Internet 2.0 is a proposed global internetworking system that uses a higher-level protocol called the Transmission Media Adaptation Layer (TMAL) to provide interconnection and internetworking services over both IP data networks and global telephony systems. TMAL enables remote applications to communicate over a variety of interconnected network devices worldwide, either separately or concurrently. Internet 2.0 aims to provide a more secure internetworking environment compared to the current Internet (Internet 1.0) by establishing private, dedicated communication channels using existing telephony systems.
1. Internet 2.0
Internet 2.0 is a global multimode internetworking system for providing interconnection and
internetworking services to remote application programs among interconnected computer
networks and internet of thing (IoT) devices. Instrumental to Internet 2.0 is a higher level network
protocol, Transmission Media Adaptation Layer (TMAL). TMAL enables remote application
programs to internetwork among a myriad of interconnected network devices worldwide. Internet
2.0 will carries huge resources of multimedia information and provides internetworking services
natively over both, global telephony systems and Internet Protocol (IP) data network systems,
discretely or concurrently.[1]
.
IP-based data network, IPv4 or IPv6, is the predominant network system utilised by higher level
network protocols, such as User Datagram Protocol (UDP) and Transmission Control Protocol
(TCP), to cast their information packets into its system[2]
. IP-based network system uses
connectionless mode of connectivity, with static or fixed addressing, to route
information packets from sender to receiver among its interconnected intelligent routers. IP-based
system lacks any security means arising from this mode of connectivity as anyone can cast their
information into any IP-based communication pipelines.
Conversely, TMAL, a higher level network protocol is the predominant system in Internet 2.0.
Based upon the type of connectivity requested by application-layer programs and the socket
component, TMAL will establishes the requested connectivity using a myriad of lower level network
protocols and systems. When an application requested for IP-based connectivity, TMAL would
cast its information packets into the appropriate IP network systems. When an application
requested for private end-to-end communication, TMAL would methodically establishes a virtual
dedicated connectivity channel for said application using the existing telephony systems. Thus
TMAL is able to support both shared-media and virtual dedicated-media internetworking
environment [3] [1]
.
Terminology
The term Internet is a paraphrase for Internetworking. Under OSI model, interconnect and
internetworking functionality resources lie from OSI Model Layer 1 till Layer 5, where the lower
level network protocols provide for interconnect functionality while the higher level network
protocols provide for internetworking functionality[4][5]
.
Interconnect or interconnection refers to connectivity services provided by lower-layer or lower
level network protocols for enabling interconnectivity among a plurality of network devices.
Internetworking refers to higher level network protocol providing internetworking connectivity
services for remote application programs to communicate and interact with each other over a
plurality of interconnected network devices.
Internet 1.0 refers to a specific global internetworking system, established using Internet
Protocol (IP) protocols suite among a plurality of interconnected network systems.
The Internet utilizes higher-layer or higher level network protocols, such as User Datagram
Protocol (UDP) and Transmission Control Protocol (TCP) for enabling remote application
programs the capability for internetworking, while IPv4 or IPv6 protocols provides for
interconnectivity among remote end-nodes or devices[2]
.
Internet 2.0 refers to a multimode global internetworking system of interconnected network devices
created by having a higher level transmission media network protocol able to subscribes to and
utilizes differing lower level transmission medium network protocols, discretely or concurrently.
Said transmission medium network systems comprising of network systems using packet
switching or virtual circuit-switching technology[1]
.
Transmission media network protocol refers to any higher-layer or higher level network protocol
able to provides internetworking services among remote application programs.
2. Transmission medium network protocol refers to any lower-layer or lower level network protocol
that provides interconnect services to network devices.
Packet-switching refers to a method where packetized data is transmitted over a digital network
into having a header and a payload segments. The data in the header is used by network
hardware to direct the packet to its destination where the payload data is used by the application
software. In packet-switching technology, no is no requirement to establish a connection between
the communicating end-nodes for enabling communication. Packet switching technology is the
basis for connectionless data communications among computer networks worldwide[3]
.
Virtual circuit-switching refers to the means of transporting data over packetized circuit switched
network system in such a way that it appears as though there is a dedicated physical
layer link between the source and destination end systems. Before communication can proceed,
a virtual circuit has to be established, between two or more nodes or software applications,
by configuring the relevant parts of the interconnected network devices[3]
.
Virtual Circuit Connection (VCC) refers a type of communication connections in which a dedicated
channel (or circuit) is established either physically or virtually for the duration of the communication.
Shared-Media Internet (SMI) refers to any internetworking system which uses packet-switching
network protocol having connectionless and cast mode of communication among network devices.
Virtual Dedicated-Media Internet (VDMI) refers to any internetworking system established to
provide dedicated end-to-end and connection-oriented connectivity among network devices, using
virtual circuit-switching network protocols over circuit-switched network systems[1] [3]
.
History
The origin of Internet 2.0 occurs with the realisation of the vulnerability of the Internet arising for its
core technologies utilised for data delivery.
The Internet (Internet 1.0)
The Internet was mooted during early 1960s. Its development was initially funded by DARPA. The
key objective for the Internet was to create a fault-tolerance network which would survive disruption
in data delivery in the event of a nuclear war [6]
. The reason being in the situation where data
communication utilising connection-oriented and circuit-switching technology of
the telephony systems would be prone to disruption once an exchange was destroyed[7]
.
The solution for this concern was to utilize connectionless-based packet-switching technology
piggy-backing on the existing telephony systems for data delivery. IP-based data network is one
of such packet-switching technology. With IP-based data network system, data packets are routed
among a series of independent and intelligent self-routing IP routers over the existing global
telephony systems, to deliver data among the interconnected end-devices. The breakthrough for
Internet technology was the inception of Internet protocol suite, advocated by Jonathan B. Postel.
Those key protocols are UDP, TCP, IMP, ICMP, and IP. Between 1982 and 1984 Postel co-
authored the RFCs which became the foundation of today's DNS (RFC 819, RFC 881, RFC 882
and RFC 920) which were joined in 1995 by RFC 1591 which he also co-wrote.
In addition, several Application-layer protocol software were developed to harness Internet
protocol suite, through the use of TCP and UDP packets. Some of those predominant Application-
layer protocol software were developed or ported are ftp, telnet, smtp, instant messaging, and http.
IP aggregates all TCP and UDP packets and transmits them over its allocated communication
pipeline established using existing telephony systems. This solution also creates an excellent
system for the sharing of communication pipelines as anyone can cast their information packets
into the pipeline without a need to establish a connection [8]
. The realization of global IP-based data
network system created the present Internet, Internet 1.0.
Since packet-switching technology enables the creation of
a distributed and decentralized communication and computing topology, this method of
3. communication would inherently and inevitably create a vulnerable internetworking system due to
its cast mode of connectivity and communication[8]
. Furthermore, intrusive exploitation and attacks
are a growing concern with the Internet due to the ease of implementing fronting, targeting, and
interception of data packets, arising from the use of static addressing.
In packet-switching, one has to cast their packets and let those computerized packet-switching
routers, with a routing table, to define the delivery path for the packets from senders to receivers,
using those static end-node addressing. However, connectionless communication enables the
ability for address cloning and fronting for intrusive injection of malicious information. With packet-
switching technology, security is always a concern due to its inability to implement reliable access
control and authentication, as well as, the inability to reliably determine and held the sender
accountable for those malicious intrusion[8]
.
Lastly, IP routers are essentially computers programmed for data delivery and routing. IP routers
can be reprogramed by hackers to serve as agents for eavesdropping, cloning, fronting or
duplicating and rerouting of data.
Characteristics
For the comprehension of the concept of packet-switching data delivery engine, let's use the
analogue of the postal delivery systems. The IP data network system utilizes lower-
layer transmission medium network systems for the delivery of information, similarly to the postal
system utilizing existing road, rail, air and ship-freight infrastructures. The IP-based data network
routers are similar to the post offices. Like the postal delivery system, when there is a disruption
in any of its delivery infrastructure, the post office would determine the rerouting path. Likewise,
IP-based routers have the intelligent and capability to reroute the information packets, should there
be any problems arising in anywhere in its delivery infrastructures.
Any mails and packages can be deposited with the postal system for delivery without the need to
validate the senders. As with packet-switching system, there is neither the mechanism to reliably
authenticate any sender nor the need to establish a private and dedicated line of delivery from
senders to receivers. Thus, the postal delivery system is also vulnerable to interception and
anonymous posting through identity theft exploitation. Due to the use of static addressing for data
delivery, those mails are potentially prone to interception anywhere along the delivery path. Hence
this means of eavesdropping vulnerability is ever presence in packet-switching due to the use of
static addressing for routing [9] [10]
.
