从网络中立到抓住机遇[比特与电子]

B. Frankston
{"title":"从网络中立到抓住机遇[比特与电子]","authors":"B. Frankston","doi":"10.1109/MCE.2018.2851758","DOIUrl":null,"url":null,"abstract":"^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity","PeriodicalId":179001,"journal":{"name":"IEEE Consumer Electron. Mag.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"From Net Neutrality to Seizing Opportunity [Bits Versus Electrons]\",\"authors\":\"B. Frankston\",\"doi\":\"10.1109/MCE.2018.2851758\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity\",\"PeriodicalId\":179001,\"journal\":{\"name\":\"IEEE Consumer Electron. Mag.\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Consumer Electron. Mag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCE.2018.2851758\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Consumer Electron. Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCE.2018.2851758","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

^ IEEE消费电子杂志55n网络中立性是一个重要的问题。我们绝不能允许运输业主限制我们的沟通能力。但是,网络中立性本身将互联网定位为一种电信服务。我们需要退后一步,认识到互联网本身是软件带来的更大转变的一部分。当我发现自己在医院的房间里(膝盖手术后)无法自己打开和关闭窗帘时,我想到了更多。但是我可以控制家里的灯!这不仅仅是因为我创造了一个特例;相反,我仔细地设计了我的家庭照明控制实现,以最大限度地减少相互依赖,同时利用现有技术。例如,我尽可能地避免依赖于诸如Zigbee之类的竖井的偶然属性。我将任何传输都标准化为简单的数据包。这就是互联网的运作方式;它将底层基础设施标准化为互联网协议(IP),所以我不关心特定的段是ATM还是蜂窝。我可以使用与使用通用串行协议通过蓝牙隧道IP相同的技术。软件给了我们将事物拼接在一起的能力。在设计和重新设计应用程序时,我们还了解了动态架构边界的重要性,它可以最大限度地减少耦合或纠缠。因此,对于IP连接,我可以插入垫片(也称为变通方法,只要它们能保持体系结构的完整性),比如nat,或者将整个电信系统视为一个简单的链路。我可以将我自己的IP连接覆盖在我发现的IP连接上,包括现有的IP连接(就像我们使用vpn一样)。这使我们能够在提高理解的同时实现并发展系统。在电信范例中,我必须依靠网络来确保从我的手机到我家里的设备之间有一条虚拟线路。但在新的范式中,我们的关系是抽象的。我们可以将这种关系表示为[,],a b,其中a是app元素,b是设备或虚拟设备。它不需要涉及物理电线。网络连接不是一个层,而只是我可以使用的一种资源。它确实需要以不同的方式思考,发现什么是可能的,而不是坚持严格的要求。虽然我避免依赖提供者的承诺,但我可能会受到政策的限制,这些政策会事后猜测我在做什么。这就是为什么中立是一个重要的原则。这包括不要通过事后猜测我的需求来帮助我,从而在我在他们的设计点之外进行创新时产生交叉目的。一个更好的术语是净冷漠,因为中介不知道我的意图,因此不能偏心。更重要的是,这意味着付费墙和安全屏障可能使我的应用程序无法工作。我不得不手动干预使用医院的Wi-Fi连接。我可以在简单的情况下做到这一点,所以我们假设现状很好,但这是一个致命的障碍,我们可以称之为工作连接。与任何新的范式一样,它很难解释,因为我们的语言本身就有隐含的假设。这也意味着那些最精通网络架构的人往往会迷失在他们的专业知识中。在Internet的情况下,我认为端点标识符是由网络运营商分配的IP地址。作为一个善于利用身边机会的人,我认为人际关系只是一种手段,并试图绕开限制。如果没有机会,我可以自己创造机会。一个例子是IP版本6 (v6)。V6可以更容易地在两个端点之间产生直接连接,但在没有它的情况下,我可以使用IPv4拼凑路径。这是v6采用缓慢的一个原因:我们已经能够围绕它进行编程,所以它很好,但不是必需的。当然,我们希望创造机会。我把这样一个机会称为环境连接:假设连接的能力。这并不意味着总有一种连接方式,而是我将实现连接的问题与我们如何实现连接的问题分开。使用Wi-Fi提供连接很简单,但这与Wi-Fi本身无关,也与网状无关,因为它如何实现并不重要。这些只是例子。这是一种架构,而不是偶然的从网络中立到抓住机遇
本文章由计算机程序翻译,如有差异,请以英文原文为准。
From Net Neutrality to Seizing Opportunity [Bits Versus Electrons]
^ IEEE ConsumEr ElECtronICs magazInE 55 N etwork neutrality is an im portant issue. We must not allow transport owners to limit our ability to communicate. But, net neutrality in itself positions the Internet as a telecommunications service. We need to step back and recognize that the Internet itself is part of a larger shift wrought by software. I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. Yet I could control the lights in my house! It wasn’t simply that I had built a one-off special case; rather, I had carefully architected my home-lighting control implementation to minimize the interdependencies while taking advantage of existing technologies. For example, to the extent that I could, I avoided depending on the accidental properties of silos, such as Zigbee. I normalized any transport to simple packets. This is how the Internet works; it normalizes the underlying infrastructure to Internet protocol (IP), so I don’t care if a particular segment is ATM or cellular. I can use the same technique as in tunneling IP through Bluetooth using the general serial protocols. Software has given us the ability to stitch things together. In designing and redesigning applications, we have also gained an understanding of the importance of dynamic architectural boundaries that minimize coupling or entanglement. Thus, with an IP connection, I could insert shims (also known as work-arounds, as long as they preserve the architectural integrity), such as NATs, or treat the entire telecom system as a simple link. I can normalize this by overlaying my own IP connection on top of what I find, including existing IP connections (as we do with VPNs). This allows us to implement and then evolve systems as we improve our understanding. In the telecom paradigm, I would have to rely on the network to assure a path as a virtual wire from my phone to a device in my house. But in the new paradigm, we have relationships that are abstract. We can represent the relationship as [ , ], a b where a is the app element and b is the device or virtual device. It need not involve a physical wire. The network connection is not a layer but simply one resource I can use. It does require thinking differently and discovering what is possible rather than adhering to rigid requirements. Though I avoid depending on a provider’s promises, I may be limited by policies that second-guess what I’m doing. This is why neutrality is an important principle. That includes not doing me favors by secondguessing my needs and thus working at cross-purposes as I innovate outside their design point. A better term is net indifference, because the intermediaries don’t know my intent and thus can’t play favorites. More important is that it means that paywalls and security barriers may make it impossible for my application to work. I had to manually intervene to use the hospital’s Wi-Fi connection. I can do that in simple cases, so we assume that the status quo is fine—but it is a fatal barrier for what we might call just works connectivity. As with any new paradigm, it is difficult to explain, because our very language has implicit assumptions embedded. It also means that often those most expert in network architecture can get lost in their expertise. In the case of the Internet, I see this in the idea of endpoint identifiers being IP addresses assigned by network operators. As one who takes advantage of the opportunities I find lying around, I view networks as just a means and try to program around limits. If the opportunities aren’t available, I can create my own. One example is IP version 6 (v6). V6 makes it easier to produce a direct connection between two end points, but in its absence, I can cobble together a path using IPv4. This is one reason v6 adoption has been slow: we’ve been able to program around it, so it is nice but not necessary. Of course, we want to create opportunity. I call one such opportunity ambient connectivity: the ability to assume connectivity. This doesn’t mean that there is always a way to connect but rather that I separate out the problem of achieving connectivity from how we implement it. It’s simple to think of providing connectivity using Wi-Fi, but it’s not about Wi-Fi per se, and it’s not about a mesh, because it doesn’t matter how it’s implemented. Those are just examples. It’s architecture and not the accidental From Net Neutrality to Seizing Opportunity
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信