Layers and levels Models of analysis 17.447/17.448 Fall, 2011

advertisement
Layers and levels
Models of analysis
17.447/17.448
Fall, 2011
1
Review
• In our last meetings we have presented two
tools of analysis for our work.
– A layered model of cyberspace
• A model familiar to computer science.
– Levels of analysis
• A model familiar to political science.
• The goals today
– Elaborate these models.
– Link them together.
2
Layers model from last week
Businesses
Citizens
NGOs, etc. Illegitimates
The net
People
Providers
Suppliers Standards Intl policy
Information
Logical
Application
Services
Internet
Physical
3
Govts
Levels of analysis
• The other tool, familiar to political science.
– But extended in fundamental ways.
4
IR levels of analysis
Global
International
State
Individual
5
Adding in private actors
Degree of state involvement
Private sector actors
Scope
Global
International
State
Individual
6
Collective actors
come with many
scopes:
•Local to a state
•Trans-national
•“Going for
Global”
The “belongs to”
arrows do not
strongly apply to
collective private
actors.
Using this model
• This model can be a tool of analysis to characterize
problems:
– Causes of war, nature of spam, climate change.
• Some problems may suggest a framing at multiple levels, some
(like climate change) seem to have a natural level where their
analysis must necessarily go.
• This model can also be a tool to explore the space of
solutions.
– A proposed solution that is at a different level than the
“natural” level of the problem may not be effective.
7
Curing spam
Global
State
Discuss at ITU
Pass laws
Individual
Private sector actors
International
Establish Spamhaus
Abandon email;
Use IM
Install a spam filter
8
Some actors move the locus
Global
Private sector actors
International
State
Advocacy groups
attempt to take
issues at the
individual level
and elevate them
to state-level
issues.
•Privacy
Advocacy
groups
Such action may
rebalance the
power among the
actors.
Individual
9
Private order
Global
Private sector actors
International
U.S. Congress
andState
agencies.
States delegate
regulation to
collective actors:
•FASB
•UL
•D&B
Administrative
organization
Individual
10
Asymmetric contention
• When actors of different sorts contend, they use
different tools, leading to asymmetric contention.
– States pass laws and enter into contracts.
– U.N. organizations convene summits and pass resolutions.
States use tools of diplomacy, such as consensus building
and stalling.
– Companies lobby, form larger collectives for clout, fund
preferred outcomes.
– Advocacy groups protest.
11
States differ in their control
Global
Private sector actors
International
State
Chinese ISPs
US views ISPs are
(largely) private
actors.
Other nations
such as China
view ISPs as full
agents of the
state.
U.S. ISPs
Interactions
among these ISPs
may have an
asymmetric feel.
Individual
12
Contention over DNS
Private sector actors
Global
WSIS/IGF
ICANN
International
US delegate DNS
regulation to
ICANN. Claims it
is “global”.
Internet-based
firms
Other nations
U.S. Dept
State
of Commerce
State and nonstate actors
contest the
legitimacy of this
at WSIS and IGF.
Individual
13
“Internet”
companies back
ICANN
A potentially useful elaboration
Degree of state involvement
International
State
Individual
14
Profit-seeking actors
Non-profit actors
Scope
Global
Combining the models
• Actors can be positioned within both models
– As can “issues” and “solutions”.
15
The matrix
Individual
State
International
People
Information
Logical
Applications
Services
Internet
Physical
16
Global
Non-profits
Profitseeking
Examples of issues
Individual
Logical
People
State
International
Digital divide
Information
Privacy;
Peer
production
Censorship
Applications
Peer
production
Lawful
intercept
Services
Global
Developing
world
Takedown;
IPR,
Spam;
Wikileaks
Blocking DNS
Governance
of DNS
Allocation of
IP addresses
Internet
Home
network mgt.
