User:Howard C. Berkowitz/Editor: Difference between revisions
imported>Howard C. Berkowitz No edit summary |
imported>Howard C. Berkowitz No edit summary |
||
Line 226: | Line 226: | ||
There are quite a few techniques, sometimes simple, that almost instantly lose their value when it becomes known they are used. Do not, however, fall into the trap of believing that there is a radical difference between what political scientists in academia and political scientists in intelligence do. The most significant difference is that the intelligence analyst may have to give a best estimate, with confidence factors, in an externally imposed amount of time. | There are quite a few techniques, sometimes simple, that almost instantly lose their value when it becomes known they are used. Do not, however, fall into the trap of believing that there is a radical difference between what political scientists in academia and political scientists in intelligence do. The most significant difference is that the intelligence analyst may have to give a best estimate, with confidence factors, in an externally imposed amount of time. | ||
The techniques of domestic political | The techniques of domestic [[campaign political research] aren’t necessarily the same, although there is some overlap, especially in opposition research. I can certainly say that a good political pollster, perhaps producing the polls that aren’t released to the media, makes extensive use of formal methodology that I studied in graduate-level political/social science courses. | ||
===The practice of politics=== | ===The practice of politics=== | ||
While the Workgroup system may not always be with us, I observe it is the Politics Workgroup rather than the Political Science Workgroup. I've had substantial experience in political campaigning, internals of poltical process, lobbying and preparing testimony. While some of my work was with what was then the [[U.S. Republican Party]], I can only claim that the party ethos was considerably different than it is today, when "moderate Republican" is the moral equivalent of "slightly pregnant." If I may use 12-step terms, I am a Recovering Republican, who still graduated from the Republican Senior Campaign Management School and was on campaign staffs, including the DC Nixon Campaign in 1972. I spent several years as Research Director for the District of Columbia (state-equivalent) Republican Committee and DC Young Republicans. For the Ripon Society, a moderate Republican policy group, I contributed to Congressional testimony on government secrecy and on Congressional representation for the District of Columbia. Representing [[Young Americans for Freedom]], I debated [[Tom Charles Huston]] on the constitutionality and practicality of the "[[Huston Plan]]" for domestic surveillance and political provocation during the second Nixon Administration. | While the Workgroup system may not always be with us, I observe it is the Politics Workgroup rather than the Political Science Workgroup. I've had substantial experience in political campaigning, internals of poltical process, lobbying and preparing testimony. While some of my work was with what was then the [[U.S. Republican Party]], I can only claim that the party ethos was considerably different than it is today, when "moderate Republican" is the moral equivalent of "slightly pregnant." If I may use 12-step terms, I am a Recovering Republican, who still graduated from the Republican Senior Campaign Management School and was on campaign staffs, including the DC Nixon Campaign in 1972. I spent several years as Research Director for the District of Columbia (state-equivalent) Republican Committee and DC Young Republicans. For the Ripon Society, a moderate Republican policy group, I contributed to Congressional testimony on government secrecy and on Congressional representation for the District of Columbia. Representing [[Young Americans for Freedom]], I debated [[Tom Charles Huston]] on the constitutionality and practicality of the "[[Huston Plan]]" for domestic surveillance and political provocation during the second Nixon Administration. | ||
Line 232: | Line 232: | ||
With the capture of the Republican Party by social conservatives, I was no longer actively affiliated, but continued to be involved in local politics, often nonpartisan, in Arlington County, Virginia. I am involved in a variety of serious discussion forums and mailing lists, often shared with elected and appointed officials. | With the capture of the Republican Party by social conservatives, I was no longer actively affiliated, but continued to be involved in local politics, often nonpartisan, in Arlington County, Virginia. I am involved in a variety of serious discussion forums and mailing lists, often shared with elected and appointed officials. | ||
=== The Truth about Network Reference Models === | |||
The early days of [[Computer network|computer networks]] were dominated by a few large companies such as [[IBM]] and [[DEC]]. In order promote interoperability and avoid a situation where a small number of vendors predominated, each with their own proprietary technology, it was necessary to introduce a set of [[open standards]] defining network protocols. There were two main candidates, "OSI" and "TCP/IP". | |||
====Open Systems Interconnection==== | |||
The FTSC and National Communications System contributed, in the late seventies, to the ANSI Distributed Systems (DISY) architecture, which was a significant input into the internationally defined [Open Systems Interconnection Reference Model]] (OSIRM). ISO 7498, the basic OSI specifications, was published in 1984. Even ignoring the eventual dominance of Internet protocols, there is a great deal of misunderstanding about OSI, because educators generally ignored supplemental ISO documents that clarified ISO 7498. | |||
From 1986 to 1991, I was the first technical staff member at the Corporation for Open Systems, a not-for-profit industry research center for promoting and testing OSI and ISDN protocols. In addition to secretariat work with the various committees, I managed teams working on FTAM and X.25 test systems, and contributed to IEEE 802 test systems. One memorable experience was lecturing about X.25 testing in Japan, and had the horrible realization that my PowerPoint slides, translated into Japanese, had gotten into a different order than my English-language notes. | |||
For around six years of my life, I explained how OSI was the answer, but eventually realized I didn't know the question. | |||
There is a continuing and frustrating tendency, in Wikipedia articles on network architecture, to treat the OSI model as if it is still used other than as a teaching aid, and to try to “coerce” (using the lovely word choice of my colleague, Priscilla Oppenheimer) Internet Protocol Suite protocols into OSI layers. Layering, as an abstraction, is useful up to a point. It can be overused. An updated IETF architectural document, RFC3439, <ref> {{Citation | |||
| first1 = R. | |||
| last1 = Bush | |||
| first 2 = D. | |||
| last2 = Meyer | |||
| title = Some Internet Architectural Guidelines and Philosophy | |||
| year = 2002 | |||
| publisher = IETF | |||
| url = ftp://ftp.rfc-editor.org/in-notes/rfc3439.txt | |||
| id = RFC3439 }} | |||
</ref> even contains a section entitled: "Layering Considered Harmful": ''Emphasizing layering as the key driver of architecture is not a feature of the TCP/IP model, but rather of OSI. Much confusion comes from attempts to force OSI-like layering onto an architecture that minimizes their use.'' | |||
I have insufficient hair to tear it out whenever I try to explain that the Internet protocol suite was not intended to match OSI, was developed before OSI, the full set of OSI specifications (i.e., not just document ISO 7498) subdivide layers so that it is no longer seven, and that OSI has, in the real world, been relegated to a teaching tool. The Internet Protocol Suite has four layers, defined in RFC1122<ref> {{Citation | |||
| first = R | |||
| last = Braden | |||
| title = Requirements for Internet Hosts -- Communication Layers | |||
| year = 1989 | |||
| publisher = IETF | |||
| url = http://www.isi.edu/in-notes/rfc1122.txt | |||
| id = RFC1122 }} | |||
</ref>and no IETF document, as opposed to some nonauthoritative textbooks, say it has five. | |||
No [[IETF]] standards-track document has accepted a five-layer model, and IETF documents indeed deprecate strict layering of all sorts. Given the lack of acceptance of the five-layer model by the body with technical responsibility for the protocol suite, it is not unreasonable to regard five-layer presentations as teaching aids, possibly to make the IP suite architecture more familiar to those students who were first exposed to layering using the [[OSI model]]. Comparisons between the IP and OSI suites can give some insight into the abstraction of layering, but trying to coerce Internet protocols, not designed with OSI in mind, can only lead to confusion. | |||
Again, RFC1122 defines 4 layers. If anyone can find another IETF document that states the OSI model is followed, please cite it. Further, RFC 1122 was published in 1989, while the OSI Reference Model, ISO 7498, was published in 1984. If the RFC 1122 authors had wanted to be OSI compliant, they had the OSI definitions available to them. They didn't use them. Does that suggest they were not concerned with OSI compliance? | |||
For Internet Protocol Suite architecture, textbooks are not authoritative; the IETF's work, particularly the Standards Track, is definitive for the Internet Protocol Suite. I've written networking textbooks, and, while I might clarify an IETF document, I certainly don't contend that textbooks are more definitive than the actual technical specifications created by expert, not beginning student or teacher, consensus. | |||
Unfortunately not available free online, there are ISO documents such as "Internal Organization of the Network Layer" <ref> {{Citation | |||
| title = Internal Organization of the Network Layer | |||
| year = 1988 | |||
| publisher = ISO | |||
| url = http://engineers.ihs.com/document/abstract/WRCFCAAAAAAAAAAA | |||
| id = ISO 8648 }} | |||
</ref>, which splits the network layer nicely into three levels, logical (lower-layer agnostic), subnetwork (i.e., link technology) specific, and a mapping sublayer between the other two. | |||
===="It's about IP, stupid"==== | |||
By the early nineties, it was obvious that Internet protocols were indeed the answer, and I started to play in the [[Internet Engineering Task Force]] (IETF), [[North American Network Operators Group]] (NANOG)and the [[Internet Research Task Force]] (IRTF). | By the early nineties, it was obvious that Internet protocols were indeed the answer, and I started to play in the [[Internet Engineering Task Force]] (IETF), [[North American Network Operators Group]] (NANOG)and the [[Internet Research Task Force]] (IRTF). | ||
In the IETF, my main work has been in the Routing (especially | In the IETF, my main work has been in the Routing (especially [[Border Gateway Protocol]] and [[Open Shortest Path First]]) and Operations & Management Areas (especially Benchmarking Methodology & Operations Security), and, more as a lurker, Security and Real-time Applications & Infrastructure Area. I am an author or coauthor of RFC 1912, RFC 2071<ref> {{Citation | ||
| first1 = P | | first1 = P | ||
| last1 = Ferguson | | last1 = Ferguson | ||
Line 278: | Line 322: | ||
}} | }} | ||
</ref>, which essentially looked at the question "what comes after BGP?" Some of my most satisfying work came when I was first the product line manager for routing protocols in the carrier router group, and then in corporate research at Nortel, both working with standards and operational forums, and designing a next-generation router. | </ref>, which essentially looked at the question "what comes after BGP?" Some of my most satisfying work came when I was first the product line manager for routing protocols in the carrier router group, and then in corporate research at Nortel, both working with standards and operational forums, and designing a next-generation router. | ||
Today, we rarely think about why Internet access has become so ubiquitous. Still, this is quite a technical achievement: a user may be connected to an [[Ethernet]] network, [[Fiber Distributed Data Interface]] (FDDI) or a wireless network in a coffee house. They may also use such diverse methods as DSL, cable, or dialup lines to "get online." | Today, we rarely think about why Internet access has become so ubiquitous. Still, this is quite a technical achievement: a user may be connected to an [[Ethernet]] network, [[Fiber Distributed Data Interface]] (FDDI) or a wireless network in a coffee house. They may also use such diverse methods as DSL, cable, or dialup lines to "get online." | ||
Revision as of 09:56, 10 February 2011
I have started an estimated 2000-3000 articles at CZ, and the list obviously is too long to detail here. Recently, I have been using the CZ: Subgroups mechanism to characterize many, encourage collaboration, and use for targeted recruiting. Nevertheless, I think it's the best way to see my contributions. The experience of writing CZ articles, editing, and being edited is itself a form of expertise. I'm sometimes concerned that Citizens without substantial CZ contribution experience believe themselves expert on the practice of CZ editing; the Editorial Council has recognized it is usually unwise to allow people to become Editors at initial registration time.
Not all the articles are long, but all should be thoroughly interconnected. One of the key differentiators between CZ and Wikipedia, I believe, is what I call contextualization. To help this process, with Chris Day, I developed the idea of the lemma article. One of the purposes of this article type was, even if its main theme was not fully developed, it could have a Related Articles page to link it to other relevant articles. Indeed, it can make sense even to start with a lemma and Related Articles, as something of an outline for an article. We do not want what have been called "orphan" articles or "walled gardens". As an Editor, I urge authors to contextualize.
Other contextualization, however, involves extensive development of a series of articles, such as wars of Vietnam, interrogation, intelligence cycle management, Pacific War, extrajudicial detention, Nazism, etc.
