BT Technology Journal

, Volume 24, Issue 3, pp 119–129 | Cite as

Why the Internet only just works

  • M. Handley


The core Internet protocols have not changed significantly in more than a decade, in spite of exponential growth in the number of Internet users and the speed of the fastest links. The requirements placed on the net are also changing, as digital convergence finally occurs. Will the Internet cope gracefully with all this change, or are the cracks already beginning to show? In this paper I examine how the Internet has coped with past challenges resulting in attempts to change the architecture and core protocols of the Internet. Unfortunately, the recent history of failed architectural changes does not bode well. With this history in mind, I explore some of the challenges currently facing the Internet.


Congestion Control User Datagram Protocol Domain Name System Border Gateway Protocol Stream Control Transmission Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Crocker S: ’Protocol notes’, RFC 36, Network Working Group, (Updated by RFC44, RFC 39) (March 1970).Google Scholar
  2. 2.
    Clark D D: ’The design philosophy of the DARPA internet protocols’, in Proc ACM SIGCOMM, pp 106–114, Stanford, CA, (August 1988).Google Scholar
  3. 3.
    Kudlick M: ’Host names on-line’, RFC 608, IETF (January 1974).Google Scholar
  4. 4.
    McQuillan J, Richer I and Rosen E: ’The New Routing Algorithm for the ARPAnet’, IEEE Transactions on Communications (May 1980).Google Scholar
  5. 5.
    Rosen E: ’Exterior Gateway Protocol (EGP)’, RFC 827 (October 1982).Google Scholar
  6. 6.
    Jacobson V: ’Congestion avoidance and control’, in Proc ACM SIGCOMM, pp 314–329, Stanford, CA (1988).Google Scholar
  7. 7.
    Lougheed K and Rekhter Y: ’Border Gateway Protocol BGP’, RFC 1105 (June 1989).Google Scholar
  8. 8.
    Rosen E, Viswanathan A and Callon R: ’Multiprotocol Label Switching Architecture’, RFC3031, IETF (January 2001).Google Scholar
  9. 9.
    Ramakrishnan K K, Floyd S and Black D: ’The addition of Explicit Congestion Notification (ECN) to IP’, RFC 3168, IETF (September 2001).Google Scholar
  10. 10.
    Braden R, Clark D and Shenker S: ’Integrated Services in the Internet architecture: an overview’, RFC 1633, IETF (June 1994).Google Scholar
  11. 11.
    Carlson M, Weiss W, Blake S, Wang Z, Black D and Davies E: ’An architecture for differentiated services’, RFC 2475, IETF (December 1998).Google Scholar
  12. 12.
    Rosen E and Rekhter Y: ’BGP/MPLS VPNs’, RFC 2547, IETF (March 1999).Google Scholar
  13. 13.
    Rosenberg J, Weinberger J, Huitema C and Mahy R: ’STUN — simple traversal of user datagram protocol (UDP) through network address translators (NATs)’, RFC 3489, IETF (March 2003).Google Scholar
  14. 14.
    Rosenberg J, Mahy R and Huitema C: ’Obtaining relay addresses from Simple Traversal of UDP Through NAT (STUN)’, Internet-Draft (February 2006).Google Scholar
  15. 15.
    Kohler E, Handley M and Floyd S: ’Datagram Congestion Control Protocol (DCCP)’, RFC 4340, IETF (March 2006).Google Scholar
  16. 16.
    Kohler E, Handley M and Floyd S: ’Designing DCCP: Congestion Control without Reliability’, to appear in Proc ACM SIGCOMM (September 2006).Google Scholar
  17. 17.
    Stewart R, Xie Q, Morneault K, Sharp C, Schwarzbauer H, Taylor T, Rytina I, Kalla M, Zhang L and Paxson V: ’Stream Control Transmission Protocol’, RFC 2960, IETF (October 2000).Google Scholar
  18. 18.
    Smirnov A and Chiueh T: ’Dira: Automatic detection, identification and repair of control-hijacking attacks in NDSS (2005).Google Scholar
  19. 19.
    Kiriansky V, Bruening D and Amarasinghe S P: ’Secure execution via program shepherding’, in USENIX Security Symposium (2002).Google Scholar
  20. 20.
    Dunlap G W, King S T, Cinar S, Basrai M A and Chen P M: ’Revirt: Enabling intrusion analysis through virtual-machine logging and replay’, SIGOPS Oper Syst Rev, 36, (2002).Google Scholar
  21. 21.
    Newsome J and Song D X: ’Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software’, in NDSS (2005).Google Scholar
  22. 22.
    Raiciu C, Handley M and Rosenblum D: ’Exploit Hijacking: Side Effects of Smart Defenses’, Proc ACM SIGCOMM Workshop on Large Scale Attack Defence (September 2006).Google Scholar
  23. 23.
    Ferguson P and Senie D: ’Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing’, RFC 2267 (January 1998).Google Scholar
  24. 24.
  25. 26.
    Shorten R and Leith D: ’H-TCP: TCP for high-speed and longdistance networks’, Proc PFLDnet, Argonne (2004).Google Scholar
  26. 27.
    Xu L, Harfoush K and Rhee I: ’Binary increase congestion control for fast long-distance networks’, Proc INFOCOM (2004).Google Scholar
  27. 28.
    Demers A, Keshav S and Shenker S: ’Analysis and simulation of a fair queueing algorithm’, Internetworking: Research and Experience, 1, pp 3–26 (1990).Google Scholar
  28. 29.
    Katabi D, Handley M and Rohrs C: ’Internet Congestion Control for High Bandwidth-Delay Product Environments’, Proc ACM SIGCOMM (2002).Google Scholar
  29. 30.
    Cerf V: ’Report of the Second Ad Hoc Network Management Review Group’, RFC 1109 (August 1989).Google Scholar
  30. 31.
    Kent S, Lynn C and Seo K: ’Secure Border Gateway Protocol (SBGP)’, IEEE JSAC Special Issue on Network Security (April 2000).Google Scholar
  31. 32.
    White R: ’Architecture and deployment considerations for Secure Origin BGP (soBGP)’, Internet-Draft (June 2006).Google Scholar
  32. 33.
    Perkins C: ’IP Mobility Support’, RFC 2002, IETF (October 1996).Google Scholar
  33. 34.
    Huston G: ’IETF64 Review: SHIM’, IETF Journal, 1, Issue 2 (Winter 2005/2006).Google Scholar
  34. 35.
    Rekhter Y and Li T: ’An architecture for IP address allocation with CIDR’, RFC 1518, IETF (September 1993).Google Scholar
  35. 36.
    Huston G: ’IPv4: How long do we have?’, The Internet Protocol Journal, 6, No 4 (December 2003).Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2006

Authors and Affiliations

  • M. Handley

There are no affiliations available

Personalised recommendations