Network
neutrality
Physical
Home wiring
Facilities
unbundling
Satellite orbit
spectrum
17
Non-profits
Profitseeking
Controlling spam
Individual
State
International
Filter
Pass laws;
authorize
private
action
Discuss
Global
Non-profits
Profitseeking
Spamhaus
Filter;
Certified
emailers
People
Logical
Information
Applications
Block ports
Services
Block DNS
Internet
Disconnect
ISPs
Disconnect
ISPs;Identify
BOTs
Physical
18
Wikileaks
Individual
State
International
Global
People
Information
Wikileaks
Logical
Applications
Services
Internet
Physical
19
Non-profits
Profitseeking
Spam marketing
Individual
State
International
Global
People
Information
Spam
Logical
Applications
Services
Internet
Physical
20
Non-profits
Profitseeking
France and nazi memorabilia
Individual
State
International
People
Information
French law
Logical
Applications
Services
Internet
Physical
21
Global
Non-profits
Profitseeking
Enforcement of IPR
Individual
State
International
People
Information
IPR
enforcement
Logical
Applications
Services
Internet
Physical
22
Global
Non-profits
Profitseeking
Lessons
• This (and other) examples suggest the
following: ( I made this slide in advance…)
– Remedies can be implemented at different levels
and layers.
• Remedies at different levels (e.g. individual vs.
state) may or may not be effective.
– Want to understand issues.
• Remedies at different layers are often either
ineffective or “blunt instruments”.
23
Analysis/synthesis
• Case studies of specific events help us
generate a catalog of responses.
– Our matrix is one approach to helping organize
and discover the range of responses.
– Need tools to help us think methodically.
• The harder problem is mechanism design.
– The Internet is a built artifact.
– A technology change can “change everything”.
– How do we think methodically about that?
24
Systems engineering
• The art/science of designing large complex
systems is called “systems engineering”.
– Lots of books on how to do it.
• But they don’t tell us how to think
methodically about the necessary range of
issues.
– For many systems (highways, planes, airports,
power systems), we have prior experience to help
us catalog the issues.
– We have not built many Internets.
25
An example of a design question
• What would the implications be if we
hardened the jurisdictional boundaries of the
Internet by making sure that the binding from
an IP address to a national jurisdiction was
unambiguous?
– In whose interest?
– What would change for better or worse?
– Should computers that fight cyber-wars wear
uniforms?
26
The matrix
Individual
State
International
People
Information
Logical
Applications
Services
Internet
Physical
27
Global
Non-profits
Profitseeking
The matrix
Individual
State
International
People
Information
Logical
Applications
Services
Internet
Physical
28
Global
Non-profits
Profitseeking
The matrix
Individual
State
International
People
Information
Logical
Applications
Services
Internet
Physical
29
Global
Non-profits
Profitseeking
Examples of institutions
Individual
Logical
People
State
International
Global
Non-profits
FTC
(consumer
protection)
Information
Copyright
Censors
Applications
Freegate
Profitseeking
EFF, CDT
Wikipedia
Spamhaus;
WIPO
I
T
U
Services
I
G
F
Google,
NetFlix, etc.
W3C; Open
software
Facebook,
Twitter
ICANN*
(DNS)
DynDNS, DNS
registrars
Internet
Agencies as
ISPs
NANOG; IETF
ISPs
Physical
State-owned
facilities
IEEE 802
Fiber,
satellite, etc.
30
Summary
• My goal in my current research is to provide
tools to think methodically about both
analysis (of a specific situation) and about
design (of future network mechanisms).
• Come back later to one approach to the latter
– Control point analysis.
• There are potential class research topics
about both analysis and design.
31
Quick tutorial on DNS
• Domain Name System
– A means to use names, not IP addresses, to
identify locations on the network.
• Allows location dynamics.
• Easier to remember (?)
• Sometimes meaningful.
32
DNS is a name hierarchy
• Example name: www.mit.edu
– Top level domains (TLDs) such as .edu, .com, .us, etc are
stored in “root servers”.
• The image is “the root of the tree”.
• The addresses of the various root servers must be globally
propagated in the background.
– The root of the tree is always special.
– The server at each level provides the name of the server at
the next level.
• The root server gives the address of the server for .edu, which
gives the server address for .mit in .edu. And so on.
33
A picture
.com IPaddr
.edu IPaddr
…
Root
.edu
.com
.mit.edu
34
Design goals
• Resilience and failure-proof.
– Replicated distributed servers at each level.
• But not resistance to attack.
– Penetration and corruption.
– Mis-direction.
– Lack of assurance as to authority.
• Pharming, DHCP exploits
35
MIT OpenCourseWare
http://ocw.mit.edu
17.447 / 17.448 Cyberpolitics in International Relations: Theory, Methods, Policy
Fall 2011
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
36
Download