{"id":6610,"date":"2017-04-27T18:55:02","date_gmt":"2017-04-27T18:55:02","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/2017abrilen\/ietf-ip-protocol-stacks-in-extreme-environments"},"modified":"2018-01-19T15:09:23","modified_gmt":"2018-01-19T15:09:23","slug":"ietf-ip-protocol-stacks-in-extreme-environments","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/","title":{"rendered":"IETF: IP Protocol Stacks in Extreme Environments"},"content":{"rendered":"<p>More than 1000 experts from around the world gathered for the IETF 98 event held in Chicago (USA), a global meeting of the group of engineers and professionals that agrees the technical aspects that allow the proper operation of the Internet.<\/p>\n<p>Attended by a significant number of Latin Americans, the meeting was marked by the change of IETF leadership as it was chaired by Alissa Cooper, who took over as IETF chair from outgoing chair Jari Arkko (<a href=\"https:\/\/www.youtube.com\/watch?v=lhYWB5FFkg4\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.youtube.com\/watch?v=lhYWB5FFkg4<\/a>)<\/p>\n<p>\u201cIt was a special week,\u201d noted LACNIC CTO and active IETF member and participant Carlos Mart\u00ednez.<\/p>\n<p>The Chicago meeting attracted many new faces: almost 17% of the 1000 participants were attending their first IETF meeting.<\/p>\n<p>Mart\u00ednez highlighted the two-day IETF Hackaton in which 18 independent teams participated. These teams worked on various IETF documents and proposed projects which they presented before a judging panel.<\/p>\n<p>Likewise, the innovative documents on which IETF experts are working include several that deal with the Internet of Things (IoT). \u201cThis area requires a lot of new work, as many of the existing protocols are not appropriate for connecting everything,\u201d Mart\u00ednez added.<\/p>\n<p>A new IETF project is concerned with low-power devices than have connectivity issues. \u201cThe challenge is how to adapt Internet protocols to be able to use them in low-power devices with connectivity constraints,\u201d Mart\u00ednez observed. In certain environments constraints are extreme, for example, sensor networks in sewers or in open fields, and this work focuses precisely on creating IP protocols that will help improve their use under these conditions.<\/p>\n<p>Another highlight of the IETF plenary sessions were the presentations by Niels ten Oever and David Clark, who addressed the relationship between Internet protocols and human rights. \u201cThe way technology affects the ability to exercise certain human rights online,\u201d Mart\u00ednez commented.<\/p>\n<p>After presenting a brief history of human rights and raising questions about how technology affects the ability to exercise these rights online, both speakers encouraged the audience to debate on whether the protocols we have today are useful, if there is an Internet equivalent to the right to assembly, and whether or not DNS queries respect individual privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 1000 experts from around the world gathered for the IETF 98 event held in Chicago (USA), a global meeting of the group of engineers and professionals that agrees the technical aspects that allow the proper operation of the Internet. Attended by a significant number of Latin Americans, the meeting was marked by the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6550,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[498,499,503],"tags":[1271,480,474,1289],"archivo":[791,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-6610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-casa-de-internet-en","category-cybersecurity","category-research","tag-cibersecurity","tag-ietf-en","tag-institutional","tag-research","archivo-april-2017-edition","archivo-editions"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments\" \/>\n<meta property=\"og:description\" content=\"More than 1000 experts from around the world gathered for the IETF 98 event held in Chicago (USA), a global meeting of the group of engineers and professionals that agrees the technical aspects that allow the proper operation of the Internet. Attended by a significant number of Latin Americans, the meeting was marked by the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-27T18:55:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-19T15:09:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"IETF: IP Protocol Stacks in Extreme Environments\",\"datePublished\":\"2017-04-27T18:55:02+00:00\",\"dateModified\":\"2018-01-19T15:09:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\"},\"wordCount\":366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png\",\"keywords\":[\"Cibersecurity\",\"IETF\",\"Institutional\",\"Research\"],\"articleSection\":[\"Casa de Internet\",\"Cybersecurity\",\"Research\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\",\"name\":\"LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png\",\"datePublished\":\"2017-04-27T18:55:02+00:00\",\"dateModified\":\"2018-01-19T15:09:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png\",\"width\":680,\"height\":220},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IETF: IP Protocol Stacks in Extreme Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments","og_description":"More than 1000 experts from around the world gathered for the IETF 98 event held in Chicago (USA), a global meeting of the group of engineers and professionals that agrees the technical aspects that allow the proper operation of the Internet. Attended by a significant number of Latin Americans, the meeting was marked by the [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2017-04-27T18:55:02+00:00","article_modified_time":"2018-01-19T15:09:23+00:00","og_image":[{"width":680,"height":220,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"IETF: IP Protocol Stacks in Extreme Environments","datePublished":"2017-04-27T18:55:02+00:00","dateModified":"2018-01-19T15:09:23+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/"},"wordCount":366,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","keywords":["Cibersecurity","IETF","Institutional","Research"],"articleSection":["Casa de Internet","Cybersecurity","Research"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/","url":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/","name":"LACNIC Blog | IETF: IP Protocol Stacks in Extreme Environments","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","datePublished":"2017-04-27T18:55:02+00:00","dateModified":"2018-01-19T15:09:23+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","width":680,"height":220},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/ietf-ip-protocol-stacks-in-extreme-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"IETF: IP Protocol Stacks in Extreme Environments"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/04\/ietf.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":6571,"post_title":"IETF: la pila de protocolos IP en ambientes extremos","slug":"ietf-la-pila-de-protocolos-ip-en-ambientes-extremos","href":"https:\/\/blog.lacnic.net\/ietf-la-pila-de-protocolos-ip-en-ambientes-extremos\/"},{"locale":"pt_BR","id":6612,"post_title":"IETF: a pilha de protocolos IP em ambientes extremos","slug":"ietf-a-pilha-de-protocolos-ip-em-ambientes-extremos","href":"https:\/\/blog.lacnic.net\/pt-br\/ietf-a-pilha-de-protocolos-ip-em-ambientes-extremos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=6610"}],"version-history":[{"count":6,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6610\/revisions"}],"predecessor-version":[{"id":10074,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6610\/revisions\/10074"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/6550"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=6610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=6610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=6610"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=6610"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=6610"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=6610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}