From: rjmcmahon <rjmcmahon@rjmcmahon.com>
To: "Network Neutrality is back! Let´s make the technical aspects
heard this time!" <nnagain@lists.bufferbloat.net>
Subject: Re: [NNagain] Internet Education for Non-technorati?
Date: Fri, 13 Oct 2023 13:50:17 -0700 [thread overview]
Message-ID: <1f93c14727a2baeb24fe875a7bd21f38@rjmcmahon.com> (raw)
In-Reply-To: <28b55c94-ea6b-4926-ad53-bd4c0ecb1a6b@3kitty.org>
As an open-source maintainer of iperf 2, which is basically a network
socket & traffic tool, I find this history extremely interesting.
Releasing a measurement tool free to all, with transparent code, allows
everyone access to a "shared yardstick." While maybe not enough,
hopefully, it helps a little bit to those 40+ years of not much.
Bob
> Good point -- "How would I know if an installation was meeting the
> specs?"
>
> It *has* been done before. From a historical perspective...
>
> When TCPV4 was being defined and documented in RFCs (e.g., RFC 793),
> circa 1981, other activities were happening in the administrative
> bureaucracy of the US government, outside the realm of the "research
> community".
>
> The US Department of Defense, which purchases huge quantities of
> electronic equipment, declared TCP to be a "DoD Standard" in the early
> 1980s. Further, they changed their purchasing rules so that all
> equipment purchased, which might need to communicate to other
> equipment, had to implement TCP. If you wanted to sell your networked
> products to the government, they had to implement TCP. This caused
> industry to suddenly pay attention to what us crazy researchers had
> done in creating this TCP thing.
>
> A separate piece of government, the US National Bureau of Standards
> (now called NIST), defined a testing procedure for verifying that a
> particular TCP implementation actually conformed to the documented DoD
> Standard. Further, they also created a program which would certify
> third-party labs as qualified to perform those tests and issue
> conformance certificates. Such conformance proof could be submitted
> by companies as part of their sales process to supply equipment for
> DoD contracts.
>
> I remember this pretty well, since I set up one such TCP Conformance
> Lab, got it certified, and we performed a lot of testing and
> consulting to help traditional government contractors figure out what
> TCP was all about and get their products certified for DoD
> procurement. I've never learned who was orchestrating those
> bureaucratic initiatives, but it seemed like a good idea. There may
> have been other similar efforts in other countries over the decades
> since 1981 that I don't know anything about.
>
> In the last 40+ years, AFAIK little else has happened for testing,
> certification, or regulation of Internet technology. Hundreds,
> perhaps thousands, of "standards" have been created by IETF and
> others, defining new protocols, algorithms, and mechanisms for use in
> the Internet. I'm not aware of any testing or certification for any
> Internet technology today, or any way to tell is f any product or
> service I might buy actually has implemented, correctly, any
> particular "Internet Standard".
>
> Governments can create such mechanisms around important
> infrastructures, and have done so for transportation and many others.
> IMHO they could do the same for Internet, and seem to be trying to do
> so.
>
> But to be effective the administrators, politicians, and regulators
> need to know more about how the Internet works. They could create
> "Conformance Labs". They could involve organizations such as the
> Underwriters Lab in the US, CSA in Canada, CE (European Conformity) et
> al.
>
> If they knew they could and decided they should .... Education...
>
> Jack Haverty
>
> On 10/12/23 12:52, Hal Murray via Nnagain wrote:
>
>> Jack Haverty said:
>>
>>> A few days ago I made some comments about the idea of "educating"
>>> the
>>> lawyers, politicians, and other smart, but not necessarily
>>> technically
>>> adept, decision makers.
>>
>> That process might work.
>>
>> Stanford has run programs on cyber security for congressional
>> staffers.
>>
>> From 2015:
>> Congressional Staffers Headed to Stanford for Cybersecurity Training
>>
> https://cisac.fsi.stanford.edu/news/congressional-staffers-headed-stanford-cybe
>> rsecurity-training
>>
>>> Today I saw a news story about a recent FCC action, to mandate
>>> "nutrition
>>> labels" on Internet services offered by ISPs:
>>
>> Is there a chicken-egg problem in this area?
>>
>> Suppose I had a nutrition-label sort of spec for a retail ISP
>> offering. How
>> would I know if an installation was meeting the specs? That seems
>> to need a
>> way to collect data -- either stand alone programs or patches to
>> existing
>> programs like web browsers.
>>
>> Would it make sense to work on those programs now? How much could
>> we learn if
>> volunteers ran those programs and contributed data to a public data
>> base? How
>> many volunteers would we need to get off the ground?
>>
>> Could servers collect useful data? Consider Zoom, YouTube, gmail,
>> downloads
>> for software updates...
> _______________________________________________
> Nnagain mailing list
> Nnagain@lists.bufferbloat.net
> https://lists.bufferbloat.net/listinfo/nnagain
prev parent reply other threads:[~2023-10-13 20:50 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-11 17:31 Jack Haverty
2023-10-11 17:38 ` David Bray, PhD
2023-10-11 18:06 ` Dave Taht
2023-10-11 18:18 ` rjmcmahon
2023-10-11 18:35 ` Dick Roy
2023-10-11 18:49 ` rjmcmahon
2023-10-11 20:42 ` Dick Roy
2023-10-11 20:59 ` Sebastian Moeller
2023-10-11 18:19 ` David Bray, PhD
2023-10-11 18:23 ` David Bray, PhD
2023-10-11 20:49 ` Sebastian Moeller
2023-10-11 19:23 ` David Lang
2023-10-11 20:06 ` rjmcmahon
2023-10-11 22:58 ` David Lang
2023-10-12 15:55 ` Robert McMahon
2023-10-12 16:04 ` rjmcmahon
2023-10-12 16:49 ` David Lang
2023-10-12 17:30 ` Dave Taht
2023-10-12 18:17 ` rjmcmahon
2023-10-12 20:14 ` David Lang
2023-10-13 4:31 ` rjmcmahon
2023-10-13 8:34 ` David Lang
2023-10-13 15:55 ` Robert McMahon
2023-10-13 8:38 ` Sebastian Moeller
2023-10-13 17:35 ` rjmcmahon
2023-10-13 6:35 ` Sebastian Moeller
2023-10-13 17:20 ` rjmcmahon
2023-10-14 10:41 ` Sebastian Moeller
2023-10-14 19:59 ` rjmcmahon
2023-10-19 0:40 ` David Lang
2023-10-19 2:02 ` Robert McMahon
2023-10-19 2:05 ` David Lang
2023-10-19 2:12 ` Robert McMahon
2023-10-19 2:25 ` David Lang
2023-10-19 3:13 ` rjmcmahon
2023-10-11 20:42 ` Sebastian Moeller
2023-10-12 19:52 ` Hal Murray
2023-10-13 18:47 ` Jack Haverty
2023-10-13 20:50 ` rjmcmahon [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/nnagain.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1f93c14727a2baeb24fe875a7bd21f38@rjmcmahon.com \
--to=rjmcmahon@rjmcmahon.com \
--cc=nnagain@lists.bufferbloat.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox