Internet Fragmentation: Difference between revisions

Vivian (talk | contribs)
No edit summary
Vivian (talk | contribs)
No edit summary
Line 18: Line 18:
* '''Character:''' Whether fragmentation is generally positive, negative, or neutral
* '''Character:''' Whether fragmentation is generally positive, negative, or neutral


==Technical Fragmentation==
==Types of Fragmentation==
===Technical Fragmentation===
When the Internet concept was first articulated, a guiding vision was that
every device on the Internet should be able to exchange packets with any
other device. Universal connectivity was assumed to be a primary benefit. But
there are a variety of ways in which the original concept has been eroded
through a complex evolutionary process that has unfolded slowly but is
gathering pockets of steam in the contemporary era.
Four issue-areas are reviewed, including Internet addressing, interconnection,
naming and security. Within these categories, 12 kinds of fragmentation of
varying degrees of significance are identified:
1. Network Address Translation
2. IPv4 and IPv6 incompatibility and the dual-stack requirement
3. Routing corruption
4. Firewall protections
5. Virtual private network isolation and blocking
5
6. TOR “onion space” and the “dark web”
7. Internationalized Domain Name technical errors
8. Blocking of new gTLDs
9. Private name servers and the split-horizon DNS
10. Segmented Wi-Fi services in hotels, restaurants, etc.
11. Possibility of significant alternate DNS roots
12. Certificate authorities producing false certificates


==Governmental Fragmentation==
===Governmental Fragmentation===
The most common imagery of “governmental fragmentation” is of the global
public Internet being divided into digitally bordered “national Internets”.
Movement in the direction of national segmentation could entail, inter alia,
establishing barriers that impede Internet technical functions, or block the flow
of information and e-commerce over the infrastructure. Pressure and trends in
this direction do exist, as do counter-pressures.
Six issue-areas are reviewed, including: content and censorship; e-commerce
and trade; national security; privacy and data protection; data localization; and
fragmentation as an overarching national strategy. Within these categories,
10 kinds of fragmentation of varying degrees of significance are identified:
1. Filtering and blocking websites, social networks or other resources offering
undesired contents
2. Attacks on information resources offering undesired contents
3. Digital protectionism blocking users’ access to and use of key platforms
and tools for electronic commerce
4. Centralizing and terminating international interconnection
5. Attacks on national networks and key assets
6. Local data processing and/or retention requirements
7. Architectural or routing changes to keep data flows within a territory
8. Prohibitions on the transborder movement of certain categories of data
9. Strategies to construct “national Internet segments” or “cybersovereignty”
10.International frameworks intended to legitimize restrictive practices


==Commercial Fragmentation==
===Commercial Fragmentation===
A variety of critics have charged that certain commercial practices by
technology companies also may contribute to Internet fragmentation. The
nature of the alleged fragmentation often pertains to the organization of
specific markets and digital spaces and the experiences of users that choose
to participate in them, but sometimes it can impact the technical infrastructure
and operational environments for everyone. Whether or not one considers
commercial practices as meriting the same level of concern as, say, data
localization is of course a matter of perspective. Certainly there are significant
concerns from the perspectives of many Internet users, activists and
competing providers in global markets. As such, the issues are on the table in
6
the growing global dialogue about fragmentation, and they are therefore
discussed here.
Five issue-areas are reviewed, including: peering and standardization;
network neutrality; walled gardens; geo-localization and geo-blocking; and
infrastructure-related intellectual property protection. Within these categories,
10 kinds of fragmentation of varying degrees of significance are identified:
1. Potential changes in interconnection agreements
2. Potential proprietary technical standards impeding interoperability in the
IoT
3. Blocking, throttling, or other discriminatory departures from network
neutrality
4. Walled gardens
5. Geo-blocking of content
6. Potential use of naming and numbering to block content for the purpose of
intellectual property protection


==References==
==References==