|From The Editor
In this issue, Geoff Huston concludes his two-part article on Interconnection, Peering, and Settlements. Last time Geoff discussed the technical aspects for Internet Service Provider (ISP) interconnection. This time he examines the associated business relationships that arise out of ISP peering arrangements. He also looks at some future directions for the ISP interconnection environment, particularly with respect to Quality-of-Service considerations.
A recurring theme in this journal has been the traditional lack of security in Internet technologies and systems. We have examined several ways in which security has been added at all levels of the protocol stack. This time we look at firewalls, a popular way to segregate internal corporate intranet traffic from Internet traffic while still maintaining Internet connectivity. Fred Avolio gives the history of firewalls, their current state, and future directions.
Computer viruses have probably existed for as long as we have had computers. However, the ease with which viruses can be distributed as Internet e-mail attachments has made the problem more prevalent. Recently, the Melissa virus achieved some notoriety because of its "self-replication" properties. Barbara Fraser, Lawrence Rogers, and Linda Pesante of the Software Engineering Institute at Carnegie Mellon University examines some of the issues raised by this kind of virus.
This issue is the first anniversary issue of The Internet Protocol Journal (IPJ). You can find all of our back issues in PDF format at the IPJ Web site: www.cisco.com/ipj . Please let us know if you have suggestions for articles, books you want to review, or general feedback for this jour-nal. Our contact address is: email@example.com .
-Ole J. Jacobsen, Editor and Publisher firstname.lastname@example.org .