Lastly, the ability for someone to inject malicious malware packets in a shared-media mode of
communication through the cloning of any IP addresses or through domain fronting by casting it
into the IP networks are always unavoidable and ever growing concerns. Using connectionless
and shared-media mode of communication, anyone can access to any end-nodes by posting to
the end-node IP address. Being connectionless, all packets arriving at the address will be unpack
and process. Basically Internet protocol suite does not have any security measures. To enable
security, augment technology like digital certification and encryption technology are used. The
present Virtual Private Network (VPN) systems utilises Point-to-Point Tunnelling Protocol (PPTP),
an encryption technology to ensure privacy and security. Nevertheless VPN packets can be
captured for deep packet inspection and compromise for malicious intents.
Internet 2.0
In the granted patents associated with the technology for enabling multimode internetworking
connectivity, an alternative global internetworking system was created to operate natively over the
existing telephony systems. Unique to the invention is the ability to provide for internetworking
connectivity is by using connection-based scheme of virtual circuit connection (VCC) to establish
private and dedicated-media mode of communication. This created a new internetworking platform.
Said invention also provides for backward compatibility with the present Internet, thus providing a
multimode internetworking environment either discretely or concurrently. This new global
multimode internetworking environment is coined as Internet 2.0[1] [11]
.
4. The crux of Internet 2.0 is the deployment of a higher-layer transmission-media network protocol
having the ability to subscribe and operate natively not only over any telephony systems but also
over any packet-switching systems. Said transmission media system can be programmed to
interface with myriad of existing connectionless routing network protocol such as IP, IPX, and the
likes, as well as, to connection-based virtual circuit-switching transmission medium systems in
order to provide for connection-based private and dedicated-media communication channels.
Transmission Media Adaptation Layer (TMAL) has such capability [1] [11]
.
When TMAL subscribes for end-to-end and connection-based connectivity over the existing
telephony system, a private and dedicated-mode of internetworking communication session will be
established to create a new internetworking environment, coined as Virtual Dedicated-Media
Internet (VDMI)[1]
.
Characteristics
For comprehension of the concept of VDMI environment, let’s use the analogue of the telephony
systems. The most ubiquitous network system is the global telephony circuit-switched systems. It
is also the transmission medium which the Internet uses to deliver data to you. Basically the
Internet piggy-back on the telephony network infrastructures.
For establishing telephony connectivity and communication, links of virtual circuit segments were
created among a plurality of interconnect relay switches to create a single line of communication
for each telephone call[1][11]
. Telephony system utilises dynamic label-swapping routing addresses
as they traverse through the relay switches. Controlling and programming those relay switches are
the controller systems of the Telco’s Center Office. The Controller systems program the routing
virtual switching table of each relay switches during call establishment and termination. Lastly,
those relay switches are simple switches specifically designed only for the routing of information
packets.
VDMI works natively with the telephony system, by utilising the telephony call establishment and
termination process. Basically for establishing connectivity among application endpoints, TMAL
will communicate with underlying telephony system using Signalling System No 7 signalling to
request for connectivity among end-node devices. It is during this call or connection establishment
procedure that VDMI platform is able to implement access control. In access control, VDMI access
control component would compare the Caller ID with its table of Approved Caller. If the Caller ID
is not in the table of Approved Caller, then the call would immediately be terminated. In addition,
during connection establishment, no data is transfer between end-points; just like when we having
ringing tone, we cannot communicate. Furthermore, without using VoIP and SigTrans, Caller ID
spoofing is more difficult to be implemented.
Lastly, if the end-node is a secure site, one would use the unapproved Caller ID number to trace
down the owner of said Caller ID. This ability to reliably trace the owner of attempt unauthorised
access will acts as a deterrent for anyone contemplating of compromising any system in VDMI
platform.
Development and Funding
The funding for Internet 2.0 was initially funded by friends and family. Future funding for both TMAL
and Telephony-based DNS will be through other crowdfunding mechanisms.
Project development and commercialisation of TMAL will be undertaken by ITranscend Network
Holdings Limited, a company registered in Isle of Man.
Project development and deployment for Telephony-based DNS will be undertaken by Incepxion
DNS Holdings Limited, a company registered in Hong Kong SAR.
Technologies
5. TMAL is designed also to support myriad types of lower level network protocols, such
as IPX, Token Rings, Ethernet and the likes, over the telephony system, besides using IP system,
for Shared-Media Internet (SMI). TMAL utilises associative addressing identifiers of Network
Connection Identifier and User Session Identifier for network and session connectivity, respectively.
It has at least a dual translation tables for those identifiers.
