4,039 research outputs found

    Regulatory Approaches to NGNs: An International Comparison

    Get PDF
    The emergence of Next Generation Networks (NGNs) raises profound challenges for regulators everywhere. Different regulatory authorities have approached these problems in strikingly different ways, depending in part on the overall regulatory milieu in which they operate, and in part on the nature of the NGN migration envisioned by major market players. Also, the NGN core network raises significantly different issues from those of the NGN access network. The migration to NGN raises many of the same issues that were already on the table as a result of the broader migration to IP-based services, notably in regard to the de-coupling of the service from the underlying network. To these concerns are added profound questions related to the nature of market power. Will NGNs enable new forms of competition? Will competitive bottlenecks remain, especially in the last mile? Will NGN enable new forms of bottlenecks to emerge, especially in the upper layers of the network, perhaps as a result of new IMS capabilities? Regulators in the UK, Netherlands, Germany, Japan and the United States have been forced to deal with these issues due to relatively rapid migration to NGNs proposed by their respective incumbent telecoms operators. Many of the same issues are also visible in the recommendations that the European Commission finalised on 13 November 2007 as part of the ongoing review of the European regulatory framework for electronic communications. In this paper, we compare and contrast the many regulatory proceedings that have been produced by these regulatory authorities.Regulation; Next Generation Networks; access network; core network; all-IP; competition; market power; international comparison

    Regulatory Approaches to NGNs: An International Comparison

    Get PDF
    The emergence of Next Generation Networks (NGNs) raises profound challenges for regulators everywhere. Different regulatory authorities have approached these problems in strikingly different ways, depending in part on the overall regulatory milieu in which they operate, and in part on the nature of the NGN migration envisioned by major market players. Also, the NGN core network raises significantly different issues from those of the NGN access network. The migration to NGN raises many of the same issues that were already on the table as a result of the broader migration to IP-based services,notably in regard to the de-coupling of the service from the underlying network. To these concerns are added profound questions related to the nature of market power. Will NGNs enable new forms of competition? Will competitive bottlenecks remain, especially in the last mile? Will NGN enable new forms of bottlenecks to emerge, especially in the upper layers of the network, perhaps as a result of new IMS capabilities? Regulators in the UK, Netherlands, Germany, Japan and the United States have been forced to deal with these issues due to relatively rapid migration to NGNs proposed by their respective incumbent telecoms operators. Many of the same issues are also visible in the recommendations that the European Commission finalised on 13 November 2007 as part of the ongoing review of the European regulatory framework for electronic communications. In this paper, we compare and contrast the many regulatory proceedings that have been produced by these regulatory authorities.Regulation; Next Generation Networks; access network; core network; all-IP; competition; market power; international comparison.

    Systemization of Pluggable Transports for Censorship Resistance

    Full text link
    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vectors available to a censor has led to an arms race, leading to a dramatic speed of evolution of LCs. Despite their inherent complexity and the breadth of work in this area, there is no systematic way to evaluate link circumvention systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a LC, a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an evaluation stack that underscores a layered approach to evaluate LCs, and (iv) systemize and evaluate existing censorship resistance systems that provide link circumvention. We highlight open challenges in the evaluation and development of LCs and discuss possible mitigations.Comment: Content from this paper was published in Proceedings on Privacy Enhancing Technologies (PoPETS), Volume 2016, Issue 4 (July 2016) as "SoK: Making Sense of Censorship Resistance Systems" by Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg (DOI 10.1515/popets-2016-0028

    Evidence-informed regulatory practice: an adaptive response, 2005ā€‘15

    Get PDF
    Overview: In this occasional paper, the ACMA reflects on its regulatory practice over the past 10 years; specifically, the role of research in evidence-informed decision-making and regulation. It looks at how the ACMA has used research in an environment of ongoing change to document and build evidence, inform public debate about regulation, and build capability among our stakeholders to make communications and media work in Australiaā€™s national interest

    The Quest for a Killer App for Opportunistic and Delay Tolerant Networks (Invited Paper)

    Get PDF
    Delay Tolerant Networking (DTN) has attracted a lot of attention from the research community in recent years. Much work have been done regarding network architectures and algorithms for routing and forwarding in such networks. At the same time as many show enthusiasm for this exciting new research area there are also many sceptics, who question the usefulness of research in this area. In the past, we have seen other research areas become over-hyped and later die out as there was no killer app for them that made them useful in real scenarios. Real deployments of DTN systems have so far mostly been limited to a few niche scenarios, where they have been done as proof-of-concept ļ¬eld tests in research projects. In this paper, we embark upon a quest to ļ¬nd out what characterizes a potential killer applications for DTNs. Are there applications and situations where DTNs provide services that could not be achieved otherwise, or have potential to do it in a better way than other techniques? Further, we highlight some of the main challenges that needs to be solved to realize these applications and make DTNs a part of the mainstream network landscape

    Network Neutrality: A Research Guide

    Get PDF
    The conclusion in a research handbook should emphasise the complexity of the problem than trying to claim a one-size-fits-all solution. I have categorised net neutrality into positive and negative (content discrimination) net neutrality indicating the latter as potentially harmful. Blocking content without informing customers appropriately is wrong: if it says ā€˜Internet serviceā€™, it should offer an open Internet (alongside walled gardens if that is expressly advertised as such). The issue of uncontrolled Internet flows versus engineered solutions is central to the question of a ā€˜freeā€™ versus regulated Internet. A consumer- and citizen-orientated intervention depends on passing regulations to prevent unregulated nontransparent controls exerted over traffic via DPI equipment, whether imposed by ISPs for financial advantage or by governments eager to use this new technology to filter, censor and enforce copyright against their citizens. Unraveling the previous ISP limited liability regime risks removing the efficiency of that approach in permitting the free flow of information for economic and social advantage. These conclusions support a light-touch regulatory regime involving reporting requirements and co-regulation with, as far as is possible, market-based solutions. Solutions may be international as well as local, and international coordination of best practice and knowledge will enable national regulators to keep up with the technology ā€˜arms raceā€™

    UMTS broadband mobile technology is a reality ā€“ Confounding many expectations

    Get PDF
    Contrary to the negative public perception, third-generation (3G) broadband mobile telecommunication, aka UMTS, has become reality. UMTS networks have been rolled out above all in Central Europe. The take-up of UMTS differs sharply from one country to the next, though. The large differences are due not only to market-related factors and differing marketing strategies, but also to political intervention that distorts the market. At present, content providers, handset makers and telcos are working feverishly to produce UMTS-based supplementary offerings. For the sluggish demand for mobile broadband services still harbours a big risk for the entire telecommunications sector.information an communications technology; telecommunications; 3G; broadband

    Blindspot: Indistinguishable Anonymous Communications

    Get PDF
    Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic for a given user. We propose Blindspot, a design for high-latency anonymous communications that offers indistinguishability and unobservability under a (qualified) global active adversary. Blindspot creates anonymous routes between sender-receiver pairs by subliminally encoding messages within the pre-existing communication behaviour of users within a social network. Specifically, the organic image sharing behaviour of users. Thus channel bandwidth depends on the intensity of image sharing behaviour of users along a route. A major challenge we successfully overcome is that routing must be accomplished in the face of significant restrictions - channel bandwidth is stochastic. We show that conventional social network routing strategies do not work. To solve this problem, we propose a novel routing algorithm. We evaluate Blindspot using a real-world dataset. We find that it delivers reasonable results for applications requiring low-volume unobservable communication.Comment: 13 Page
    • ā€¦
    corecore