📄 rfc1336.txt
字号:
RFC 1336 Who's Who May 1992 into OSI as possible, and to introduce OSI into an ever more pervasive and worldwide Internet. It is, to say the least, a challenge! 4.8 Dr. David Clark David Clark works at the M.I.T. Laboratory for Computer Science, where he is a Senior Research Scientist. His current research involves protocols for high speed and very large networks, in particular the problems of routing and flow and congestion control. He is also working on integration of video into packet networks. Prior to this effort, he developed a new implementation approach for network software, and an operating system (Swift) to demonstrate this concept. Earlier projects include the token ring LAN and the Multics operating system. He joined the TCP development effort in 1975, and chaired the IAB from 1981 to 1990. He has a continuing interest in protocol performance. He is also active in the area of computer and communications security. David Clark received his BSEE from Swarthmore College in 1966, and his MS and PhD from MIT, the latter in 1973. He has worked at MIT since then. ------------ It is not proper to think of networks as connecting computers. Rather, they connect people using computers to mediate. The great success of the internet is not technical, but in human impact. Electronic mail may not be a wonderful advance in Computer Science, but it is a whole new way for people to communicate. The continued growth of the Internet is a technical challenge to all of us, but we must never loose sight of where we came from, the great change we have worked on the larger computer community, and the great potential we have for future change. 4.9 Stephen Crocker, IETF Security Area Director Steve Crocker joined Trusted Information Systems, Inc. in 1986 and is a vice president. He set up TIS' Los Angeles office and ran it until summer 1989 when he moved to the home office in Maryland. At TIS his primary concerns are program verification research and application, integration of cryptography with trusted systems, network security, and new applications for networks and trusted systems. He was at the Aerospace Corporation from 1981-86 as DirectorMalkin [Page 15]RFC 1336 Who's Who May 1992 of the Information Sciences Research Office which later became the Computer Science Laboratory. The research program at Aerospace included networks, program verification, artificial intelligence, applications of expert systems, and parallel processing. From 1974-81 he was a researcher at USC's Information Sciences Institute, where he focused primarily on program verification. From 1971-74 he was a program manager at DARPA/IPTO, responsible for the research programs in artificial intelligence, automatic programming, speech understanding, and some parts of the network research. He also initiated an ambitious but somewhat ill-fated venture called the National Software Works. From 1968-71 he was a graduate student in the UCLA Computer Science Department. While there he initiated the Network Working Group, arguably the forerunner of the IETF and many related groups around the world, and helped define the original suite of protocols for the Arpanet. He also initiated the Request for Comments (RFC) series. A short description of the events of that era are contained in RFC 1000. He was a graduate student in the MIT AI Lab for a year and a half in 1967-68, and an undergraduate at UCLA for a long time before that. ------------ I've watched the Internet grow from its beginning. At UCLA we had the privilege of being the first of the Arpanet. In those days, several of us dreamed of very high quality intercomputer connections and very rich protocols to knit the computers together. Some of the those concepts are still discussed and anticipated today under the names remote visualization, distributed file systems, etc. On the other hand, I would never have imagined that 20 years later we'd have such a plethora of different network technologies. Even more astonishing is the enormous number of independently managed but nonetheless interconnected networks that make up the current network. And somewhat beyond comprehension is that it seems to work. How will the Internet evolve? I expect to see substantial developments in the following dimensions. o Regularization, internationalization and commercializationMalkin [Page 16]RFC 1336 Who's Who May 1992 Standards will become even more important than they are now. Implementations of protocols and related mechanisms will become more standard and robust. The relationship between the TCP/IP stack and the OSI stack will be resolved with The Internet will become a less U.S.