skip to main content
article

Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world

Published:01 August 2001Publication History
Skip Abstract Section

Abstract

This article looks at the Internet and the changing set of requirements for the Internet as it becomes more commercial, more oriented toward the consumer, and used for a wider set of purposes. We discuss a set of principles that have guided the design of the Internet, called the end-to-end arguments, and we conclude that there is a risk that the range of new requirements now emerging could have the consequence of compromising the Internet's original design principles. Were this to happen, the Internet might lose some of its key features, in particular its ability to support new and unanticipated applications. We link this possible outcome to a number of trends: the rise of new stakeholders in the Internet, in particular Internet service providers; new government interests; the changing motivations of a growing user base; and the tension between the demand for trustworthy overall operation and the inability to trust the behavior of individual users.

References

  1. 1 Saltzer, J., Reed, D., and Clark, D.D., 1984. "End-to-end arguments in system design." ACM Trans. Comput. Syst., Vol. 2, No. 4, Nov., pp. 277-288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Larson, G. and Jeffrey, C., 1999."Song of the open road: Building a broadband network for the 21st century." The Center for Media Education, Section IV, p 6. ,http://www.cme.org/broadband/openroad-. pdf.Google ScholarGoogle Scholar
  3. 3 This trend is signaled by the rise of the application service provider, or ASP, as a part of the landscape.Google ScholarGoogle Scholar
  4. 4 A common method for constructing "configuration-free," "plug and play," or "works out of the box" devices is to assume that some other element takes on the role of controlling setup and configuration. Of course, centralization raises other issues, such as a common point of vulnerability. The proper balance between centralization and distribu-tion of security function for consumer networking is not yet clear.Google ScholarGoogle Scholar
  5. 5 For example, see Saltzer, J., 1999. "Open access is just the tip of the iceberg." Oct. 22. ,http://web.mit.edu/Saltzer/www/publications/ openaccess.html.; and Lemley, M. A. and Lessig, L., 1999. Filing before the Federal Communications Commission, (In the Matter of Application for Consent to the Transfer of Control of Licenses Media- One Group, Inc. to AT&T Corp. CS Docket No. 99-251). ,http:// cyber.law.harvard.edu/works/lessig/MB.html. Lessig's work can be seen in overview at ,http://cyber.law.harvard.edu. For a lightweight example that speaks directly to end-to-end, see Lessig, L., 1999. "It's the architecture, Mr. Chairman."Google ScholarGoogle Scholar
  6. 6 The Electronic Signatures in Global and National Commerce Act is an indicator of the broadening need for tools to support network-mediated transactions, although observers note that it raises its own questions about how to do so-resolving the technology and policy issues will take more work.Google ScholarGoogle Scholar
  7. 7 Chaum, D., 1992. "Achieving electronic privacy." Scientific American, Aug., pp. 96-101.Google ScholarGoogle Scholar
  8. 8 It may seem that attention to protection of identity, especially as it manifests in low-level information such as addresses, is exaggerated. The telephone system provides an illustration of how attention to identity has grown and added complexity to communications. For most of the history of the telephone system, the called telephone (and thus the person answering the phone) had no idea what the number of the caller was. Then the "caller ID" feature was invented to show the caller's number to the called party. This very shortly led to a demand for a way to prevent this information from being passed across the telephone network. Adding this capability, which reinstituted caller anonymity at the level of the phone number, led in turn to a demand that a receiver have the capability to refuse a call from a person who refused to reveal his phone number. Additional issues have arisen about the treatment of phone numbers used by people who have paid for "unlisted" numbers, which appears to vary by telephone service provider and state regulatory decision. Given the emergence of this rather complex balance of power in conventional telephony, there is no reason to