Podcasts about internet engineering task force ietf

  • 25PODCASTS
  • 34EPISODES
  • 29mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 22, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about internet engineering task force ietf

Latest podcast episodes about internet engineering task force ietf

The Bid Picture - Cybersecurity & Intelligence Analysis

Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Alan DeKok, the CEO of InkBridge Networks, and Founder of FreeRADIUS, the world's most widely used Remote Authentication Dial-In User Service (RADIUS) server. FreeRADIUS is used in hundreds of thousands of corporate networks and ISPs worldwide, and authenticates millions of network users every day. Originally trained as a nuclear physicist, Alan helped build the Sudbury Neutrino Observatory. He now does consulting as one of the world's leading experts on Authentication, Authorization, and Accounting (AAA) frameworks, and especially the RADIUS protocol.Alan has been an Internet Engineering Task Force (IETF) contributor since 1999, and has published many Requests for Comments (RFCs) in the space. He also consults as a domain expert in patent litigation.Support the Show.

History in Slow German
#79 The Establishment of the Internet Engineering Task Force (IETF)

History in Slow German

Play Episode Listen Later Feb 20, 2024 4:33


internet tasks establishment ietf internet engineering task force ietf internet engineering task force episode transcripts
Cables2Clouds
Ep 18 - Talking ONUG with Nick Lippis

Cables2Clouds

Play Episode Listen Later Oct 18, 2023 63:59 Transcription Available


***EXCLUSIVE ONUG DISCOUNT***Cables2Clouds listeners can get $500 off their registration to ONUG Fall 2023, in New York City! Just use the code F23C2C50 when registering. The event is taking place on October 24-25, so register today!Register here: https://onug.net/fall-2023/Episode Notes:In the latest episode of the Cables2Clouds Podcast, hosts Tim McConnaughy, Alex Perkins, and Chris Miles navigate through the ever-evolving realm of network and cloud trends for you. Get ready for an info-packed discussion as they bring us the latest in bi-weekly cloud news and a special interview with the esteemed Nick Lippis of ONUG.From the deep dive into the big announcement from Azure about changing default outbound access for VMs to their perspective on the rapid adoption of AI in data centers — the conversation takes you through the highs and lows of the cloud world intricacies. The hosts share their candid thoughts on emerging AI technologies, including generative AI and its market ramifications, evidencing $300 million in revenue for Accenture in this space.The episode also showcases an insightful talk about Amazon's Project Kuiper's first prototype satellite launch and the beginning of the competition with Starlink. In addition, the hosts delve into the key issues facing women in the Internet Engineering Task Force (IETF) and the urgent call for more diversity within this sector.But that's not all. This episode also features a riveting discussion with our guest, Nick Lippis, from ONUG. Tune in to hear the insights and visions shared by one of the leading figures in our industry, sure to spark your thinking.Along the way, the hosts share technical insights, relatable stories, and a few good laughs. If you are a professional navigating the cloud ecosystem or just curious about the cloud and networking landscape, this episode is for you! So, get ready and dive right in with us on this fascinating journey from Cables2Clouds.More Information about ONUG Fall: ONUG Fall, October 24-25 in New York City,  is a forum for senior executives and technologists looking to discover the best tools, solutions and best practices to build cloud based infrastructures for their enterprise. The conference covers essential networking, automation/AI and security solutions that help IT consumers build powerful cloud-based communications infrastructures that drive revenue, operational excellence, and new applications. Interested in joining? Register with the code F23C2C50 to save $500 off your registration. Your ticket includes access to all keynotes, panel sessions, Proofs of Concept, networking events, meals and barista-prepared coffee breaks! Check out the Fortnightly Cloud Networking NewsVisit our website and subscribe: https://www.cables2clouds.com/Follow us on Twitter: https://twitter.com/cables2cloudsFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatjArt of Network Engineering (AONE): https://artofnetworkengineering.com

Hacker Public Radio
HPR3664: Secret hat conversations

Hacker Public Radio

Play Episode Listen Later Aug 18, 2022


The Tin Foil Hat often worn in the belief or hope that it shields the brain from threats such as electromagnetic fields, mind control, and mind reading. Proper hat construction video. Also includes the “why” along with the “how”. Proper hat construction music. Just something to keep you focused. FCC Caller ID Spoofing info: Spoofing is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity. FCC Call Blocking info: Call blocking is a tool used by phone companies to stop illegal and unwanted calls from reaching your phone. A second annual FCC report released in June 2021 found that many voice service providers and third-party analytics companies are improving their call blocking and labeling services and use new data to better detect robocalls. Billions of unwanted calls to American consumers are being blocked each year. The PinePhone Pro Explorer Edition is aimed at Linux developers with an extensive knowledge of embedded systems and/or experience with mobile Linux. Time-based one-time password (TOTP) is a computer algorithm that generates a one-time password (OTP) that uses the current time as a source of uniqueness. As an extension of the HMAC-based one-time password algorithm (HOTP), it has been adopted as Internet Engineering Task Force (IETF) standard RFC 6238. Matrix is an open standard for interoperable, decentralised, real-time communication over IP. Password Managers: Used by Some Guy On The Internet. Bitwarden KeePassXC

The SEP Couch with Tim Pohlmann
#16 Alissa Cooper | Why Standards Matter

The SEP Couch with Tim Pohlmann

Play Episode Listen Later Jul 4, 2022 43:04


“The diversity of the standards development organizations (SDOs) is itself a virtue, as you do not want any SDOs to work the same”Alissa Cooper is the Vice President and Chief Technology Officer for Technology Policy and a Fellow at Cisco Systems. She leads and supports the company's technology policy work on artificial intelligence, broadband, and technical standards. In fact, she was the first female chair of the Internet Engineering Task Force (IETF) in 2017, a position she held until 2021. When first joining the IETF Alissa was impressed by the cooperative nature of standards development where worldwide experts from all over the world meet, discuss, and find alignment on how to set a standard that allows better interoperability for different systems and products in the market. Alissa points out that these experts work for competing companies and that means you do not necessarily trust each other. But that's a good thing she explains as standards development is about finding consensus about different views. Companies heavily invest in standards development to ensure that there is access to markets, and this only works when all stakeholders take part. The rules and governance of standards bodies however are very diverse, depending on the purpose, technology, and industry. There are hundreds of private-led standard organizations. These bodies are subject to different procedures and rules and Alissa points out that this heterogeneity is needed to meet the different needs of each industry and technology. While the private standards consortia have individuals or companies as members international bodies such as ITUT, ISO or CEN have countries as members. These more formal bodies set general rules and guidelines, liaising with the private-led standards organizations.Alissa explains that the standards development process takes place in meetings in different groups and committees within proposals submitted and discussed by its members. Here typically one person, expert, or entity is driving an initial item or proposal that is presented. Standards development in most of these organizations is consensus-driven, which means that all oppositions to proposals and ideas are considered and discussed. This makes sure that the final standards are approved and accepted by all members and thus the industry. Even more, some standards bodies also ensure the wide adoption of standards with testing and feedback loops into the standard development process, making sure that standards can be easily implemented and deployed. Alissa says in her final statement that there is an incredible diversity in the standard development ecosystem that is often overlooked. Blanket statements of certain companies or countries that are supposed to be dominating or winning in standards development, ignore, in her opinion, the complexity of the reality. Alissa states that it may be hard to understand the diversity of all these standards development groups but it's worth understanding this diversity.

DiscoPosse Podcast
Ep 229 Rick Taylor of Ori Industries, Living on the Edge, Standards, and Redefining the Network

DiscoPosse Podcast

Play Episode Listen Later Jun 21, 2022 80:25


Rick Taylor is an internationally known software architect with over 25 years experience in developing next-generation networking products. Rick is an active member of several standards organisations, including the Internet Engineering Task Force (IETF) where he co-chairs two Working Groups. Check out Ori Industries here: https://ori.co/  This episode is brought to you by Shift Group, the amazing folks at Veeam Software  and the 4-Step Guide to Delivering Extraordinary Software Demos that Win Deals  and Diabolical Coffee!

The Trident Room Podcast
24 - Dr. Britta Hale - Exchanging Big Ideas

The Trident Room Podcast

Play Episode Listen Later Mar 23, 2022


24 - Dr. Britta Hale - Exchanging Big Ideas Trident Room Host Michael Gannon sits down with cryptographer and NPS faculty member Dr. Britta Hale. This episode was recorded on July 30, 2021. PROF. BRITTA HALE is a cryptographer and faculty in the Computer Science Department at the Naval Postgraduate School. Prof. Hale has a PhD from the Norwegian University of Science and Technology (NTNU), and a Master's of Science in Mathematics of Cryptography and Communications from Royal Holloway University of London (RHUL). Her focus areas include cryptographic key exchange and authentication protocols, cryptographic self-healing recovery after cyberattacks, post-quantum security, e-voting, unmanned system C2 security, and counter unmanned systems. Dr. Hale is a member of the Internet Engineering Task Force (IETF) and International Association for Cryptologic Research (IACR). Faculty Page: https://nps.edu/faculty-profiles/-/cv/britta.hale The Trident Room Podcast is brought to you by the Naval Postgraduate School Alumni Association and the Naval Postgraduate School Foundation. npsfoundation.org For comments, suggestions, and critiques, please email us at TridentRoomPodcastHost@nps.edu, and find us online at nps.edu/tridentroompodcast. Thank you! The views expressed in this interview are those of the individuals and do not reflect the official policy or position of the U.S. Government, the Department of Defense, the US Navy, or the Naval Postgraduate School.

Podland News
This week's report card: ACast very bad, GoodPods bad, ActivityPub very good and Super Listener Wayne Cheong dies, very sad.