Yes, I am an Editor in multiple workgroups: Computers, History, Military, Politics and Engineering. My most successful professional experience, however, is interdisciplinary. While, for example, I am an expert in routing and switching, I am no longer current in a different aspect of computers, compiler writing. Routing, however, involves both software and hardware, electronics and system architecture of the latter being electronic engineering in the Engineering Workgroup. Carl von Clausewitz defined war as the "extension of national politics by military means", so it is a bit silly to claim that Military matters can be separated from Politics.
Fields of expertise
These do not strictly map to workgroups, and I have indeed specialized within workgroups. Nevertheless, these fields seem to express my areas of interest, not considering such things as serious personal participation in areas including cooking, visual arts and science fiction.
Articles can entertain as well as inform. Not all my articles (e.g., red-stewing; sympathetic magic; Chatham, Massachusetts; chicken-based technologies; pastel; Chicken-based technologies belong to subgroups (although there are applications of chicken-based technologies to nuclear weapons), and I have not yet placed all subgroup-relevant articles in the appropriate list. |
Do remember the titles of workgroups; they are not strictly academic. It's Computers, not Computer Science, and Politics, not Political Science. Such a view makes it plausible to have "practitioner experts" as well as "academic experts". Practical expertise, in turn, can be, in part, evaluated by examination of my body of work at CZ. I'm not the only practitioner that will have challenges in detailing all experiences; consider a potential Law Editor, the details of whose experience could breach client confidentiality.
As George Santayana put it, “those who forget the past are condemned to repeat it.” In my personal experience, it is difficult to separate serious current research from historical research. While there have been accusations that I do not consider formal historical methodology, it is a bit ironic that one of the complaints about my Adolf Hitler draft was that I included a section on historiography, now a separate article historiography of Hitler in the CZ:Historiography Subgroup.
Other broad experience at CZ includes membership in the Charter Drafting committee, serving throughout the process, as well as Editorial Council membership both before and after the Charter
Computer network engineering
First started programming in 1966, moved into real-time and fault-tolerant military and health systems by 1970, operating systems in 1973, and networks since 1974. Did take some graduate courses in computer science at George Washington University; there were no computer science academic curricula when I started. Designed and implemented first network (management) control center for the civilian U.S. government, 1974. Network architect for the Library of Congress and interconnected libraries, 1976-1980. First technical staff member for the Corporation for Open Systems, a nonprofit industry testing center for Open Systems Interconnection Reference Model and Integrated Systems Digital Network, 1986-1991. Consultant and certified trainer for Cisco Systems and related contractors, 1991-1999. Contributing member of Internet Engineering Task Force since 1995; International Organization for Standardization since 1979, North American Network Operators' Group since 1998. Member of Nortel Networks corporate research staff, first as product line manager for carrier routers and then senior adviser on IP routing, 1999-2001.
Author of four books, two from Macmillan (Designing ddressing architecture for routing and switching[1], Routing and switching for Enterprise Networks[2]); two from John Wiley and Sons (WAN Survival Guide [3], and Building Service Provider Networks[4]). Wrote networking chapter for Harvey Deitel's Operating Systems, 6th Edition. Technical director for CertificationZone, a Cisco study guide business, with a number of topics published as collections. Technical reviewer for Macmillan, Addison-Wesley, Wiley and Prentice-Hall. Author or coauthor of four IETF RFCs and reviewer of many more; participant in Benchmarking Technology, Interdomain Routing, OSPF, IS-IS, and other workgroups. Numerous publications and presentations for trade groups and professional associations, some peer-reviewed, some invited
My general sense is that vendor-independent traditional engineering books have a limited market, and I've been concentrating more on online publications. In the past, I've been involved in preparation for Cisco certifications, and still participate in mailing lists. I developed a Cisco course on Internet Service Provider infrastructure security.
- CZ: Routing and switching Subgroup
- CZ: Internet operations Subgroup
- CZ: Distributed computing Subgroup
- CZ: Internetworking Subgroup
- CZ: Security Subgroup
- CZ: Military information and communications Subgroup
Distributed computing
Networks interconnect computers that perform distributed computing. Some of my most recent work is in advising clients on cloud computing, with special emphasis on information security. Most of the military and medical systems on which I've worked are distributed, and network management is itself a distributed computing problem for controlling the routers and other network elements. A good deal of marine electronics is distributed, including Automatic identification system and vessel monitoring systems, to say nothing of military systems such as Cooperative Engagement Capability.
Other areas include System Control And Data Acquisition for critical infrastructure areas including the electrical power grid, chemical plants, etc.
My book, WAN Survival Guide, deals with the customer side of a distributed network, while Building Service Provider Networks complements the provider side. Email and Domain Name Service are distributed computing parts of network infrastructure.
- CZ: Distributed computing Subgroup
- CZ: Security Subgroup
- CZ: Critical infrastructure Subgroup
- CZ: Military information and communications Subgroup
Politicomilitary history and practice; intelligence
I became a Military Workgroup Editor when I first registered, in part, presumably, on the intelligence and related articles that I brought from WP. While I have no uniformed service, I began paid work as a military contractor/consultant in 1967, during the Vietnam War, in military social science and engineering. Some of my nontraditional learning came in even younger years; my mother was a U.S. Army reserve officer, the training officer for the 322nd General Hospital, and arranged for me to take informal training -- I was her study partner when she took the correspondence program for the Command and General Staff College.
When I applied for History and Politics Editor status, I indicated, and have kept reasonable faith, that I would subspecialize in modern military history and practice, the political dimensions of strategy, and U.S. politics including international organizations. To the extent that I deal with earlier periods, they contribute to modern history, such as the Lieber Code of 1863 as a predecessor to the Geneva Conventions and as a precedent for war crimes. I also deal with history of technologies, such as the evolution of interconnection and switching in the Public Switched Telephone Network (Strowger-to-SS7-to-SIP proxy) and Internet.
As mentioned elsewhere, I worked on analysis of Vietnamese Communist documents. Since my client was United States Army Special Forces, a good deal of their training curricula were made available to their contractors. During this time, I was also a special graduate student in the National Security Program, School of International Service, American University. In addition, I worked on early measurement and signature intelligence personnel sensors, first the M3 ammonia and smoke detector,[5] and some more experimental devices such as the bedbug-based device from the Army Night Vision Laboratories at Fort Belvoir. Weird as some of these may have seemed, it was important to understand the tactical doctrines by which they were used (e.g., Operation IGLOO WHITE), and their impact -- see Vietnam War ground technology.
During this time, I was involved in issues research and policy development for Republican organizations. For the Ripon Society, I prepared a policy paper on government secrecy, classified information and compartmented control systems. This involved extensive primary document work at the National Archives, as well as discussions with security officers at the Defense Department, CIA, State Department and National Security Agency. I was on the Foreign and Military Policy Subcommittee of the 1972 Young Republican National Federation Platform Recommendations Committee. Later, for Young Americans for Freedom, I debated domestic surveillance plans of the Nixon Administration with Tom Charles Huston.
After those projects, I moved to history of technology for the Office of Naval Research, tracking how basic research was realized in operational systems. Next, I spent several years in analysis and programming for military systems, again requiring understanding of how they were used. These included the Army's Combat Service Support System (CS3), and the Chief of Naval Operations Command Management Information System. My managers, mostly retired officers, encouraged my learning more and more about the military technology and its use, and arranged additional training.
As the network architect for the Library of Congress, I was a member of the Federal Telecommunications Standards Committee of the National Communications System (NCS). NCS, a "second hat" for the head of the Defense Information Services Agency, is responsible for ensuring the interoperability of government communications across all agencies, under stresses including nuclear war. Since we all dealt with extremely large data bases, imagery, and nonroman alphabets, I was the liaison for mutual interests to the Central Intelligence Agency and National Security Agency.
While at the Corporation for Open Systems, I had extensive involvement with military electronics, consulting to and running training for engineers at the Defense Information Systems Agency, and also the command and control support group for the Joint Chiefs of Staff.
More recently, I have consulted in open source intelligence projects, as well as intelligence information sharing for counterterrorism.
U.S. politics and historyWhile I oppose much of the activity of today’s U.S. Republican Party, I spent a number of years as an activist, holding office in party organizations, graduating from the senior campaign management program of the Republican National Committee. Campaigns in which I participated included the 1972 Nixon reelection and 1971 Jack Nevius for Congress. Of course, there is overlap between opposition research in politics and intelligence analysis. Going back to honors high school history, I have long been convinced that if there ever is totalitarianism in the United States, it will come from demagoguery on the right. To understand how such politics becomes dominant, I have maintained a lifelong interest in Nazism, and the The Paranoid Style in American Politics. Principally, however, my interest in history and politics deals with national security, but also with the use of propaganda against domestic targets. Transportation engineeringCurrent author for Marine Electronics Journal (National Marine Electronics Association) and consult to a marine electronics business, Beachwerks, in the fishing and recreational port of Chatham, Massachussetts, on Cape Cod. Integrate Electronic Charting Systems and chartplotters, using NMEA 0183, Ethernet, and NMEA 2000 networking with GPS, marine radio with digital selective calling, automated identification system, radar with automatic radar plotting aid, vessel monitoring system, sonar, engine performance monitoring and autopilot. Developed proposal for conversion of waste cooking oil to biodiesel, including chemical quality control and effect on marine diesel engines. Currently involved in discussions on human factors engineering for charting systems. Emergency managementMember of the Federal Telecommunications Standards Committee of the National Communications System (1976-1980). External network architect for the U.S. government Y2K information center and associated critical infrastructure monitoring. Developed designs for mass casualty management, weapons of mass destruction field laboratories, and U.S. Army field surgical team. Current member of Cape Cod Medical Reserve Corps, special interest in disaster communications; numerous courses from Federal Emergency Management Agency. Biomedical engineering and healthcareActive in the field since 1970, setting up the first clinical computer center for Georgetown University Medical Center, in a captive company called the Washington Reference Laboratories; had been in honors programs in microbiology and clinical chemistry since 1963. Implemented systems for toxicology (main military drug screening for the Vietnam War), regional virology center, regional blood banking for the American Red Cross, general hospital clinical chemistry, hematology and microbiology. Architect for nursing workflow product of Aionex Corp.; also designed electronic prescribing, data mining for clinical research, infection control root cause analysis. Member of Cape Cod Medical Reserve Corps, dealing with disaster communications.
|
- ↑ Berkowitz, Howard C. (1998). Designing Addressing Architectures for Routing and Switching. Indianapolis: Macmillan Technical Publishing. ISBN 1578700590.
- ↑ Berkowitz, Howard C. (1999). Designing Routing and Switching Architectures for Enterprise Networks. Indianapolis: Macmillan Technical Publishing. ISBN 1578700604.
- ↑ Berkowitz, Howard C. (2000). WAN Survival Guide: Strategies for VPNs and Multiservice Networks. New York: John Wiley & Sons. ISBN 0471384283.
- ↑ Berkowitz, Howard C. (2002). Building Service Provider Networks. New York: John Wiley & Sons. ISBN 0471099228.
- ↑ Reid Kirby (January–June 2007), "Operation Snoopy: The Chemical Corps' "People Sniffer"", Army Chemical Review
- ↑ Bush, R. & Meyer (2002), Some Internet Architectural Guidelines and Philosophy, IETF, RFC3439
- ↑ Braden, R (1989), Requirements for Internet Hosts -- Communication Layers, IETF, RFC1122
- ↑ Internal Organization of the Network Layer, ISO, 1988, ISO 8648
- ↑ Ferguson, P & H Berkowitz (1997), Network Renumbering Overview: Why would I want it and what is it anyway?, IETF, RFC2071
- ↑ Berkowitz, H (1997), Router Renumbering Guide, IETF, FDR
- ↑ Berkowitz, H; E Davies & S Hares et al. (2005), Terminology for Benchmarking BGP Device Convergence in the Control Plane, IETF, RFC4098
- ↑ Davies E. & Doria A., ed. (2007), Analysis of IDR requirements and History, IETF