SlideShare a Scribd company logo
1 of 18
Download to read offline
Future of the Internet
Open Research Topics

2009.11.16




Dr. Eric W. Burger
SVP and CTO / Neustar, Inc.
Chairman of the Board of Directors / SIP Forum
Member of the Board of Trustees / Internet Society
Chair-elect (2010) Committee on Communications
  Policy / IEEE-USA

1                                © 2009, Neustar Inc.
2009.11.16


 Evolution of Importance of the Internet
 The Internet is No Longer a Toy




Research → Entertainment   → B2C → B2B →           Critical Infrastructure

          Infrastructure Reliability & Security and
              Support of Complex Applications

 2                          © 2009, Neustar Inc.
2009.11.16




Where Do Applications Come From?




3              © 2009, Neustar Inc.
2009.11.16




What is a Good Internet Application?




• Sometimes you need complexity
• Sometimes you sell complexity
• Usually, simplicity rules

4                        © 2009, Neustar Inc.
2009.11.16




Future Internet Scenarios




5                © 2009, Neustar Inc.
2009.11.16




Research at Neustar




      6           © 2009, Neustar Inc.
2009.11.16




What is the Internet?

    The Internet is Mobile                          Implications
                                       •  Device is mobile
                                       •  Device is first a phone
                                       •  Phone identifies owner
                                       •  Content adaptation and low-power
                                          consumption factors in design




7                            © 2009, Neustar Inc.
2009.11.16




Identity
• Cryptographic identity management
    »  Classic   Computer Science problems
• Human factors and identity
    »  How  do people want to refer to each other?
    »  Usernames
    »  National identity strings
    »  Telephone number (mobile)

• Separating identity and location from IP Address
    »  IETF   HIP, LISP



8                             © 2009, Neustar Inc.
2009.11.16




Peer-to-Peer
• Optimizing user experience and operator expenses
• P2P applications need to know network topology
• Operators know network topology
• P2P applications and operators do not trust each
  other
• How to share information?
    »  IETF ALTO   work group




9                               © 2009, Neustar Inc.
2009.11.16




Network as Critical Infrastructure
• Securing the DNS
     »  DNSSEC,    others
• Securing BGP
     »  RPKI,   others
• Identifying new architectures for Internet
  infrastructure
     »  Meet critical infrastructure requirements
     »  Keep end-to-end, innovation-driving aspects of Internet




10                            © 2009, Neustar Inc.
2009.11.16




Internet of Things
• Movement to connect everything
     »  Homes   and content
     »  Enterprises and content
     »  People

• Sophistication of node
     »  Highperformance computer
     »  RFID tag on commodity

• Connection to network
     »  Direct – wired
     »  Direct – wireless
     »  Gateway

11                            © 2009, Neustar Inc.
2009.11.16




Internet of Things: Scale
• Millions (today) to thousand millions (near future)
• Impacts
     »  Addressing  infrastructure
     »  Naming infrastructure
     »  Routing infrastructure

• Capability of nodes far less than current nodes
     »  Power  – impacts CPU and networking
     »  Size – impacts interconnect and circuit complexity
     »  Intermittent activity – may not always be on

• Research Questions

12                              © 2009, Neustar Inc.
2009.11.16




Internet of Things: Privacy and Control
• Exposing in-home usage can expose user’s habits
• Safety and security impacts: stalking via location
  exposure
• Need to collect, use, process data; at same time
  need to protect, hide, control data
     »  Policy   enforcement
• I want to remotely turn on my light
• I do not want you to remotely turn off my light
• Electric car catastrophe in the making
• Research Questions

13                             © 2009, Neustar Inc.
2009.11.16




Internet of Things: Critical Infrastructure
• Smart Grid initiatives in Northern Europe, Middle East,
  South America, Asia, North America
• Network becomes national security domain
• Only true security is physical security
• But, most of the ultimate value of Smart Grid is
  interconnection to the Internet
     »  User self-monitoring
     »  User control
     »  Future, end-to-end applications not envisioned

• Impossible to keep separate: large enterprises will
  connect explicitly or implicitly
• Research Questions
14                              © 2009, Neustar Inc.
2009.11.16




Internet of Things: Signaling
• Need ubiquitous protocol for messaging, session
  establishment, control
     »  Works  across all network media
     »  Interoperates across different networks
     »  Has policy, security, privacy capabilities
     »  Small enough profile to run in embedded devices

• A leading option is SIP




15                           © 2009, Neustar Inc.
2009.11.16




SIP for Smart Grid
• Has all of the interoperability properties
     »  Remote   control of devices
       −  Stahl, 2001 – demonstration of SIP light bulb
       −  Burger, 2006 – demonstration and theory for any network
          interoperability

• Policy, security, and privacy
     »  Extantin protocol
     »  Not well adopted in today’s applications

