, for example, would help | |||
| enable distributed services in situations where smaller entities | enable distributed services in situations where smaller entities | |||
| would like to collaborate. | would like to collaborate. | |||
| Similarly, in an asymmetric power balance between users and services, | Similarly, in an asymmetric power balance between users and services, | |||
| tools that enable the user to control what information is provided to | tools that enable the user to control what information is provided to | |||
| a particular service can be very helpful. Some such tools exist, for | a particular service can be very helpful. Some such tools exist, for | |||
| instance, in the privacy and tracking-prevention modes of popular | instance, in the privacy and prevention-tracking modes of popular | |||
| browsers but why are these modes not the default, and could we | browsers, but why are these modes not the default, and could we | |||
| develop them further? | develop them further? | |||
| It is also surprising that in the age of software-defined everything, | It is also surprising that in the age of software-defined everything, | |||
| we can program almost anything else except the globally provided, | we can program almost anything else except the globally provided, | |||
| packaged services. Opening up interfaces would allow the building of | packaged services. Opening up interfaces would allow the building of | |||
| additional, innovative services, and better match with users' needs. | additional, innovative services, and better match users' needs. | |||
| Silver bullets are rare, of course. Internet service markets | Silver bullets are rare, of course. Internet service markets | |||
| sometimes fragment rather than cooperate through federation. And the | sometimes fragment rather than cooperate through federation. And the | |||
| asymmetric power balances are easiest changed with data that is in | asymmetric power balances are easiest changed with data that is user- | |||
| your control, but it is much harder to change when someone else holds | controlled, but it is much harder to change when someone else holds | |||
| it. Nevertheless, the exploration of solutions to ensure the | it. Nevertheless, the exploration of solutions to ensure the | |||
| Internet is kept open for new innovations and in the control of users | Internet is kept open for new innovations and in the control of users | |||
| is very important. | is very important. | |||
| o What IETF topics that should be pursued to address some of the | o What IETF topics that should be pursued to address some of the | |||
| issues around consolidation? Some of the topics for consideration | issues around consolidation? Some of the topics for consideration | |||
| are discussed in Section 4.1 and Section 4.2. | are discussed in Section 4.1 and Section 4.2. | |||
| o Are there open source efforts that should be pursued or kept being | o Are there open source efforts that should be pursued or continue | |||
| pursued to ensure that a diversity of operators and networks can | to be pursued to ensure that a diversity of operators and networks | |||
| use a particular technology? This is further discussed in | can use a particular technology? This is further discussed in | |||
| {{opensource]]. | {{opensource]]. | |||
| o What measurements relating to the developments centralization or | o What measurements relating to the development of centralization or | |||
| consolidation should be pursued? And what other research, such as | consolidation should be pursued? And what other research, such as | |||
| distributed Internet architectures, should be driven forward? | distributed Internet architectures, should be driven forward? | |||
| Some potential topics are discussed in Section 4.4. | Some potential topics are discussed in Section 4.4. | |||
| 4.1. Open Interfaces | 4.1. Open Interfaces | |||
| Standards and open source efforts continue to build many open | Standards and open source efforts continue to build many open | |||
| interfaces and APIs that allow systems interoperability and tailoring | interfaces and APIs that allow systems interoperability and tailoring | |||
| of services. In some cases, however, the availability of open | of services. In some cases, however, the availability of open | |||
| interfaces definitions and software has not lead to the realization | interfaces definitions and software has not led to the realization of | |||
| of actual interfaces in this open manner. For instance, different | actual interfaces in this open manner. For instance, different | |||
| instant messaging systems have had a technical ability to be | instant messaging systems have had a technical ability to be | |||
| interoperable with other systems, just like e-mail is interoperable | interoperable with other systems, just like e-mail is interoperable | |||
| across systems, but have chosen to be disconnected. | across systems, but have chosen to be disconnected. | |||
| Work in determining what open interfaces can provide benefits to | Work in determining what open interfaces can provide benefits to | |||
| users as well be successfully deployed in the Internet ecosystem | users as well be successfully deployed in the Internet ecosystem | |||
| would of course be useful. | would of course be useful. | |||
| 4.2. Specific Standardization Choices | 4.2. Specific Standardization Choices | |||
| Sometimes the issue is not the availability of interfaces as such, | Sometimes the issue is not the availability of interfaces as such, | |||
| but rather fundamental architectural choices with regards to how | but rather fundamental architectural choices with regards to how | |||
| Internet systems should be built. | Internet systems should be built. | |||
| Often this relates to how centralized or distributed deployments are | Often this relates to how centralized or distributed deployments are | |||
| targeted. And even if a distributed, broad deployment model is | targeted. And even if a distributed, broad deployment model is | |||
| targeted, he expectations may not match reality when economies of | targeted, expectations may not match reality when economies of scale, | |||
| scale, DDoS resilience, market consolidation, or other factors have | DDoS resilience, market consolidation, or other factors have come | |||
| come into play. These factors can result in the deployed reality | into play. These factors can result in the deployed reality being | |||
| being highly concentrated. | highly concentrated. | |||
| This is a serious issue for the Internet, as concentrated, | This is a serious issue for the Internet, as concentrated, | |||
| centralized deployment models present risks to user choice, privacy, | centralized deployment models present risks to user choice, privacy, | |||
| and future protocol evolution. On occasion, the differences to | and future protocol evolution. On occasion, the differences to | |||
| expectations can be immediate, but can also occur much later. | expectations can be immediate, but can also occur much later. | |||
| Some examples of these issue include current work in DNS where we may | Some examples of these issues include current work in DNS where we | |||
| see concentration through the use of globally available common | may see concentration through the use of globally available common | |||
| resolver services, which evolve rapidly and can offer better | resolver services, which evolve rapidly and can offer better | |||
| security. But the concentration of these queries into few services | security. But the concentration of these queries into a few services | |||
| creates new security and privacy concerns. | creates new security and privacy concerns. | |||
| Another example is email, which started out as many providers running | Another example is email, which started out as many providers running | |||
| in a largely uncoordinated fashion, but which has since then seen | in a largely uncoordinated fashion, but which has since then seen | |||
| significant market consolidation and a need for coordination to | significant market consolidation and a need for coordination to | |||
| defend against attacks such as spam. The coordination and | defend against attacks such as spam. The coordination and | |||
| centralized defense mechanisms scale better for large entities, which | centralized defense mechanisms scale better for large entities, which | |||
| has fueled additional consolidation. | has fueled additional consolidation. | |||
| Awareness of these issues while working on standards would be useful, | Awareness of these issues while working on standards would be useful, | |||
| so that the issues can be taken into account and appropriately | so that the issues can be taken into account and appropriately | |||
| mitigated. To begin with, those of us Interested in the broader | mitigated. To begin with, those of us interested in the broader | |||
| questions about Internet development and Internet researchers are | questions about Internet research and development are needed to | |||
| needed to identify some of the effects that new technology | identify some of the effects that new technology developments may | |||
| developments may pose. | pose. | |||
| 4.3. Open Source | 4.3. Open Source | |||
| Many key Internet infrastructure services (e.g., DNS servers), end- | Many key Internet infrastructure services (e.g., DNS servers), end- | |||
| user applications (e.g., browsers) and technology components (e.g., | user applications (e.g., browsers) and technology components (e.g., | |||
| operating systems or protocol implementations) are commonly | operating systems or protocol implementations) are commonly | |||
| implemented using open source solutions. | implemented using open source solutions. | |||
| This is often true even if there's a large entity that is in charge | This is often true even if there is a large entity that is in charge | |||
| of large fraction of development and deployment for a particular | of a large fraction of development and deployment for a particular | |||
| technology. This is a good thing, as it ensures that others have a | technology. This is a good thing, as it provides a means for others | |||
| fair chance of changing the technology in question, should the large | to have a fair chance of changing the technology in question, should | |||
