[ih] IPv8...

Jack Haverty jack at 3kitty.org
Sat Apr 18 18:15:20 PDT 2026


On 4/18/26 14:38, Tony Li wrote:
> Hi Jack,
>
>> Somewhere in the timeline of Internet History, the notion of scenarios as drivers of technical choices must have disappeared.
> No, not at all.  In fact, it’s hard to get any solution through the IETF anymore without an independent “use cases” document.
>
> Regards,
> Tony
>
"Use Cases" and "Scenarios" are different things.   Both are needed.

My understanding of "Use Cases" is that they serve to show how some 
particular technology (protocol, algorithm, whatever) can be actually 
used in the Internet.  In other words, they are driven from the 
technology side, explaining how a technology could be used.

In contrast, "Scenarios" are driven from the end-users' perspective.  
They capture things that the end users need to be able to do, given the 
overall system of technologies that exist at the time.  The C3I scenario 
I described earlier captured one example of what the aggregate of 
military end-users needed to do, using the Internet to provide the 
communications infrastructure.   If there was a technological piece 
still missing, the scenario was not possible.

A particular technology may be useful and even necessary.  But by itself 
it is likely insufficient to actually enable any but the simplest 
end-users' scenarios.  Other technologies may also be needed before a 
particular scenario is workable.   Sometimes many technologies have to 
exist and work together.

It's also conceivable that some particular decision of a technology 
precludes ever reaching the goal of enabling a scenario.  A particular 
technology decision with a "use case" may rule out approaches to other 
technology issues that must also exist to enable the scenario.

In the C3I example I described, lots of technology advances seemed to be 
likely needed.  Routing algorithms almost certainly needed to evolve.  
Congestion and flow control likely needed changes too.  In military 
contexts, security was always a requirement.   Techniques for 
prioritizing traffic flows were likely needed.  Techniques for 
compressing large documents, voice streams, et al had to be created.  
Etc.   To meet the needs of the scenario, all the technical pieces had 
to exist and work together.

I first encountered "scenarios" while I was a student, in Professor 
Licklider's group at MIT.  Lick was my adviser and later boss for 
several years in the 1970s.  About ten years earlier, Lick had written 
memos about his vision of a "galactic network" in which computers were 
available to humans everywhere, and were somehow interconnected so that 
they could communicate with each other.

Lick's training was in psychology, so he thought from the human's 
end-user point of view.  He described the "scenario" of his "galactic 
network" vision as "computers everywhere helping humans do everything 
that humans do."  He understood that such a scenario was a bit too vague 
to serve as a specification.   But for a vision that was OK, and could 
serve to create other more detailed scenarios -- like the military ones.

In the mid-70s, one of the network research topics focussed on what came 
to be called email on the ARPANET.  I recall lots of discussions with 
Lick and many others to define relevant and more detailed scenarios.  
Lick's vision was broad, encompassing all sorts of human-human 
communication.  Emails might be short notes or massive documents.  They 
might be urgent, and require mechanisms for tracking through delivery.  
They might be multi-media, perhaps starting as text communications, 
switching to conversational voice, and even evolving into an interactive 
conferencing session using text and/or voice (video was just too hard to 
think about in the 1970s).  Interactions could be saved (such as on the 
"Datacomputer", which did exist on the ARPANET and our email system used 
it).  Long "conversations" could be related to each other as something 
like today's email "threads" and "forums".  Some communications might 
have to be private, protected from prying eyes along the way.  Some 
might need to have the author, and/or recipients, verified so that you 
could believe what you saw or heard came from where you thought it came 
from.   Some might be routed through a kind of "escrow agent", who could 
later independently testify that a document was real and had been 
authored, created, delivered, and handled at particular points in time.  
The scenario for comprehensive human-human communications was very complex.

We developed a rudimentary technical architecture for such a scenario, 
to at least serve as a starting point while computer technology advanced 
and more things became feasible.    Sadly it was probably never captured 
in any form more permanent than email archives, which are probably lost 
by now.  Lots of technologies would be needed.   It would take a while.  
  Research does.

That human-human communications architecture was shelved by ARPA in the 
mid-1970s in favor of a much simpler approach, to provide an interim 
solution that we now would all recognize as today's electronic mail.   I 
think Lick's scenario is still a good target, but I don't think anyone's 
been working on it for the last 50 years.

Anyway, I hope that explains the concept of "Scenario".....

/Jack Haverty



-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <http://elists.isoc.org/pipermail/internet-history/attachments/20260418/358b80e5/attachment-0001.asc>


More information about the Internet-history mailing list