• But, SIP is considered a very heavy protocol



16                                © 2009, Neustar Inc.
2009.11.16




SIP for PSTN versus SIP
• SIP envisioned as a small protocol to establish
  sessions using the Internet model
     »  End-to-end  principal
     »  Recognizing need for policy enforcement, location
        services, and impaired (NAT) networks: Proxy Element
• SIP “lost its way” when adopted as the protocol for
  next generation telephony signaling
     »  Specification  of 200 pages in 1999 is now well over 5,000
     »  Almost all of that is extensions
     »  Base protocol relevant for many uses other than
        telephony

17                            © 2009, Neustar Inc.
2009.11.16




Summary
• Evolution of Internet: we depend on it
• Neustar Internet research: how to make Internet
  dependable
• Internet of things: ripe area for research
• SIP and the Internet of things
• Future delivery of the Internet and governance
     »  You will be a user of the Internet
     »  You may be creating the new Internet
     »  You may be creating new uses for the Internet
     »  You may govern the Internet

• Keeping the Internet safe, secure, and available and at the
  same time keeping what made it the most important 20th
  century technology: the end-to-end principal
18                                 © 2009, Neustar Inc.

More Related Content

What's hot

Hélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web ExperiencesHélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web Experiences
AIC_UCD
 
Cisco mortensen
Cisco mortensenCisco mortensen
Cisco mortensen
CIRB_CIBG
 

What's hot (19)

Tech dev cssfounder.com
Tech dev cssfounder.comTech dev cssfounder.com
Tech dev cssfounder.com
 
Hélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web ExperiencesHélène Haughney - Nubiq: Our Mobile Web Experiences
Hélène Haughney - Nubiq: Our Mobile Web Experiences
 
5 g technology
5 g technology5 g technology
5 g technology
 
VillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialogVillageTelco FOSDEM WirelessDialog
VillageTelco FOSDEM WirelessDialog
 
Cisco mortensen
Cisco mortensenCisco mortensen
Cisco mortensen
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Technology Development & Its Impacts
Technology Development & Its ImpactsTechnology Development & Its Impacts
Technology Development & Its Impacts
 
How to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of HeliumHow to Design A Product with Blockchain by Dir Product of Helium
How to Design A Product with Blockchain by Dir Product of Helium
 
Hessen am is activity 5
Hessen am is activity 5Hessen am is activity 5
Hessen am is activity 5
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...
 
Trends in communication technology
Trends in communication technology Trends in communication technology
Trends in communication technology
 
Li-Fi Technology
Li-Fi Technology Li-Fi Technology
Li-Fi Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing Introduction
 
Pom ppt munira
Pom ppt  muniraPom ppt  munira
Pom ppt munira
 
Technologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukarTechnologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukar
 

Similar to The Future of the Internet: Open Research Topics

Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008
Roland Tritsch
 
Sws lecture13
Sws lecture13Sws lecture13
Sws lecture13
sundarnu
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
ifrieshe
 

Similar to The Future of the Internet: Open Research Topics (20)

Mondial Telecom Cherry at Mobile Monday Brussels-
Mondial Telecom    Cherry at Mobile Monday Brussels-   Mondial Telecom    Cherry at Mobile Monday Brussels-
Mondial Telecom Cherry at Mobile Monday Brussels-
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
 
Evolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future ServicesEvolution of Mobile Networks - Impact and Possibilities for Future Services
Evolution of Mobile Networks - Impact and Possibilities for Future Services
 
Technology update
Technology updateTechnology update
Technology update
 
Technology update
Technology updateTechnology update
Technology update
 
Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008Mobile Monday - WebServices on the iPhone - 05/2008
Mobile Monday - WebServices on the iPhone - 05/2008
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123
 
Ch09
Ch09Ch09
Ch09
 
Sws lecture13
Sws lecture13Sws lecture13
Sws lecture13
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Browser wars - the desktop strikes back
Browser wars - the desktop strikes backBrowser wars - the desktop strikes back
Browser wars - the desktop strikes back
 
Mobile security
Mobile securityMobile security
Mobile security
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Lost layer talk 2014
Lost layer talk 2014Lost layer talk 2014
Lost layer talk 2014
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Lecture-1.pptx
Lecture-1.pptxLecture-1.pptx
Lecture-1.pptx
 
Lemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip SmetLemon Companies IoT - Filip Smet
Lemon Companies IoT - Filip Smet
 
His.internet.50
His.internet.50His.internet.50
His.internet.50
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Things
 
Chap006
Chap006Chap006
Chap006
 

More from Neustar, Inc.

Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
Neustar, Inc.
 

More from Neustar, Inc. (11)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

The Future of the Internet: Open Research Topics

  • 1. Future of the Internet Open Research Topics 2009.11.16 Dr. Eric W. Burger SVP and CTO / Neustar, Inc. Chairman of the Board of Directors / SIP Forum Member of the Board of Trustees / Internet Society Chair-elect (2010) Committee on Communications Policy / IEEE-USA 1 © 2009, Neustar Inc.
  • 2. 2009.11.16 Evolution of Importance of the Internet The Internet is No Longer a Toy Research → Entertainment → B2C → B2B → Critical Infrastructure Infrastructure Reliability & Security and Support of Complex Applications 2 © 2009, Neustar Inc.
  • 3. 2009.11.16 Where Do Applications Come From? 3 © 2009, Neustar Inc.
  • 4. 2009.11.16 What is a Good Internet Application? • Sometimes you need complexity • Sometimes you sell complexity • Usually, simplicity rules 4 © 2009, Neustar Inc.
  • 6. 2009.11.16 Research at Neustar 6 © 2009, Neustar Inc.
  • 7. 2009.11.16 What is the Internet? The Internet is Mobile Implications •  Device is mobile •  Device is first a phone •  Phone identifies owner •  Content adaptation and low-power consumption factors in design 7 © 2009, Neustar Inc.
  • 8. 2009.11.16 Identity • Cryptographic identity management »  Classic Computer Science problems • Human factors and identity »  How do people want to refer to each other? »  Usernames »  National identity strings »  Telephone number (mobile) • Separating identity and location from IP Address »  IETF HIP, LISP 8 © 2009, Neustar Inc.
  • 9. 2009.11.16 Peer-to-Peer • Optimizing user experience and operator expenses • P2P applications need to know network topology • Operators know network topology • P2P applications and operators do not trust each other • How to share information? »  IETF ALTO work group 9 © 2009, Neustar Inc.
  • 10. 2009.11.16 Network as Critical Infrastructure • Securing the DNS »  DNSSEC, others • Securing BGP »  RPKI, others • Identifying new architectures for Internet infrastructure »  Meet critical infrastructure requirements »  Keep end-to-end, innovation-driving aspects of Internet 10 © 2009, Neustar Inc.
  • 11. 2009.11.16 Internet of Things • Movement to connect everything »  Homes and content »  Enterprises and content »  People • Sophistication of node »  Highperformance computer »  RFID tag on commodity • Connection to network »  Direct – wired »  Direct – wireless »  Gateway 11 © 2009, Neustar Inc.
  • 12. 2009.11.16 Internet of Things: Scale • Millions (today) to thousand millions (near future) • Impacts »  Addressing infrastructure »  Naming infrastructure »  Routing infrastructure • Capability of nodes far less than current nodes »  Power – impacts CPU and networking »  Size – impacts interconnect and circuit complexity »  Intermittent activity – may not always be on • Research Questions 12 © 2009, Neustar Inc.
  • 13. 2009.11.16 Internet of Things: Privacy and Control • Exposing in-home usage can expose user’s habits • Safety and security impacts: stalking via location exposure • Need to collect, use, process data; at same time need to protect, hide, control data »  Policy enforcement • I want to remotely turn on my light • I do not want you to remotely turn off my light • Electric car catastrophe in the making • Research Questions 13 © 2009, Neustar Inc.
  • 14. 2009.11.16 Internet of Things: Critical Infrastructure • Smart Grid initiatives in Northern Europe, Middle East, South America, Asia, North America • Network becomes national security domain • Only true security is physical security • But, most of the ultimate value of Smart Grid is interconnection to the Internet »  User self-monitoring »  User control »  Future, end-to-end applications not envisioned • Impossible to keep separate: large enterprises will connect explicitly or implicitly • Research Questions 14 © 2009, Neustar Inc.
  • 15. 2009.11.16 Internet of Things: Signaling • Need ubiquitous protocol for messaging, session establishment, control »  Works across all network media »  Interoperates across different networks »  Has policy, security, privacy capabilities »  Small enough profile to run in embedded devices • A leading option is SIP 15 © 2009, Neustar Inc.
  • 16. 2009.11.16 SIP for Smart Grid • Has all of the interoperability properties »  Remote control of devices −  Stahl, 2001 – demonstration of SIP light bulb −  Burger, 2006 – demonstration and theory for any network interoperability • Policy, security, and privacy »  Extantin protocol »  Not well adopted in today’s applications • But, SIP is considered a very heavy protocol 16 © 2009, Neustar Inc.
  • 17. 2009.11.16 SIP for PSTN versus SIP • SIP envisioned as a small protocol to establish sessions using the Internet model »  End-to-end principal »  Recognizing need for policy enforcement, location services, and impaired (NAT) networks: Proxy Element • SIP “lost its way” when adopted as the protocol for next generation telephony signaling »  Specification of 200 pages in 1999 is now well over 5,000 »  Almost all of that is extensions »  Base protocol relevant for many uses other than telephony 17 © 2009, Neustar Inc.
  • 18. 2009.11.16 Summary • Evolution of Internet: we depend on it • Neustar Internet research: how to make Internet dependable • Internet of things: ripe area for research • SIP and the Internet of things • Future delivery of the Internet and governance »  You will be a user of the Internet »  You may be creating the new Internet »  You may be creating new uses for the Internet »  You may govern the Internet • Keeping the Internet safe, secure, and available and at the same time keeping what made it the most important 20th century technology: the end-to-end principal 18 © 2009, Neustar Inc.