{"title":"从网络中立到抓住机遇[比特与电子]","authors":"B. Frankston","doi":"10.1109/MCE.2018.2851758","DOIUrl":null,"url":null,"abstract":"^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity","PeriodicalId":179001,"journal":{"name":"IEEE Consumer Electron. Mag.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"From Net Neutrality to Seizing Opportunity [Bits Versus Electrons]\",\"authors\":\"B. Frankston\",\"doi\":\"10.1109/MCE.2018.2851758\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity\",\"PeriodicalId\":179001,\"journal\":{\"name\":\"IEEE Consumer Electron. Mag.\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Consumer Electron. Mag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCE.2018.2851758\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Consumer Electron. Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCE.2018.2851758","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
From Net Neutrality to Seizing Opportunity [Bits Versus Electrons]
^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity