Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, August 25, 2011

Evolution Has Ossified the Internet

Posted on 9:40 AM by Unknown

R. Colin Johnson 

The Internet is evolving, according researchers at the Georgia Institute of Technology, but unfortunately extinction has resulted in a rigid structure where all information is being forced through a small set of mid-layer protocols that reduce flexibility and decrease security. To remedy, Georgia Tech recommends restructuring the mid-layers into a set of nonoverlapping protocols that do not compete with one another and thus will not become extinct as they evolve.Anyone who has used the Internet for very long knows about its evolution by the number of extinct protocols that are no longer used. For instance, FTP (File Transfer Protocol) used to be the only way to transmit files too large for SMTP (Simple Mail-Transfer Protocol), but clever programmers have devised ways of using server-side algorithms to deliver large files using HTTP (Hypertext Transfer Protocol). As a result, FTP has become virtually extinct on all but legacy systems.
Researchers at the Georgia Institute of Technology wondered if these evolution and extinction phenomena on the Internet were in any way similar to evolution and extinction in nature. After all, protocols could be viewed as species that compete for resources, with the weaker ones eventually becoming extinct. Similarly, the evolution of the Internet's architecture could be described as a competition among protocols, with some thriving and others becoming extinct.
To test their theory, the group headed by computer science professor Constantine Dovrolis crafted a research program that tracks the evolution of architectures, called EvoArch. The overall goal was to help understand how protocols evolve in order to develop better ones that protect the Internet from the wide variety of threats it is facing today and to prevent extinctions that ossify the Internet, making it more vulnerable to attacks. The general conclusion derived from EvoArch was that unless new protocols are crafted to avoid competition, they will inevitably lead to extinctions.


The six layers, from top to bottom, are specific applications (like Firefox), application protocols (like HTTP), transport protocols (like TCP), network protocols (like IP), data-link protocols (like Ethernet) and physical layer protocols (like DSL).  
In particular, the six layers of the Internet have evolved into an hour-glass shape where protocols at the very top and bottom continue to evolve, but where those toward the middle have become stagnant, leaving unnecessary security-risk opportunities open for exploitation.
At the top application layer where browsers, email clients, video and audio streamers exist, there is still plenty of diversity and competition among alternatives. Evolution here is still healthy, weeding out the weaker applications and strengthening those with better security. At the application protocols layer, where HTTP, SMTP and newer protocols like RTP (Real-time Transfer Protocol) exist, extinction has eliminated some of the weaker protocols, but enough variety still exists.
In the middle layers, however, extinction has left only a few survivors, ossifying its structure. At the transport layer (layer three), TCP (Transmission Control Protocol) competes with only a few other alternatives, such as UDP (User Datagram Protocol), and at layer five, the network protocol, IP (Internet Protocol) and ICMP (Internet Control Message Protocol) are used almost exclusively. Diversity resurfaces at layers five and six, where Ethernet and other data-link protocols such as PPP (Point-to-Point Protocol) communicate with a wide variety of physical layer protocols including DSL (digital subscriber line), coaxial cable and fiber optic alternatives.
From running simulations with the EvoArch program these researchers have concluded that the only way to reintroduce diversity into the middle layers without inevitable extinctions is to create protocols that do not overlap with the others. By thus eliminating competition for the same resources, a rich set of middle layer protocols with increased security should be able to survive.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • When touring the Large Hadron Collider, stay with your group
  • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
    By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • Wet Electronics Open Door to New Possibilities
    R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
  • 2012 Salary and Skills report
    http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • Entry-level IT jobs will be plentiful in 2012, experts predict
    Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • (no title)
    Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
  • Melissa Harris-Perry: World wide web access to local communities
    Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ►  October (18)
    • ►  September (11)
    • ▼  August (24)
      • Irene's wrath leaves 6,500 cell towers out, FCC says
      • How Social Media Improves Disaster Response
      • Hundreds of U.S. Data Centers Closing
      • Focus: HOPE career training programs!
      • Evolution Has Ossified the Internet
      • Pieces of Gold in Those Job Postings
      • How to Create a Job for Yourself
      • Motivational Moment
      • Motivational Moment
      • IBM Debuts Brainlike Cognitive Computer
      • Game Theory Improves Detection of Security Breaches
      • Texting, grand theft auto style; alarms pose risk
      • Gator power: Alligator fat pitched as biodiesel
      • Webcam System Reduces Workplace Back Problems
      • Motivational Moment
      • Anonymous breaches San Francisco's public transpor...
      • Motivational Moment
      • Motivational Moment
      • Why Tablets Don't Kill the Laptop
      • Motivational Moment
      • Why Wi-Fi as we know it is in trouble
      • Wet Electronics Open Door to New Possibilities
      • Social Media Fuels New Web-Based Political Party
      • The BDPA Insider - July 31, 2011
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile