51 research outputs found

    Can Hongkong Telecom be the leader in the emerging Internet market in Hong Kong.

    Get PDF
    Cheng Wai Man, Candy.Thesis (M.B.A.)--Chinese University of Hong Kong, 1996.Includes bibliographical references (leaves 65-66).ABSTRACT --- p.iiTABLE OF CONTENTS --- p.ivLIST OF FIGURES --- p.viiLIST OF TABLES --- p.viiiChapter Chapter1 --- Introduction --- p.1The Commercial Development of Internet in the US --- p.2Electronic Commerce is the Trend and Area of Competition --- p.4The Commercial Development of Internet in Hong Kong --- p.5High PC Penetration Facilitates Internet Pick-up --- p.7Chapter Chapter2 --- Internet Industry Analysis --- p.12Wholesaler -- The Backbone Network Carrier --- p.13Target CustomersBooming Demand on Leased Circuit ServiceIntensified Competition with New EntrantsRegional Opportunity is the Main IssueRetailers -- The Internet Service Provider (ISP) --- p.16Large ISPs DominateEnlarging Service Portfolio to Remain CompetitiveISP Exerts Great Substitution Force on On-line ServiceOn-line Service Providers --- p.20Losers and WinnersISP Substituting Conventional On-line ServiceNew Entrants with a Hand on InternetCollaboration Among the IT Players to Tap on the Emerging MarketUsers --- p.24General Users Receptive to InternetCorporate Users Demand High End ServiceCustomer Needs Determine Internet Access EmployedChapter Chapter3 --- Commercial Opportunities For Hongkong Telecom with the Rising Internet Demand --- p.30The Golden Goose: ISDN --- p.31Regional Opportunities -- Hubbing Creates Entry Barrier --- p.33Development of Network Security as Value Added Service --- p.34Network Service Consultancy --- p.36Chapter Chapter4 --- Threats to Hongkong Telecom with the Rising Internet Demand --- p.37Revenue Migration --- p.37Customers Switching Brand --- p.38Pre-empt Local Competition --- p.39Chapter Chapter5 --- Competitive Advantages of Hongkong Telecom --- p.41Huge Customer Base Speeds Up Service Adoption --- p.41Unchallenged Credibility --- p.42Expertise in Network Configuration and LAN Management --- p.42Expertise in Developing Security System --- p.43Network Resource Abundance --- p.43Administrative Ability to Run an Internet Operation --- p.44Hi-tech Infrastructure for Future Development -- IMS --- p.45Differentiation -- Local Access in Overseas Possible --- p.46Chapter Chapter6 --- Strategic Integration and Positioning of HKT to Dominate the Internet Market --- p.48TCSL Internet --HKT as a Backbone Network Manager --- p.48Target CustomersMarket PotentialInternet AccessDirect CompetitorsMajor Customer BenefitsPricingMajor Service OfferingsBenefits to HKTIMS On-line -- Internet-based On-line Service Provider --- p.52Target CustomersInternet AccessDirect CompetitorsMajor Customer BenefitsPricingBenefits to HKTChapter Chapter7 --- The HKT Challenges --- p.55Strategically Positioning of IMS On-Line and TCSL Internet --- p.55Extension of Core Business -- New Venture --- p.58High Overhead Balancing Off Profitability --- p.61Business Cannibalizing Each Other --- p.62Chapter Chapter8 --- "Conclusion -- ""Win Win"" Situation" --- p.64BIBLIOGRAPHY --- p.65Appendix 1: Growth Rate of Internet Users --- p.67Appendix 2: Commercial Addresses Comprise 51% of Internet Network Registration --- p.68Appendix 3: Internet Service Providers in Hong Kong --- p.69Appendix 4: Comparison Among ISPs on Service Offerings --- p.71Appendix 5: Network Configuration between Customer End and HKT CSL Internet Node --- p.7

    Information Outlook, March 1999

    Get PDF
    Volume 3, Issue 3https://scholarworks.sjsu.edu/sla_io_1999/1002/thumbnail.jp

    Intra-Domain Pathlet Routing

    Full text link
    Internal routing inside an ISP network is the foundation for lots of services that generate revenue from the ISP's customers. A fine-grained control of paths taken by network traffic once it enters the ISP's network is therefore a crucial means to achieve a top-quality offer and, equally important, to enforce SLAs. Many widespread network technologies and approaches (most notably, MPLS) offer limited (e.g., with RSVP-TE), tricky (e.g., with OSPF metrics), or no control on internal routing paths. On the other hand, recent advances in the research community are a good starting point to address this shortcoming, but miss elements that would enable their applicability in an ISP's network. We extend pathlet routing by introducing a new control plane for internal routing that has the following qualities: it is designed to operate in the internal network of an ISP; it enables fine-grained management of network paths with suitable configuration primitives; it is scalable because routing changes are only propagated to the network portion that is affected by the changes; it supports independent configuration of specific network portions without the need to know the configuration of the whole network; it is robust thanks to the adoption of multipath routing; it supports the enforcement of QoS levels; it is independent of the specific data plane used in the ISP's network; it can be incrementally deployed and it can nicely coexist with other control planes. Besides formally introducing the algorithms and messages of our control plane, we propose an experimental validation in the simulation framework OMNeT++ that we use to assess the effectiveness and scalability of our approach.Comment: 13 figures, 1 tabl

    SWIFT ISP Local Loop: An Emerging Business Dimension for Local ISP Market in Pakistan

    Get PDF
    SWIFT Belgium has introduced their new product – the ISP Local Loop (ISP-LL) for banks and institutions to connect to SWIFT’s secure network through the Internet last year in February 2005. The product, which is bundling of Virtual Private Network (VPN), enables customers to access SWIFT’s Secure IP Network (SIPN) through local Internet Service Providers (ISPs). The architecture and different aspects of this report has been observed that how this product can become a fruitful business dimension for ISP market in developing countries. The ISP markets in Pakistan are struggling with different solutions and various network architectures they propose. Using their technological skills the ISPs of Pakistan can jump into the competition and can see their banking industry as their market for this and forthcoming products of SWIFT. The product is attractive in terms of cost, usage and scalability that ISPs can easily market by targeting the strong financial sector of Pakistan. SWIFT also continually provides new business opportunities for stakeholders. Keeping in view these aspects, the land is fertile and SWIFT has given seeds to sow only plough is needed that ISPs already have in shape of technology, the only requirement for the crop to grow is to bring them together

    The role of an ICT change agent in ICT diffusion within technology projects in public and private sector setting

    Get PDF
    Rapid changes in the competitive environment and increasing customer demands drive the public and private sectors to innovate by continually investing millions of dollars in Information and Communication Technology (ICT) projects. Basically, organisations depend on ICT technology for every part of their business. Companies are not only challenged to apply new technologies to remain competitive, they also need to spread (diffuse), manage and implement technological innovation across extended organisational boundaries. Diffusion, management and implementation of ICT innovation involve a considerable amount of risk and potentially protracted delays of technological projects. As a consequence of high demand for ICT innovation, as well as the risk of failure, a wide range of organisations such as state agencies and banks now employ so-called change agents to diffuse, manage and implement innovation within technological projects. While a large number of academics and practitioners are concerned with change agents who alter organisational culture, structure and processes, relatively little research has been undertaken on the role of ICT change agents in the innovation process. Thus, this professional doctorate study aims to fill that gap by exploring ICT change agents’ project work experiences within state agencies and banks and fuse them with theory. The research is based on case study methodology, including 41 cases within 12 target organisations in Australia and Germany. As a former ICT change agent, the researcher of this Doctor of Business Administration (DBA) study applied mixed research methods, also incorporating her ICT project experiences by using an individual reflection model. From this investigation emerged that change agents’ roles are embedded in components (organisational structure, project stages) and processes (ICT diffusion, informal networks). These findings underpin the model of ICT change agents who perform the multiple linker roles of these components and processes in order to deliver set project outcomes. The model is designed to inform practice by providing guidance for advanced ICT change agents’ training in public and private sector settings.Doctor of Business Administratio

    Intelligent Network Infrastructures: New Functional Perspectives on Leveraging Future Internet Services

    Get PDF
    The Internet experience of the 21st century is by far very different from that of the early '80s. The Internet has adapted itself to become what it really is today, a very successful business platform of global scale. As every highly successful technology, the Internet has suffered from a natural process of ossification. Over the last 30 years, the technical solutions adopted to leverage emerging applications can be divided in two categories. First, the addition of new functionalities either patching existing protocols or adding new upper layers. Second, accommodating traffic grow with higher bandwidth links. Unfortunately, this approach is not suitable to provide the proper ground for a wide gamma of new applications. To be deployed, these future Internet applications require from the network layer advanced capabilities that the TCP/IP stack and its derived protocols can not provide by design in a robust, scalable fashion. NGNs (Next Generation Networks) on top of intelligent telecommunication infrastructures are being envisioned to support future Internet Services. This thesis contributes with three proposals to achieve this ambitious goal. The first proposal presents a preliminary architecture to allow NGNs to seamlessly request advanced services from layer 1 transport networks, such as QoS guaranteed point-to-multipoint circuits. This architecture is based on virtualization techniques applied to layer 1 networks, and hides from NGNs all complexities of interdomain provisioning. Moreover, the economic aspects involved were also considered, making the architecture attractive to carriers. The second contribution regards a framework to develop DiffServ-MPLS capable networks based exclusively on open source software and commodity PCs. The developed DiffServ-MPLS flexible software router was designed to allow NGN prototyping, that make use of pseudo virtual circuits and assured QoS as a starting point of development. The third proposal presents a state of the art routing and wavelength assignment algorithm for photonic networks. This algorithm considers physical layer impairments to 100% guarantee the requested QoS profile, even in case of single network failures. A number of novel techniques were applied to offer lower blocking probability when compared with recent proposed algorithms, without impacting on setup delay time

    Towards SDN-based smart contract solution for IoT access control

    Get PDF
    Access control is essential for the IoT environment to ensure that only approved and trusted parties are able to configure devices, access sensor information, and command actuators to execute activities. The IoT ecosystem is subject to various access control complications due to the limited latency between IoT devices and the Internet, low energy requirements of IoT devices, the distributed framework, ad-hoc networks, and an exceptionally large number of heterogeneous IoT devices that need to be managed. The motivation for this proposed work is to resolve the incurring challenges of IoT associated with management and access control security. Each IoT domain implementation has particular features and needs separate access control policies to be considered in order to design a secure solution. This research work aims to resolve the intricacy of policies management, forged policies, dissemination, tracking of access control policies, automation, and central management of IoT nodes and provides a trackable and auditable access control policy management system that prevents forged policy dissemination by applying Software Defined Network (SDN) and blockchain technology in an IoT environment. Integration of SDN and blockchain provides a robust solution for IoT environment security. Recently, smart contracts have become one of blockchain technology’s most promising applications. The integration of smart contracts with blockchain technology provides the capability of designing tamper-proof and independently verifiable policies. In this paper, we propose a novel, scalable solution for implementing immutable, verifiable, adaptive, and automated access control policies for IoT devices together with a successful proof of concept that demonstrates the scalability of the proposed solution. The performance of the proposed solution is evaluated in terms of throughput and resource access delay between the blockchain component and the controller as well as from node to node. The number of nodes in the IoT network and the number of resource access requests were independently and systematically increased during the evaluations. The results illustrate that the resource access delay and throughput were affected neither linearly nor exponentially; hence, the proposed solution shows no significant degradation in performance with an increase in the number of nodes and/or requests

    Vital Signs, Summer 2012

    Get PDF
    A forty-eight page newsletter created by the Boonshoft School of Medicine to document the current affairs of the school. This issue includes a variety of feature articles, a research spotlight, alumni notes, and more.https://corescholar.libraries.wright.edu/med_vital_signs/1019/thumbnail.jp

    Correctness of services and their composition

    Get PDF
    We study correctness of services and their composition and investigate how the design of correct service compositions can be systematically supported. We thereby focus on the communication protocol of the service and approach these questions using formal methods and make contributions to three scenarios of SOC.Wir studieren die Korrektheit von Services und Servicekompositionen und untersuchen, wie der Entwurf von korrekten Servicekompositionen systematisch unterstĂĽtzt werden kann. Wir legen dabei den Fokus auf das Kommunikationsprotokoll der Services. Mithilfe von formalen Methoden tragen wir zu drei Szenarien von SOC bei

    A study on the industry evolution of Internet service providers ("ISP") in Hong Kong.

    Get PDF
    by Chiang Tung-Keung, Wu Po-Wan, Andy.Thesis (M.B.A.)--Chinese University of Hong Kong, 1998.Includes bibliographical references (leaves 77-78).ABSTRACT --- p.iiTABLE OF CONTENTS --- p.iiiLIST OF FIGURES --- p.viLIST OF TABLES --- p.viiADKNOWLEDGEMENTS --- p.viiiChapterChapter I. --- INTRODUCTION --- p.1The Wave of Internet --- p.1A Platform for Worldwide Communications --- p.1Fierce Competition of ISP Industry in Hong Kong --- p.2Chapter II. --- OBJECTIVES OF THE STUDY --- p.4Chapter III. --- METHODOLOGY --- p.5Structure of Study --- p.5Literature Review and Interviews --- p.6Model Analysis --- p.7Chapter IV. --- THE INTERNET --- p.8Definition --- p.8A Brief History --- p.8Who Manages the Internet --- p.10Utilities of the Internet --- p.11Remote Access --- p.11Interpersonal Communications --- p.11Information Gathering --- p.12Commercial Operations --- p.12Others --- p.13How to Connect to the Internet - the Topology --- p.13How Information is Moved Over the Internet --- p.14Packet Switched Network --- p.15The Internet Protocol (“IP´ح) --- p.15Chapter V. --- The ISP INDUSTRY IN HONG KONG --- p.18Definition --- p.18Services of ISP --- p.18Internet Access --- p.18Value-added Services --- p.19WEB hosting --- p.19Facilities management (Server hosting) --- p.19System design and integration --- p.20WEB page design --- p.20Operation of ISP --- p.20ISP Access to the Internet Backbone --- p.20Common Ways of Access to ISP --- p.22Leased line Internet connections --- p.23Dialup IP connections --- p.24Cyber Map of Hong Kong --- p.24"Hong Kong Internet eXchange (""HKIX"")" --- p.25The Value Chain - Role of ISP --- p.27Cost Structure of ISP --- p.28Capital Cost --- p.28Operating Cost --- p.29Chapter VI. --- ISP - INDUSTRY LEVEL --- p.31The Past and Present of the ISP Industry in Hong Kong --- p.31The History --- p.31The Technology --- p.34The Government --- p.35The Five Forces --- p.37Entry barrier --- p.37Internal rivalry --- p.39Substitutes --- p.41Supplier power --- p.42Buyer power --- p.43The Demand --- p.44Competition and Profitability --- p.45Future Projection of the ISP Industry in Hong Kong --- p.46The Technology --- p.46The Government --- p.47The Five Forces --- p.48Entry barrier --- p.48Internal rivalry --- p.49Substitutes --- p.50Supplier power --- p.50Buyer power --- p.52The Demand --- p.52Competition and Profitability --- p.52Chapter VII. --- HONG KONG ISP - FIRM LEVEL --- p.54Value-added Analysis --- p.54Cost Structure --- p.55Cost Drivers --- p.55Economies of scale --- p.55Learning curve --- p.56Economies of scope --- p.57Benefit Drivers --- p.57Ease of connection --- p.57Traffic speed --- p.58Customer services --- p.59Hyperlinks and contents --- p.59Internet based services --- p.59Extensive sales network --- p.60Seller's reputation --- p.60Large installed base --- p.61Tailor-made services --- p.61Strategies --- p.62Wholesaling of Bandwidth --- p.62Focusing on Household Market --- p.63Focusing on Corporate Customers --- p.67Concentrating on Value-added Services --- p.68Integration and Alliances --- p.70Chapter VIII. --- CONCLUSIONS --- p.73APPENDIX --- p.74BIBLIOGRAPHY --- p.7
    • …
    corecore