think that users of the Internet will eventually demand any less. Even if the identity of the individual user is not revealed, this low-level information can be used to construct profiles of aggregate behavior, as in Amazon's summer 1999 publicity about book-buying patterns of employees of large organizations based on e-mail ad-dresses; see Amazon.com. 1999. "Amazon.com introduces 'Purchase Circlesy,' featuring thousands of bestseller lists for hometowns, work-places, universities, and more." Press release, Seattle, WA, Aug. 20. ,www.amazon.com.; McCullagh, D., 1999. "Big brother, big 'fun' at Amazon." Wired, Aug. 25. ,www.wired.com/news/news/business/story/ 21417.html.; Reuters, 1999. "Amazon modifies purchase data policy." Zdnet, Aug. 27. ,http://www.zdnet.com/filters/printerfriendly/ 0,6061,2322310-2,00.html. Also Amazon, 1999. "Amazon.com modi-fies 'Purchase Circlesy' feature." Press release, Seattle, WA, Aug. 26. ,www.amazon.com.Google ScholarGoogle Scholar
  9. 9 Cookies may be part of a larger class of monitoring software; see, for example, O'Harrow, R., Jr., 1999. "Fearing a plague of 'Web bugs': Invisible fact-gathering code raises privacy concerns." Washington Post, Nov. 13, E1, E8.Google ScholarGoogle Scholar
  10. 10 See O'Harrow, R., Jr. and Corcoran, E., 1999. "Intel drops plans for ID numbers." Washington Post, Jan. 26. ,http://www.washingtonpost-. com/wp-srv/washtech/daily/jan99/intel26.htm. Intel backed away from use of the ID as an identifier in e-commerce transactions under consumer pressure; see ,http://www.bigbrotherinside.com.Google ScholarGoogle Scholar
  11. 11 Microsoft implemented a scheme to tag all documents produced by Office 97 with a unique ID derived from the network address of the machine. In response to public criticism, Microsoft made it possible to disable this feature. It also discontinued reporting the unique hard-ware ID of each machine during online registration of Windows 98; see ,http://www.microsoft.com/presspass/features/1999/03- 08custletter2.htm.Google ScholarGoogle Scholar
  12. 12 See Cha, A. E., 2000. "Your PC is watching: programs that send personal data becoming routine," Washington Post, July 14, A1, A12- 13.Google ScholarGoogle Scholar
  13. 13 See Computer Science and Telecommunications Board, 2000. The Digital Dilemma: Intellectual Property in the Information Age. Na-tional Academy Press.Google ScholarGoogle Scholar
  14. 14 D'Antoni, H., 2000. "Web surfers beware: Someone's watching." Infor-mationWeek Online, Feb. 7. ,http://www.informationweek.com/bizint/ biz772/72bzweb.htm. Examples of currently available software in-clude ,SurfWatchhttp://www1.surfwatch.com/products/swwork.html. and Internet Resource Manager ,http://www.sequeltech.com.Google ScholarGoogle Scholar
  15. 15 The rash of denial of service attacks on major Web sites in early 2000 illustrates the magnitude of this problem.Google ScholarGoogle Scholar
  16. 16 For one view of spam and its control, see Dorn, D., 1998. "Postage due on junk e-mail-Spam costs Internet millions every month." Internet Week, May 4, 1998. ,http://www.techweb.com/se/directlink.cgi? INW19980504S0003. For a summary of legislative approaches to control spam, see Ouellette, T., 1999. "Technology quick study: spam." Computerworld, April 5, p.70. The Mail Abuse Prevention System (MAPS.LLC), provides tools for third parties (ISPs) to filter and control spam. Their charter states that their approach to controling spam is "educating and encouraging ISPs to enforce strong terms and conditions prohibiting their customers from engaging in abusive e-mail practices." ,http://www.mail-abuse.org.Google ScholarGoogle Scholar
  17. 17 Moss, M., 1999. "Inside the game of e-mail hijacking." The Wall Street Journal, Nov. 9, B1, B4. "Already, the Internet is awash in Web sites that trick people into clicking on by using addresses that vary only slightly from the sites being mimicked: an extra letter here, a dropped hyphen there. Now, in near secrecy, some of these same look-alike Web sites are grabbing e-mail as well."Google ScholarGoogle Scholar
  18. 18 A series of publicized problems affecting Microsoft's Internet Explorer, and the generation of associated software fixes, is documented on the Microsoft security site at ,http://www.microsoft.com/windows/ie/secu-rity/ default.asp. A similar list of issues for Netscape Navigator can be found at ,http://home.netscape.com/security/notes.Google ScholarGoogle Scholar
  19. 19 Saltzer, J., 1998. Personal communication, Nov 11.Google ScholarGoogle Scholar
  20. 20 As opposed to taxing the use of the Internet per se, like taxation of telephone service. This discussion does not address the merits of taxation; it proceeds from the recognition of (multiple) efforts to implement it.Google ScholarGoogle Scholar
  21. 21 For example, independently of technology, income tax compliance is promoted by the practice, and risk, of audits.Google ScholarGoogle Scholar
  22. 22 Practically, many pornography sites today use possession of a credit card and a self-affirmation of age as an acceptable assurance of adulthood-although some minors have credit cards. Indicating adult-hood has different ramifications from indicating minority, as Lessig has noted; the intent here is to contrast identification of content and users.Google ScholarGoogle Scholar
  23. 23 There are other purposes for which a control point "in" the network might be imposed to achieve a supposedly more robust solution than an end-point implementation can provide: including facilitating eaves-dropping/ wiretap, collection of taxes and fees associated with transac-tions using the network, and so on. One question discussed by the Internet Engineering Task Force (IETF) is how, if at all, Internet protocols should be modified to support the Communications Assis-tance for Law Enforcement Act of 1995 (CALEA) wiretap regulations; see Clausing, J., 1999. "Internet engineers reject wiretap proposal." The New York Times, Nov. 11, B10. The current sentiment in the design community is that this is not an appropriate goal for the IETF. However, there appears to be some interest in conforming to CALEA from equipment vendors, given the interest expressed by their custom-ers.Google ScholarGoogle Scholar
  24. 24 It is possible that the introduction of the new Internet address space, as part of the next generation Internet protocol, IPv6, with its much larger set of addresses, will alleviate the need for NAT devices. There is much current debate as to whether NAT devices are a temporary fix, or are now a permanent part of the Internet.Google ScholarGoogle Scholar
  25. 25 As this article was being completed, news broke about the FBI's "Carnivore" system, characterized as an "Internet wiretapping sys-tem" deployed at an ISP's premises; see King, N., Jr. and Bridis, T., 2000. "FBI's wiretaps to scan e-mail spark concern." The Wall Street Journal, July 11, A3, A6. Also note that users who move from place to place and dial in to different phone numbers do not use the same physical link for successive access, but since they have to authenticate themselves to the ISP to complete the connection, the ISP knows who is dialing, and could institute logging accordingly.Google ScholarGoogle Scholar
  26. 26 Some ISPs, in particular AOL, route all their traffic to a central point before sending it on into the Internet. This design makes it easier to control what a user does; it also makes it easier to monitor and track. So the decentralized nature of the Internet need not be mirrored in the systems that run over it.Google ScholarGoogle Scholar
  27. 27 Similarly, if an organization has any requirement imposed on it to control the behavior of its users, it will be at the point of egress that the control can best be imposed.Google ScholarGoogle Scholar
  28. 28 Of course, this sort of control is not perfect. It is possible for a creative user to purchase a number of ISP accounts and move from one to another in an unpredictable way. This is what is happening today in the battle between spammers and those who would control themanother example of the dynamic tussle between control and avoidance.Google ScholarGoogle Scholar
  29. 29 California Assembly Bill 1676, enacted in 1998.Google ScholarGoogle Scholar
  30. 30 For a detailed discussion of labels on content and on users, see Lessig, L. and Resnick, P., 1999. "Zoning speech on the Internet: A legal and technical model." Michigan Law Review 98, 2, pp. 395-431.Google ScholarGoogle ScholarCross RefCross Ref
  31. 31 This is a critical issue for the viability of industry self-regulation, given the looming prospect of government regulation, and is the subject of much debate. Major industry players and scholars partici-pated in a 1999 international conference organized by the Bertels-mann Foundation, which cast labeling approaches as user-empower-ing and urged government support for private filtering based on labeling; see Bertelsmann Foundation, 1999. Self-Regulation of Inter-net Content, Gutersloh, Germany, Sept. ,http://www.stiftung.bertels-mann. de/internetcontent/english/content/c2340.htm.Google ScholarGoogle Scholar
  32. 32 See, for example, US Federal Trade Commission, 1998. Advertising and Marketing on the Internet: Rules of the Road, Washington, DC, Aug. ,www.ftc.gov.Google ScholarGoogle Scholar
  33. 33 The PICS web site maintained by the World Wide Web Consortium is ,http://www.w3.org/pics.Google ScholarGoogle Scholar
  34. 34 There are a number of Web proxy servers that implement PICS filtering; see ,http://www.n2h2.com/pics/proxy_servers.html.Google ScholarGoogle Scholar
  35. 35 For a discussion of concerns aroused by PICS, see ,http://libertus.net/ liberty/label.html. For a response to such concerns by one of the PICS developers and proponents, see Resnick, P., Ed. 1999. "PICS, censorship, & intellectual freedom FAQ." ,www.w3.org/PIC/PICS-FAQ- 980126.HTML.Google ScholarGoogle Scholar
  36. 36 The Metatdata web site maintained by the World Wide Web Consor-tium is ,http://www.w3.org/Metadata.Google ScholarGoogle Scholar
  37. 37 For example, there have been lawsuits to prevent the use of a trademark in the metadata field of a page not associated with the holder of the mark. A summary of some lawsuits related to trade-marks in metadata can be found at ,http://www.searchenginewatch. com/resources/metasuits.html.Google ScholarGoogle Scholar
  38. 38 Examples of anonymizing browser services can be found at ,http:// www.anonymizer.com.; ,http://www.idzap.ne.; ,http://www.rewebber. com.; ,http://www.keepitsecret.com.; ,http://www.confidentialonline. com/home.html.; and ,http://www.websperts.net/About_Us/Privacy/ clandestination.shtml. The last of these offers a service where the anonymous intermediate is located in a foreign country to avoid the reach of the US legal system. The quality of some of these services is questioned in Oakes, C., 1999. "Anonymous Web surfing? uh-uh." Wired News, April 13. ,http://www.wired.com/news/technology/0,1282,19091,00.html.Google ScholarGoogle Scholar
  39. 39 For one example of a system that tries to provide protection from traffic analysis, see Goldschlag, D. M., Reed, M. G., and Syverson, P. F., 1999. "Onion routing for anonymous and private Internet connec-tions." Communications of the ACM, 42, 2, Feb. For a complete bibliography and discussion, see ,http://onion-router.nrl.navy.mil. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. 40 Mazi~res, D. and Kaashoek, M. F., 1998. "The design, implementation and operation of an email pseudonym server." In Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS-5), San Francisco, CA, Nov., pp. 27-36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. 41 The outgoing message is prefaced with a sequence of addresses, each specifying a relay point. Each address is encrypted using the public key of the prior hop, so that the relay point, and only the relay point, using its matching private key, can decrypt the address of the next hop the message should take. Each relay point delays the message for an unpredictable time, so that it is hard to correlate an incoming and an outgoing message. If enough hops are used, it becomes almost impossible to trace the path from destination back to the source.Google ScholarGoogle Scholar
  42. 42 For a review of tools currently available to filter spam in mail servers, see ,http://spam.abuse.net/tools/mailblock.html.Google ScholarGoogle Scholar
  43. 43 More complex replication/hosting schemes for controlled staging of content provide features to remedy these limitations, in return for which the content provider must usually pay a fee to the service.Google ScholarGoogle Scholar
  44. 44 The icap forum ,http://www.i-cap.org. is concerned with standards for content caching. The IETF has a number of activities, including the Midcom working group looking at protocols for communication among end-nodes, firewalls, NAT boxes, and the Open Extensible Proxy Services (OEPS) group.Google ScholarGoogle Scholar
  45. 45 This is a topic receiving more analysis in different contexts. For a legal assessment, see, for example, Froomkin, A. M,. 1996. "The essential role of trusted third parties in electronic commerce" Oregon Law Review 75:29. ,www.law.miami.edu/~froomkin/articles/trustedno.htm.Google ScholarGoogle Scholar