Podland News

Play Episode Listen Later Feb 25, 2022 74:19 Transcription Available


GUEST:John Spurlock talking about implementing ActivityPub/Co-Comments  LINKS: https://podcastsocial.orghttps://minipub.dev/NEWS: Anyone can claim to be a creator of any podcast within the GoodPods app, without any proof or validation, we've discovered. Acast has been been “spamming podcasters”, says competitor Buzzsprout, which has published an unsolicited email from Acast sent to many of Buzzsprout's customers; we're aware they've also been sent to Anchor users too. “Email marketing is one part of our marketing strategy as we look to bring even more great creators to Acast, and we're focused on providing the best possible tools and services to help them reach their potential.” — Ross Adams, CEO, AcastHow should apps best verify ownership?  Fountain asks for the email held in the RSS file to claim podcast? Proposed Solution by James Cridland.  Is there a better, easier way to help podcasters “claim” their podcast on different apps? Currently, that process is a clunky method of hoping someone has access to the email address in the RSS feed, and then sending them an email. We think there might be something rather easier. Here's some proposed documentation of how it might work.WebFinger is a protocol specified by the Internet Engineering Task Force IETF that allows for the discovery of information about people and things identified by a URI. Edison Research released their Super Listeners study, with Ad Results Media. “Super listeners” - US adults who listen to 5+ hours of podcasts a week.Responding to Spotify purchasing Podsights and Chartable, Bryan Barletta writes this week in Sounds Profitable that “Grading your own homework isn't third-party measurement,” Libsyn has launched Libsyn Studio Beta, iHeartMedia has signed with Veritone to use synthetic voices to translate shows into different languages. SPECIAL MENTION: Wayne Cheong, the founder of PodFest Asia, has died. He was 44. His memorial service will be held this weekend. He was a friend and fellow LFC Fan.  YNWA. 

Hemispheric Views
042: You Showed Them!

Hemispheric Views

Play Episode Listen Later Nov 18, 2021 44:31


We bet you don't know as much about how email works as our special guest Rob! Martin was born in what year!? No one is happy about being home sweet home alone. And, Andrew is so mad at YNAB he subscribed for another year! (Martin and Jason love stoking that fire). Welcome, Rob from Fastmail! 00:00:00 Fastmail (https://www.fastmail.com)

Digital Citizen
Why Open Internet Standards Are So Important To Your Future with Bron Gondwana

Digital Citizen

Play Episode Listen Later Aug 23, 2021 33:09


Have you ever wondered how the Internet works, how it's governed, or why some devices and services work together and others don't? In the final episode of this season, Fastmail CEO, Bron Gondwana answers these questions and more, so you can learn how standards make the Internet better for everyone. Get a crash course about open standards, how they work, and why we need to support organizations that use them. Bron and show host Fastmail's CTO, Ricardo Signes, talk about JMAP, an open standard for email that Fastmail's developers produced, which is moving email forward. Additionally, before and after the show hear Rik and Fastmail's COO, Helen, talk about how the internet came to be what it is today and what the future of the Internet may look like. ▶️ Guest Interview - Bron Gondwana Follow @BronGondwana on Twitter Visit ietf.org for more information about IETF Learn about JMAP at jmap.io or by reading this article Start your 30 day trial of Fastmail at fastmail.com/podcast

Breakthrough Builders
Introducing Our Next Three Guests

Breakthrough Builders

Play Episode Listen Later Feb 3, 2021 4:40


Bill Carr joined Amazon in 1999 and spent more than 15 years with the company.  As Vice President of Digital Media, Bill launched and managed the company's global digital music and video businesses, including Amazon Music, Prime Video, and Amazon Studios. After Amazon, Bill was an Executive In Residence with Maveron, LLC, an early-stage, consumer-only venture capital firm. Bill later served as the Chief Operating Officer of OfferUp, the largest mobile marketplace for local buyers and sellers in the U.S. Today Bill is co-founder of Working Backwards LLC where he coaches executives at both large and early-stage companies on how to implement the management practices developed at Amazon.Kim Scott is the author of Just Work: Get Sh*t Done Fast and Fair and Radical Candor: Be a Kick-Ass Boss Without Losing Your Humanity and co-founder of the company Radical Candor. Kim was a CEO coach at Dropbox, Qualtrics, Twitter, and other tech companies. She was a member of the faculty at Apple University and before that led AdSense, YouTube, and DoubleClick teams at Google. Kim managed a pediatric clinic in Kosovo and started a diamond-cutting factory in Moscow. She lives with her family in Silicon Valley.Gurdeep Pall leads the Business AI Group at Microsoft, a team comprising Research Scientists, Engineers and Business Leaders bringing digital transformation to business tasks through the power of AI, including a recent effort to train Autonomous Systems with Reinforcement Learning efficiently. He is also responsible for Microsoft Garage and Hackathon, a hyperscale grass-roots innovation program. Prior to this, Gurdeep was responsible for Skype, Skype for Business and Microsoft Teams efforts, including starting Lync (now Skype for Business) and developing it into a multi-billion-dollar business. Gurdeep's favorite technology moment was demonstrating the world's first live real-time spoken language translation within a Skype call at the Code Conference in 2014. Gurdeep joined Microsoft in January 1990 as a software design engineer after graduate school at University of Oregon. He has worked on many breakthrough products in his tenure. Pall was part of the Windows NT development team, working on the first version of Windows NT 3.1 in 1993 as a software design engineer, all the way through Windows XP in 2001 as general manager of Windows Networking. During his work on Windows, he led design and implementation of core networking technologies such as PPP, TCP/IP, VPNs, Internet Routing, and Wi-Fi, and parts of the operating system. Pall co-authored the first VPN protocol in the industry - Point-to-Point Tunneling Protocol (PPTP) - which received the prestigious Innovation of the Year award from PC Magazine in 1996. He also authored several documents and standards in the networking area in the Internet Engineering Task Force (IETF) standards body in the mid-1990s. Since then, amongst other things, Gurdeep has led Conversation-as-a-Platform, Microsoft Speech, Tellme, and Bing Maps initiatives. Gurdeep Pall has been a keynote speaker at many industry conferences over the years. He was named one of the "15 Innovators & Influencers Who Will Make A Difference" in 2008 by Information Week. He co-authored "Institutional Memory Goes Digital," which was published by Harvard Business Review as part of "Breakthrough Ideas for 2009" and subsequently presented at the World Economic Forum 2009 in Davos. Pall holds 25+ patents in networking, VoIP and collaboration areas. He has served on the board of trustees of Ashesi University, Ghana.

SecurityTrails Blog
Why Not to Set Domains to Private IPs

SecurityTrails Blog

Play Episode Listen Later Jan 21, 2021 10:01


An ounce of prevention is worth a pound of cure. **Benjamin Franklin** The concept of risk is ubiquitous across the cybersecurity landscape. In this day and age, it is difficult to envision any security-conscious organization not having alluded, hopefully more than once, to the serious consequences attached to avoiding the subject, particularly when it comes to protecting its most sensitive digital assets and personal data. These repercussions, in both monetary and non-monetary terms, can be far-reaching in the amount of damage they can cause by the resultant corporate disarray and overall loss of reputation. Thus, entire governance structures are distinctly preconditioned with the relevant identification of the digital infrastructure as well as the adequate assessment of their threat ecosystem, prior to consigning any additional items onto the risk registers. While modern businesses can't anticipate every possible threat there is, a few solutions have evolved over the years to become proficient at preventing, or altogether disallowing, the most common types of attack patterns and intrusion attempts known throughout the cyber milieu. The leading principle here is known as the information classification process, commonly assigned, in typical organizational fashion, to data owners and similar stakeholders in what is considered the initial step in the domain of business continuity planning and disaster recovery. One of these approaches entails the concept of attack surface management (ASM), an overarching methodology capable of providing real-time discovery, classification, and continuous examination of an entity's digital assets whose misconfiguration or unintended exposure may lead to a serious breach scenario. The ability of techniques such as ASM to effectively shut the door in the face of threat actors seeking to leverage even the most sophisticated attack vectors is a significant testimony to its foregoing validity and importance. This blogpost will highlight the risks associated with the use of private IP (Internet Protocol) addresses in public Domain Name System (DNS) records as they extend the possibility of a cyber attack on internal address spaces and attributed domains. It will briefly re-examine the historical prohibition set forth by RFC 1918 that sought to limit the use of these address blocks to within enterprise boundaries, as well as the unnecessary technical challenges that arise from their misuse. Let's take a look. Private IP addresses in a nutshell IP addresses long journey to present-day operations began in the 1970's when the Defense Advanced Research Projects Agency (DARPA) designed the first protocol specifications. The concept was shaped around the need to interconnect computer communication networks, called packet-switched networks, where sources and destinations were represented by hosts identified by fixed-length numerical addresses known as Internet Protocol addresses, or IPs for short. The protocol contained additional features such as the ability to fragment long datagrams to allow efficient data transmission through less capable network channels and, most importantly, an abstraction of the time-to-live (TTL) consistency mechanism to prevent data packets from circulating indefinitely. According to the standards established by the Internet Engineering Task Force (IETF), IPv4 (IP version 4) was to define a set of private address spaces (see image below) to allow an ever-depleting subset of 2 to the power of 32 possible IPs to be effectively routed as to not create ambiguity between publicly-connected enterprises. It was also IETF's decisive action that established that applications that did not require external connectivity should be confined to any one of these non-routable reserved classes without further intervention from Internet authorities. As previously mentioned, in a race to put a stopgap to the problem of IP address exhaustion, RFC 1918 became the de facto referenc...

internet private ip ips domains asm rfc ttl ietf internet protocol domain name system dns internet engineering task force ietf
Cyber Security Effectiveness Podcast
Layers of Architecture

Cyber Security Effectiveness Podcast

Play Episode Listen Later Mar 16, 2020 19:51


The Internet Engineering Task Force (IETF) is a large community of network designers, operators, vendors, and researchers passionate about the ever-evolving internet architecture. Security strategist, CISO, and board advisor Kathleen Moriarty chats with Brian about the fascinating research she's done, her upcoming book, and recommendations for scaling threat intel.

security architecture layers ciso internet engineering task force ietf
Cybersecurity Effectiveness Podcast
Layers of Architecture

Cybersecurity Effectiveness Podcast

Play Episode Listen Later Mar 15, 2020 19:52


The Internet Engineering Task Force (IETF) is a large community of network designers, operators, vendors, and researchers passionate about the ever-evolving internet architecture. Security strategist, CISO, and board advisor Kathleen Moriarty chats with Brian about the fascinating research she’s done, her upcoming book, and recommendations for scaling threat intel.

security architecture layers ciso internet engineering task force ietf
The Dan York Report
TDYR 379 - IETF 106 Begins In Singapore - 1,000 Engineers Gathered To Make The Internet Work Better

The Dan York Report

Play Episode Listen Later Nov 16, 2019 12:02


The 106th meeting of the Internet Engineering Task Force (IETF) begins this weekend (16 Nov 2019) in Singapore. In this episode, I talk about what will be happening there and how you can participate remotely. Learn more in this post: https://www.internetsociety.org/blog/2019/11/ietf-106-begins-nov-16-in-singapore-here-is-how-you-can-participate-remotely-in-building-open-internet-standards/

internet singapore engineers gathered work better ietf internet engineering task force ietf
Stephan Livera Podcast
SLP124 Jon Atack - Bitcoin Core Contribution

Stephan Livera Podcast

Play Episode Listen Later Nov 12, 2019 61:46


Jon Atack joins me to talk about his experience with open source software development, and to talk about the process of Bitcoin Core development and code review. We talk: Becoming a Bitcoin Core contributor How to best contribute Communication channels for development Priorities in Bitcoin development Funding for development Jon Atack Links: Twitter: @jonatack (https://twitter.com/jonatack) Github: @jonatack (https://github.com/jonatack) Bitcoin Core PR Review Club: https://bitcoincore.reviews and https://twitter.com/BitcoinCorePRs How to Review Bitcoin Core PRs: https://github.com/jonatack/bitcoin-development/blob/master/how-to-review-bitcoin-core-prs.md How to Make Bitcoin Core PRs: https://github.com/jonatack/bitcoin-development/blob/master/how-to-make-bitcoin-core-prs.md Bitcoin Core Peer Review process: https://github.com/bitcoin/bitcoin/blob/master/CONTRIBUTING.md#peer-review “On Consensus” by the Internet Engineering Task Force (IETF): https://tools.ietf.org/html/rfc7282 Sponsor links: Kraken Unchained Capital GiveBitcoin Bitcoin Outlet use code: LIVERA for 21% off Stephan Livera links: Show notes and website Follow me on twitter @stephanlivera Subscribe to the podcast

The History of Computing
The Internet Tidal Wave

The History of Computing

Play Episode Listen Later Aug 15, 2019 40:26


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us for the innovations of the future! Todays episode is going to be just a little bit unique. Or not unique as the case may be. Bill Gates sent a very important memo on May 26th, 1995. It's so important because of how well it foreshadows what was about to happen with this weird thing called the Internet. So we're going to simply provide the unaltered transcript and if you dig it, read a book or two of his. He is a surprisingly good writer. To: Executive Staff and direct reports From: Bill Gates Date: May 26, 1995 The Internet Tidal Wave Our vision for the last 20 years can be summarized in a succinct way. We saw that exponential improvements in computer capabilities would make great software quite valuable. Our response was to build an organization to deliver the best software products. In the next 20 years the improvement in computer power will be outpaced by the exponential improvements in communications networks. The combination of these elements will have a fundamental impact on work, learning and play. Great software products will be crucial to delivering the benefits of these advances. Both the variety and volume of the software will increase. Most users of communications have not yet seen the price of communications come down significantly. Cable and phone networks are still depreciating networks built with old technology. Universal service monopolies and other government involvement around the world have kept communications costs high. Private networks and the Internet which are built using state of the art equipment have been the primary beneficiaries of the improved communications technology. The PC is just now starting to create additional demand that will drive a new wave of investment. A combination of expanded access to the Internet, ISDN, new broadband networks justified by video based applications and interconnections between each of these will bring low cost communication to most businesses and homes within the next decade. The Internet is at the forefront of all of this and developments on the Internet over the next several years will set the course of our industry for a long time to come. Perhaps you have already seen memos from me or others here about the importance of the Internet. I have gone through several stages of increasing my views of its importance. Now I assign the Internet the highest level of importance. In this memo I want to make clear that our focus on the Internet is crucial to every part of our business. The Internet is the most important single development to come along since the IBM PC was introduced in 1981. It is even more important than the arrival of the graphical user interface (GUI). The PC analogy is apt for many reasons. The PC wasn't perfect. Aspects of the PC were arbitrary or even poor. However a phenomena grew up around the IBM PC that made it a key element of everything that would happen for the next 15 years. Companies that tried to fight the PC standard often had good reasons for doing so but they failed because the phenomena overcame any weaknesses that resisters identified. The Internet Today The Internet's unique position arises from a number of elements. TCP/IP protocols that define its transport level support distributed computing and scale incredibly well. The Internet Engineering Task Force (IETF) has defined an evolutionary path that will avoid running into future problems even as eventually everyone on the planet connects up. The HTTP protocols that define HTML Web browsing are extremely simple and have allowed servers to handle incredible traffic reasonably well. All of the predictions about hypertext - made decades ago by pioneers like Ted Nelson - are coming true on the Web. Although other protocols on the Internet will continue to be used (FTP, Gopher, IRC, Telnet, SMTP, NNTP). HTML with extensions will be the standard that defines how information will be presented. Various extensions to HTML, including content enhancements like tables, and functionality enhancements like secure transactions, will be widely adopted in the near future. There will also be enhanced 3D presentations providing for virtual reality type shopping and socialization. Another unique aspect of the Internet is that because it buys communications lines on a commodity bid basis and because it is growing so fast, it is the only "public" network whose economics reflect the latest advances in communications technology. The price paid for corporations to connect to the Internet is determined by the size of your "on-ramp" to the Internet and not by how much you actually use your connection. Usage isn't even metered. It doesn't matter if you connect nearby or half way around the globe. This makes the marginal cost of extra usage essentially zero encouraging heavy usage. Most important is that the Internet has bootstrapped itself as a place to publish content. It has enough users that it is benefiting from the positive feedback loop of the more users it gets, the more content it gets, and the more content it gets, the more users it gets. I encourage everyone on the executive staff and their direct reports to use the Internet. I've attached an appendix, which Brian Flemming helped me pull together that shows some hot sites to try out. You can do this by either using the .HTM enclosure with any Internet browser or, if you have Word set up properly, you can navigate right from within this document. Of particular interest are the sites such as "YAHOO" which provide subject catalogs and searching. Also of interest are the ways our competitors are using their Websites to present their products. I think SUN, Netscape and Lotus do some things very well. Amazingly it is easier to find information on the Web than it is to find information on the Microsoft Corporate Network. This inversion where a public network solves a problem better than a private network is quite stunning. This inversion points out an opportunity for us in the corporate market. An important goal for the Office and Systems products is to focus on how our customers can create and publish information on their LANs. All work we do here can be leveraged into the HTTP/Web world. The strength of the Office and Windows businesses today gives us a chance to superset the Web. One critical issue is runtime/browser size and performance. Only when our Office - Windows solution has comparable performance to the Web will our extensions be worthwhile. I view this as the most important element of Office 96 and the next major release of Windows. One technical challenge facing the Internet is how to handle "real-time" content - specifically audio and video. The underlying technology of the Internet is a packet network which does not guarantee that data will move from one point to another at a guaranteed rate. The congestion on the network determines how quickly packets are sent. Audio can be delivered on the Internet today using several approaches. The classic approach is to simply transmit the audio file in its entirety before it is played. A second approach is to send enough of it to be fairly sure that you can keeping playing without having to pause. This is the approach Progressive Networks Real Audio (Rob Glaser's new company) uses. Three companies (Internet Voice Chat, Vocaltec, and Netphone) allow phone conversations across the Internet but the quality is worse than a normal phone call. For video, a protocol called CU-SeeMe from Cornell allows for video conferencing. It simply delivers as many frames per second as it sees the current network congestion can handle, so even at low resolution it is quite jerky. All of these "hacks" to provide video and audio will improve because the Internet will get faster and also because the software will improve. At some point in the next three years, protocol enhancements taking advantage of the ATM backbone being used for most of the Internet will provide "quality of service guarantees". This is a guarantee by every switch between you and your destination that enough bandwidth had been reserved to make sure you get your data as fast as you need it. Extensions to IP have already been proposed. This might be an opportunity for us to take the lead working with UUNET and others. Only with this improvement and an incredible amount of additional bandwidth and local connections will the Internet infrastructure deliver all of the promises of the full blown Information Highway. However, it is in the process of happening and all we can do is get involved and take advantage. I think that virtually every PC will be used to connect to the Internet and that the Internet will help keep PC purchasing very healthy for many years to come. PCs will connect to the Internet a variety of ways. A normal phone call using a 14.4k or 28.8k baud modem will be the most popular in the near future. An ISDN connection at 128kb will be very attractive as the connection costs from the RBOCs and the modem costs come down. I expect an explosion in ISDN usage for both Internet connection and point-to-point connections. Point-to-point allows for low latency which is very helpful for interactive games. ISDN point-to-point allows for simultaneous voice data which is a very attractive feature for sharing information. Example scenarios include planning a trip, discussing a contract, discussing a financial transaction like a bill or a purchase or taxes or getting support questions about your PC answered. Eventually you will be able to find the name of someone or a service you want to connect to on the Internet and rerouting your call to temporarily be a point-to-point connection will happen automatically. For example when you are browsing travel possibilities if you want to talk to someone with expertise on the area you are considering, you simply click on a button and the request will be sent to a server that keeps a list of available agents who can be working anywhere they like as long as they have a PC with ISDN. You will be reconnected and the agent will get all of the context of what you are looking at and your previous history of travel if the agency has a database. The reconnection approach will not be necessary once the network has quality of service guarantees. Another way to connect a PC will be to use a cable-modem that uses the coaxial cable normally used for analog TV transmission. Early cable systems will essentially turn the coax into an Ethernet so that everyone in the same neighborhood will share a LAN. The most difficult problem for cable systems is sending data from the PC back up the cable system (the "back channel"). Some cable companies will promote an approach where the cable is used to send data to the PC (the "forward channel") and a phone connection is used for the back channel. The data rate of the forward channel on a cable system should be better than ISDN. Eventually the cable operators will have to do a full upgrade to an ATM-based system using either all fiber or a combination of fiber and Coax - however, when the cable or phone companies will make this huge investment is completely unclear at this point. If these buildouts happen soon, then there will be a loose relationship between the Internet and these broadband systems. If they don't happen for some time, then these broadband systems could be an extension of the Internet with very few new standards to be set. I think the second scenario is very likely. Three of the biggest developments in the last five years have been the growth in CD titles, the growth in On-line usage, and the growth in the Internet. Each of these had to establish critical mass on their own. Now we see that these three are strongly related to each other and as they come together they will accelerate in popularity. The On-line services business and the Internet have merged. What I mean by this is that every On-line service has to simply be a place on the Internet with extra value added. MSN is not competing with the Internet although we will have to explain to content publishers and users why they should use MSN instead of just setting up their own Web server. We don't have a clear enough answer to this question today. For users who connect to the Internet some way other than paying us for the connection we will have to make MSN very, very inexpensive - perhaps free. The amount of free information available today on the Internet is quite amazing. Although there is room to use brand names and quality to differentiate from free content, this will not be easy and it puts a lot of pressure to figure out how to get advertiser funding. Even the CD-ROM business will be dramatically affected by the Internet. Encyclopedia Brittanica is offering their content on a subscription basis. Cinemania type information for all the latest movies is available for free on the Web including theater information and Quicktime movie trailers. Competition Our traditional competitors are just getting involved with the Internet. Novell is surprisingly absent given the importance of networking to their position however Frankenberg recognizes its importance and is driving them in that direction. Novell has recognized that a key missing element of the Internet is a good directory service. They are working with AT&T and other phone companies to use the Netware Directory Service to fill this role. This represents a major threat to us. Lotus is already shipping the Internotes Web Publisher which replicates Notes databases into HTML. Notes V4 includes secure Internet browsing in its server and client. IBM includes Internet connection through its network in OS/2 and promotes that as a key feature. Some competitors have a much deeper involvement in the Internet than Microsoft. All UNIX vendors are benefiting from the Internet since the default server is still a UNIX box and not Windows NT, particularly for high end demands, SUN has exploited this quite effectively. Many Web sites, including Paul Allen's ESPNET, put a SUN logo and link at the bottom of their home page in return for low cost hardware. Several universities have "Sunsites" named because they use donated SUN hardware. SUN's Java project involves turning an Internet client into a programmable framework. SUN is very involved in evolving the Internet to stay away from Microsoft. On the SUN Homepage you can find an interview of Scott McNealy by John Gage where Scott explains that if customers decide to give one product a high market share (Windows) that is not capitalism. SUN is promoting Sun Screen and HotJava with aggressive business ads promising that they will help companies make money. SGI has also been advertising their leadership on the Internet including servers and authoring tools. Their ads are very business focused. They are backing the 3D image standard, VRML, which will allow the Internet to support virtual reality type shopping, gaming, and socializing. Browsing the Web, you find almost no Microsoft file formats. After 10 hours of browsing, I had not seen a single Word .DOC, AVI file, Windows .EXE (other than content viewers), or other Microsoft file format. I did see a great number of Quicktime files. All of the movie studios use them to offer film trailers. Apple benefited by having TCP support before we did and is working hard to build a browser built from OpenDoc components. Apple will push for OpenDoc protocols to be used on the Internet, and is already offering good server configurations. Apple's strength in education gives them a much stronger presence on the Internet than their general market share would suggest. Another popular file format on the Internet is PDF, the short name for Adobe Acrobat files. Even the IRS offers tax forms in PDF format. The limitations of HTML make it impossible to create forms or other documents with rich layout and PDF has become the standard alternative. For now, Acrobat files are really only useful if you print them out, but Adobe is investing heavily in this technology and we may see this change soon. Acrobat and Quicktime are popular on the network because they are cross platform and the readers are free. Once a format gets established it is extremely difficult for another format to come along and even become equally popular. A new competitor "born" on the Internet is Netscape. Their browser is dominant, with 70% usage share, allowing them to determine which network extensions will catch on. They are pursuing a multi-platform strategy where they move the key API into the client to commoditize the underlying operating system. They have attracted a number of public network operators to use their platform to offer information and directory services. We have to match and beat their offerings including working with MCI, newspapers, and other who are considering their products. One scary possibility being discussed by Internet fans is whether they should get together and create something far less expensive than a PC which is powerful enough for Web browsing. This new platform would optimize for the datatypes on the Web. Gordon Bell and others approached Intel on this and decided Intel didn't care about a low cost device so they started suggesting that General Magic or another operating system with a non-Intel chip is the best solution. Next Steps In highlighting the importance of the Internet to our future I don't want to suggest that I am alone in seeing this. There is excellent work going on in many product groups. Over the last year, a number of people have championed embracing TCP/IP, hyperlinking, HTML, and building client, tools and servers that compete on the Internet. However, we still have a lot to do. I want every product plan to try and go overboard on Internet features. One element that will be crucial is coordinating our various activities. The challenge/opportunity of the Internet is a key reason behind the recent organization. Paul Maritz will lead the Platform group to define an integrated strategy that makes it clear that Windows machines are the best choice for the Internet. This will protect and grow our Windows asset. Nathan and Pete will lead the Applications and Content group to figure out how to make money providing applications and content for the Internet. This will protect our Office asset and grow our Office, Consumer, and MSN businesses. The work that was done in the Advanced Technology group will be extremely important as it is integrated in with our products. We must also invest in the Microsoft home page, so it will be clear how to find out about our various products. Today it's quite random what is on the home page and the quality of information is very low. If you look up speeches by me all you find are a few speeches over a year old. I believe the Internet will become our most important promotional vehicle and paying people to include links to our home pages will be a worthwhile way to spend advertising dollars. First we need to make sure that great information is available. One example is the demonstration files (Screencam format) that Lotus includes on all of their products organized by feature. I think a measurable part of our ad budget should focus on the Internet. Any information we create - white papers, data sheets, etc., should all be done on our Internet server. ITG needs to take a hard look at whether we should drop our leasing arrangements for data lines to some countries and simply rely on the Internet. The actions required for the Windows platform are quite broad. Pual Maritz is having an Internet retreat in June which will focus on coordinating these activities. Some critical steps are the following: 1. Server. BSD is working on offering the best Internet server as an integrated package. We need to understand how to make NT boxes the highest performance HTTP servers. Perhaps we should have a project with Compaq or someone else to focus on this. Our initial server will have good performance because it uses kernel level code to blast out a file. We need a clear story on whether a high volume Web site can use NT or not becaues SUN is viewed as the primary choice. Our plans for security need to be strengthened. Other Backoffice pieces like SMS and SQL server also need to stay out in front in working with the Internet. We need to figure out how OFS can help perhaps by allowing pages to be stored as objects and having properties added. Perhaps OFS can help with the challenge of maintaining Web structures. We need to establish distributed OLE as the protocol for Internet programming. Our server offerings need to beat what Netscape is doing including billing and security support. There will be substantial demand for high performance transaction servers. We need to make the media server work across the Internet as soon as we can as new protocols are established. A major opportunity/challenge is directory. If the features required for Internet directory are not in Cairo or easily addable without a major release we will miss the window to become the world standard in directory with serious consequences. Lotus, Novell, and AT&T will be working together to try and establish the Internet directory. Actually getting the content for our directory and popularizing it could be done in the MSN group. 2. Client. First we need to offer a decent client (O'Hare) that exploits Windows 95 shortcuts. However this alone won't get people to switch away from Netscape. We need to figure out how to integrate Blackbird, and help browsing into our Internet client. We have made the decision to provide Blackbird capabilities openly rather than tie them to MSN. However, the process of getting the size, speed, and integration good enough for the market needs works and coordination. We need to figure out additional features that will allows us to get ahead with Windows customers. We need to move all of our Internet value added from the Plus pack into Windows 95 itself as soon as we possible can with a major goal to get OEMs shipping our browser preinstalled. This follows directly from the plan to integrate the MSN and Internet clients. Another place for integration is to eliminate today's Help and replace it with the format our browser accepts including exploiting our unique extensions so there is another reason to use our browser. We need to determine how many browsers we promote. Today we have O'Hare, Blackbird, SPAM MediaView, Word, PowerPoint, Symettry, Help and many others. Without unification we will lose to Netscape/HotJava. Over time the shell and the browser will converge and support hierarchical/list/query viewing as well as document with links viewing. The former is the structured approach and the later allows for richer presentation. We need to establish OLE protocols as the way rich documents are shared on the Internet. I am sure the OpenDoc consortium will try and block this. 3. File sharing/Window sharing/Multi-user. We need to give away client code that encourages Windows specific protocols to be used across the Internet. It should be very easy to set up a server for file sharing across the Internet. Our PictureTel screen sharing client allowing Window sharing should work easily across the Internet. We should also consider whether to do something with the Citrix code that allows you to become a Windows NT user across the Network. It is different from the PictureTel approach because it isn't peer to peer. Instead it allows you to be a remote user on a shared NT system. By giving away the client code to support all of these scenarios, we can start to show that a Windows machine on the Internet is more valuable than an artitrary machine on the net. We have immense leverage because our Client and Server API story is very strong. Using VB or VC to write Internet applications which have their UI remoted is a very powerful advantage for NT servers. 4. Forms/Languages. We need to make it very easy to design a form that presents itself as an HTML page. Today the Common Gateway Interface (CGI) is used on Web servers to give forms 'behavior' but its quite difficult to work with. BSD is defining a somewhat better approach they call BGI. However we need to integrate all of this with our Forms3 strategy and our languages. If we make it easy to associate controls with fields then we get leverage out of all of the work we are doing on data binding controls. Efforts like Frontier software's work and SUN's Java are a major challenge to us. We need to figure out when it makes sense to download control code to the client including a security approach to avoid this being a virus hole. 5. Search engines. This is related to the client/server strategies. Verity has done good work with Notes, Netscape, AT&T and many others to get them to adopt their scalable technology that can deal with large text databases with very large numbers of queries against them. We need to come up with a strategy to bring together Office, Mediaview, Help, Cairo, and MSN. Access and Fox do not support text indexing as part of their queries today which is a major hole. Only when we have an integrated strategy will we be able to determine if our in-house efforts are adequate or to what degree we need to work with outside companies like Verity. 6. Formats. We need to make sure we output information from all of our products in both vanilla HTML form and in the extended forms that we promote. For example, any database reports should be navigable as hypertext documents. We need to decide how we are going to compete with Acrobat and Quicktime since right now we aren't challenging them. It may be worth investing in optimizing our file formats for these scenarios. What is our competitor to Acrobat? It was supposed to be a coordination of extended metafiles and Word but these plans are inadequate. The format issue spans the Platform and Applications groups. 7. Tools. Our disparate tools efforts need to be brought together. Everything needs to focus on a single integrated development environment that is extensible in a object oriented fashion. Tools should be architected as extensions to this framework. This means one common approach to repository/projects/source control. It means one approach to forms design. The environment has to support sophisticated viewing options like timelines and the advanced features SoftImage requires. Our work has been separated by independent focus on on-line versus CD-ROM and structured display versus animated displays. There are difficult technical issues to resolve. If we start by looking at the runtime piece (browser) I think this will guide us towards the right solution with the tools. The actions required for the Applications and Content group are also quite broad. Some critical steps are the following: 1. Office. Allowing for collaboration across the Internet and allowing people to publish in our file formats for both Mac and Windows with free readers is very important. This won't happen without specific evangelization. DAD has written some good documents about Internet features. Word could lose out to focused Internet tools if it doesn't become faster and more WYSIWYG for HTML. There is a critical strategy issue of whether Word as a container is strict superset of our DataDoc containers allowing our Forms strategy to embrace Word fully. 2. MSN. The merger of the On-line business and Internet business creates a major challenge for MSN. It can't just be the place to find Microsoft information on the Internet. It has to have scale and reputation that it is the best way to take advantage of the Internet because of the value added. A lot of the content we have been attracting to MSN will be available in equal or better form on the Internet so we need to consider focusing on areas where we can provide something that will go beyond what the Internet will offer over the next few years. Our plan to promote Blackbird broadly takes away one element that would have been unique to MSN. We need to strengthen the relationship between MSN and Exchange/Cairo for mail, security and directory. We need to determine a set of services that MSN leads in - money transfer, directory, and search engines. Our high-end server offerings may require a specific relationship with MSN. 3. Consumer. Consumer has done a lot of thinking about the use of on-line for its various titles. On-line is great for annuity revenue and eliminating the problems of limited shelf-space. However, it also lowers the barriers to entry and allows for an immense amount of free information. Unfortunately today an MSN user has to download a huge browser for every CD title making it more of a demo capability than something a lot of people will adopt. The Internet will assure a large audience for a broad range of titles. However the challenge of becoming a leader in any subject area in terms of quality, depth, and price will be far more brutal than today's CD market. For each category we are in we will have to decide if we can be #1 or #2 in that category or get out. A number of competitors will have natural advantages because of their non-electronic activities. 4. Broadband media applications. With the significant time before widescale iTV deployment we need to look hard at which applications can be delivered in an ISDN/Internet environment or in a Satellite PC environment. We need a strategy for big areas like directory, news, and shopping. We need to decide how to persue local information. The Cityscape project has a lot of promise but only with the right partners. 5. Electronic commerce. Key elements of electronic commerce including security and billing need to be integrated into our platform strategy. On-line allows us to take a new approach that should allow us to compete with Intuit and others. We need to think creatively about how to use the Internet/on-line world to enhance Money. Perhaps our Automatic teller machine project should be revived. Perhaps it makes sense to do a tax business that only operates on on-line. Perhaps we can establish the lowest cost way for people to do electronic bill paying. Perhaps we can team up with Quickbook competitors to provide integrated on-line offerings. Intuit has made a lot of progress in overseas markets during the last six months. All the financial institutions will find it very easy to buy the best Internet technology tools from us and others and get into this world without much technical expertise. The Future We enter this new era with some considerable strengths. Among them are our people and the broad acceptance of Windows and Office. I believe the work that has been done in Consumer, Cairo, Advanced Technology, MSN, and Research position us very well to lead. Our opportunity to take advantage of these investments is coming faster than I would have predicted. The electronic world requires all of the directory, security, linguistic and other technologies we have worked on. It requires us to do even more in these ares than we planning to. There will be a lot of uncertainty as we first embrace the Internet and then extend it. Since the Internet is changing so rapidly we will have to revise our strategies from time to time and have better inter-group communication than ever before. Our products will not be the only things changing. The way we distribute information and software as well as the way we communicate with and support customers will be changing. We have an opportunity to do a lot more with our resources. Information will be disseminated efficiently between us and our customers with less chance that the press miscommunicates our plans. Customers will come to our "home page" in unbelievable numbers and find out everything we want them to know. The next few years are going to be very exciting as we tackle these challenges are opportunities. The Internet is a tidal wave. It changes the rules. It is an incredible opportunity as well as incredible challenge I am looking forward to your input on how we can improve our strategy to continue our track record of incredible success. HyperLink Appendix Related reading, double click to open them On-line! (Microsoft LAN only, Internet Assistant is not required for this part): * "Gordon Bell on the Internet" email by Gordon Bell * "Affordable Computing: advertising subsidized hardware" by Nicholas Negroponie * "Brief Lecture Notes on VRML & Hot Java" email by William Barr * "Notes from a Lecture by Mark Andresson (Netscape)" email by William Barr * "Application Strategies for the World Wide Web" by Peter Pathe (Contains many more links!) Below is a hotlist of Internet Web sites you might find interesting. I've included it as an embedded .HTM file which should be readable by most Web Browsers. Double click it if you're using a Web Browser like O'Hare or Netscape. HotList.htm A second copy of these links is below as Word HTML links. To use these links, you must be running the World Internet Assistant, and be connected to the Web. Cool, Cool, Cool.. The Lycos Home Page Yahoo RealAudio Homepage HotWired - New Thinking for a New Medium Competitors Microsoft Corporation World-Wide-Web Server Welcome To Oracle Lotus on the Web Novell Inc. World Wide Web Home Page Symantec Corporation Home Page Borland Online Disney/Buena Vista Paramount Pictures Adobe Systems Incorporated Home Page MCI Sony Online Sports ESPNET SportsZone The Gate Cybersports Page The Sports Server Las Vegas Sports Page News CRAYON Mercury Center Home Page Travel/Entertainment ADDICTED TO NOISE CDnow The Internet Music Store Travel & Entertainment Network home page Virtual Tourist World Map C(?) Net Auto Dealernet Popular Mechanics

The Dan York Report
TDYR 361 - Reflections on IETF 104 in Prague

The Dan York Report

Play Episode Listen Later Mar 30, 2019 8:36


I was in Prague for the 104th meeting of the Internet Engineering Task Force (IETF) and in this episode I talk about some of what went on there...

reflections prague ietf internet engineering task force ietf
Packet Pushers - Full Podcast Feed
IPv6 Buzz 018: Inside The IETF With Fred Baker

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jan 24, 2019 27:25


On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF.

networking addressing buzz dns ipv6 ietf fred baker ipam internet engineering task force ietf internet protocol ip
Packet Pushers - IPv6 Buzz
IPv6 Buzz 018: Inside The IETF With Fred Baker

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Jan 24, 2019 27:25


On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF.

networking addressing buzz dns ipv6 ietf fred baker ipam internet engineering task force ietf internet protocol ip
Packet Pushers - IPv6 Buzz
IPv6 Buzz 018: Inside The IETF With Fred Baker

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Jan 24, 2019 27:25


On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF. The post IPv6 Buzz 018: Inside The IETF With Fred Baker appeared first on Packet Pushers.

buzz ipv6 ietf fred baker packet pushers internet engineering task force ietf internet protocol ip
Packet Pushers - Full Podcast Feed
IPv6 Buzz 018: Inside The IETF With Fred Baker

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jan 24, 2019 27:25


On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF. The post IPv6 Buzz 018: Inside The IETF With Fred Baker appeared first on Packet Pushers.

buzz ipv6 ietf fred baker packet pushers internet engineering task force ietf internet protocol ip
The Dan York Report
TDYR 358 - Heading to Bangkok for IETF 103

The Dan York Report

Play Episode Listen Later Nov 2, 2018 6:45


I am on my way to Bangkok, Thailand, for the 103rd meeting of the Internet Engineering Task Force (IETF). In this episode I explain why I am going...

thailand heading bangkok ietf internet engineering task force ietf
Tamil Language Podcast in Rathinavani90.8, Rathinam College Community Radio, Coimbatore, Tamil Nadu.
World Standards Day and Freedom Artist Special Album Song by Rathinam Viscom Students - Neeyum Song!

Tamil Language Podcast in Rathinavani90.8, Rathinam College Community Radio, Coimbatore, Tamil Nadu.

Play Episode Listen Later Oct 13, 2018 12:56


Rathinavani 90.8 Community Radio Broadcast - Oct 14 2018 | World Standards Day & Freedom Artist Special Album Song by Rathinam Viscom Students | Neeyum Illama Song with the artist interview. World Standards Day (or International Standards Day) is celebrated internationally each year on 14 October. The day honours the efforts of the thousands of experts who develop voluntary standards within standards development organizations such as the American Society of Mechanical Engineers (ASME) International Electrotechnical Commission (IEC), International Organization for Standardization (ISO), International Telecommunication Union (ITU), Institute of Electrical and Electronics Engineers (IEEE) and Internet Engineering Task Force (IETF). The aim of World Standards Day is to raise awareness among regulators, industry and consumers as to the importance of standardization to the global economy. 14 October was specifically chosen to mark the date, in 1946, when delegates from 25 countries first gathered in London and decided to create an international organization focused on facilitating standardization.Even though ISO was formed one year later, it wasn't until 1970 that the first World Standards Day was celebrated. உலகத் தர நிர்ணய நாள் (World Standards Day) என்பது ஆண்டு தோறும் அக்டோபர் 14ம் நாளன்று உலகளாவிய முறையில் கொண்டாடப்பட்டு வருகிறது. சீர்தரத்துக்கான அனைத்துலக நிறுவனம் (ஐ.எஸ்.ஓ.), அனைத்துலக மின் தொழில்நுட்ப ஆணையம் (ஐ.ஈ.சி.), அனைத்துலகத் தொலைத்தொடர்பு ஒன்றியம் (ஐ.டி.யூ.) ஆகிய நிறுவனங்களின் வழிமுறைகளுக்கு உட்பட்டு உலகத் தரங்களை உருவாக்கப் பாடுபடும் தொழில்துறை வல்லுநர்களின் சேவையைப் பாராட்டவும் பொருள்கள் மற்றும் சேவைகளில் விளங்க வேண்டிய சீர்மைத் தன்மையின் அவசியத்தை உலகளாவிய ரீதியில் வலியுறுத்தவும் இந்நாள் கொண்டாடப்பட்டு வருகிறது. ஒவ்வோர் ஆண்டும் ஐ.எஸ்.ஓ. மாநாட்டில், பல்லாயிரக்கணக்கான நிபுணர்கள் பங்கேற்கின்றனர். பல தொழில்நுட்பக் குழுக்களும், துணைக் குழுக்களும், பணிக் குழுக்களும் அமைக்கப்பட்டுப் பல்வேறு தொழில்களுக்கான தர நிர்ணயங்களை அந்நிபுணர்கள் வகுத்தளிக்கின்றனர் அல்லது மேம்படுத்துகின்றனர். IEC, ISO மற்றும் ITU என்பன சந்தைகளை உருவாக்கல், சுற்றுச் சூழல் பாதுகாப்பு, சுகாதாரம், பணக்கார மற்றும் வறிய நாடுகளுக்கிடையேயான வேறுபாடுகளைக் களைவது, போன்ற பல நடவடிக்கைகளில் ஈடுபட்டு வருகின்றன.

The Dan York Report
TDYR 352 - Excited for the start of IETF 102 in Montreal

The Dan York Report

Play Episode Listen Later Jul 16, 2018 6:45


The 102nd meeting of the Internet Engineering Task Force (IETF) starts today in Montreal with over 1,000 engineers coming together from around the world to make the Internet work better. It's an amazing event and I give a preview in this episode. Visit https://www.ietf.org/live to follow along this week.

internet montreal excited ietf internet engineering task force ietf
Wide World of Tech
Wide World of Tech #5 - Tech Rants

Wide World of Tech

Play Episode Listen Later Jan 25, 2018 58:20


Welcome Tech News Apple bringing money home and giving it out Sports News NFL News -Playoff Crazy NHL -Who actually watched? Placing Bets Superbowl matchup Big Topic 2018 IT Predictions Year to date IT rants This week/day in tech history 1/14/1878: Edison demo’d telephone for Queen Victoria https://books.google.com/books?id=EqgFnAZEPhgC&pg=PA62&lpg=PA62&dq=january+14+1878+Bell+Queen&source=bl&ots=mPKok_L6Wk&sig=SZ49ClI0TVRvZbfRrIvPniwEtZM&hl=en&sa=X&ei=OQxZULiHLOeLiwLA3YGQCA#v=onepage&q=january%2014%201878%20Bell%20Queen&f=false 1/18/1903: 1st telegraph sent https://www.nps.gov/caco/learn/education/upload/Marconi.pdf 1/16/1983: Internet Engineering Task Force (IETF) met for the first time https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force 1/18/95: yahoo.com registered https://en.wikipedia.org/wiki/Yahoo! Last word

tech yahoo rants marconi wide world internet engineering task force ietf
DPL-Surveillance-Equipment.com
Security Expert Talks About ICANN, Verisign And The Demise of Free Speech On The Internet

DPL-Surveillance-Equipment.com

Play Episode Listen Later Sep 1, 2016


Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Talks About ICANN, Verisign And The Demise of Free Speech On The InternetThe U.S. government plans within weeks to end much of its oversight of the California nonprofit that helps run the internet, a move with broad international support. But recent business deals by the nonprofit are threatening to roil those plans.Under the deals, the nonprofit Internet Corporation for Assigned Names and Numbers, known as Icann, is set to give significant new business to its largest contractor, Verisign Inc., under circumstances that some say show favoritism.One of the deals would give Verisign a no-bid extension on its current contract to run the huge dot-com domain. In the other deal, Verisign emerged as a surprise potential winner of the contract to operate the new dot-web domain by quietly putting $130 million behind another firm's bid in an Icann auction.Icann denies that it has given special treatment to Verisign, saying its focus has been promoting the internet's stability and security. Verisign, which is based in Reston, Va., is widely viewed as a highly competent manager of the domain-name system.The deals open a window into what is a netherworld to most users—the structures and firms that keep the chaotic-seeming internet running smoothly.Icann handles the internet's technical operations, including the crucial domain-name system, under a longstanding arrangement with the U.S. government. Icann also oversees the firms that run many of the internet's top-level domains, such as dot-com. Verisign currently runs the dot-com domain as well as dot-net, and also helps maintain the domain-name system. It makes money by receiving fees paid by people who register websites, while ensuring the registry's operation is smooth, stable and secure.The Obama administration is preparing to end much of its oversight of Icann on Oct. 1. The government hasn't intervened lately in Icann's operations, but its authority to do so has been seen as a backstop should something go wrong.Many high-tech firms view the shift as essential to maintaining international support for the internet's governance, as foreign countries increasingly bridle at the U.S. role. But some conservative critics, who have long worried that Icann could fall under foreign control, are seizing on the recent business deals as they try to block the government's move. They are hoping the deals will raise concerns among congressional Democrats, too.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Critics including Sen. Ted Cruz (R., Texas) say Icann's recent deals with Verisign show it to be a feckless regulator.“Where there's smoke there's fire,” Rep. Sean Duffy (R., Wis.), who has lined up with Mr. Cruz, said in an interview. The lawmakers have called for a Justice Department investigation.Icann denies favoritism. Regarding accusations that Icann is too cozy with Verisign, Akram Atallah, president of Icann's global domains division, said, “‘Cozy with Verisign' is an oxymoron,” in reference to the firm's reputation as a tough bargainer.Critics face an uphill fight to derail the government's planned transfer.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Icann has proposed giving Verisign a no-bid extension of its long-running contract to operate the dot-com domain, two years ahead of schedule. Verisign's current contract is set to expire in 2018; the extension would last through 2024. Verisign has had exclusive control of the dot-com registry since 2000. Starting in 2006, Verisign's contract with Icann has had an automatic-renewal clause, meaning no bidding is required so long as Verisign meets basic performance standards. Other domain operators have received similar deals. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Critics say Verisign's hold on the dot-com domain already has made it an effective monopoly. Mr. Atallah says the contract extension is less significant than it appears, since Verisign would be entitled to automatic renewal in two years anyway.The agency that oversees Icann, the National Telecommunications and Information Administration, hasn't yet endorsed the contract extension. Noting that it hasn't yet been approved by the Icann and Verisign boards, an NTIA spokesman said, “We have not been presented with anything to consider at this point.” NTIA would be able to keep price limits in place for the duration of the contract extension.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)In the second deal, Verisign covertly provided most of the funding for a winning bid in a recent Icann auction for the right to run the potentially lucrative dot-web domain.The Verisign-backed bidder, Nu Dot Co LLC, won the July 27 auction with a bid of $135 million. Then Verisign disclosed that it had put up $130 million of the bid and said it expected Nu Dot Co to hand over the dot-web deal to Verisign. Nu Dot Co didn't respond to a request for comment. Such assignments aren't unusual.In a lawsuit against Icann in federal court in Los Angeles, one losing bidder, Donuts Inc., accused Icann of using its authority “to unfairly benefit” an applicant.Mr. Atallah said Icann and its ombudsman investigated the suspicions ahead of the auction but no action was merited. “Now we have some other evidence that is surfacing, and we are looking again,” Mr. Atallah said. “What happens, I cannot project.”United Nations Might Take Control of InternetWhen the Obama administration announced its plan to give up U.S. protection of the internet, it promised the United Nations would never take control. But because of the administration's naiveté or arrogance, U.N. control is the likely result if the U.S. gives up internet stewardship as planned at midnight on Sept. 30. On Friday Americans for Limited Government received a response to its Freedom of Information Act request for “all records relating to legal and policy analysis . . . concerning antitrust issues for the Internet Corporation for Assigned Names and Numbers” if the U.S. gives up oversight. The administration replied it had “conducted a thorough search for responsive records within its possession and control and found no records responsive to your request.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It's shocking the administration admits it has no plan for how Icann retains its antitrust exemption. The reason Icann can operate the entire World Wide Web root zone is that it has the status of a legal monopolist, stemming from its contract with the Commerce Department that makes Icann an “instrumentality” of government.Antitrust rules don't apply to governments or organizations operating under government control. In a 1999 case, the Second U.S. Circuit Court of Appeals upheld the monopoly on internet domains because the Commerce Department had set “explicit terms” of the contract relating to the “government's policies regarding the proper administration” of the domain system.Without the U.S. contract, Icann would seek to be overseen by another governmental group so as to keep its antitrust exemption. Authoritarian regimes have already proposed Icann become part of the U.N. to make it easier for them to censor the internet globally. So much for the Obama pledge that the U.S. would never be replaced by a “government-led or an inter-governmental organization solution.”Rick Manning, president of Americans for Limited Government, called it “simply stunning” that the “politically blinded Obama administration missed the obvious point that Icann loses its antitrust shield should the government relinquish control.”The administration might not have considered the antitrust issue, which would have been naive. Or perhaps in its arrogance the administration knew all along Icann would lose its antitrust immunity and look to the U.N. as an alternative. Congress could have voted to give Icann an antitrust exemption, but the internet giveaway plan is too flawed for legislative approval.As the administration spent the past two years preparing to give up the contract with Icann, it also stopped actively overseeing the group. That allowed Icann to abuse its monopoly over internet domains, which earns it hundreds of millions of dollars a year.Earlier this month, an independent review within Icann called the organization “simply not credible” in how it handled the application for the .inc, .llc and .llp domains. The independent review found Icann staffers were “intimately involved” in evaluating their own work. A company called Dot Registry had worked with officials of U.S. states to create a system ensuring anyone using these Web addresses was a legitimate registered company. Icann rejected Dot Registry's application as a community, which would have resulted in lowered fees to Icann.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Delaware's secretary of state objected: “Legitimate policy concerns have been systematically brushed to the curb by Icann staffers well-skilled at manufacturing bureaucratic processes to disguise pre-determined decisions.” Dot Registry's lawyer, Arif Ali of the Dechert firm, told me last week his experience made clear “Icann is not ready to govern itself.”Icann also refuses to award the .gay domain to community groups representing gay people around the world. Icann's ombudsman recently urged his group to “put an end to this long and difficult issue” by granting the domain. Icann prefers to earn larger fees by putting the .gay domain up for auction among for-profit domain companies.And Icann rejects the community application for the .cpa domain made by the American Institute of CPAs, which along with other accounting groups argues consumers should expect the .cpa address only to be used by legitimate accountants, not by the highest bidder. An AICPA spokesman told me he has a pile of paperwork three feet high on the five-year quest for the .cpa domain. The professional group objected in a recent appeal: “The process seems skewed toward a financial outcome that benefits Icann itself.”The only thing worse than a monopoly overseen by the U.S. government is a monopoly overseen by no one—or by a Web-censoring U.N. Congress still has time to extend its ban on the Obama administration giving up protection of the internet. Icann has given it every reason to do so.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)The U.S. Commerce Department on Monday delayed for at least a year its plans to give up oversight of a key component of Internet governance.The department said it would renew its contract with the Internet Corp. for Assigned Names and Numbers for one year. Icann administers the Internet's domain-name system, through contracts with the companies that sell website names and addresses.Commerce Department Renews Contract With The Internet Corp. For Assigned Names And NumbersCommerce has overseen Icann since the organization was created in 1998. Last year, the Obama administration said it planned to transfer Icann oversight to an unspecified group of international stakeholders by September 2015.Critics of the plan have expressed concerns that it may open the door to influence by foreign governments that aren't committed to Western principles of free expression, and may want to impose different rules for administering the Internet in different parts of the world.Wireless Camera Finder(Buy/Rent/Layaway)“It has become increasingly apparent over the last few months that the community needs time to complete its work, have the plan reviewed by the U.S. government and then implement it if it is approved,” Assistant Commerce Secretary Lawrence Strickling wrote in a blog post.Mr. Strickling wrote that the government plans to extend its contract with Icann for one year to Sept. 30 of 2016, with options to extend it another three years. Mr. Strickling said Commerce informed Congress of the plan on Friday.Commerce said the extension will provide time to work out additional details on how a “multistakeholder” governance approach might work.Icann Chief Executive Fadi Chehadé said in May he plans to leave in March 2016 to work in the private sector. Mr. Chehadé has championed greater independence for the group. In 2013, he praised Brazil's call for the U.S. to relinquish oversight of the agency in the wake of disclosures that the National Security Agency monitored Brazil's leaders and businesses online.“This is an important step,” said House Energy and Commerce Committee Chairman Fred Upton (R., Mich.) and Reps. Greg Walden (R., Ore.) and John Shimkus (R., Ill.) in a statement. “The administration is recognizing, as it should, that it is more important to get this issue right than it is to simply get it done.”In June, the House passed legislation to give Congress oversight of the Obama administration's plans to transfer stewardship of Icann.“We appreciate the administration's efforts and look forward to working with them, and the global Internet community, to get this done right,” the Republican legislators said Monday.Tuesday, Icann Senior Adviser Theresa Swinehart said in a statement that the agency is “pleased” by the contract extension. Ms. Swinehart said there has been progress in devising a new governance structure, but “additional time is necessary for the global community to complete its work and for Icann to implement the community's proposals.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The US government has formally approved a plan to transition control of the internet's administrative tasks to the private sector.In an announcement Thursday, the National Telecommunications And Information Administration (NTIA) gave the green light to a plan developed over two years by the internet community to hand control of the critical Internet Assigned Numbers Authority (IANA) contract to Californian non-profit Internet Corporation for Assigned Names and Numbers (ICANN)."Today's announcement marks an important milestone in the US government's 18-year effort to privatize the Internet's domain name system," said Commerce secretary Penny Pritzker. "This transition ensures that the Internet continues to flourish as a platform for innovation, economic growth and free expression."ICANN has run the IANA functions – which cover the highest level of internet: the DNS, IP addresses, and internet protocols – since the day it was incorporated in 1999, but through a contract awarded repeatedly to it by the NTIA.This plan moves the contract into ICANN's hands and so removes the US government from its position of direct control – an important change in an ever more global internet.Following the formal approval, the transition is in line to be completed by the end of the current IANA contract – 30 September 2016.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)

