rfc1336.txt

来自「RFC 的详细文档!」· 文本 代码 · 共 1,280 行 · 第 1/5 页

TXT
1,280
字号
           daughters in Hopkinton, Massachusetts.

           ------------

           I started out in 1977 working with X.25 networks, and began
           working on OSI in 1979 - first the architecture (the OSI
           Reference Model), and then the transport, internetwork, and
           routing protocol specifications.  It didn't take long to
           recognize the basic irony of OSI standards development:
           there we were, solemnly anointing international standards for
           networking, and every time we needed to send electronic mail
           or exchange files, we were using the TCP/IP-based Internet!
           I've been looking for ways to overcome this anomaly ever
           since;  to inject as much of the proven TCP/IP technology



Malkin                                                         [Page 14]

RFC 1336                       Who's Who                        May 1992


           into OSI as possible, and to introduce OSI into an ever more
           pervasive and worldwide Internet.  It is, to say the least, a
           challenge!

      4.8  Dr. David Clark

           David Clark works at the M.I.T. Laboratory for Computer
           Science, where he is a Senior Research Scientist. His current
           research involves protocols for high speed and very large
           networks, in particular the problems of routing and flow and
           congestion control. He is also working on integration of
           video into packet networks. Prior to this effort, he
           developed a new implementation approach for network software,
           and an operating system (Swift) to demonstrate this concept.
           Earlier projects include the token ring LAN and the Multics
           operating system. He joined the TCP development effort in
           1975, and chaired the IAB from 1981 to 1990. He has a
           continuing interest in protocol performance. He is also
           active in the area of computer and communications security.

           David Clark received his BSEE from Swarthmore College in
           1966, and his MS and PhD from MIT, the latter in 1973. He has
           worked at MIT since then.

           ------------

           It is not proper to think of networks as connecting
           computers. Rather, they connect people using computers to
           mediate. The great success of the internet is not technical,
           but in human impact. Electronic mail may not be a wonderful
           advance in Computer Science, but it is a whole new way for
           people to communicate. The continued growth of the Internet
           is a technical challenge to all of us, but we must never
           loose sight of where we came from, the great change we have
           worked on the larger computer community, and the great
           potential we have for future change.

      4.9  Stephen Crocker, IETF Security Area Director

           Steve Crocker joined Trusted Information Systems, Inc.  in
           1986 and is a vice president.  He set up TIS' Los Angeles
           office and ran it until summer 1989 when he moved to the home
           office in Maryland.  At TIS his primary concerns are program
           verification research and application, integration of
           cryptography with trusted systems, network security, and new
           applications for networks and trusted systems.

           He was at the Aerospace Corporation from 1981-86 as Director



Malkin                                                         [Page 15]

RFC 1336                       Who's Who                        May 1992


           of the Information Sciences Research Office which later
           became the Computer Science Laboratory.  The research program
           at Aerospace included networks, program verification,
           artificial intelligence, applications of expert systems, and
           parallel processing.

           From 1974-81 he was a researcher at USC's Information
           Sciences Institute, where he focused primarily on program
           verification.  From 1971-74 he was a program manager at
           DARPA/IPTO, responsible for the research programs in
           artificial intelligence, automatic programming, speech
           understanding, and some parts of the network research.  He
           also initiated an ambitious but somewhat ill-fated venture
           called the National Software Works.

           From 1968-71 he was a graduate student in the UCLA Computer
           Science Department.  While there he initiated the Network
           Working Group, arguably the forerunner of the IETF and many
           related groups around the world, and helped define the
           original suite of protocols for the Arpanet.  He also
           initiated the Request for Comments (RFC) series.  A short
           description of the events of that era are contained in RFC
           1000.

           He was a graduate student in the MIT AI Lab for a year and a
           half in 1967-68, and an undergraduate at UCLA for a long time
           before that.

           ------------

           I've watched the Internet grow from its beginning.  At UCLA
           we had the privilege of being the first of the Arpanet.  In
           those days, several of us dreamed of very high quality
           intercomputer connections and very rich protocols to knit the
           computers together.  Some of the those concepts are still
           discussed and anticipated today under the names remote
           visualization, distributed file systems, etc.  On the other
           hand, I would never have imagined that 20 years later we'd
           have such a plethora of different network technologies.  Even
           more astonishing is the enormous number of independently
           managed but nonetheless interconnected networks that make up
           the current network.  And somewhat beyond comprehension is
           that it seems to work.