  46. 46 For example, see the mutual commitment protocol. Zhou, J. and Gollmann, D., 1996. "A fair non-repudiation protocol." In Proceedings of the 1996 Symposium on Security and Privacy, Oakland, CA, May 6-8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. 47 A notary is "{a} responsible person appointed by state government to witness the signing of important documents and administer oaths." See National Notary Association, 1997, "What is a notary public?" ,http://www.nationalnotary.org/actionprograms/WhatisNotaryPub-lic. pdf. Recognition of this role has led to the investigation of a "cyber-notary" as a useful agent within the Internet. This has been a topic studied by the American Bar Association, but there does not appear to be an active interest at this time.Google ScholarGoogle Scholar
  48. 48 There is a partial analogy with payment by check, where the bank balance is normally not verified at the moment of purchase. However, the taker of the check may demand other forms of identification, which can assist in imposing a fee for a bad check. If a certificate has been invalidated, the recipient cannot even count on knowing who the other party in the transaction actually is. So there may be fewer options for recourse later.Google ScholarGoogle Scholar
  49. 49 From the recognition that technologists often prefer technical solu-tions, we emphasize the broader choice of mechanism. The Internet philosophy acknowledged early in this article argues for the superior-ity of technology over other kinds of mechanisms. See, for example, Goldberg, I., Wagner, D., and Brewer, E., 1997. "Privacy-enhancing technologies for the Internet." ,http://www.cs.berkeley.edu/~daw/privacy-compcon97- 222/privacy-html.html. The authors observe that "{t}he cyperpunks credo can be roughly paraphrased as 'privacy through technology, not through legislation.' If we can guarantee privacy protection through the laws of mathematics rather than the laws of men and whims of bureaucrats, then we will have made an important contribution to society. It is this vision which guides and motivates our approach to Internet privacy."Google ScholarGoogle Scholar
  50. 50 There is no technical verification that this number is indeed sent (the fax, like the Internet, is very much an end-to-end design), but the presumption is that the law can be used to keep the level of unwanted faxes to an acceptable level. Note also that this law, which had the goal of controlling receipt of unwanted material, outlaws "anonymous faxes," in contrast to telephone calls, where one can prevent the caller's phone number from being passed to the called party.Google ScholarGoogle Scholar
  51. 51 This trend was emphasized by the establishment by executive order in mid-1999 of a federal task force on illegal conduct on the Internet. President's Working Group on Unlawful Conduct on the Internet, 2000. The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet. ,http://www.usdoj.gov/criminal/ cybercrime/unlawful.htm.Google ScholarGoogle Scholar
  52. 52 The authors recognize that on the Internet today various labels are associated with voluntary schemes for content rating, etc.; illustra-tions of the complementarity of law or regulation come, at present, from other domains. Note, however, that the Bertelsmann Foundation conference summary cited above specifically cast law enforcement as a complement to voluntary labeling. It observed that "Law enforcement is the basic mechanism employed within any country to prevent, detect, investigate and prosecute illegal and harmful content on the Internet. This state reaction is essential for various reasons: It guar-antees the state monopoly on power and public order, it is democrati-cally legitimized and directly enforceable, and it secures justice, equity, and legal certainty. However, a mere system of legal regulation armed with law enforcement would be ineffective because of the technical, fast-changing, and global nature of the Internet. In a coordinated approach, self-regulatory mechanisms have to be com-bined with law enforcement as a necessary backup." (p.45).Google ScholarGoogle Scholar
  53. 53 US Federal Communications Commission, "V-Chip Homepage." ,http://www.fcc.gov/vchip.Google ScholarGoogle Scholar