california texas father google china starting internet freedom house los angeles americans video russia ms identity tips government failure search local owner western resolutions open barack obama blog brazil numbers financial congress security fbi bitcoin va phone web republicans shop tool pc democrats receive fallout commerce register cia skype customers united nations gps odds prevention rent electric recommendations ip detectives criticism pi payments delaware similar designed critics includes free speech select reaction law enforcement flexible ipods surveillance californians sd gmail makes ted cruz appeals ftc sensitivity corrupt magnetic demise cozy reps ill msn justice department optional detection duh american institute antitrust blacklist mcafee pixels pda world wide web legitimate cpas dns safeguards ore marco rubio authoritarian urls circuit court utf private investigators wis fax dvr shopping carts noting national security agency information act financial system bookmark remote control congressmen planning ahead security expert specifications interwebs commerce department reston icann aicpa no risk fact sheet createelement house energy limited government aol instant messenger articleid tld ntia layaway verisign vint cerf personal protection no debt how does it work iana targeted individuals parentnode identity protection global commission line of sight national telecommunications dechert search google tlds dpl yahoo groups blog site assigned names information administration internet association rick manning 5v internet corporation siteid numbers icann gtld gtlds internet engineering task force ietf idology donuts inc
The Dan York Report
TDYR 298 - Heading To Buenos Aires for #IETF95 and more...

The Dan York Report

Play Episode Listen Later Mar 31, 2016 5:11


I am heading to Buenos Aires, Argentina, for the 95th meeting of the Internet Engineering Task Force (IETF) and several other meetings. In this episode I talk about what I will be doing there.

argentina heading buenos aires internet engineering task force ietf
I Share Hope: Chris Williams
50: Alan Emtage - Searching for hope with the creator of the first internet search engine - #isharehope

I Share Hope: Chris Williams

Play Episode Listen Later Oct 8, 2015 38:52


  Alan Emtage oversees programming and content management at Mediapolis. Before joining the company Emtage co-founded Bunyip Information Systems, Inc., where he created the Archie system, the Internet's first search engine. Alan has chaired the Internet Engineering Task Force (IETF) working groups on Internet Anonymous FTP Archives (IAFA) and Uniform Resource Identifiers (URLs, URNs and URCs), as well as sitting on advisory boards for the National Science Foundation and other agencies. Emtage lectures and speaks at conferences around the world on such topics as Internet information systems and the impact of the Internet on society. He is often called upon by the press for his technological expertise including interviews in the Wall Street Journal and the highly praised PBS series Life on the Internet. Emtage, a native of Barbados, holds Bachelor's and Master's degrees in Computer Science from McGill University.

Down the Security Rabbithole Podcast
DtSR Episode 136 - Crypto and Privacy with Jon Callas

Down the Security Rabbithole Podcast

Play Episode Listen Later Mar 30, 2015 49:49


In this episode... Jon Callas gives a little of his background and his current role We talk through why cryptography is so hard, and so broken today Jon overviews compatibility, audit and making cryptography useful Jon brings up open source, security, and why "open is more secure" is bunk We talk through "barn builders" vs. "barn kickers" and why security isn't improving We talk through how to do privacy, active vs. passive surveillance We talk through anonymous VPN providers, anonymization services, and how they're legally bound Jon talks about appropriate threat modeling and knowing what we're protecting We talk through patching -- how to do patching for Joe Average User Bonus-- Mobile is as secure (or more) than what we're used to on the desktop Guest Jon Callas ( @JonCallas ) - Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and CTO of the global encrypted communications service Silent Circle. He has held major positions at Digital Equipment Corporation, Apple, PGP, and Entrust, and is considered “one of the most respected and well-known names in the mobile security industry.” Callas is credited with creating several Internet Engineering Task Force (IETF) standards, including OpenPGP, DKIM, and ZRTP, which he wrote. Prior to his work at Entrust, he was Chief Technical Officer and co-founder of PGP Corporation and the former Chief Technical Officer of Entrust.

The Dan York Report
TDYR 234 - Living The IETF Blur This Week

The Dan York Report

Play Episode Listen Later Mar 26, 2015 7:06


This week I'm living the "IETF blur" as the 92nd meeting of the Internet Engineering Task Force (IETF) takes place in Dallas, Texas, all week. I'm participating remotely... but it's still a crazy busy week! More in the episode...

texas blur ietf internet engineering task force ietf
The Dan York Report
TDYR #119 - There Are Always People Smarter Than You! The Beauty Of An IETF Meeting

The Dan York Report

Play Episode Listen Later Mar 5, 2014 5:13


There are always people smarter than you... and being around those people can be a great experience in which you learn much. In this episode I talk about how the Internet Engineering Task Force (IETF) meetings are places where this happens for me...

beauty smarter ietf internet engineering task force ietf
The Dan York Report
TDYR #085 - What Keeps Network Operators Away From The Internet Standards Process?

The Dan York Report

Play Episode Listen Later Jan 31, 2014 6:13


What are the barriers preventing more network operators from being engaged in the open Internet standards process of the Internet Engineering Task Force (IETF)? In this episode I raise that question and ask anyone operating a network or providing network services to please take a couple of minutes to fill out a quick survey. More info at: http://www.circleid.com/posts/20140130_how_do_we_get_more_network_operator_feedback_into_ietf_standards/ http://www.internetsociety.org/deploy360/blog/2014/01/new-project-operators-and-the-ietf/

internet network standards operators internet engineering task force ietf
Gordon And Mike's ICT Podcast
Internet Protocol version 6 (IPv6) Details Podcast [32:30]

Gordon And Mike's ICT Podcast

Play Episode Listen Later Apr 3, 2008 32:30


Intro: Two weeks ago we gave an overview of IPv6. This week we take a look at some of the technical details for this protocol. Mike: Gordon, a couple of weeks ago we discussed Ipv6 - can you give us a quick review - what's the difference between IPv4 and IPv6? The most obvious distinguishing feature of IPv6 is its use of much larger addresses. The size of an address in IPv6 is 128 bits, which is four times the larger than an IPv4 address. A 32-bit address space allows for 232 or 4,294,967,296 possible addresses. A 128-bit address space allows for 2 28 or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4x1038) possible addresses. In the late 1970s when the IPv4 address space was designed, it was unimaginable that it could be exhausted. However, due to changes in technology and an allocation practice that did not anticipate the recent explosion of hosts on the Internet, the IPv4 address space was consumed to the point that by 1992 it was clear a replacement would be necessary. With IPv6, it is even harder to conceive that the IPv6 address space will be consumed. Mike: It's not just to have more addresses though, is it? It is important to remember that the decision to make the IPv6 address 128 bits in length was not so that every square inch of the Earth could have 4.3x1020 addresses. Rather, the relatively large size of the IPv6 address is designed to be subdivided into hierarchical routing domains that reflect the topology of the modern-day Internet. The use of 128 bits allows for multiple levels of hierarchy and flexibility in designing hierarchical addressing and routing that is currently lacking on the IPv4-based Internet. Mike: Is there a specific RFC for IPv6? The IPv6 addressing architecture is described in RFC 2373. Mike: I know there is some basic terminology associated with IPv6. Can you describe Nodes and Interfaces as they apply to IPv6? A node is any device that implements IPv6. It can be a router, which is a device that forwards packets that aren't directed specifically to it, or a host, which is a node that doesn't forward packets. An interface is the connection to a transmission medium through which IPv6 packets are sent. Mike: How about some more IPv6 terminology - can you discuss Links, Neighbors, Link MTUs, and Link Layer Addresses? A link is the medium over which IPv6 is carried. Neighbors are nodes that are connected to the same link. A link maximum transmission unit (MTU) is the maximum packet size that can be carried over a given link medium, and is expressed in octets. A Link Layer address is the "physical" address of an interface, such as media access control (MAC) addresses for Ethernet links. Mike: Can you give a brief ouline in address syntax? IPv4 addresses are represented in dotted-decimal format. This 32-bit address is divided along 8-bit boundaries. Each set of 8 bits is converted to its decimal equivalent and separated by periods. For IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons. The resulting representation is called colon-hexadecimal. The following is an IPv6 address in binary form: 00100001110110100000000011010011000000000000000000101111001110110000001010101010000000001111111111111110001010001001110001011010 The 128-bit address is divided along 16-bit boundaries: 0010000111011010  0000000011010011   0000000000000000   0010111100111011  0000001010101010   0000000011111111   1111111000101000  1001110001011010    Each 16-bit block is converted to hexadecimal and delimited with colons. The result is: 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A IPv6 representation can be further simplified by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. With leading zero suppression, the address representation becomes: 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Mike: I know there are lost of zeros in IPv6 addresses - can you discribe zero compression notation? Some types of addresses contain long sequences of zeros. To further simplify the representation of IPv6 addresses, a contiguous sequence of 16-bit blocks set to 0 in the colon hexadecimal format can be compressed to “::?, known as double-colon. For example, the link-local address of FE80:0:0:0:2AA:FF:FE9A:4CA2 can be compressed to FE80::2AA:FF:FE9A:4CA2. The multicast address FF02:0:0:0:0:0:0:2 can be compressed to FF02::2. Zero compression can only be used to compress a single contiguous series of 16-bit blocks expressed in colon hexadecimal notation. You cannot use zero compression to include part of a 16-bit block. For example, you cannot express FF02:30:0:0:0:0:0:5 as FF02:3::5. The correct representation is FF02:30::5. To determine how many 0 bits are represented by the “::?, you can count the number of blocks in the compressed address, subtract this number from 8, and then multiply the result by 16. For example, in the address FF02::2, there are two blocks (the “FF02? block and the “2? block.) The number of bits expressed by the “::? is 96 (96 = (8 – 2)(16). Zero compression can only be used once in a given address. Otherwise, you could not determine the number of 0 bits represented by each instance of “::?. Mike: IPv4 addresses use subnet masks - do IPv6 addresses? No - a subnet mask is not used for IPv6. Something called prefix length notation is supported. The prefix is the part of the address that indicates the bits that have fixed values or are the bits of the network identifier. Prefixes for IPv6 subnet identifiers, routes, and address ranges are expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in address/prefix-length notation. For example, 21DA:D3::/48 is a route prefix and 21DA:D3:0:2F3B::/64 is a subnet prefix. Mike: I know there are three basic types of IPv6 addresses - can you give a brief description of each? 1. Unicast – packet sent to a particular interface A unicast address identifies a single interface within the scope of the type of unicast address. With the appropriate unicast routing topology, packets addressed to a unicast address are delivered to a single interface. To accommodate load-balancing systems, RFC 2373 allows for multiple interfaces to use the same address as long as they appear as a single interface to the IPv6 implementation on the host. 2. Multicast - packet sent to a set of interfaces, typically encompassing multiple nodes A multicast address identifies multiple interfaces. With the appropriate multicast routing topology, packets addressed to a multicast address are delivered to all interfaces that are identified by the address. 3. Anycast – while identifying multiple interfaces (and typically multiple nodes) is sent only to the interface that is determined to be “nearest? to the sender. An anycast address identifies multiple interfaces. With the appropriate routing topology, packets addressed to an anycast address are delivered to a single interface, the nearest interface that is identified by the address. The “nearest? interface is defined as being closest in terms of routing distance. A multicast address is used for one-to-many communication, with delivery to multiple interfaces. An anycast address is used for one-to-one-of-many communication, with delivery to a single interface. In all cases, IPv6 addresses identify interfaces, not nodes. A node is identified by any unicast address assigned to one of its interfaces. Mike: What about broadcasting? RFC 2373 does not define a broadcast address. All types of IPv4 broadcast addressing are performed in IPv6 using multicast addresses. For example, the subnet and limited broadcast addresses from IPv4 are replaced with the link-local scope all-nodes multicast address of FF02::1. Mike: What about special addresses? The following are special IPv6 addresses: Unspecified Address The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address. It is equivalent to the IPv4 unspecified address of 0.0.0.0. The unspecified address is typically used as a source address for packets attempting to verify the uniqueness of a tentative address. The unspecified address is never assigned to an interface or used as a destination address. Loopback Address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of 127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by an IPv6 router. Mike: How is DNS handled? Enhancements to the Domain Name System (DNS) for IPv6 are described in RFC 1886 and consist of the following new elements: Host address (AAAA) resource record IP6.ARPA domain for reverse queries Note:  According to RFC 3152, Internet Engineering Task Force (IETF) consensus has been reached that the IP6.ARPA domain be used, instead of IP6.INT as defined in RFC 1886. The IP6.ARPA domain is the domain used by IPv6 for Windows Server 2003. The Host Address (AAAA) Resource Record: A new DNS resource record type, AAAA (called “quad A?), is used for resolving a fully qualified domain name to an IPv6 address. It is comparable to the host address (A) resource record used with IPv4. The resource record type is named AAAA (Type value of 28) because 128-bit IPv6 addresses are four times as large as 32-bit IPv4 addresses. The following is an example of a AAAA resource record:         host1.microsoft.com    IN    AAAA   FEC0::2AA:FF:FE3F:2A1C A host must specify either a AAAA query or a general query for a specific host name in order to receive IPv6 address resolution data in the DNS query answer sections. The IP6.ARPA Domain The IP6.ARPA domain has been created for IPv6 reverse queries. Also called pointer queries, reverse queries determine a host name based on the IP address. To create the namespace for reverse queries, each hexadecimal digit in the fully expressed 32-digit IPv6 address becomes a separate level in inverse order in the reverse domain hierarchy. For example, the reverse lookup domain name for the address FEC0::2AA:FF:FE3F:2A1C (fully expressed as FEC0:0000:0000:0000:02AA: 00FF:FE3F:2A1C) is: C.1.A.2.F.3.E.F.F.F.0.0.A.A.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.C.E.F.IP6.ARPA. The DNS support described in RFC 1886 represents a simple way to both map host names to IPv6 addresses and provide reverse name resolution. Mike: Can you discuss transition from IPv4 to IPv6? Mechanisms for transitioning from IPv4 to IPv6 are defined in RFC 1933. The primary goal in the transition process is a successful coexistence of the two protocol versions until such time as IPv4 can be retired if, indeed, it's ever completely decommissioned. Transition plans fall into two primary categories: dual-stack implementation, and IPv6 over IPv4 tunneling. More Info Mechanisms for transitioning from IPv4 to IPv6 are defined in RFC 1933. There are two primary methods. Dual Stack Implementation The simplest method for providing IPv6 functionality allows the two IP versions to be implemented as a dual stack on each node. Nodes using the dual stack can communicate via either stack. While dual-stack nodes can use IPv6 and IPv4 addresses that are related to each other, this isn't a requirement of the implementation, so the two addresses can be totally disparate. These nodes also can perform tunneling of IPv6 over IPv4. Because each stack is fully functional, the nodes can configure their IPv6 addresses via stateless autoconfiguration or DHCP for IPv6, while configuring their IPv4 addresses via any of the current configuration methods. IPv6 Over IPv4 Tunneling The second method for implementing IPv6 in an IPv4 environment is by tunneling IPv6 packets within IPv4 packets. These nodes can map an IPv4 address into an IPv4-compatible IPv6 address, preceding the IPv4 address with a 96-bit "0:0:0:0:0:0" prefix. Routers on a network don't need to immediately be IPv6-enabled if this approach is used, but Domain Name System (DNS) servers on a mixed-version network must be capable of supporting both versions of the protocol. To help achieve this goal, a new record type, "AAAA," has been defined for IPv6 addresses. Because Windows 2000 DNS servers implement this record type as well as the IPv4 "A" record, IPv6 can be easily implemented in a Windows 2000 environment. Mike: we've only touched on some of the IPv6 details - where can people get more information? I'm hoping to run a session at our summer conference July 28 - 31 in Austin, TX - we've currently got faculty fellowships available to cover the cost of the conference. See www.nctt.org for details. References - Content for this academic podcast from Microsoft sources: All Linked Documents at Microsoft Internet Protocol Version 6 (note: excellent and free online resources): http://technet.microsoft.com/en-us/network/bb530961.aspx Understanding IPv6, Joseph Davies, Microsoft Press, 2002 ISBN: 0-7356-1245-5 Sample Chapter at: http://www.microsoft.com/mspress/books/sampchap/4883.asp#SampleChapter