A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Let the market drive deployment
2011
Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11
Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP. ...
We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global S*BGP deployment. ...
We have shown that, if deployment cost θ is low, our proposal can successfully transition a majority of ASes to S*BGP. ...
doi:10.1145/2018436.2018439
dblp:conf/sigcomm/GillSG11
fatcat:kqeedt42bvgarcakhallgy7wqe
Let the market drive deployment
2011
Computer communication review
Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP. ...
We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global S*BGP deployment. ...
We have shown that, if deployment cost θ is low, our proposal can successfully transition a majority of ASes to S*BGP. ...
doi:10.1145/2043164.2018439
fatcat:uy7ow2fidfgjhihzk6uweduxda
On incremental deployability
[article]
2018
arXiv
pre-print
For example, we show that incremental deployability is at least as general a concept as the Nash equilibrium (in that the latter can be derived from the former). ...
Motivated by the difficulty of effecting fundamental change in the architecture of the Internet, in this paper, we study from a theoretical perspective the question of how individuals can join forces toward ...
Acknowledgments My account on YouTube has kept me company, through recommendations (for example, on music to listen to or on technical material to study) and through positive "clockwork orange" experiments ...
arXiv:1805.10115v1
fatcat:2ovf2na3jnbz3dwmrtiphdp6oy
A Unified Framework for the Negotiation and Deployment of Network Services
[chapter]
2005
Lecture Notes in Computer Science
The Internet network technology today does not allow a sufficient degree of autonomy to express user choices, constraints and preferences in order to dynamically obtain the most suitable services. ...
In this context, we propose an architecture to automate user-provider and provider-provider relationships, by converting the Internet into an electronic market space where the commodities to be traded ...
First of all, partial deployment must be supported. For instance, let us consider a path is made up of domains A, B, C and D in sequence, with A as source domain and D as destination domain. ...
doi:10.1007/11520184_7
fatcat:23cdeg4gl5bgbjyfb6s37b52aa
Deployment Archetypes for Cloud Applications
2023
ACM Computing Surveys
This enables application owners to better examine the tradeoffs of each deployment model and what is needed for achieving the availability and latency goals for their application. ...
This is a survey article that explores six Cloud-based deployment archetypes for Cloud applications and the tradeoffs between them to achieve high availability, low end-user latency, and acceptable costs ...
anonymous reviewers for providing valuable feedback on this article, and we thank everyone working on Cloud whose work informed and inspired this survey. ...
doi:10.1145/3498336
fatcat:r4qxt5sizrdrzcr4uzlfuj6lyu
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
2013
IEEE/ACM Transactions on Networking
Recently, economic models have been proposed to study adoption dynamics of entrant and incumbent technologies motivated by the need for new network architectures to complement the current Internet. ...
We propose new models of adoption dynamics of entrant and incumbent technologies among bounded rational users who choose a satisfying strategy rather than an optimal strategy based on aspiration-based ...
ACKNOWLEDGMENT The authors would like to thank the associate editor, the anonymous referees, and Prof. R. Guérin for their valuable comments. ...
doi:10.1109/tnet.2012.2189891
fatcat:u7yxanu4nzdbpfinqkvwchhfre
The geopolitics behind the routes data travels: a case study of Iran
[article]
2019
arXiv
pre-print
Several countries have opted for a BGP strategy. ...
Nevertheless, we need to comprehend Cyberspace as a space organized by humans to analyse the strategies of the actors. ...
Several countries have opted for a network architecture facilitating the definition of a BGP strategy. ...
arXiv:1911.07723v2
fatcat:lyyokgakbfeypacg5qo3kfoxr4
Lowering Legal Barriers to RPKI Adoption
2019
Social Science Research Network
For RPKI to provide increased security, networks must first issue route origin authorizations ("ROAs") to cover their Internet Protocol ("IP") address space. ...
To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure ("RPKI") framework. ...
