FedRAMP Boundaries — Articles on Application-Aware Networking

A collected series by Michal Doroszewski

federal-modernization
fedramp-boundaries
application-aware-networking
book
Author

Michal Doroszewski

Published

April 17, 2026

This collection brings together twenty-one articles on Application-Aware Networking — a growing and largely unspoken problem in federal cloud architecture: the absence of meaningful visibility, telemetry, and adaptive control in the networks that agencies depend on every day.

The series is structured in two parts.

Together these articles argue that the network must become aware of the applications it carries, and that building this awareness requires a deliberate, structured, and layered approach.

Prologue

Part I — The Problems

  1. 1. The Blindfold Problem
  2. 2. The Boundary Problem
  3. 3. The Distance Problem
  4. 4. The Identity Problem
  5. 5. The Arbitrariness Problem
  6. 6. The Telemetry Problem
  7. 7. The Optimization Problem
  8. 8. The Media Problem
  9. 9. The Trust Problem
  10. 10. The Policy Problem

Part II — The Layers

  1. 11. The Visibility Layer
  2. 12. The Continuity Layer
  3. 13. The Control Layer
  4. 14. The Signal Layer
  5. 15. The Evaluation Layer
  6. 16. The Decision Layer
  7. 17. The Automation Layer
  8. 18. The Remediation Layer
  9. 19. The Recovery Layer
  10. 20. The Stability Layer
  11. 21. The Resilience Layer

UIAO canon alignment

This book is Series 1 + Series 5 of the UIAO modernization canon:

  • Series 1 — Federal Modernization Architecture reads Part I as its foundational diagnostic arc.
  • Series 5 — Unified Identity-Addressing-Overlay Architecture reads Part II as its architectural body.

Per ADR-028 and the pre-UIAO promotion path (ADR-030), these articles were drafted before the UIAO substrate was formalized; they are published here with byline and body preserved, filename qualifiers dropped, and one title disambiguated (Article 05 renamed from “The Boundary Problem” to “The Arbitrariness Problem” to resolve a collision with Article 02).

Source: inbox/Book of Articles - Application Aware Networking.docx and the 21 individual article files from the round-2 drop on 2026-04-17.

Back to top