| entity drive their use of the technology in some direction that does | the large entity drive their use of the technology in some direction | |||
| not benefit the users. For instance, users and other organizations | that does not benefit the users. For instance, users and other | |||
| have traditionally been able to either run their own browser versions | organizations have traditionally been able to either run their own | |||
| or provided extensions that suit their needs better than the default | browser versions or provided extensions that suit their needs better | |||
| system. | than the default system. | |||
| As a result, continuing to have this ecosystem is important safety | As a result, continuing to have this ecosystem is an important safety | |||
| valve and competition opportunity. | valve and competition opportunity. | |||
| 4.4. Research Challenges | 4.4. Research Challenges | |||
| There are number of different research directions for which further | There are a number of different research directions for which further | |||
| work would be useful. | work would be useful. | |||
| The first is about measurements; is the Internet indeed | The first is about measurements; is the Internet indeed | |||
| consolidating, and if so, by how much, and in what aspects? Also, | consolidating, and if so, by how much, and in what aspects? Also, | |||
| where are Internet's traffic flows concentrating, and how is this | where are the Internet's traffic flows concentrating, and how is this | |||
| changing over time? | changing over time? | |||
| There are also questions about the trends and their relationships to | There are also questions about the trends and their relationships to | |||
| technology: Has Internet technology influenced the consolidation | technology: Has Internet technology influenced the consolidation | |||
| trends in some manner? And conversely, how Internet consolidation | trends in some manner? And conversely, how does Internet | |||
| influences the development of the Internet infrastructure and | consolidation influence the development of Internet infrastructure | |||
| architecture? | and architecture? | |||
| Finally, research on topics that would likely yield results that | Finally, research on topics that would likely yield results that | |||
| increase the diversity and de-centralization in the Internet would | increase the diversity and de-centralization in the Internet would | |||
| obviously be welcome. This can include any de-centralized | obviously be welcome. This can include any de-centralized | |||
| technologies, but in particular distributed Internet architecture is | technologies, but in particular distributed Internet architecture is | |||
| an Interesting topic. | an interesting topic. | |||
| 5. Contributors | 5. Contributors | |||
| Much of the text in this memo is from a blog article written by Jari | Much of the text in this memo is from a blog article written by Jari | |||
| Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | Arkko, Mark Nottingham, Christian Huitema, Martin Thomson, and Brian | |||
| Trammell for the Internet Architecture Board (IAB), and from a blog | Trammell for the Internet Architecture Board (IAB), and from a blog | |||
| article written by Jari Arkko and Brian Trammell APNIC and RIPE. | article written by Jari Arkko and Brian Trammell APNIC and RIPE. | |||
| Some parts of the text have also come from a future workshop | Some parts of the text have also come from a future workshop | |||
| description developed in the IAB, primarily by Christian Huitema and | description developed in the IAB, primarily by Christian Huitema and | |||
| Ted Hardie. | Ted Hardie. | |||
| 6. Acknowledgements | 6. Acknowledgements | |||
| The authors would like to thank IAB members, Geoff Huston, Amelia | The authors would like to thank IAB members, Geoff Huston, Amelia | |||
| Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf | Andersdotter, Gonzalo Camarillo, Mirjam Kuehne, Robert Mitchell, Olaf | |||
| Kolkman, and many others for interesting discussions in this problem | Kolkman, Greg Skinner and many others for interesting discussions in | |||
| space. | this problem space. The authors would also like to thank all | |||
| participants in the 2019 Design Expectations vs. Deployment Reality | ||||
| (DEDR) IAB workshop held in Kirkkonummi, Finland, as well as the | ||||
| participants in the 2019 EuroDIG workshop on "Internet consolidation | ||||
| - opportunities and challenges". | ||||
| 7. Informative References | 7. Informative References | |||
| [Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000, | [Abbate] Abbate, J., "Inventing the Internet", MIT Press , 2000, | |||
| <https://mitpress.mit.edu/books/inventing-internet>. | <https://mitpress.mit.edu/books/inventing-internet>. | |||
| [Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and | [Boyle] "Foucault in Cyberspace: Surveillance, Sovereignty, and | |||
| Hardwired Censors", Duke Law School, | Hardwired Censors", Duke Law School, | |||
| https://scholarship.law.duke.edu/ | https://scholarship.law.duke.edu/ | |||
| faculty_scholarship/619/ , 1997. | faculty_scholarship/619/ , 1997. | |||
| skipping to change at page 14, line 5 | skipping to change at page 14, line 22 | |||