Using associative Network Connection Identifier, one is able to a create hybrid interconnect
systems among any connectionless network systems or between connection-
oriented and connectionless network systems which provides for interconnect data delivery
services. An additional benefit of using associative addressing, it’s harder to specifically target the
users even in TMAL enabled SMI environment. In addition, by using associative User Session
Identifier, one is also able to camouflage the final Source and Destination Ports values.
Virtual Dedicated-Media Internet (VDMI) environment is created when the internetworking
environment establishes an end-to-end connection-oriented connectivity among both higher level
transmission media network protocol and lower level transmission medium which utilises
connection-oriented and circuit-switched transmission means. With VDMI platform, one is able to
provide a more secure and private line of communication as the requirement for connection
establishment enables one to implements security mechanisms like access control, reliable
recording of caller identity, and for call tracing.
In addition to the differing data delivery systems, there is the need for ease of use and the
accessibility to said multimode internetworking platform and environment. While computer
identifies and associates any end-nodes with numbers, we are more accustomed to associate any
entities with names. Therefore there is also a need for human-to-machine interface for associating
network device numeric addressing to domain name in a multimode internetworking environment.
Whereas we have IP-based Domain Name System (DNS), for the mapping of domain name to
an IP address, VDMI network platform would also require similar capability. Incepxion DNS
Holdings Limited is presently undertaking the development of telephony-based DNS where a
VDMI’s domain name will be mapped to a telephone number.
Concepts
Internet 2.0 can be described in five parts:
Higher level network protocols for internetworking services
Lower level network protocol for interconnection services
Transmission Media Adaptation Layer (TMAL) network protocol
Telephony-based DNS for VDMI platform
Virtual Dedicated-Media Internet (VDMI) platform and environment
Shared-Media Internet (SMI) platform and environment
Comparison with Internet 1.0
The below table will provide a summarized comparison of the capabilities between Internet 1.0 and
Internet 2.0 for the differing platform and environment.
Internet 2.0 Internet 1.0
Multimode internetworking platform and
environment of:
A single-mode internetworking platform and
environment of Shared-Media
Internetworking (SMI) using IP protocol suite
only.
6. Shared-Media Internetworking (SMI),
including IP data network.
Virtual Dedicated-Media Internet (VDMI)
Able to subscribe to any lower level transmission
medium network protocol address routing
scheme of:
Static addressing used by packet-switching
network systems
Label-swapping addressing used by virtual
switched systems.
Utilises static addressing of IP's Source and
Destination addresses only for routing.
TMAL utilises associative addressing scheme
Utilises static addressing of Source Port and
Destination Port by higher level protocols
Able to implement over any packet-switching
and virtual-switched transmission medium
network devices
Only available and works in IP-based network
systems
Ease in implement upscaling of network device
addressing
Difficult to implements upscaling for device
addresses
Able to support multi-protocol address
translation
Incompatible addressing scheme even for
IPv4 and IPv6
Able to support SMI and VDMI platforms
discretely or concurrently:
Connectionless mode of connectivity among
end-devices
End-to-end connection-oriented mode of
connectivity among end-devices
Hybrid of end-to-end connection-oriented
and connectionless mode of connectivity
among differing network end-devices.
Connectionless mode of connectivity among
end-node or devices
Mode of communication for VDMI platform
comprising of:
Point-to-Point (P2P)
Point-to-Multipoint (P2MP)
Multipoint-to-Multipoint (MP2MP)
Mode of communication for SMI platform
comprising of:
Uni-cast
Multi-cast
Broadcast
Mode of communication comprising of:
Uni-cast
Multi-cast
Broadcast
Usage
Internet 2.0, besides being backward compatible with IP data network, create an alternative VDMI
data delivery platform. Similarly to the Internet platform, this alternative VDMI platform finds equal
7. usage in the fields of applications that the present Internet presently provides. As such the
applications for Internet 2.0 are in the fields of:
Digital economy
Cloud computing and VPN
Internet of Things, where secure communication is paramount
Smart Cities
Multimedia communication
Applications
Like the Internet, Internet 2.0 will find equal usage of myriads of applications where security and
privacy are essential. Internet 2.0 will find applications in the following industries:
e-Commerce
Education technology
e-Government
Online banking and e-commerce payment system
Digital currencies
Internet of Things
Cloud computing
Application software will also evolve from mainly client-server architecture to support point-to-point
(P2P), point--to-multipoint (P2MP) and multipoint-to-multipoint architectures.
Patents
On September 12, 1997, Lee Chooi Tian applied to Intellectual Property Corporation of
Malaysia (MyIPO) for a patent on a higher level network protocol for interfacing with application
programs and operating over existing lower level connectionless and connection-oriented
transmission medium network systems. He was granted a patent, MyIPO Pat. No. MY129914-A,
for the invention on May 31, 2007[12]
On July 22, 2011, Lee Chooi Tian submitted another patent application to MyIPO for the system
and methods for enabling multimode internetworking connectivity. Subsequently, he applied under
PCT application on July 16, 2012. Since then he was granted a European patent, EP 2636188 B1
on July 17, 2014. The USPTO also granted a patent to him on January 9, 2018 under US Pat No.
9,866,499 B2 [13] [14]
.
Lee Chooi Tian had two papers published in IEEE for 21st
LCN Technical Program on October 13-
16, 1996. The papers being “Designing a Virtual Access Control Configuration Protocol for
Implementation over ISDN and Shared-Media Networks” and “Principle and Techniques for
Encapsulation of User Control and Data Information in Separate Frame”. Those papers were cited
by USPTO examiners as prior arts for other granted patents. Those patents cited, which is not
exhaustive, are:
US Pat No. 7,467,211
US Pat No. 7,389,331
US Pat No. 7,346,669
8. See also
History of telecommunication
Data transmission
Virtual Circuit
Jon Postel
Communication protocol
References
1. MINDS. "Malaysian Invention and Design Society (MINDS), January 2016. MINDS Newsletter, page
2-3" (PDF). Retrieved 10 May 2018.
2. ARIN (7 May 2018). "American Registry for Internet Numbers (ARIN), 1997" (PDF). Retrieved 7
May 2018.
3. Chooi-Tian (Alex), Lee. & Jack, W. Harris (6 May 2018). "Chooi-Tian (Alex), Lee. & Jack, W. Harris,
1996. Principle and Technique for Encapsulation of User Control and Data Information in Separated
Frame. IEEE". Retrieved 6 May 2018.
4. Bob Smith (2 May 2018). "Microchip Technology, 2018. TCP/IP Five-Layer Model Overview".
Retrieved 2 May 2018.
5. Wyllys, R. E. and Doty, P. (5 May 2018). "Wyllys, R. E. and Doty, P., 2000. The University of Texas
at Austin, Notes on 5-layer and 7-layer Models of Interconnection." Retrieved 5 May 2018.
6. Duncan Graham Rowe. "Duncan Graham Rowe, 2008. Fifty years of DARPA: Hits, misses and ones
to watch". Retrieved 5 May 2018.
7. Richard A. Costello, Ray Horak. "Richard A. Costello, Ray Horak, 2003. Basic Concepts of
Communications: An Introduction. Technology Overview: 24 September 2003,". Retrieved 12
May 2018.
8. Moore, Roger D. (August 2006). "Moore, Roger D. (August 2006).”This is a temporary index for a
collection of papers about packet-switching in the 1970s"". Retrieved 11 May 2018.
9. Peter L Dordal. "Peter L Dordal, June 14, 2016. An Introduction to Computer Networks" (PDF).
Retrieved 10 May 2018.
10. Cisco, nd. "Cisco, nd. Cisco Networking Academy Program". Retrieved 6 May 2018.
11. Chooi-Tian (Alex), Lee. & Jack, W. Harris, (October, 1996.). "Chooi-Tian (Alex), Lee. & Jack, W.
Harris, (October, 1996). Designing A Virtual Access Control Configuration Protocol for
Implementation over ISDN and Shared-Media Networks. IEEE". Retrieved 5 May 2018.
12. Lee, CT. (1997). "Lee, CT. (1997). A Versatile Higher-layer Network Protocol for Interfacing with
Application Layer Programs and Operating over Existing Lower-layer Connectionless and
Connection- Oriented Network Protocol, MyIPO: MY-129914-A". Retrieved 2 May 2018.
13. Justia Patent, (2018). "Justia Patent, (2018). Patents by Inventor Chooi Tian Lee". Retrieved 2
May 2018.
14. WIPO (2013). "World Intellectual Property Organization (WIPO), 2013. Patent Scope, Apparatus
and Methods for Multimode Internetworking Connectivity, Patent number: 9866499". Retrieved 2
May 2018.
External links
https://ieeexplore.ieee.org/document/558139/
https://ieeexplore.ieee.org/document/558167/