Difference between revisions of "IAB requested protocol stack enhancement"
From IUWG
(→Discussed Proposed positions) |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
== The IAB == | == The IAB == | ||
* [[IAB_Statement_on_Internet_Confidentiality]] | * [[IAB_Statement_on_Internet_Confidentiality]] | ||
− | * [[IAB SEMI 2015 | + | * [[IAB SEMI 2015 WORKSHOP]] |
== UNCTAD == | == UNCTAD == | ||
* [http://unctad.org/meetings/en/SessionalDocuments/CSTD_2014_Mapping_Internet_en.pdf The mapping of international Internet public policy issues] | * [http://unctad.org/meetings/en/SessionalDocuments/CSTD_2014_Mapping_Internet_en.pdf The mapping of international Internet public policy issues] | ||
* [http://unctad.org/meetings/en/SessionalDocuments/CSTD_2014_Mapping_InternetDatabase_en.pdf The mapping of international Internet public policy issues - Database] | * [http://unctad.org/meetings/en/SessionalDocuments/CSTD_2014_Mapping_InternetDatabase_en.pdf The mapping of international Internet public policy issues - Database] | ||
+ | |||
+ | == IUWG Position == | ||
+ | |||
+ | * [[Preliminary position]] | ||
+ | |||
+ | |||
+ | == Discussed Proposed positions == | ||
+ | |||
+ | The proposed texts are linked or copied and discussed. | ||
+ | |||
+ | *Black, D.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_black.pdf UDP Encapsulation: Framework Considerations] | ||
+ | *Blanchet, M.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_blanchet.pdf Implications of Blocking Outgoing Ports Except Ports 80 and 443] | ||
+ | *Briscoe, B.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_briscoe.pdf Tunneling Through Inner Space] | ||
+ | *Calvert, K.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_calvert.pdf Refactoring Transport for the Next Century] | ||
+ | *Ding, A. Y., Korhonen, J., Savolainen, T., Liu. Y., Kojo, M., Tarkoma, S. and Schulzrinne, H.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_ding.pdf Reflections on Middlebox Detection Mechanism in IPv6 Transition] | ||
+ | *Edeline, K. and Donnet, B.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_edeline.pdf On a Middlebox Classification] | ||
+ | *Hardie, T.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_hardie.pdf Network Function Virtualization and Path Character] | ||
+ | *Huici, F., Raiciu, C. and Honda, M.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_huici.pdf In-Network Processing, User-Level Stacks and the Future of Internet Evolution] | ||
+ | *Huitema, C.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_huitema.pdf The Secure Transport Tussle] | ||
+ | *Nádas, S. and Loreto, S: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_nadas.pdf Middleboxes in Cellular Networks] | ||
+ | *Nottingham, M. and Ponec, M.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_nottingham.pdf UDP-based Application Layer Protocol Recipes to the Rescue] | ||
+ | *Perkins, C. and McQuistin, S.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_perkins.pdf Reinterpreting the Transport Protocol Stack to Embrace Ossification] | ||
+ | *Raiciu, C., Olteanu, V., and Stoenescu, R.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_raiciu.pdf Good cop, Bad Cop: Forcing Middleboxes to Cooperate] | ||
+ | *Reddy, T., Patil, P., Wing, D. and Versteeg, B.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_reddy.pdf WebRTC UDP Firewall Traversal] | ||
+ | *Rescorla, E.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_rescorla.pdf Notes on Security Models for Transport Evolution] | ||
+ | *Schmidt, P. and Enghardt, T.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_schmidt.pdf Cross-Layer Coordination: Let’s Talk About Intentions] | ||
+ | *Welzl, M., Fairhurst, G., and Ros, D.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_welzl.pdf Ossification: a result of not even trying?] | ||
+ | *Williams, B.: [http://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_williams.pdf IAB SEMI Position Paper] |
Latest revision as of 10:31, 15 December 2014
The IAB
UNCTAD
- The mapping of international Internet public policy issues
- The mapping of international Internet public policy issues - Database
IUWG Position
Discussed Proposed positions
The proposed texts are linked or copied and discussed.
- Black, D.: UDP Encapsulation: Framework Considerations
- Blanchet, M.: Implications of Blocking Outgoing Ports Except Ports 80 and 443
- Briscoe, B.: Tunneling Through Inner Space
- Calvert, K.: Refactoring Transport for the Next Century
- Ding, A. Y., Korhonen, J., Savolainen, T., Liu. Y., Kojo, M., Tarkoma, S. and Schulzrinne, H.: Reflections on Middlebox Detection Mechanism in IPv6 Transition
- Edeline, K. and Donnet, B.: On a Middlebox Classification
- Hardie, T.: Network Function Virtualization and Path Character
- Huici, F., Raiciu, C. and Honda, M.: In-Network Processing, User-Level Stacks and the Future of Internet Evolution
- Huitema, C.: The Secure Transport Tussle
- Nádas, S. and Loreto, S: Middleboxes in Cellular Networks
- Nottingham, M. and Ponec, M.: UDP-based Application Layer Protocol Recipes to the Rescue
- Perkins, C. and McQuistin, S.: Reinterpreting the Transport Protocol Stack to Embrace Ossification
- Raiciu, C., Olteanu, V., and Stoenescu, R.: Good cop, Bad Cop: Forcing Middleboxes to Cooperate
- Reddy, T., Patil, P., Wing, D. and Versteeg, B.: WebRTC UDP Firewall Traversal
- Rescorla, E.: Notes on Security Models for Transport Evolution
- Schmidt, P. and Enghardt, T.: Cross-Layer Coordination: Let’s Talk About Intentions
- Welzl, M., Fairhurst, G., and Ros, D.: Ossification: a result of not even trying?
- Williams, B.: IAB SEMI Position Paper