This document describes the current state of the Internet from the architectural viewpoint, concentrating on issues of end-to-end connectivity and transparency. It concludes with a summary of some major architectural alternatives facing the Internet network layer.
RFC Downloads
Cited By
- Zhu L and Heidemann J LDplayer Proceedings of the Internet Measurement Conference 2018, (119-132)
- Carpenter B (2014). IP addresses considered harmful, ACM SIGCOMM Computer Communication Review, 44:2, (65-69), Online publication date: 8-Apr-2014.
- Han S, Liu V, Pu Q, Peter S, Anderson T, Krishnamurthy A and Wetherall D (2013). Expressive privacy control with pseudonyms, ACM SIGCOMM Computer Communication Review, 43:4, (291-302), Online publication date: 19-Sep-2013.
- Han S, Liu V, Pu Q, Peter S, Anderson T, Krishnamurthy A and Wetherall D Expressive privacy control with pseudonyms Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (291-302)
- Jun S and Ahamad M FeedEx Proceedings of the 15th international conference on World Wide Web, (113-122)
- Clark D, Sollins K, Wroclawski J and Faber T Addressing reality Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (247-257)
- Turányi Z, Valkó A and Campbell A (2003). 4+4, ACM SIGCOMM Computer Communication Review, 33:5, (43-54), Online publication date: 1-Oct-2003.
- Clark D, Sollins K, Wroclawski J and Faber T (2019). Addressing reality, ACM SIGCOMM Computer Communication Review, 33:4, (247-257), Online publication date: 1-Oct-2003.
- Kruse H, Yurcik W and Lessig L The interNAT Communications Policy in Transition, (141-157)
- Borella M and Montenegro G RSIP Proceedings of the Workshop on Intelligence at the Network Edge, (3-3)
Recommendations
Investigating Transparency Dimensions for Internet Voting
Electronic VotingAbstractWhile Internet voting is argued to have the potential to improve election processes, concerns about security risks remain one of its main adoption barriers. These concerns are furthermore aggravated by the lack of transparency of Internet voting ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...