Vinton Cerf, who is revered as the "Father of the Internet", later went to Google and is still doing what he loves. Speaking of the Internet he helped to invent, he seemed full of surprise: "New things such as social networks, business applications, and mobile devices are constantly pouring into the Internet. The scale of the Internet has grown by more than a million times. Not many things can develop as continuously as the Internet. But the old protocols we created are still available." Yes, after the test of time, the old protocols are "still available", and all the greatness or pride is revealed here.
(Photo source: Baotu.com) The long process of fine-tuning the protocol evolution The core protocols of the Internet have hardly changed significantly for a long time. People in the industry should still remember that in the 1980s, after TCP/IP became the basic protocol of the Internet, most traffic on the network only needed to use a few core protocols: IPv4 (routing data packets), TCP (converting data packets into connections), SSL/TLS (encrypting connections), DNS (naming the connected host) and HTTP (Hypertext Transfer Protocol). After many years, we found that the technical evolution of these core protocols has only made some minor adjustments: TCP has implemented congestion control, TLS has slowly completed minor modifications, DNS has introduced security extension protocols, and HTTP has added some new headers and methods. The only significant change is the evolution from IPv4 to IPv6, which is also receiving high attention from network operators. The slogan of IPv6 is enough to attract attention: every grain of sand on the earth will be assigned an IP address. It aims to solve the problem that IPv4 address resources are about to be exhausted. [The IPv4 protocol was born in 1981. At that time, only a few computers were connected to the Internet. Later, in addition to computers, mobile phones, e-readers, set-top boxes, Internet TVs, many devices in smart power, cameras and sensors in urban monitoring, medical equipment, etc., flocked to the Internet.] IPv6 is not new, and its development in China has been dubbed as "getting up early and catching up late". Under the current situation, the development of IPv6 will be driven by both the state and the market, and the driving force at the national policy level was strongly launched again in November 2017. In fact, my country proposed the IPv6 development plan as early as 2003. It can be seen that the technical evolution of network protocols affects the whole body, and it does require strategic guidance at the government level, which is not easy. Unsafe network protocols The address problem is just the tip of the iceberg. In the future, TCP/IP will also face new applications such as augmented reality (AR/VR), Internet of Things (IoT), autonomous driving, tactile Internet, artificial intelligence (AI)/machine learning (ML), etc. The impact of these applications on them is no longer just a simple IP address resource issue, nor is it just about end-to-end IP connection, quality of service (QoS), security, mobility, intelligent network management, and profitable business models. These issues will pose great challenges to the application types, technical capabilities, and theoretical assumptions that network protocols such as TCP/IP rely on when they were first designed. The Internet is a great invention of mankind, but it has never been developed based on the latest protocols and standards. Otherwise, it would not have required nearly 5,000 protocol standards to form the current structure. The Internet brings these protocols together to form an extremely complex whole to support the original applications and the new applications that are constantly added. Network protocols have always been under pressure to evolve and iterate. Old protocols cannot remain at the "usable" level forever. Just like the early network protocol families that once shone brightly, today, only the TCP/IP protocol is still being improved, and many new protocols have been generated. Other network protocols have almost stagnated, and no one even talks about or uses them anymore. Network protocols are entering a time of change Today, even more significant changes are taking place—core Internet protocols are also undergoing major changes. Although this change will maintain compatibility with existing networks to the greatest extent possible, it will still have a significant impact on the majority of Internet users. Mark Nottingham (member of the Internet Architecture Board and co-chair of the HTTP and QUIC working groups of the IETF) believes that the driving force behind the Internet's embrace of major changes is that the many limitations of the core Internet protocols have become very obvious, especially in terms of performance, which has caused major problems. Due to the shortcomings of the application and transmission protocol's own structure, network resources cannot be effectively utilized, which in turn leads to poor performance experience for end users, especially in terms of latency. Because of this, the industry has a strong incentive to evolve or replace these existing protocols - as there is ample evidence that even small performance gains can have a huge impact on the user experience. Another urgent crisis is that if the process of this core evolution is delayed, the future Internet may lose the opportunity to change - HTTP proxies that compress responses make it difficult for us to deploy new compression technologies; TCP optimization mechanisms in middleware also make it difficult for us to improve existing TCP - as time goes by, the evolution of the Internet protocol will become more and more difficult, until it is impossible to move forward. The matter is far from over. Among the series of problems exposed after the commercialization of the Internet, the most thorny and difficult to solve is the security issue. The "Prism Gate" incident of Edward Snowden in 2013 made every ordinary citizen realize the importance of network security. At this time, we have encountered a special existence in network protocols - network security protocol. It is special because it has now become the main battlefield of network protocol technology evolution, and its technological evolution path has become more muddy. References:
|
<<: The Legend of Network Protocol (III): The Glorious Family Goes East and West
>>: The legend of network protocols (V): The shadow of a great power is hard to eliminate
In addition to popular devices such as smartphone...
5G is like a "tonic pill" that has sudd...
There are two basic types of industrial network s...
The Internet of Things (IoT) has fundamentally ch...
"Now that I'm using 5G, I don't thin...
Data centers are the infrastructure for modern bu...
The three major operators have already commercial...
Yesterday, the highly anticipated 2024 General Ar...
HostDare released the latest promotion in LET, of...
[[430197]] Image from Baotu.com If the scenic spo...
China Telecom announced that it will stop selling...
In the process of industrial digitalization, Inte...
This is the first time that the tribe has shared ...
On the 27th, China Telecom released its first qua...
What is a long connection? Long connection or sho...