Presentation
Context by the text
residency in Boulder
Network protocol X25, as start to study TCP/IP + idea of alternative internet
Lori Emerson - Other Networks
http://mediaarchaeologylab.com/
Research focus: How does a protocol work?
method: trying to set up a network (with acquired/situated knowledges)
TCP/IP flawed X25 (mis)understanding the flow
An X25 network doesn't work successfully on a global scale the way it does on the local scale
scale issues on protocols: local->global
+ medium issues: phone->computer
legacy
: distance yourself from the current formations of things by looking at how other formations could work
Managed network, connecting two points: In some ways this is similar to the claims that Uber make about now being an employer, just connecting a service to a user.
experiment in anarchy / the great anarchist event
media archaeology heads toward in-the-middle technologies (pushes you as a researcher to look at interfaces)
In the lab, everything was about the interface.
How to transpose our computing knowledge to machines of 30 years ago.
Legacy: working through historical residues - not a methodology
Lab was organised around interfaces, made it difficult
technical reading + oral history interviews, Andrew Russell - Open Standards and the Digital Age
http://aaaaarg.fail/thing/537f5469334fe04de2c63dba
European vs US histories of the internet
Europeans working for telecom (old world) vs Americans doing computing (future)
http://arussell.org/
/ binary narratives
"networking had to be rescued from the telecom companies"
relationality protocol-infrastructure
ideological readings/narratives interconnected with the function -> it's posible to track-back the polarisation of the function
absurd thing: global hegemonic network makes it possible to function otherwise.
refusal of the centralised model/ideology/technology of x25
free market openness but functions very differently
it is "free" as long as it lives in the context of the US market
using trace-routing (ref. Maja): showing the routes that you use to go to a website reveals how much the telecom infrastructure is still there
Nina Canell & Robin Watkins --> http://www.canellwatkins.org/
Questions & comments
https://redecentralize.github.io/alternative-internet/
Søren R: Values inherent in different systems?
x25, network protocol conceptualized by telecom companies, realized through consensus
IP protocol: free way to do networking, liberated from immediate need to do networking, detach logical of the flow from logical of infrastructure
Christian: strong method. Reminds me of how people try to understand poetry ("new criticism").
Compartaive literature structure. Substituting words. New criticisms. Histories are fascinating.
replacing 1 element by another
-> they used it before as well, ex doing radio network (?) instead of wired
Histories are fascinating when they reflect back on current times:
complex, fathers of the internet trying to inscribe themselves, so near & active still (Eric Schmidt wirting it :-))
I would be interested in looking deeper into agency through legacy (nor archaelogical neither genealogical, exactly): it keeps anomaly present instead of celebrating the epic. Q: Does it have any relation with the notion of latencies?
Femke: what objects are you looking at to see legacies?
Roel: how IP address is imagined & how it reveals ideas behind it
X25: phone number, 1st number linked to country on map vs IP address has mathematical elegance (and that shows how they come from different perspectives)
RFC request for comments -> can someone extend on this?
'task force'
Nicolas: collaboration? what happens with voices?
Martino: writing is difficult, practise works well
we use pads in same physical spaces, each one writes txt, other comments
Geoff: your own ideological position? you avoid Galloway's protocol / Deleuze's control societies
Protocol as a technological of functioning and current capitalist context, it merges the two.
it does not work well when you want to look at protocol from the perspective of philosophy of technology; it conflates it.
try to use different elements
a heterodox approach
Renee: Struggling discussing Google, confirms hegemony (and its legacy)
Martino: there is an urgency, there is no 'other'
Renee: I think there is an 'other' -> would be interesting to extend on this!
Kristoffer: interested in idea of Legacy systems - Wolfgang Ernst: technology and micro-temporality. Obsolence? Legacy systems are usually such that are still in use and need to be maintained - thus the link to microtemporality is there - yet obviously, cultural history also plays a part in how the system is maintained or marginalised today. (or reappropriated for that matter)
current concrete instantiations?
Martino: ex linux command line (not the same weight of maintenance)
long term temporalities that are still part of our technologies, such as the linux command line.
till 2012 public X25, ao Minitel
now only private networks, designed to run for 40-50 y
still a lot of current technical documentation, but impossible to use them
Maja: interesting methodology, very different than mine
'slippery protocol object'
Martino: look from different aspect: infrastructural, ideological... allow for different understanding
Thinking about different strategies to work with these ideas in a group setting - can the protocols be acted out, by transposition onto social relations (for instance), or alternatively through the development of new( or use of existing) tools that problematise these systems and their politics?
I'd like to hear more about the influence on X.25 on tcp/ip, where the anachic ideology breaks down.
What is your next step in this research?
I wonder to which extent history is reversed now with cloud-based platforms or silos that control the traffic? Are Apple, Amazon, Google etc the new telcos? Might be different protocols but same rhetoric?
---
title: Marino Monti & Roel Abbing – The stupid network that we know and love
slug: marino-monti-roel-abbing
id: 95
link: https://machineresearch.wordpress.com/2016/09/26/marino-monti-roel-abbing/
guid: https://machineresearch.wordpress.com/?p=95
status: publish
terms: Uncategorized
---
This text is an offshoot of a period of research on an obsolete network protocol, X.25, which was taken as a technical object of comparison to study the ways in which contemporary Internetworking works. Being informed by particular hands-on experiences with protocols, it is written as an accompanying text for a small practical exercise.
Legacy
In the early days of internetworking, before the establishment of the Internet Protocol suite (TCP/IP) as the global undisputed standard, different protocols were developed in competition with one another. X.25 was one such competitor and was for more than two decades the hegemonic networking technology. X.25 and TCP/IP emerged around the same period in response to similar questions, and still co-exist nowadays, representing alternative networking paradigms. However, X.25 is used in few specific cases and is been phased out for many years, hence it is often described as a legacy protocol in technical literature.
Legacy in this context is used as an adjective to refer to methods, software or hardware considered obsolete. The term is used to derogatorily point at the burden of maintaining older components of a system which can not be removed without breaking support for or compatibility with older versions, thus requiring extra work and care. Outside of technical parlance, used as a noun, legacy is defined as an inheritance, or as the outcomes of past events.
The interplay between the technical parlance and the colloquial meaning of the word suggested a way to understand the long-term relations between systems that are decades apart from each other.
The text that follows is an attempt at activating the concept of legacy as an approach to look at and speak about technology. Legacy protocols, formats and systems are reluctantly dragged along into the present together with shiny black-boxed interfaces. This offers a continuity in which structures inherited from the past appear next to those of the present. As a result, legacies implicitly question current paradigms of innovation and progress and return technological artifacts to their complex historical dimension.
The potential of these legacies comes from the way they can be experienced from within, through the practice of use, shifting our ordinary punctual relation to a technical object. Any such object always involves certain long-term elements, which can be mobilized to obtain a temporal displacement in the functioning of the object, and in our understanding of its functioning.
Legacy is therefore a site to ground archaeological and genealogical approaches in the devices and systems we encounter in our everyday life.
In practice, it often implies anomaly, deviance or mis-functioning of the normal operation of something. Nonetheless, the attempted use of X.25 was in itself a revealing experience of some fundamental differences between the TCP/IP protocol and its legacy other.
Network
The assumption that one could experience the X.25 by reading technical manuals and setting up a connection was dispelled in understanding the complex interdependence between the protocol and the infrastructure it was meant to run on. Our understanding of the functioning of a protocol is influenced by our existing knowledge of the TCP/IP, so we just tried to apply the way we would relate to that. What we didn't know, is how much the design choices of TCP/IP were fundamentally taken in opposition to the paradigms of networks like X.25.
At the time of the parallel development of the two protocols, the debate on internetworking was polarized along two constellations of agents, interests, industries and technologies.
This debate can be re-casted by accessing the Oral Histories of the Internet, told by the 'protagonists' of this history, many of whom are still alive, and most of which are involved in reconstructing an own personal account of the events. As a result one has to be wary that these individual histories are biased in many ways ranging from the heroic memories of the pioneers to the accounts of the ones that didn't make it into the Internet Hall of Fame but want to reinstate their participation in the process. They are still an invaluable resource to try and track the evolution of the technical and political controversies.