RPKI is only a partial solution to the problem of BGP security because it does not account for the entire routing path. But its value should not be discounted merely because it is not a panacea. ...
doi:10.2139/ssrn.3308619
fatcat:s6arztxxh5f3xorxjtb3drindu
New Model of Network- a Future Aspect of the Computer Networks
[article]
2009
arXiv
pre-print
A new model of network is necessary to find solutions for today's pressing problems, especially those related to network security. ...
But there is no shortage of technologies offered as universal remedy - EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There are multiple factors for the current situation. ...
In addition, the TNA model allows flexible network design and deployment strategies with maximum flexibility -without mandating either a packet-centric or a circuit-centric approach. ...
arXiv:0912.3985v1
fatcat:yiqdobahcfdvhmxz4zfomf2rea
Reshaping the African Internet: From scattered islands to a connected continent
2017
Computer Communications
Our hope is that quantitatively demonstrating the benefits will provide incentives for ISPs to intensify their peering relationships in the region. ...
We then investigate a naive approach to IXP interconnection, which shows that a theoretically optimal solution would be infeasible in practice due to the prevailing socio-economic conditions in the region ...
We are thankful to all African IXPs which replied to our survey. ...
doi:10.1016/j.comcom.2017.09.006
fatcat:myyycpfjy5d57g6jvucvfax5iu
A Survey on Security Issues in Cloud Computing
[article]
2013
arXiv
pre-print
There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. ...
It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. ...
And hence it becomes quite important a factor to ensure data security over the transitioning networks. ...
arXiv:1109.5388v2
fatcat:gmhwf7a3uvgvnkq2b2tnvgeadu
Qualitative evidence of crimes against humanity: the August 2017 attacks on the Rohingya in northern Rakhine State, Myanmar
2019
Conflict and Health
The study aimed to conduct a multiphase mixed-methods assessment of the prevalence and contexts of violence and mortality across affected hamlets in northern Rakhine State during the August 2017 attacks ...
This publication describes qualitative accounts by Rohingya community leaders from affected hamlets, with a focus on the events and environment leading up to and surrounding the attacks. ...
Given the absence of a formal Rohingya body that could serve as a review board, PHR held a community consultation with Rohingya leadership prior to conducting this assessment, to obtain their input, feedback ...
doi:10.1186/s13031-019-0227-8
pmid:31534472
pmcid:PMC6745777
fatcat:xmrrcsxyknhzxdtwafsdrw3plm
Techno-Economic Aspects of Information-Centric Networking
2012
Journal of Information Policy
They believe the ICN model would help rationalize pricing in a three-sided market; reduce congestion and transit costs; provide more transparency; offer more choices and possible outcomes with respect ...
Can the Internet be redesigned to reduce future conflicts? The Internet's underlying architecture, Internet Protocol (IP), was introduced in 1974. ...
Unlike the Border Gateway Protocol (BGP), this approach allows for multiple ITF functions, each offering different sets of peering and transit opportunities that were exposed to them. ...
doi:10.5325/jinfopoli.2.2012.0026
fatcat:vtyved4t5rgerlkkfwsj6doafu
Report on the SIGCOMM 2011 conference
2012
Computer communication review
This document provides reports on the presentations at the SIG-COMM 2011 Conference, the annual conference of the ACM Special Interest Group on Data Communication (SIGCOMM). ...
Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security Authors: Phillipa Gill (University of Toronto); Michael Schapira (Princeton University); Sharon Goldberg (Boston University ...
The paper presents a strategy to drive global S*BGP deployment that relies solely on each ISP's local economic incentives -i.e., an ISP's interest in attracting revenue-generating traffic to their networks ...
doi:10.1145/2096149.2096162
fatcat:ylurqiquzzbstdr6w3unexqhie
A Primer on Network Neutrality
2007
Social Science Research Network
A particularly repellent example of this enterprise was Enron's so-called Death Star strategy, which, as a company memo put it, let Enron be paid 'for moving energy to relieve congestion without actually ...
for market entry by more ISPs and new incentives for all ISPs to charge what the market would bear for network access. ...
doi:10.2139/ssrn.1026633
fatcat:7pfu7cb2enhvnjkg3neoimgsaa
« Previous
Showing results 1 — 15 out of 157 results