4,039 research outputs found
Regulatory Approaches to NGNs: An International Comparison
The emergence of Next Generation Networks (NGNs) raises profound challenges for regulators everywhere. Different regulatory authorities have approached these problems in strikingly different ways, depending in part on the overall regulatory milieu in which they operate, and in part on the nature of the NGN migration envisioned by major market players. Also, the NGN core network raises significantly different issues from those of the NGN access network. The migration to NGN raises many of the same issues that were already on the table as a result of the broader migration to IP-based services, notably in regard to the de-coupling of the service from the underlying network. To these concerns are added profound questions related to the nature of market power. Will NGNs enable new forms of competition? Will competitive bottlenecks remain, especially in the last mile? Will NGN enable new forms of bottlenecks to emerge, especially in the upper layers of the network, perhaps as a result of new IMS capabilities? Regulators in the UK, Netherlands, Germany, Japan and the United States have been forced to deal with these issues due to relatively rapid migration to NGNs proposed by their respective incumbent telecoms operators. Many of the same issues are also visible in the recommendations that the European Commission finalised on 13 November 2007 as part of the ongoing review of the European regulatory framework for electronic communications. In this paper, we compare and contrast the many regulatory proceedings that have been produced by these regulatory authorities.Regulation; Next Generation Networks; access network; core network; all-IP; competition; market power; international comparison
Regulatory Approaches to NGNs: An International Comparison
The emergence of Next Generation Networks (NGNs) raises profound challenges for regulators everywhere. Different regulatory authorities have approached these problems in strikingly different ways, depending in part on the overall regulatory milieu in which they operate, and in part on the nature of the NGN migration envisioned by major market players. Also, the NGN core network raises significantly different issues from those of the NGN access network. The migration to NGN raises many of the same issues that were already on the table as a result of the broader migration to IP-based services,notably in regard to the de-coupling of the service from the underlying network. To these concerns are added profound questions related to the nature of market power. Will NGNs enable new forms of competition? Will competitive bottlenecks remain, especially in the last mile? Will NGN enable new forms of bottlenecks to emerge, especially in the upper layers of the network, perhaps as a result of new IMS capabilities? Regulators in the UK, Netherlands, Germany, Japan and the United States have been forced to deal with these issues due to relatively rapid migration to NGNs proposed by their respective incumbent telecoms operators. Many of the same issues are also visible in the recommendations that the European Commission finalised on 13 November 2007 as part of the ongoing review of the European regulatory framework for electronic communications. In this paper, we compare and contrast the many regulatory proceedings that have been produced by these regulatory authorities.Regulation; Next Generation Networks; access network; core network; all-IP; competition; market power; international comparison.
Systemization of Pluggable Transports for Censorship Resistance
An increasing number of countries implement Internet censorship at different
scales and for a variety of reasons. In particular, the link between the
censored client and entry point to the uncensored network is a frequent target
of censorship due to the ease with which a nation-state censor can control it.
A number of censorship resistance systems have been developed thus far to help
circumvent blocking on this link, which we refer to as link circumvention
systems (LCs). The variety and profusion of attack vectors available to a
censor has led to an arms race, leading to a dramatic speed of evolution of
LCs. Despite their inherent complexity and the breadth of work in this area,
there is no systematic way to evaluate link circumvention systems and compare
them against each other. In this paper, we (i) sketch an attack model to
comprehensively explore a censor's capabilities, (ii) present an abstract model
of a LC, a system that helps a censored client communicate with a server over
the Internet while resisting censorship, (iii) describe an evaluation stack
that underscores a layered approach to evaluate LCs, and (iv) systemize and
evaluate existing censorship resistance systems that provide link
circumvention. We highlight open challenges in the evaluation and development
of LCs and discuss possible mitigations.Comment: Content from this paper was published in Proceedings on Privacy
Enhancing Technologies (PoPETS), Volume 2016, Issue 4 (July 2016) as "SoK:
Making Sense of Censorship Resistance Systems" by Sheharbano Khattak, Tariq
Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg
(DOI 10.1515/popets-2016-0028
Evidence-informed regulatory practice: an adaptive response, 2005ā15
Overview: In this occasional paper, the ACMA reflects on its regulatory practice over the past 10 years; specifically, the role of research in evidence-informed decision-making and regulation. It looks at how the ACMA has used research in an environment of ongoing change to document and build evidence, inform public debate about regulation, and build capability among our stakeholders to make communications and media work in Australiaās national interest
The Quest for a Killer App for Opportunistic and Delay Tolerant Networks (Invited Paper)
Delay Tolerant Networking (DTN) has attracted a lot of attention from the research community in recent years. Much work have been done regarding network architectures and algorithms for routing and forwarding in such networks. At the same time as many show enthusiasm for this exciting new research area there are also many sceptics, who question the usefulness of research in this area. In the past, we have seen other research areas become over-hyped and later die out as there was no killer app for them that made them useful in real scenarios. Real deployments of DTN systems have so far mostly been limited to a few niche scenarios, where they have been done as proof-of-concept ļ¬eld tests in research projects. In this paper, we embark upon a quest to ļ¬nd out what characterizes a potential killer applications for DTNs.
Are there applications and situations where DTNs provide
services that could not be achieved otherwise, or have potential to do it in a better way than other techniques? Further, we highlight some of the main challenges that needs to be solved to realize these applications and make DTNs a part of the mainstream network landscape
Network Neutrality: A Research Guide
The conclusion in a research handbook should emphasise the complexity of the problem than trying to claim a one-size-fits-all solution. I have categorised net neutrality into positive and negative (content discrimination) net neutrality indicating the latter as potentially harmful. Blocking content without informing customers appropriately is wrong: if it says āInternet serviceā, it should offer an open Internet (alongside walled gardens if that is expressly advertised as such). The issue of uncontrolled Internet flows versus engineered solutions is central to the question of a āfreeā versus regulated Internet. A consumer- and citizen-orientated intervention depends on passing regulations to prevent unregulated nontransparent controls exerted over traffic via DPI equipment, whether imposed by ISPs for financial advantage or by governments eager to use this new technology to filter, censor and enforce copyright against their citizens. Unraveling the previous ISP limited liability regime risks removing the efficiency of that approach in permitting the free flow of information for economic and social advantage. These conclusions support a light-touch regulatory regime involving reporting requirements and co-regulation with, as far as is possible, market-based solutions. Solutions may be international as well as local, and international coordination of best practice and knowledge will enable national regulators to keep up with the technology āarms raceā
UMTS broadband mobile technology is a reality ā Confounding many expectations
Contrary to the negative public perception, third-generation (3G) broadband mobile telecommunication, aka UMTS, has become reality. UMTS networks have been rolled out above all in Central Europe. The take-up of UMTS differs sharply from one country to the next, though. The large differences are due not only to market-related factors and differing marketing strategies, but also to political intervention that distorts the market. At present, content providers, handset makers and telcos are working feverishly to produce UMTS-based supplementary offerings. For the sluggish demand for mobile broadband services still harbours a big risk for the entire telecommunications sector.information an communications technology; telecommunications; 3G; broadband
Blindspot: Indistinguishable Anonymous Communications
Communication anonymity is a key requirement for individuals under targeted
surveillance. Practical anonymous communications also require
indistinguishability - an adversary should be unable to distinguish between
anonymised and non-anonymised traffic for a given user. We propose Blindspot, a
design for high-latency anonymous communications that offers
indistinguishability and unobservability under a (qualified) global active
adversary. Blindspot creates anonymous routes between sender-receiver pairs by
subliminally encoding messages within the pre-existing communication behaviour
of users within a social network. Specifically, the organic image sharing
behaviour of users. Thus channel bandwidth depends on the intensity of image
sharing behaviour of users along a route. A major challenge we successfully
overcome is that routing must be accomplished in the face of significant
restrictions - channel bandwidth is stochastic. We show that conventional
social network routing strategies do not work. To solve this problem, we
propose a novel routing algorithm. We evaluate Blindspot using a real-world
dataset. We find that it delivers reasonable results for applications requiring
low-volume unobservable communication.Comment: 13 Page
- ā¦