157 Hits in 5.5 sec

Let the market drive deployment

Phillipa Gill, Michael Schapira, Sharon Goldberg
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP.  ...  We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global S*BGP deployment.  ...  We have shown that, if deployment cost θ is low, our proposal can successfully transition a majority of ASes to S*BGP.  ... 
doi:10.1145/2018436.2018439 dblp:conf/sigcomm/GillSG11 fatcat:kqeedt42bvgarcakhallgy7wqe

Let the market drive deployment

Phillipa Gill, Michael Schapira, Sharon Goldberg
2011 Computer communication review  
Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP.  ...  We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global S*BGP deployment.  ...  We have shown that, if deployment cost θ is low, our proposal can successfully transition a majority of ASes to S*BGP.  ... 
doi:10.1145/2043164.2018439 fatcat:uy7ow2fidfgjhihzk6uweduxda

On incremental deployability [article]

Ioannis Avramopoulos
2018 arXiv   pre-print
For example, we show that incremental deployability is at least as general a concept as the Nash equilibrium (in that the latter can be derived from the former).  ...  Motivated by the difficulty of effecting fundamental change in the architecture of the Internet, in this paper, we study from a theoretical perspective the question of how individuals can join forces toward  ...  Acknowledgments My account on YouTube has kept me company, through recommendations (for example, on music to listen to or on technical material to study) and through positive "clockwork orange" experiments  ... 
arXiv:1805.10115v1 fatcat:2ovf2na3jnbz3dwmrtiphdp6oy

A Unified Framework for the Negotiation and Deployment of Network Services [chapter]

Spyros Denazis, Lidia Yamamoto
2005 Lecture Notes in Computer Science  
The Internet network technology today does not allow a sufficient degree of autonomy to express user choices, constraints and preferences in order to dynamically obtain the most suitable services.  ...  In this context, we propose an architecture to automate user-provider and provider-provider relationships, by converting the Internet into an electronic market space where the commodities to be traded  ...  First of all, partial deployment must be supported. For instance, let us consider a path is made up of domains A, B, C and D in sequence, with A as source domain and D as destination domain.  ... 
doi:10.1007/11520184_7 fatcat:23cdeg4gl5bgbjyfb6s37b52aa

Deployment Archetypes for Cloud Applications

Anna Berenberg, Brad Calder
2023 ACM Computing Surveys  
This enables application owners to better examine the tradeoffs of each deployment model and what is needed for achieving the availability and latency goals for their application.  ...  This is a survey article that explores six Cloud-based deployment archetypes for Cloud applications and the tradeoffs between them to achieve high availability, low end-user latency, and acceptable costs  ...  anonymous reviewers for providing valuable feedback on this article, and we thank everyone working on Cloud whose work informed and inspired this survey.  ... 
doi:10.1145/3498336 fatcat:r4qxt5sizrdrzcr4uzlfuj6lyu

Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning

Youngmi Jin, George Kesidis, Ju Wook Jang
2013 IEEE/ACM Transactions on Networking  
Recently, economic models have been proposed to study adoption dynamics of entrant and incumbent technologies motivated by the need for new network architectures to complement the current Internet.  ...  We propose new models of adoption dynamics of entrant and incumbent technologies among bounded rational users who choose a satisfying strategy rather than an optimal strategy based on aspiration-based  ...  ACKNOWLEDGMENT The authors would like to thank the associate editor, the anonymous referees, and Prof. R. Guérin for their valuable comments.  ... 
doi:10.1109/tnet.2012.2189891 fatcat:u7yxanu4nzdbpfinqkvwchhfre

The geopolitics behind the routes data travels: a case study of Iran [article]

Loqman Salamatian, Frederick Douzet, Kevin Limonier, Kavé Salamatian
2019 arXiv   pre-print
Several countries have opted for a BGP strategy.  ...  Nevertheless, we need to comprehend Cyberspace as a space organized by humans to analyse the strategies of the actors.  ...  Several countries have opted for a network architecture facilitating the definition of a BGP strategy.  ... 
arXiv:1911.07723v2 fatcat:lyyokgakbfeypacg5qo3kfoxr4

Lowering Legal Barriers to RPKI Adoption

Christopher S. Yoo, David Wishnick
2019 Social Science Research Network  
For RPKI to provide increased security, networks must first issue route origin authorizations ("ROAs") to cover their Internet Protocol ("IP") address space.  ...  To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure ("RPKI") framework.  ...  RPKI is only a partial solution to the problem of BGP security because it does not account for the entire routing path. But its value should not be discounted merely because it is not a panacea.  ... 
doi:10.2139/ssrn.3308619 fatcat:s6arztxxh5f3xorxjtb3drindu

New Model of Network- a Future Aspect of the Computer Networks [article]

Ram Kumar Singh, T. Ramajujam
2009 arXiv   pre-print
A new model of network is necessary to find solutions for today's pressing problems, especially those related to network security.  ...  But there is no shortage of technologies offered as universal remedy - EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There are multiple factors for the current situation.  ...  In addition, the TNA model allows flexible network design and deployment strategies with maximum flexibility -without mandating either a packet-centric or a circuit-centric approach.  ... 
arXiv:0912.3985v1 fatcat:yiqdobahcfdvhmxz4zfomf2rea

Reshaping the African Internet: From scattered islands to a connected continent

R. Fanou, F. Valera, P. Francois, A. Dhamdhere
2017 Computer Communications  
Our hope is that quantitatively demonstrating the benefits will provide incentives for ISPs to intensify their peering relationships in the region.  ...  We then investigate a naive approach to IXP interconnection, which shows that a theoretically optimal solution would be infeasible in practice due to the prevailing socio-economic conditions in the region  ...  We are thankful to all African IXPs which replied to our survey.  ... 
doi:10.1016/j.comcom.2017.09.006 fatcat:myyycpfjy5d57g6jvucvfax5iu

A Survey on Security Issues in Cloud Computing [article]

Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal
2013 arXiv   pre-print
There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario.  ...  It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices.  ...  And hence it becomes quite important a factor to ensure data security over the transitioning networks.  ... 
arXiv:1109.5388v2 fatcat:gmhwf7a3uvgvnkq2b2tnvgeadu

Qualitative evidence of crimes against humanity: the August 2017 attacks on the Rohingya in northern Rakhine State, Myanmar

Nicole Messner, Andrea Woods, Agnes Petty, Parveen K. Parmar, Jennifer Leigh, Ernest Thomas, Douglass Curry, Homer Venters, Andra Gilbert, Tamaryn Nelson, Ed Lester
2019 Conflict and Health  
The study aimed to conduct a multiphase mixed-methods assessment of the prevalence and contexts of violence and mortality across affected hamlets in northern Rakhine State during the August 2017 attacks  ...  This publication describes qualitative accounts by Rohingya community leaders from affected hamlets, with a focus on the events and environment leading up to and surrounding the attacks.  ...  Given the absence of a formal Rohingya body that could serve as a review board, PHR held a community consultation with Rohingya leadership prior to conducting this assessment, to obtain their input, feedback  ... 
doi:10.1186/s13031-019-0227-8 pmid:31534472 pmcid:PMC6745777 fatcat:xmrrcsxyknhzxdtwafsdrw3plm

Techno-Economic Aspects of Information-Centric Networking

Dirk Trossen, Alexandros Kostopoulos
2012 Journal of Information Policy  
They believe the ICN model would help rationalize pricing in a three-sided market; reduce congestion and transit costs; provide more transparency; offer more choices and possible outcomes with respect  ...  Can the Internet be redesigned to reduce future conflicts? The Internet's underlying architecture, Internet Protocol (IP), was introduced in 1974.  ...  Unlike the Border Gateway Protocol (BGP), this approach allows for multiple ITF functions, each offering different sets of peering and transit opportunities that were exposed to them.  ... 
doi:10.5325/jinfopoli.2.2012.0026 fatcat:vtyved4t5rgerlkkfwsj6doafu

Report on the SIGCOMM 2011 conference

John W. Byers, László Gyarmati, Katrina LaCurts, Qi Liao, Marc Mendonca, Trang Cao Minh, S.H. Shah Newaz, Pawan Prakash, Yan Shvartzshnaider, Praveen Yalagandula, Chun-Yu Yang, Jeffrey C. Mogul (+7 others)
2012 Computer communication review  
This document provides reports on the presentations at the SIG-COMM 2011 Conference, the annual conference of the ACM Special Interest Group on Data Communication (SIGCOMM).  ...  Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security Authors: Phillipa Gill (University of Toronto); Michael Schapira (Princeton University); Sharon Goldberg (Boston University  ...  The paper presents a strategy to drive global S*BGP deployment that relies solely on each ISP's local economic incentives -i.e., an ISP's interest in attracting revenue-generating traffic to their networks  ... 
doi:10.1145/2096149.2096162 fatcat:ylurqiquzzbstdr6w3unexqhie

A Primer on Network Neutrality

Rob Frieden
2007 Social Science Research Network  
A particularly repellent example of this enterprise was Enron's so-called Death Star strategy, which, as a company memo put it, let Enron be paid 'for moving energy to relieve congestion without actually  ...  for market entry by more ISPs and new incentives for all ISPs to charge what the market would bear for network access.  ... 
doi:10.2139/ssrn.1026633 fatcat:7pfu7cb2enhvnjkg3neoimgsaa
« Previous Showing results 1 — 15 out of 157 results