| internet-article.html) , December 1993. | internet-article.html) , December 1993. | |||
| [Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was | [Gizmodo] "I Cut The 'Big Five' Tech Giants From My Life. It Was | |||
| Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut- | Hell", Gizmodo, https://www.gizmodo.com.au/2019/02/i-cut- | |||
| the-big-five-tech-giants-from-my-life-it-was-hell/ , | the-big-five-tech-giants-from-my-life-it-was-hell/ , | |||
| February 2019. | February 2019. | |||
| [ISOC] "Consolidation in the Internet economy", Internet Society, | [ISOC] "Consolidation in the Internet economy", Internet Society, | |||
| https://future.internetsociety.org/2019/ , 2019. | https://future.internetsociety.org/2019/ , 2019. | |||
| [Khan] Khan, L., "Amazon's Antritrust Paradox", The Yale Law | ||||
| Journal 126:710 , 2017. | ||||
| [LitanRivlin] | [LitanRivlin] | |||
| Litan, R. and A. Rivlin, "Projecting the Economic Impact | Litan, R. and A. Rivlin, "Projecting the Economic Impact | |||
| of the Internet", American Economic Review 91 (2), pp. | of the Internet", American Economic Review 91 (2), pp. | |||
| 313-317 , 2001. | 313-317 , 2001. | |||
| [Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies: | [Mansell] Mansell, R. and M. Javary, "Emerging Internet Oligopolies: | |||
| A Political Economy Analysis", In Miller, Edythe S.and | A Political Economy Analysis", In Miller, Edythe S.and | |||
| Samuels, Warren J., (eds.) An Institutionalist Approach to | Samuels, Warren J., (eds.) An Institutionalist Approach to | |||
| Public Utilities Regulation. Michigan State University | Public Utilities Regulation. Michigan State University | |||
| Press, East Lansing, Michigan, pp. 162-201. ISBN | Press, East Lansing, Michigan, pp. 162-201. ISBN | |||
| 9780870136245 , 2002, <https://core.ac.uk/download/ | 9780870136245 , 2002, <https://core.ac.uk/download/ | |||
| pdf/204420.pdf>. | pdf/204420.pdf>. | |||
| [Nye] Nye, J., "The Regime Complex for Managing Global Cyber | ||||
| Activities. Global Commission on Internet Governance", | ||||
| CIGI, Global Commission on Internet Governance , 2014. | ||||
| [RFC1192] Kahin, B., "Commercialization of the Internet summary | [RFC1192] Kahin, B., "Commercialization of the Internet summary | |||
| report", RFC 1192, DOI 10.17487/RFC1192, November 1990, | report", RFC 1192, DOI 10.17487/RFC1192, November 1990, | |||
| <https://www.rfc-editor.org/info/rfc1192>. | <https://www.rfc-editor.org/info/rfc1192>. | |||
| [RFC1958] Carpenter, B., Ed., "Architectural Principles of the | [RFC1958] Carpenter, B., Ed., "Architectural Principles of the | |||
| Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, | |||
| <https://www.rfc-editor.org/info/rfc1958>. | <https://www.rfc-editor.org/info/rfc1958>. | |||
| [RFC3935] Alvestrand, H., "A Mission Statement for the IETF", | [RFC3935] Alvestrand, H., "A Mission Statement for the IETF", | |||
| BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, | BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, | |||
| skipping to change at page 14, line 45 | skipping to change at page 15, line 20 | |||
| Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or | Stiglitz, J., "Joseph Stiglitz: Are markets efficient, or | |||
| do they tend towards monopoly? The verdict is in", 2016, | do they tend towards monopoly? The verdict is in", 2016, | |||
| <https://www.weforum.org/agenda/2016/05/joseph-stiglitz- | <https://www.weforum.org/agenda/2016/05/joseph-stiglitz- | |||
| are-markets-efficient-or-do-they-tend-towards-monopoly- | are-markets-efficient-or-do-they-tend-towards-monopoly- | |||
| the-verdict-is-in/>. | the-verdict-is-in/>. | |||
| [VanSchewick] | [VanSchewick] | |||
| van Schewick, B., "Internet Architecture and Innovation", | van Schewick, B., "Internet Architecture and Innovation", | |||
| MIT Press , 2012. | MIT Press , 2012. | |||
| [Wu] Wu, T., "The Curse of Bigness", Columbia Global Reports, | ||||
| New York, New York , 2018. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Jari Arkko | Jari Arkko | |||
| Ericsson | Ericsson | |||
| Email: jari.arkko@piuha.net | Email: jari.arkko@piuha.net | |||
| Brian Trammell | Brian Trammell | |||
| ETH Zurich | ETH Zurich | |||
| Email: ietf@trammell.ch | Email: ietf@trammell.ch | |||
| Mark Nottingham | Mark Nottingham | |||
| Fastly | Fastly | |||
| Email: mnot@mnot.net | Email: mnot@mnot.net | |||
| skipping to change at page 15, line 23 | skipping to change at page 16, line 4 | |||
| Christian Huitema | Christian Huitema | |||
| Private Octopus Inc. | Private Octopus Inc. | |||
| Email: huitema@huitema.net | Email: huitema@huitema.net | |||
| Martin Thomson | Martin Thomson | |||
| Mozilla | Mozilla | |||
| Email: martin.thomson@gmail.com | Email: martin.thomson@gmail.com | |||
| Jeff Tantsura | Jeff Tantsura | |||
| Nuage Networks | Apstra, Inc. | |||
| Email: jefftant.ietf@gmail.com | Email: jefftant.ietf@gmail.com | |||
| Niels ten Oever | Niels ten Oever | |||
| University of Amsterdam | University of Amsterdam | |||
| Email: mail@nielstenoever.net | Email: mail@nielstenoever.net | |||
| End of changes. 54 change blocks. | ||||
| 138 lines changed or deleted | 167 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||