  54. 54 Information on Amazon.com was cited above. On RealNetworks; see Clark, D., 1999. "RealNetworks will issue software patch to block its program's spying on users." The Wall Street Journal, Nov. 2, B8. The article explains that "Unbeknownst to users, the {Real-Jukebox} soft-ware regularly transmitted information over the Internet to the com-pany, including what CDs users played and how many songs were loaded on their disk drives." DoubleClick presented a broader privacy challenge because it tracked consumer movement across sites and products. The controversy precipitated broad reactions, including gov-ernment investigation due to a complaint to the Federal Trade Com-mission; see Tedeschi, B., 2000. "Critics press legal assault on tracking of Web users. " The New York Times, Feb. 7, C1, C10.Google ScholarGoogle Scholar
  55. 55 Simpson, G. R., 2000, "E-commerce firms start to rethink opposition to privacy regulation as abuses, anger rise." The Wall Street Journal, Jan. 6, A24.Google ScholarGoogle Scholar
  56. 56 What individuals can do for themselves and what industry does depend, of course, on incentives, which are a part of the nontechnical mechanism picture. Recent controversy surrounding the development of UCITA illustrates differing expectations and interpretations of who incurs what costs and benefits. An issue with these evolving frame-works is the reality that consumers, in particular, and businesses often prefer to avoid the costs of litigation.Google ScholarGoogle Scholar
  57. 57 The operators of the server are happy to provide what information they have in response to any court order, but the system was carefully designed to make this information useless.Google ScholarGoogle Scholar
  58. 58 This tensions among technology, law, and other influences on behavior are at the heart of Lessig's much-discussed writings on the role of "code" (loosely, technology); see his 1999 book, Code and Other Laws of Cyberspace. Basic Books, New York. Critical responses to Code .. note that technology is malleable rather than constant-a premise of this article-and so are government and industry interests and motives; see, for example, Mann, C. C., 1999. "The unacknowledged legislators of the digital world." In Atlantic Unbound, Dec. 15. ,www.theatlantic. com/unbound/digicult/dc991215.htm.Google ScholarGoogle Scholar
  59. 59 What is known as a "conflict of laws" provides a set of principles and models for addressing legal problems that span at least two jurisdic-tions. Resolving such problems is hard in the context of real space, and cyberspace adds additional challenges, but progress under the conflict of laws rubric illuminates approaches that include private agreements on which laws will prevail under which circumstances, international harmonization (difficult and slow but already in progress), and indi-rect regulation, which targets the local effects (e.g., behavior of people and equipment) of extraterritorial activity. For an overview, see Goldsmith, J. L., 1998. "Against cyberanarchy." The University of Chicago Law Review, 65:4, Fall, pp. 1199-1250. Among other things, Goldsmith explains that: "Cyberspace presents two related choice-of-law problems. The first is the problem of complexity. This is the problem of how to choose a single governing law for cyberspace activity that has multiple jurisdictional contacts. The second problem concerns situs. This is the problem of how to choose a governing law when the locus of activity cannot easily be pinpointed in geographical space." (p.1234). Case law shows that these issues are being worked out (or at least worked on); see, for example: Fusco, P., 1999. "Judge rules ISP, server location may determine jurisdiction." ISP-Planet, June 11. ,www.isp-planet.com/politics/061199jurisdiction.html.; and Kaplan, C. S., 1999. "Judge in gambling case takes on sticky issue of jurisdiction." The New York Times, Aug. 13, B10. The latter addresses the interplay of state law with federal law, which proscribes gambling via the Wire Act (18 USC 1084), the Travel Act (18 USC 1952), and the Interstate Transportation of Wagering Paraphernalia Act (18 USC 1953). Some of these issues have been attacked by the American Bar Association's Internet Jurisdiction Project. ,http://www.kentlaw.edu/cyberlaw.Google ScholarGoogle Scholar
  60. 60 See Computer Science and Telecommunications Board, 1994. Realiz-ing the Information Future: The Internet and Beyond, National Acad-emy Press, and Computer Science and Telecommunications Board, 1999. Funding a Revolution: Government Support for Computing Research, National Academy Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. 61 Large ISPs such as AOL have attempted to attain control over the end odes by distributing their own browser, which they encourage or require the user to employ. This approach has proved successful to some extent. In the future, we can expect to see ISP interest in extending their control over the end-point to the extent possible-for example by means of added function in Internet set top boxes and other devices they install in the home.Google ScholarGoogle Scholar
