Annotated list of papers and published standards documents on which I was in the authors list.

Publication Reference

Levels of Aggregation in Flow Switched Networks

An early paper, 1997, on the levels of traffic aggregation that are useful in networks. This paper focused on the notion of flows and how those flows could be aggregated from the edge of the network towards it core and then back to the edge. It discussed a method of incrementing and decrementing the level of aggregation of traffic flows as one moved through the network.

Wavelength Router as a Transport Platform for IP

Paper describing how a IP network could be overlaid on a network of optical switches. Pretty obvious stuff by now, but it was still a new idea then.

Movement from Monoliths to Component-Based Network Elements

This paper describes a movement toward a change in the way telecommunication equipment as designed and deployed. It argues for a physical architecture that has systems layered across the different planes.  While this is beginning to be accepted by many of the service providers, it is a trend that is still not accepted by many equipment vendors.

Inter-domain Routing Stability Measurement

There are a number of studies done on problems seen in the stability of the internet routing structure. Prior inter-domain routing measurements include passive analysis of routing table growth and error injection for convergence measurement. The measurements in this paper are solely based on passive logging of BGP-4 traffic from measurement points including major European IPS backbone networks and some academic networks. The goal is to understand the failures in Internet reachability and excessive route flapping through study of macro effects in the control plane.

RFC3292 - General Switch Management Protocol(GSMP) V3

RFC3294 - GSMP Packet Encapsulations for ATM, Ethernet and TCP

RFC3294 - General Switch Management Protocol Applicability

This set of documents describes the General Switch Management Protocol Version 3 (GSMPv3). The GSMPv3 is an asymmetric protocol that allows one or more external switch controllers to establish and maintain the state of a label switch such as, an ATM, frame relay or MPLS switch. The GSMPv3 allows control of both unicast and multicast switch connection state as well as control of switch system resources and QoS features. It is a component for opening the interface between the control plane and data plane in a decomposed network system architecture.

Providing connectivity to the Sámi nomadic community

This paper describes the Sámi Network Connectivity project, a project that seeks to establish Internet communication for the Sámi population of reindeer herders who live in remote regions of Swedish Sapmi (Lapland). The paper covers both the social context for the project and includes an introduction to the technical solution which is based on ideas developed in delay Tolerant Networking.

Probabilistic Routing in Intermittently Connected Networks

This paper considers the problem of routing in intermittently connected networks. In such networks there is no guarantee that a fully connected graph between source and destination exists at any time rendering traditional routing protocols unable to deliver messages between hosts. There do however, exist a number of scenarios where connectivity is intermittent, but where the possibility of communication still is desirable. Thus, there is a need for a way to route through such networks. This paper proposes PROPHET, a probabilistic routing protocol for such networks and compares it to the earlier Epidemic Routing protocols through simulations.

SNC - When the red nose won't do! A nomadic proposition for connectivity

In June 2002 a project was proposed to provide connectivity to the semi-nomadic Sámi reindeer herds of Northern Sweden. This paper includes the context involved in setting up this project and discusses many of the issues that have arisen in the first year of the project.

Sámi Network Connectivity – High Tech and Local Participation in Northern Scandinavia

An overview of the SNC project and its position within the local community

WSIS, WGIG, Technology and Technologists

This is a chapter from a book put out by members of the UN Working Group on Internet Governance. It discusses the involvement of technologists in the World Summit on Information Society and the Working Group on Internet Governance.

Internet Governance and Human Rights

This paper looks at the role of Human Rights in the WSIS and Working Group on Internet Governance (WGIG) process. It also looks at civil societies role in the process. In this analysis, not only are the words from the texts of the WSIS outcome discussed, but some of the activities involved in the second phase of WSIS leading up to and including the Tunis summit are also discussed. The analysis shows, that while there was a modicum of lip service paid to human rights, in fact human rights were transgressed more then they were upheld and that these transgression were treated with acquiescence by those responsible for the WSIS.

The IETF as a model for the IGF

One of the models that was suggested for the IGF during the Tunis phase of WSIS, and several times since-Tunis is the Internet Engineering Task Force, better known simply as the IETF. This note attempts to briefly outline one IETF participant's impression of what the IETF model is.

Talk on Internet Governance given to Sámi Network Gender Allocation Project

Introduction to Internet Governance and a view as to why feminist groups should participate.

Rethinking the Role of ICANN and the gTLD whois to Enhance the Security and Stability of the DNS

A radical proposal reviewing the purpose of whois and the need for replacing whois with appropriate tools that satisfy the real needs of the Internet community.

GPSDTN: Predictive Velocity-Enabled Delay-Tolerant Networks for Arctic Research and Sustainability

This paper contains a requirements analysis and general implementation strategy to support Arctic research and sustainability efforts. The paper proposes to augment DTN with power-aware, buffer-aware location- and time-based predictive routing for ad-hoc meshes to create networks that are inherently location and time (velocity) aware at the network level to support climate research, emergency services and rural education in the Arctic. [accepted for publication and presentation at IEEE ICGD&BC'07 and

The Working Group on Internet Governance: A feminist conversation in Process II - World Summit on Information Society page 62 also translated into Italian in Saperi Del Futoro: Analisi di Donne sulla Societá della Communicazione page 112.

Karen Banks interviews Jacqueline Morris and Avri Doria about their experiences and insights into the struggle to put women’s rights and gender issues on the agenda of Internet governance (IG), which is by many considered to be a most impenetrable and abstract area relating to information and communication technologies (ICTs). The interview questions were developed in collaboration with the Association for Progressive Communications Women’s Networking Support Programme (APC WNSP). The responses were given in writing.

Please Keep the Core Neutral

This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles.

What do the Words “Internet Security” Mean? (page 197)

Internet security is frequently discussed, but if you ask people what they mean by it, you may get many different and sometimes contradictory answers. Security has become an overloaded term used by many in various differing ways. This paper explores some of those definitions.

Internet Governance Forum The First Two Years (editor)

Proceedings of the first two years of the Internet Governance Forum (IGF)

Networking in the land of northern lights: two years of experiences from DTN system deployments

The Sámi Network Connectivity (SNC) project was started to enable Internet connectivity for the Sami population of reindeer herders in the Laponia region in northern Sweden. In this area, no infrastructure and thus, no Internet connectivity normally available. Thus, DTN functionality is used to enable connectivity through the use of mobile relays. This paper describes deployments and field tests done within he SNC project and its continuation SNC+1, in which a Delay-Tolerant Networking system was deployed in the target region. During these deployments, the PRoPHET routing protocol, and three different applications were deployed and tested successfully.

Internet Technology and Networks in The APC ICT Policy Handbook (Second edition)(chapter 18, p 114)

The chapter describes some of the most important issues in internet technology and network management. It is concerned principally with how the internet works, including how it differs from telecommunications networks, and with some of the technical issues that rise in discussions of internet services and governance.

The DTN URI Scheme

This document describes the "dtn" Uniform Resource Identifier (URI) scheme. DTN URIs are used as DTN endpoint identifiers (EIDs).

Adding the "find" Operation to the DTN: URI Scheme

This document discusses the addition of a new operation to the proposed dtn: URI (Uniform Resource Identifier) scheme. The new "find" operation would provide support for DTN (Delay- and Disruption-Tolerant Network) anycast services.

RFC5772 – Possible Requirements for Future Routing Protocols

These requirements for routing architectures are the product of two sub-groups with the IRTF Routing Research Group. They represent two individual and separate views of the problem and of what is required to fix the problem. While speaking of requirements, the document is actually a recommendation to anyone who would create a routing architecture for the Internet in the coming years.

RFC5773 - Analysis of Inter-Domain Routing Requirements and History

This document analyzes the current state of IDR routing with respect to RFC1026 and other IDR requirements and design efforts. It is the companion document to "Requirements for Inter-Domain Routing"

RFC5810 - Forwarding and Control Separation Protocol Specification

This document specifies the Forwarding and Control Element Separation (ForCES) protocol. The ForCES protocol is used for communications between Control Elements(CEs) and Forwarding Elements (FEs) in a ForCES Network Element (ForCES NE). This specification is intended to meet the ForCES protocol requirements defined in RFC 3654. Besides the ForCES protocol, this specification also defines the requirements for the Transport Mapping Layer (TML).

RFC5866 - Diameter Quality of Service Application

This document describes the framework, messages, and procedures for the Diameter Quality-of-Service (QoS) application. The Diameter QoS application allows network elements to interact with Diameter servers when allocating QoS resources in the network. In particular, two modes of operation, namely "Pull" and "Push", are defined.

Probabilistic Routing Protocol for Intermittently Connected Networks

This document defines PRoPHET, a Probabilistic Routing Protocol using History of Encounters and Transitivity. PRoPHET is a routing protocol for intermittently connected networks, where there is no guarantee that a fully connected path between source and destination exists at any time, rendering traditional routing protocols unable to deliver messages between hosts. These networks are examples of networks where there is a disparity between the latency requirements of applications and the capabilities of the underlying network (networks often referred to as Delay and Disruption Tolerant). The document presents an architectural overview followed by the protocol specification.

RFC 6041: Forwarding and Control Element Separation (ForCES) Applicability Statement

The Forwarding and Control Element Separation (ForCES) protocol defines a standard framework and mechanism for the interconnection between control elements and forwarding elements in IP routers and similar devices. In this document we describe the applicability of the ForCES model and protocol. We provide example deployment scenarios and functionality, as well as document applications that would be inappropriate for ForCES.

RFC 6385: General Area Review Team Experiences

The General Area Review team has been doing Reviews of Internet Drafts since 2004. This draft discusses the experience and the lessons learned over the past 6+ years of this process. The review team initially reviewed the drafts before each of the IESG telechats. Beginning in late 2005, review team members have been assigned to review documents during IETF Last Call, unless no IETF Last Call is necessary for the document. The same reviewer then reviews any updates when the document is placed on an IESG telechat agenda.

Policy Implications of Future Network Architecture and Technology (Discussion Draft)

The study looked at many of the technological innovations that the Internet is likely to experience over the next decade. This report discusses some of the possible policy implications of some of those innovations in the light of this study. The main assumption for the study has been that the development of technology and policy are inextricably interrelated and that they affect each other at each stage of technological and policy development. The study explored this relationship and this report attempts to extrapolate from the relationship and from ongoing technological innovation to discuss the various policy issues that will need attention over the next decade. As part of the discussion, several possible areas for continued research are mentioned.

RFC 6693: Probabilistic Routing Protocol for Intermittently Connected Networks

This document defines PRoPHET, a Probabilistic Routing Protocol using History of Encounters and Transitivity. PRoPHET is a variant of the epidemic routing protocol for intermittently connected networks that operates by pruning the epidemic distribution tree to minimize resource usage while still attempting to achieve the best-case routing capabilities of epidemic routing. It is intended for use in sparse mesh networks where there is no guarantee that a fully connected path between the source and destination exists at any time, rendering traditional routing protocols unable to deliver messages between hosts. These networks are examples of networks where there is a disparity between the latency requirements of applications and the capabilities of the underlying network (networks often referred to as delay and disruption tolerant). The document presents an architectural overview followed by the protocol specification.

Human Rights and Internet Protocols: Comparing Processes and Principles

Association for Progressive Communications (APC) Version
Internet Society Version

The Internet is a network that empowers at the edges, rather that the centre, rendering it a profoundly democratic and rights fostering platform. Human rights are a framework that seeks to empower those at the margins rather than at the centre of power, rendering it a fundamentally empowering framework for individuals. This paper explores human rights and Internet protocols comparing the processes for their making and the principles by which they operate and concludes that there are some shared principles between the two. The authors examine selected Internet protocols and human rights and conclude that these generate continuities and discontinuities that merit more exploration and further discussion and would assist those who seek to defend human rights and to maintain a free and open Internet.

The Use and [Abuse] of Multistakeholderism in the Internet

To be included as a chapter in The evolution of global Internet policy: new principles and forms of governance in the making? Editors Rolf H. Weber, Roxana Radu, Jean-Marie Chenou, 2013. Multistakeholderism has become the Internet governance regime choice of many. While it is certain that everyone does not have the same modalities in mind when they utter the term, it is apparent that for many the multistakeholder model show the way forward. The chapter explores the meaning and uses of the term.