33 research outputs found

    Provider and peer selection in the evolving internet ecosystem

    Get PDF
    The Internet consists of thousands of autonomous networks connected together to provide end-to-end reachability. Networks of different sizes, and with different functions and business objectives, interact and co-exist in the evolving "Internet Ecosystem". The Internet ecosystem is highly dynamic, experiencing growth (birth of new networks), rewiring (changes in the connectivity of existing networks), as well as deaths (of existing networks). The dynamics of the Internet ecosystem are determined both by external "environmental" factors (such as the state of the global economy or the popularity of new Internet applications) and the complex incentives and objectives of each network. These dynamics have major implications on how the future Internet will look like. How does the Internet evolve? What is the Internet heading towards, in terms of topological, performance, and economic organization? How do given optimization strategies affect the profitability of different networks? How do these strategies affect the Internet in terms of topology, economics, and performance? In this thesis, we take some steps towards answering the above questions using a combination of measurement and modeling approaches. We first study the evolution of the Autonomous System (AS) topology over the last decade. In particular, we classify ASes and inter-AS links according to their business function, and study separately their evolution over the last 10 years. Next, we focus on enterprise customers and content providers at the edge of the Internet, and propose algorithms for a stub network to choose its upstream providers to maximize its utility (either monetary cost, reliability or performance). Third, we develop a model for interdomain network formation, incorporating the effects of economics, geography, and the provider/peer selections strategies of different types of networks. We use this model to examine the "outcome" of these strategies, in terms of the topology, economics and performance of the resulting internetwork. We also investigate the effect of external factors, such as the nature of the interdomain traffic matrix, customer preferences in provider selection, and pricing/cost structures. Finally, we focus on a recent trend due to the increasing amount of traffic flowing from content providers (who generate content), to access providers (who serve end users). This has led to a tussle between content providers and access providers, who have threatened to prioritize certain types of traffic, or charge content providers directly -- strategies that are viewed as violations of "network neutrality". In our work, we evaluate various pricing and connection strategies that access providers can use to remain profitable without violating network neutrality.Ph.D.Committee Chair: Dovrolis, Constantine; Committee Member: Ammar, Mostafa; Committee Member: Feamster, Nick; Committee Member: Willinger, Walter; Committee Member: Zegura, Elle

    Naming and discovery in networks : architecture and economics

    Get PDF
    In less than three decades, the Internet was transformed from a research network available to the academic community into an international communication infrastructure. Despite its tremendous success, there is a growing consensus in the research community that the Internet has architectural limitations that need to be addressed in a effort to design a future Internet. Among the main technical limitations are the lack of mobility support, and the lack of security and trust. The Internet, and particularly TCP/IP, identifies endpoints using a location/routing identifier, the IP address. Coupling the endpoint identifier to the location identifier hinders mobility and poorly identifies the actual endpoint. On the other hand, the lack of security has been attributed to limitations in both the network and the endpoint. Authentication for example is one of the main concerns in the architecture and is hard to implement partly due to lack of identity support. The general problem that this dissertation is concerned with is that of designing a future Internet. Towards this end, we focus on two specific sub-problems. The first problem is the lack of a framework for thinking about architectures and their design implications. It was obvious after surveying the literature that the majority of the architectural work remains idiosyncratic and descriptions of network architectures are mostly idiomatic. This has led to the overloading of architectural terms, and to the emergence of a large body of network architecture proposals with no clear understanding of their cross similarities, compatibility points, their unique properties, and architectural performance and soundness. On the other hand, the second problem concerns the limitations of traditional naming and discovery schemes in terms of service differentiation and economic incentives. One of the recurring themes in the community is the need to separate an entity\u27s identifier from its locator to enhance mobility and security. Separation of identifier and locator is a widely accepted design principle for a future Internet. Separation however requires a process to translate from the identifier to the locator when discovering a network path to some identified entity. We refer to this process as identifier-based discovery, or simply discovery, and we recognize two limitations that are inherent in the design of traditional discovery schemes. The first limitation is the homogeneity of the service where all entities are assumed to have the same discovery performance requirements. The second limitation is the inherent incentive mismatch as it relates to sharing the cost of discovery. This dissertation addresses both subproblems, the architectural framework as well as the naming and discovery limitations

    A Dynamic Spectrum Access Framework (Bring Your Own Spectrum)

    Get PDF
    In this thesis, a unified and sustainable framework for spectrum allocation is presented. This multi-level operator-agnostic framework, Bring Your Own Spectrum (BYOS), is the result of a few thought experiments reflecting the ways in which spectrum could be bought and sold as an asset, similar to service models in cloud computing where every technical element can be traded via an "as-a-Service" model. BYOS architectural features form the major part of this thesis and cover four levels of abstraction as – contextual, conceptual, logical and physical. First, the contextual aspect of BYOS is covered, which addresses the question: "why is the framework needed?". To understand the reasons behind the need for a new framework an exhaustive survey of history of telecommunications policy development of 32 countries was conducted that included major economies in several key regions of the world. This research provided insight into the role of the government, mechanisms used for allocations, success/failure of allocations, and business models in the sector. Additionally, a review of existing and emerging technologies was done to understand various possible mechanisms of spectrum access. Next, the conceptual aspect of BYOS is presented, which addresses the question: "what does the framework look like?". For this, the information from the study above was converted into a skeleton framework, ensuring that it covers the requirements gathered. The framework has a three-level architecture with a quasi-static allocation scheme. The levels of architecture are designated based on periods of ownership and the thesis presents an original exponential-based-scale to determine the allocation periods (longest to shortest). The framework accommodates different types of operators, categorising in terms of their spectrum access privileges. Following this, the thesis focuses on the physical level of the framework, where the question: "with what?" i.e. the technical mechanisms are discussed. In this part, a novel analogy is presented where the wireless spectrum is compared to a multi-lane, multi-level highway. This analogy provides the basis for unit of information transport between two points, which in turn form the trading unit. In this thesis, "Interference (transmission power) spread over bandwidth" is chosen as the basic trading unit for the BYOS framework. Also included is a discussion on the required changes to the calculation of "population" – an inherent part of reserve price calculation – in view of the proliferation of device using different types of mobile technologies. A second part of the physical framework presents an original mechanism for competition management in view of the new framework and trading unit. Using the principles of network traffic management, a new tracking unit – token – is introduced, which helps the regulators keep track of the process of spectrum allocation, but in a hands-off manner. Multiple models of using tokens in the framework are presented. Tokens are intended only for the shortterm trades, though the initial number is determined by the total spectrum acquisitions and cumulative participation behaviour. Finally, the logical or system model of the framework is presented, which addresses the question: "how to structure and organise the architecture to achieve the desired requirements". This discussion is also divided into two parts. First, the discussion focuses on the multiple ways to use tokens and demonstrates the different use cases by way of competition games. Key novel points here are the discussion of competition management over multi-period allocation and addressing the needs of public safety services. Additionally, the discussion also focuses on unequal desirability of available spectrum lots based on spectrum characteristics, acquisition periods, and operator’s own requirements. The second part of the discussion focuses on various methods of implementation of this framework. A potential enterpriseblockchain based method is explored, though there may be other better solutions. Another focus of this thesis, which can be considered as a separate minor segment, came out of the initial policy research was to organize and analyse this information systematically. For this purpose, the theory of policy diffusion was explored, and the research provides evidence for the existence of, and analyses the mechanisms used for policy diffusion in different regions and countries.Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronics, 202

    Redefining superpower relations in the Caspian : the same old game : a critical analysis of competition and cooperation as well as Russia's perception of threat posed by China and the US

    Get PDF
    Aujourd'hui, l'expression « Nouveau grand jeu » fait partie du jargon de la littérature scientifique et du discours politique. Cette expression établit une analogie avec le « Grand jeu », le conflit entre l'Empire russe et l'Empire britannique pour le contrôle de l'Asie centrale, et prétend que la compétition actuelle entre les puissances pour l'accès aux hydrocarbures de la région de la mer Caspienne demeure constante et intense. Ce mémoire conteste l'emploi de l'appellation « Nouveau grand jeu » pour qualifier les relations entre la Russie, la Chine et les États-Unis pendant les deux mandats présidentiels de Poutine. L'argument principal est façonné à partir d'une étude détaillée du contexte géopolitique régional et une analyse des données sur la production d'hydrocarbures sous contrôle de chacune des superpuissances. Ce projet de recherche démontre également l'influence de la hausse des investissements américains et chinois sur la façon dont Moscou perçoit ses rivaux et analyse l'impact de ces deux éléments sur l'articulation de la politique étrangère russe dans la région Caspienne

    The State, War and Strategy: Australia’s Strategic Disconnect with its Wars of Choice in Iraq and the wider Persian Gulf Region, 1990–2014

    Get PDF
    This dissertation examines the strategic significance of Australia’s deployment of elements of its military power to a series of wars of choice in the Middle East region between 1990-2014. From a Realist perspective, it establishes a series of strategic misalignments between Australian government decision and the state’s involvement in war. It demonstrates Australia displayed consistent strategic inconsistency between the nation’s strategic outlook and its approaches to war, military power, and strategy

    Beyond bribery: exploring the intimate interconnections between corruption and tax crimes

    Get PDF
    In this article entitled "Beyond Bribery: Exploring the Intimate Interconnections Between Corruption and Tax Crimes" the authors probe the manifold interconnections between tax crimes and corruption, identifying and documenting questionable practices beyond blatant tax evasion and simple bribery. Through analysis of the adverse consequences that phenomena such as tax sweetheart deals, unethical lobbying, conflicts of interest, and revolving doors wreak on society, they emphasize the compelling need for the adoption of an expanded definition of both tax crimes and corruption in order to stimulate adequate responses to these harmful practices

    2018 FSDG Combined Abstracts

    Get PDF
    https://scholarworks.gvsu.edu/fsdg_abstracts/1000/thumbnail.jp

    The Negative Impact of TRIPS on Gender Rights in Access to Health and Food in India: A Study of the Dynamics of Knowledge Economy and Neo-Medieval Governance

    Get PDF
    Southern developing nations are increasingly emulating the knowledge economy followed by the developed nations of the North. This paradigm is characterized by the signature feature of the regime of TRIPS or individualized legal patents, particularly bio-patents developed through biotechnology in pharmaceutical and agriculture. It is also characterized by corporate social responsibility as a market mode of governance of development and increasing state retrenchment from delivery of public welfare. This form of economy is embedded in multilayered governance of neo-medieval governance where states and corporations tussle for the right to define growth and equity. This thesis argues that such a mode of economy and governance has failed to deliver equity for the marginalized poor women in India. This is explicated through four critical factors. First, there is increasing biopiracy of tribal women\u27s traditional knowledge and denuding of uncodified knowledge of tribal women due to land deprivation which in turn severely affects their health. Second, a thriving pharmaceutical sector has failed to deliver health equity for poor women, particularly by being engaged in creation of medicines that do not have relevance for the main disease profile of the poor - communicable diseases. Third, there is rise of non-communicable diseases of the poor. Patents act as legal barriers to access to medicine and severely impact the health of the poor. Fourth, the rise of Bt seeds in cash crop agriculture has meant that traditionally saved and used food crop seeds are being marginalized and there is a growing agrarian crisis for women who do not have control over land, seeds and seed technology. Fifth, poverty is on the rise which is a sure sign that equity has not trickled down. If the international society of states provides for customized patents for women\u27s traditional knowledge, women\u27s knowledge, health and food security would be better secured
    corecore