In most Oral Histories, the two constellations are generally recalled in a stylized fashion, and we will idly rehash them once again for simplicity. On one side X.25 was promoted by the national telephone monopolies trying to enter the nascent market of computer networking by applying their knowledge of networks, thus protecting their interests in the existing infrastructures. On the other, TCP/IP was funded by the US Department of Defense and supported by the emerging computer industries, stressing a model in which the terms for computer networking would not be dictated by the PTTs(Post, Telegraph and Telephone companies) and where computer networking could be built up from the start.
While presented as opposed, both these formations worked on experimental methods of interconnecting computers over long distances, however they differed in methods and priorities based on different requirements and economies. The predominant way that this contraposition can be read in the histories of the Internet is of a clash between computing culture and telephony culture. As a sub-text, the telephony world represents the status-quo and old way of doing things, based on national monopolies, their hierarchical and bureaucratic proceedings, their concerns for the wellbeing of national industries and technological sovereignty and therefore their political interference with the markets. On the other hand the emerging world of the computer industries and internetworking is depicted as based on (smaller scale) private enterprise, transnational collaboration, flat hierarchies and designs based on pure technical merit as opposed to any form of politics.
This account sounds suspicious today, for its linearity, its partitioning between political and apolitical, its accounts of market freedom, or the unclear role of the US Department of Defense, to name a few. Still, accepting this narrative as integral part of the legacy, offers an interesting angle to analyze the mutually productive relation between technical design choices and ideological positions, rather than limit ourselves to deconstruct the latter.
Bearing in mind this loose sketch of urgencies, agents and discourse around the development of the two paradigms, we can turn now to their conceptual and technical oppositions that partake in the diagram.
Paradigm
Both IP and X.25 are protocols for so-called packet switched networks. Packet switching is a technique to split up data into separate small chunks (packets) before transmission, so multiple connections can simultaneously travel over the same line. On arrival the packets are reassembled and the data reconstructed. The two differ most prominently in the understanding of how this packet switching should happen. The two approaches proposed were a connection-oriented paradigm called Virtual Circuit and a connectionless paradigm called Datagram.
X.25 has been the most important attempt based on the Virtual Circuit model of packet switching. The Virtual Circuit was proposed as a commercially viable method of using the existing infrastructure, unsurprisingly owned by the same parties that were funding the development. For this reason they imagined the existing and widespread telephone system as the basis for future data networks. In their model the switching through the network (routing) was handled by management centers. The management meant ensuring that all packets in the transmission flowed over the same route and arrive in the correct order. So it was the equipment of the telephone network, rather than the one of the users, that would take care of correct transmission of data and the allocation of bandwidth for the connection. The operation of dedicated leased lines would be guaranteed by the PTTs, which would charge a fee for this service and retain a role of central management of the flows in the network.
The paradigm on which IP is modeled, instead, is the connectionless model named Datagram, that came out of experimental networking research. This model reconceptualized the network as an agglomeration of separated and interconnected computer networks. The packets, or datagrams are created embedding their own addressing information, that the devices in the network use to forward packets to the next device, repeating this process until the destination is reached. It is then the sending and receiving machines at the ends of the connection that are responsible for tasks such as ensuring delivery, order and timeout of packets. This allowed networks to be imagined without facing the status of the existing infrastructure, fictionalizing it as a series of ducts through which the data would flow without the network having to care for it, an approach dubbed network agnostic. This approach implied that the computer industry would be the main influence on computer networking while the telephone companies should just provide the conduits for it.
What was sketched above are just the conceptual models that guided the development of the protocols, the development of both meant actually an hybridization of the two models. In the case of the datagram-based IP, for example, the diffusion and success came by coupling it with the companion protocol TCP, which is itself a Virtual Circuit protocol. The Internet's TCP/IP set is thus an application of both approaches.
In synthesis, one main contraposition between the two conceptual models was in the way in which they related to the network infrastructure. The Virtual Circuit model implied that the physical infrastructure was the most important element of the network, whereas the Datagram model proposed an abstraction of the logical network from its material grounding, implying that it doesn't (or shouldn't) matter. Even though both protocols had to compromise with the material conditions of the network, and both ended up as a hybrid of the two models, the debate on the two opposing conceptions of internetworking achieved an own agency, which still retains an influence today.
Narrative
The legacy of the contrapositions that were outlined in the previous sections is evident in a number of contemporary debates. A clear example is the controversy over the prospect of management of certain flows of data over the Internet, which has been catalyzed by the concept of net neutrality. Net neutrality is assumed as an essential quality of the Internet, which has accompanied its development and should be protected. The general discourse, championed by digital rights organizations such as EFF ( https://www.eff.org/issues/net-neutrality ) and by companies such as Google ( https://www.google.com/takeaction/action/freeandopen/index.html ), is that a network should not discriminate the way that information is vehicled through on the base of its content, if at all.
Leaving aside the extent to which certain types of management have already been in place for some time, the source of this concept as a foundational quality of the Internet can be tracked back to the debate that was just outlined. The idea of net neutrality is closely related to the idea of the dumb pipe, circulating in the TCP/IP formation, which fictionalizes a complete separation between the physical and logical levels of communication. It is generally taken to mean the localization of intelligence, in the sense of the interpretation of content, at the ends of the network, while the in-between flow of information happen through a network of neutral ducts.
The political significance of such design principles kept implicit in the early times of the debate, which pretended to be limited to a technical confrontation among models and topologies. It was evident though to all the people involved what economies and world-views the two paradigms represented, due to manifest elements such as who was funding the research and pushing for adoption.
It is with the prevailing of the TCP/IP protocol and the global success of the Internet that discourse sedimented, equating some successful design choices of the protocol with certain ethical and political values.
A representative example is the 1998 article "Rise of the Stupid Network" by David Isenberg that describes how "the Internet, because it makes the details of network operation irrelevant, is shifting control to the end user", and "end user devices would be free to behave flexibly because, in the Stupid Network the data is boss, bits are essentially free." So "the Internet that we know and love is a "virtual network" – a "network of networks" – that is independent of wires and transport protocols."
What the legacy of the DG/VC debate suggests is that these values should be read as traits that the TCP/IP protocol had at specific point in time, as a reaction to a competitor with another set of features, rather than as intrinsic qualities of TCP/IP themselves. It is therefore ironical but not surprising that the dissemination of these Internet narratives happened concurrently to the revision of the design choices to which these inherent qualities were ascribed, and that the reason for such compromises was precisely the increasing popularity of TCP/IP. The success of the protocol introduced material issues of scaling, of composition with the existing infrastructure and negotiation with its related economies.
The text will continue with/informed by the proceedings of a practical workshop that attempts to probe some elements of the current formation of the Internet, in tension with the legacy outlined above.
References
Abbate, Janet. Inventing the Internet. 58839th edition. The MIT Press, 2000.
Bowker, Geoffrey C., Karen Baker, Florence Millerand, and David Ribes. “Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment.” In International Handbook of Internet Research, edited by Jeremy Hunsinger, Lisbeth Klastrup, and Matthew Allen, 97–117. Springer Netherlands, 2009.
cheek, cris, Braxton Soderman and Nicole Starosielski. “Network Archaeology,” Amodern Journal. Vol. 2 (Fall 2013).
DeNardis, Laura. Protocol Politics: The Globalization of Internet Governance. The MIT Press, 2014.
Després, Rémi. Oral history interview with Rémi Després by Valérie Schafer. Oral History, May 16, 2012. http://conservancy.umn.edu/handle/11299/155671.
———. “X.25 Virtual Circuits - TRANSPAC IN France - Pre-Internet Data Networking.” IEEE Communications Magazine 48, no. 11 (November 2010): 40–46.
Galloway, Alexander R. Protocol: How Control Exists after Decentralization. MIT Press, 2004.
Pelkey, James. “CYCLADES Network and Louis Pouzin 1971 - 1972,” 2007. http://www.historyofcomputercommunications.info/Book/6/6.3-CYCLADESNetworkLouisPouzin1-72.html.
Pouzin, Louis. Oral history interview with Louis Pouzin by Andrew L. Russell. Oral History, April 2, 2012. http://conservancy.umn.edu/handle/11299/155666.
———. “Virtual Circuits vs. Datagrams: Technical and Political Problems,” 483–94. ACM, 1976. doi:10.1145/1499799.1499870.
Russell, Andrew L. Open Standards and the Digital Age: History, Ideology, and Networks. Cambridge University Press, 2014.