           How will the Internet evolve?  I expect to see substantial
           developments in the following dimensions.

           o Regularization, internationalization and commercialization



Malkin                                                         [Page 16]

RFC 1336                       Who's Who                        May 1992


           Standards will become even more important than they are now.
           Implementations of protocols and related mechanisms will
           become more standard and robust.  The relationship between
           the TCP/IP stack and the OSI stack will be resolved with

           The Internet will become a less U.S.-centric and more
           international operation.  Much of the Internet will be
           operated by commercial concerns on a a profit-making basis,
           thereby opening up the Internet to unrestricted use.  The
           telephone companies, including both the local exchange
           carriers and the interexchange carriers, will start providing
           some of the protocol stack other than the point-to-point
           lines.

           o Higher and lower bandwidths; great proliferation

           I expect to see T1 connections become the norm for the types
           of institutions that are now on the Internet.  Higher speeds,
           including speeds up to a gigabit will become available.  At
           the same time, I expect to see a vast expansion of the
           Internet, reaching into a significant fraction of the schools
           and businesses in this country and elsewhere in the world.
           Many of these institutions will be connected at 9600 bits/sec
           or slower.

           o More applications

           E-mail dominates the Internet, and it's likely to remain the
           dominant use of the Internet in the future.  Nonetheless, I
           expect to see an exciting array of other applications which
           become heavily used and cause a change in the perception of
           the Internet as primarily a "mail system."  Important
           databases will become available on the Internet, and
           applications dependent on those databases will flourish.  New
           techniques and tools for collaboration over a network will
           emerge.  These will include various forms of conferencing and
           cooperative multi-media document development.

           o Security

           Security will tighten up on the Internet, but not without
           some (more) pain.  Host operating systems will be built,
           configured, distributed and operated under much tighter
           constraints than they have been.  Firewalls will abound.
           Encryption will be added to links, routers and various
           protocol layers.  All of this will decrease the utility of
           the Internet in the short run, but lay the groundwork for
           broader use eventually.  New protocols will emerge which



Malkin                                                         [Page 17]

RFC 1336                       Who's Who                        May 1992


           incorporate sound protection but also provide efficient and
           flexible access control and resource sharing.  These will
           provide the basis for the kind of close knit applications
           that motivated the original thinking behind the Arpanet.

      4.10 James R. Davin, IETF Network Management Area Director

           James R. Davin currently works in the Advanced Network
           Architecture group at the M.I.T. Laboratory for Computer
           Science where his recent interests center on protocol
           architecture and congestion control.  In the past, he has
           been engaged in router development at Proteon, Incorporated,
           where much of his work focused on network management. He has
           also worked at Data General's Research Triangle Park facility
           on a variety of communications protocols.

           He holds the B.A. from Haverford College and masters degrees
           in Computer Science and English from Duke University.

           ------------

           The growth of the internet over the years has taken it from
           lower speeds to higher speeds, from limited geographical
           extent to global presence, from research apparatus to an
           essential social and commercial infrastructure, from
           experimentation among a few networking sophisticates to daily
           use by thousands in all walks of life. This latter sort of
           growth is almost certainly the most valuable.

      4.11 Dr. Deborah Estrin, IRSG Member

           Deborah Estrin is currently an Assistant Professor of
           Computer Science at the University of Southern California in
           Los Angeles.  She received her Ph.D. (1985) in Computer
           Science and her M.S. (1982) in Technology Policy, both from
           the Massachusetts Institute of Technology. She received her
           B.S.  (1980) from U.C.  Berkeley. In 1987 Estrin received the
           National Science Foundation, Presidential Young Investigator
           Award for her research in network interconnection and
           security.  Her research focuses on the design of network and
           routing protocols for very large, global, networks.

           Deborah Estrin has been studying issues of internetwork
           security and routing for almost 10 years.  As chairperson of
           the IAB's Autonomous Networks Research Group she coordinated
           and authored some of the earliest discussions and evaluations
           of mechanisms for policy-routing.  She is also one of the
           leading architects of thee Inter-Domain Policy Routing (IDPR)



Malkin                                                         [Page 18]

RFC 1336                       Who's Who                        May 1992


           protocols, in collaboration with other members of the IETF
           IDPR Working Group.  As part of the IDPR effort, Estrin
           directed the implementation of IDPR setup, packet forwarding,
           and route synthesis implementations. She continues to
           collaborate extensively with BBN and other IDPR developers.

           Previous to her work in policy routing, Dr. Estrin refuted
           the sufficiency of host-security alone, and developed
           mechanisms (i.e., the Visa Protocol) for border routers to
           flexibly and securely protect intra-domain network resources

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?