Chinese operators hope to standardize a segmented Internet
But their efforts will be fruitless, according to DNS experts
IDG News Service - A technology draft written by employees at China Mobile and China Telecom and submitted to the Internet Engineering Task Force describes how the Internet could be split into several parts using the Domain Name System and in the process give countries more control over their own segment of the network.
The DNS is one of the key building blocks of the Internet. Its most important task is translating IP (Internet Protocol) addresses to host names, which is done by a distributed system based on one unique root that is used all over the world.
The technology is developed by the IETF, on whose website the Chinese "DNS Extension for Autonomous Internet" draft is available for viewing.
Today, China blocks Internet access to some foreign websites. The goal outlined by the new document is to make it easier and cheaper for countries to create independent root DNS servers and realize Internet autonomy. Today, that is both costly and technically difficult, according to the draft.
"When you read the document it very much comes across as a way to severely segment the Internet," said Patrik WallstrAPm, CEO at OpenDNSSEC AB, a nonprofit company with the mission to facilitate the deployment of DNSSEC, which is used to secure DNS.
If the draft is adopted it would give, for example, China full control of content on the Internet for users in the country as well as how it can be accessed and by whom, WallstrAPm said.
The reason for adopting the draft into a standard architecture would not be just for control, according to the authors. The current central architecture of DNS can't keep up with the fast development of Internet, they say.
That argument doesn't ring true, according to Jakob Schlyter, a DNS expert at Swedish consultancy Kirei.
"When you say something like that you have to back it up with some facts, which I don't think they have ... the DNS root has an extreme overcapacity," said Schlyter.
However, the chances of the draft being adopted is very remote, according to both WallstrAPm and Schlyter.
Anyone can individually submit an Internet draft to the IETF. But since the intended goal with the Chinese document is standardization, it first has to be picked up by one of the IETF's working groups, and that isn't going to happen, WallstrAPm said.
"It is a controversial subject, and the IETF works on standards that, in principle, are for the global Internet," said WallstrAPm.
The idea of moving away from a central DNS root also goes against the IAB's (Internet Architecture Board's) technical comment from 2000, detailing the need for a unique DNS root to ensure the future of the Internet, according to WallstrAPm. The comment came after several alternative roots came into existence during the nineties, he said.
- Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small...
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Supercharge Your Web and Mobile App Development with High-Productivity Hybrid Cloud Webinar: Hear from industry experts about the amazing power at the intersection of next-generation web and mobile application development and cloud platforms.
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Internet White Papers | Webcasts