  62. 62 See, for example, the "Appropriate use policy of Excite@Home ,http:// www.home.com/aup., which specifically prohibits the operation of servers over their residential Internet service.Google ScholarGoogle Scholar
  63. 63 For an assessment of possible outcomes, see Saltzer, J., 1999. "'Open access' is just the tip of the iceberg." Essay for the Newton, MA Cable Commission, Oct. 22. ,http://mit.edu/Saltzer/www/publications/ openaccess.html. After succinctly commenting on a number of possi-ble outcomes that he finds undesirable, Saltzer notes that the worst possible outcome of today's open access tussle-that of no open access and stifled competition and innovation- "is looking increasingly un-likely, as customers and cable competitors alike begin to understand better why the Internet works the way it does and the implications of some of the emerging practices."Google ScholarGoogle Scholar
  64. 64 See material cited in note 10 above. Note also the concerns raised under the rubric "peering." See, for example, Caruso, D., 2000. "Digital commerce: The Internet relies on networks' passing data to one another. But what happens if one of them refuses?" The New York Times, Feb. 14, C4.Google ScholarGoogle Scholar
  65. 65 Common carriage implies certain rights and responsibilities, such as the provider's obligation to serve all comers while protected from liability if those subscribers use the network for unacceptable pur-poses. The fact that the Internet was designed such that (by end-to-end arguments) ISPs cannot easily control the content sent over their networks and that ISPs appear to serve all comers caused some to suggest that ISPs be treated as common carriers; the suggestion is also made by those who perceive the ISPs' ability to control content as greater than their nominal business and technology would suggest.Google ScholarGoogle Scholar
  66. 66 Concern about "critical infrastructure," which developed in the late 1990s, intensified the concern and attention about the growing reli-ance on the Internet, with explorations by the government and some industry leaders of new programs and mechanisms for monitoring its use or "abuse" and increasing its robustness against malicious or accidental disruption; see Blumenthal, M. S., 1999. "Reliable and trustworthy: The challenge of cyber-infrastructure protection at the edge of the millennium." iMP Magazine, Sept. ,http://www.cisp.org/ imp/september_99/09_99blumenthal.htm.Google ScholarGoogle Scholar
  67. 67 The popular fictional character Harry Potter received some advice that might apply equally to his world and the Internet: "Never trust anything that can think for itself if you can't see where it keeps its brain." Rowling, J.K., 1998. Harry Potter and the Chamber of Secrets, Bloomsbury, p. 242.Google ScholarGoogle Scholar
  68. 68 Pomfret, J., 2000. "China puts clamps on Internet; communists seek information curb." The Washington Post, Jan. 27.Google ScholarGoogle Scholar
  69. 69 See Computer Science and Telecommunications Board, 1996. Crypto-graphy's Role in Securing the Information Society. National Academy Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. 70 Today, regulatory agencies (e.g., the Federal Trade Commission) are already doing spot-checks of actual Web sites.Google ScholarGoogle Scholar
  71. 71 This approach is similar to the practice in some parts of the world of not always checking that passengers on public transit have the proper ticket in hand. Instead, there are roving inspectors that perform spot-checks. If the fine for failing to have the right ticket is high enough, this scheme can achieve reasonable compliance.Google ScholarGoogle Scholar

Index Terms

  1. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 1, Issue 1
            Aug. 2001
            140 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/383034
            Issue’s Table of Contents

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 August 2001
            Published in toit Volume 1, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader