2,530 research outputs found

    On Factors Affecting the Usage and Adoption of a Nation-wide TV Streaming Service

    Full text link
    Using nine months of access logs comprising 1.9 Billion sessions to BBC iPlayer, we survey the UK ISP ecosystem to understand the factors affecting adoption and usage of a high bandwidth TV streaming application across different providers. We find evidence that connection speeds are important and that external events can have a huge impact for live TV usage. Then, through a temporal analysis of the access logs, we demonstrate that data usage caps imposed by mobile ISPs significantly affect usage patterns, and look for solutions. We show that product bundle discounts with a related fixed-line ISP, a strategy already employed by some mobile providers, can better support user needs and capture a bigger share of accesses. We observe that users regularly split their sessions between mobile and fixed-line connections, suggesting a straightforward strategy for offloading by speculatively pre-fetching content from a fixed-line ISP before access on mobile devices.Comment: In Proceedings of IEEE INFOCOM 201

    Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

    Full text link
    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, developer, research, network operator, and regulatory communities have taken an increased interest in measuring end-to-end mobile network performance to, among other goals, minimize negative impact on application responsiveness. In this survey we examine current approaches to end-to-end mobile network performance measurement, diagnosis, and application prototyping. We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public. We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does not format the URL references correctly. For a correctly formatted version of this paper go to http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd

    Building and Delivering the Virtual World: Commercializing Services for Internet Access

    Get PDF
    This study analyzes the service offerings of Internet Service Providers (ISPs), the commercial suppliers of Internet access in the United States. It presents data on the services of 2089 ISPs in the summer of 1998. By this time, the Internet access industry had undergone its first wave of entry and many ISPs had begun to offer services other than basic access. This paper develops an Internet access industry product code which classifies these services. Significant heterogeneity across ISPs is found in the propensity to offer these services, a pattern with an unconditional urban/rural difference. Most of the explained variance in behavior arises from firm-specific factors, with only weak evidence of location-specific factors for some services. These findings provide a window to the variety of approaches taken to build viable businesses organizations, a vital structural feature of this young market.

    European Law and Regulation of Mobile Net Neutrality

    Get PDF
    Mobile is a rapidly growing and potentially major element of the future Internet, and its environment cannot be sensibly considered in isolation from fixed networks [2]. A note on terminology: Europe uses the term Mobile Network Operators (MNOs) while the United States uses 'wireless' Internet Service Providers (ISPs) [3]. 'Wireless' is somewhat more open in the United States. In Europe, mobile has always made special pleading for forms of self-regulation, as we will see. The article introduces mobile broadband, then considers net neutrality in the fixed environment including the new laws passed in November 2009 in the European Parliament, before considering the mobile net neutrality debate, the degree of price control regulation exerted on European mobiles and the MNOs' vigorous rear-guard anti-regulation defence. Finally, I look at the effects of this regulatory asymmetry and whether MNO calls for mobile to be treated differently from other ISPs can be justified. I conclude by examining what the effect of price and content control on mobile is likely to be for incentives for fixed ISPs and produce a result that I describe as the 'fixed' strategy

    Network Neutrality: A Research Guide

    Get PDF
    The conclusion in a research handbook should emphasise the complexity of the problem than trying to claim a one-size-fits-all solution. I have categorised net neutrality into positive and negative (content discrimination) net neutrality indicating the latter as potentially harmful. Blocking content without informing customers appropriately is wrong: if it says ‘Internet service’, it should offer an open Internet (alongside walled gardens if that is expressly advertised as such). The issue of uncontrolled Internet flows versus engineered solutions is central to the question of a ‘free’ versus regulated Internet. A consumer- and citizen-orientated intervention depends on passing regulations to prevent unregulated nontransparent controls exerted over traffic via DPI equipment, whether imposed by ISPs for financial advantage or by governments eager to use this new technology to filter, censor and enforce copyright against their citizens. Unraveling the previous ISP limited liability regime risks removing the efficiency of that approach in permitting the free flow of information for economic and social advantage. These conclusions support a light-touch regulatory regime involving reporting requirements and co-regulation with, as far as is possible, market-based solutions. Solutions may be international as well as local, and international coordination of best practice and knowledge will enable national regulators to keep up with the technology ‘arms race’

    Forgery in Cyberspace: The Spoof Could Be on You!

    Get PDF
    Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer the only reason for deception, as crackers have taken pleasure in the challenge of manipulating computer systems and, additionally, find recreational enjoyment in doing so. In this legal Note, the author’s intent is to show that criminal, rather than civil liability is the best way to effectively deter and punish the spoofer. The injury that results when a computer system’s technological safety measures fail to adequately safeguard the system affects not only the owner of the hijacked e-mail address, but also the Internet Service Provider, and the Network as a whole. Current Anti-Spam Legislation is arguably ineffective at targeting these particular types of malicious attacks, and a different legal approach is suggested

    Bundles and Range Strategies: The Case of Telecom Operators

    Get PDF
    Against a background of competition and the generalisation of IP that characterises the field of electronic communications, the concept of the "bundle" has resulted in the emergence of "triple play", and even "quadruple play." This paper offers an overview of the growth of this phenomenon by introducing a distinction between the basic components of multiplay strategies and the diverse range of functions that can be linked to these strategies.Bundle; range strategy; triple play; quadruple play
    corecore