9,371 research outputs found

    Do ECB Council Decisions represent always a Real Euro Consensus?

    Get PDF
    Since January 1999, according to the law, the common monetary policy for all the Economic and Monetary Union (EMU) Member States should be decided by simple majority in the Governing Council (GC) of the European Central Bank (ECB), regarding the Euro area aggregate conditions. Notwithstanding, no formal vote has been taken until today and a consensus solution has been the officially announced practical rule, hiding different points of view fuelled by national divergences that might exist within Euro area. Assuming that EMU national central bankers take into account national perspectives from their home countries when they vote interest rate decisions in the GC, we try to find whether there have been favourable conditions for the emergence of voting coalitions among them. In order to accomplish that purpose, for every month since January 1999 until August 2003, we applied cluster analysis techniques to national stances before GC meetings, which we describe using three variables. We found high stability in the identified cluster structure, particularly since August 2001, favouring the emergence of alliances between national interests. In spite of that, it is likely that the strong strategic position enjoyed by the Executive Board of the ECB has been sufficient to a priori defeat any coalitions of opposing proposals on the monetary policy for the Euro-area, situation that will change with EMU enlargement.Monetary Policy; European Central Bank; Desired Interest Rate; Cluster Analysis

    Spanning trees with generalized degree constraints arising in the design of wireless networks

    Get PDF
    In this paper we describe a minimum spanning tree problem with generalized degree constraints which arises in the design of wireless networks. The signal strength on the receiver side of a wireless link decreases with the distance between transmitter and receiver. In order to work properly, the interference on the receiving part of the link must be under a given threshold. In order to guarantee this constraint, for each node we impose a degree constraint that depends on the ”length” of the links adjacent to the corresponding node, more precisely, nodes adjacent to long links must have a smaller degree and vice-versa. The problem is complicated by considering different signal strengths for each link. Increasing the strength in a link increases the cost of the link. However, it also reduces the maximum allowed degree on its end nodes. We create two models using adequate sets of variables, one may be considered an extended version of the other, and relate, from a theoretical perspective, the corresponding linear programming relaxations.FCT - POCTI-ISFL-1-152FCT - PTDC/EIA/64772/200

    Towards effective control of P2P traffic aggregates in network infrastructures

    Get PDF
    Nowadays, many P2P applications proliferate in the Internet. The attractiveness of many of these systems relies on the collaborative approach used to exchange large resources without the dependence and associated constraints of centralized approaches where a single server is responsible to handle all the requests from the clients. As consequence, some P2P systems are also interesting and cost-effective approaches to be adopted by content-providers and other Internet players. However, there are several coexistence problems between P2P applications and In- ternet Service Providers (ISPs) due to the unforeseeable behavior of P2P traffic aggregates in ISP infrastructures. In this context, this work proposes a collaborative P2P/ISP system able to underpin the development of novel Traffic Engi- neering (TE) mechanisms contributing for a better coexistence between P2P applications and ISPs. Using the devised system, two TE methods are described being able to estimate and control the impact of P2P traffic aggregates on the ISP network links. One of the TE methods allows that ISP administrators are able to foresee the expected impact that a given P2P swarm will have in the underlying network infrastructure. The other TE method enables the definition of ISP friendly P2P topologies, where specific network links are protected from P2P traffic. As result, the proposed system and associated mechanisms will contribute for improved ISP resource management tasks and to foster the deployment of innovative ISP-friendly systems.This work has been partially supported by FCT - Fundação para a Ciência e Tecnologia Portugal in the scope of the project: UID/CEC/00319/2013

    Traffic engineering approaches in P2P environments

    Get PDF
    Nowadays, P2P applications proliferate in the Internet with distinct utilization contexts, being also an attractive model for the deployment of advanced Internet services. However, there are several undesirable effects that are caused by such applications, raising coexistence problems with Internet Service Providers (ISPs). In this context, using as case study BitTorrent like applications, this work explores a collaborative framework allowing that advanced efforts could be carried on between P2P applications and network level entities. In order to illustrate such framework, several Traffic Engineering (TE) mechanisms are devised in order to align some P2P dynamics with particular objectives pursued by network administrators. The simulation results show that both the proposed framework and corresponding illustrative mechanisms are viable and can effectively foster future research efforts within this field.(undefined

    A framework for highly reconfigurable P2P trackers

    Get PDF
    The increasing use of Peer to Peer (P2P) applications, usually ruled by selfish behaviors, is posing new challenges to the research community. As contributions of this work we firstly devise a general framework underpinning the development of highly reconfigurable P2P trackers. Following that, a novel tracker architecture is proposed and several illustrative and enhanced tracker configurations are described. As result, the devised solution turns possible that flexible, programmable and adaptive peer selection mechanisms can be introduced at the P2P application level. The proposed solution assumes the general framework of one of the most popular P2P solutions, in this case a BitTorrent-like approach. As illustrative examples of the proposed framework capabilities, several straightforward and easy to deploy tracker configuration examples are presented, including methods for qualitative differentiation of swarm peers and advanced P2P Traffic Engineering mechanisms fostering the collaboration efforts between ISPs and P2P applications. Both the framework and the devised tracker configurations are validated resorting to simulation experiments.(undefined

    An automated framework for the management of P2P traffic in ISP infrastructures

    Get PDF
    Peer-to-Peer (P2P) is nowadays a widely used paradigm underpinning the deployment of several Internet services and applications. However, the management of P2P traffic aggregates is not an easy task for Internet Service Providers (ISPs). In this perspective, and considering an expectable proliferation in the use of such ap- plications, future networks require the development of smart mechanisms fostering an easier coexistence between P2P applications and ISP infrastructures. This paper aims to contribute for such research efforts presenting a framework incorporating useful mechanisms to be activated by network administrators, being also able to operate as an automated management tool dealing with P2P traffic aggregates.This work has been partially supported by FCT - Fundacao para a Ciencia e Tecnologia Portugal in the scope of the project: UID/CEC/00319/2013

    Context aware programmable trackers for the next generation Internet

    Get PDF
    This work introduces and proposes the concept of context aware programmable trackers for the next generation Internet. The pro- posed solution gives ground for the development of advanced applications based on the P2P paradigm and will foster collaborative efforts among several network entities (e.g. P2P applications and ISPs). The proposed concept of context aware programmable trackers allows that several peer selection strategies might be supported by a P2P tracker entity able to improve the peer selection decisions according with pre-defined objectives and external inputs provided by specific services. The flexible, adaptive and enhanced peer selection semantics that might be achieved by the proposed solution will contribute for devising novel P2P based services and business models for the future Internet
    corecore