-centric and more international operation. Much of the Internet will be operated by commercial concerns on a a profit-making basis, thereby opening up the Internet to unrestricted use. The telephone companies, including both the local exchange carriers and the interexchange carriers, will start providing some of the protocol stack other than the point-to-point lines. o Higher and lower bandwidths; great proliferation I expect to see T1 connections become the norm for the types of institutions that are now on the Internet. Higher speeds, including speeds up to a gigabit will become available. At the same time, I expect to see a vast expansion of the Internet, reaching into a significant fraction of the schools and businesses in this country and elsewhere in the world. Many of these institutions will be connected at 9600 bits/sec or slower. o More applications E-mail dominates the Internet, and it's likely to remain the dominant use of the Internet in the future. Nonetheless, I expect to see an exciting array of other applications which become heavily used and cause a change in the perception of the Internet as primarily a "mail system." Important databases will become available on the Internet, and applications dependent on those databases will flourish. New techniques and tools for collaboration over a network will emerge. These will include various forms of conferencing and cooperative multi-media document development. o Security Security will tighten up on the Internet, but not without some (more) pain. Host operating systems will be built, configured, distributed and operated under much tighter constraints than they have been. Firewalls will abound. Encryption will be added to links, routers and various protocol layers. All of this will decrease the utility of the Internet in the short run, but lay the groundwork for broader use eventually. New protocols will emerge whichMalkin [Page 17]RFC 1336 Who's Who May 1992 incorporate sound protection but also provide efficient and flexible access control and resource sharing. These will provide the basis for the kind of close knit applications that motivated the original thinking behind the Arpanet. 4.10 James R. Davin, IETF Network Management Area Director James R. Davin currently works in the Advanced Network Architecture group at the M.I.T. Laboratory for Computer Science where his recent interests center on protocol architecture and congestion control. In the past, he has been engaged in router development at Proteon, Incorporated, where much of his work focused on network management. He has also worked at Data General's Research Triangle Park facility on a variety of communications protocols. He holds the B.A. from Haverford College and masters degrees in Computer Science and English from Duke University. ------------ The growth of the internet over the years has taken it from lower speeds to higher speeds, from limited geographical extent to global presence, from research apparatus to an essential social and commercial infrastructure, from experimentation among a few networking sophisticates to daily use by thousands in all walks of life. This latter sort of growth is almost certainly the most valuable. 4.11 Dr. Deborah Estrin, IRSG Member Deborah Estrin is currently an Assistant Professor of Computer Science at the University of Southern California in Los Angeles. She received her Ph.D. (1985) in Computer Science and her M.S. (1982) in Technology Policy, both from the Massachusetts Institute of Technology. She received her B.S. (1980) from U.C. Berkeley. In 1987 Estrin received the National Science Foundation, Presidential Young Investigator Award for her research in network interconnection and security. Her research focuses on the design of network and routing protocols for very large, global, networks. Deborah Estrin has been studying issues of internetwork security and routing for almost 10 years. As chairperson of the IAB's Autonomous Networks Research Group she coordinated and authored some of the earliest discussions and evaluations of mechanisms for policy-routing. She is also one of the leading architects of thee Inter-Domain Policy Routing (IDPR)Malkin [Page 18]RFC 1336 Who's Who May 1992 protocols, in collaboration with other members of the IETF IDPR Working Group. As part of the IDPR effort, Estrin directed the implementation of IDPR setup, packet forwarding, and route synthesis implementations. She continues to collaborate extensively with BBN and other IDPR developers. Previous to her work in policy routing, Dr. Estrin refuted the sufficiency of host-security alone, and developed mechanisms (i.e., the Visa Protocol) for border routers to flexibly and securely protect intra-domain network resources without modifying the IP protocol itself. Estrin's Current research interests are in inter-domain routing for global internets, and adaptive routing to support new high-speed, delay-sensitive services. Estrin is a member of the National Science Foundation's NSFNET technical advisory committee and of the OTA Information Technology and Research Assessment Advisory Panel. Dr. Estrin is co-Editor of the Journal of Internetworking Research and Experience and has acted as a reviewer and program committee member for several IEEE and ACM journals and conferences (e.g., SIGCOMM, INFOCOM, Security and Privacy). She is a member of IEEE, ACM, AAAS, and CPSR. ------------ For the past several years I have had the opportunity to collaborate in the design of network and routing protocols designed to support global internetworks linking a very large number of domains (e.g., tens of thousands of networks and millions of hosts). Such scaling implies not only larger numbers of routers and end-systems, but also increased heterogeneity, both technical and administrative. This
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -