Internet Service Provider Research Papers (original) (raw)
2025, Lecture Notes in Computer Science
The question of our study is how to provision a diffserv (differentiated service) intra-net serving three classes of traffic, i.e., voice, real-time data (e.g. stock quotes), and best-effort data. Each class of traffic requires a... more
The question of our study is how to provision a diffserv (differentiated service) intra-net serving three classes of traffic, i.e., voice, real-time data (e.g. stock quotes), and best-effort data. Each class of traffic requires a different level of QoS (Quality of Service) guarantee. For VoIP the primary QoS requirements are delay and loss; for realtime data response-time. Given a network configuration and anticipated workload of a business intra-net, we use ns-2 simulations to determine the minimum capacity requirements that dominate total cost of the intranet. To ensure that it is worthwhile converging different traffic classes or deploying diffserv, we cautiously examine capacity requirements in three sets of experiments: three traffic classes in i) three dedicated networks, ii) one network without diffserv support , and iii) one network with diffserv support. We find that for the business intra-net of our study, integration without diffserv may need considerable over-provisioning depending on the fraction of real-time data in the network. In addition, we observe significant capacity savings in the diffserv case; thus conclude that deploying diffserv is advantageous. The relations we find give rise to, as far as we know, the first rule of thumb on provisioning a diffserv network for increasing real-time data.
2025, ACM SIGCOMM Computer Communication Review
2025, 2017 European Modelling Symposium (EMS)
The metrics and measurements play a crucial role in the whole lifecycle of telecommunication networks. The number of metrics being considered for modern telecommunication systems supporting digital or computing infrastructures has grown... more
The metrics and measurements play a crucial role in the whole lifecycle of telecommunication networks. The number of metrics being considered for modern telecommunication systems supporting digital or computing infrastructures has grown exponentially. It requires sophisticated systems for the metrics management which are under development by the industry consortia. For many research tasks, it would be sufficient to identify a relatively small number of recommended metrics to achieve more consistent evaluations of the system performance. There are still many unsolved problems in this area including defining the optimum modeling strategies and the metrics optimality. This paper explores a landscape of the most commonly used telecommunication and computing metrics to illuminate what metrics are available.
2025, ICTACT Journal on Communication Technology
Our work suggests that, in a small buffer regime, a simple Drop Tail queue management serves to enhance stability and appears preferable to the much studied RED scheme.
2025
This research project has been submitted for examinations with my approval as university supervisor. Signature……………………………….Date…………………………………………. I wish to sincerely express my heartfelt gratitude to all those who contributed directly or... more
This research project has been submitted for examinations with my approval as university supervisor. Signature……………………………….Date…………………………………………. I wish to sincerely express my heartfelt gratitude to all those who contributed directly or indirectly, in whatever level towards the successful completion of this project. I offer ultimate thanks to God for answering my prayer and guiding me towards the completion of MBA course .My sincere gratitude goes to my supervisor Dr. Kamau Mwangi for the valuable comments, insights, and for guiding me patiently through the intricacies of my study. Other gratitude goes to my family, Dad Joshua Abade ,sister Quinter Abade, friends and colleagues for their unfailing believe in me, patience, support and encouragement during my studies.
2025, Annals of Operations Research
Under multi-homing an Internet Service Provider (ISP) connects to the Internet via multiplicity of network providers. This allows the provider to receive proper quality of service when one of the networks fails. An ISP that uses... more
Under multi-homing an Internet Service Provider (ISP) connects to the Internet via multiplicity of network providers. This allows the provider to receive proper quality of service when one of the networks fails. An ISP that uses multihoming is subject to extra charges due to the use of multiple networks. Such extra costs can be very drastic under fixed cost pricing and non-meaningful under per-usage pricing. This work deals with the question of how large are these costs under top-percentile pricing, a relatively new and popular pricing regime. We provide a general formulation of this problem as well as its probabilistic analysis, and derive the expected cost faced by the ISP. We numerically examine several typical scenarios and demonstrate that despite the fact that this pricing aims at the peak traffic of the ISP (similarly to fixed cost), the bandwidth cost of multi-homing is not much higher than that of single-homing.
2025
There have been several approaches to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance... more
There have been several approaches to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services between two core (relay) network nodes, an ingress node and an egress node. MATE (Multipath Adaptive Traffic Engineering) has been proposed for multipath adaptive traffic engineering between an ingress node (source) and an egress node (destination) to distribute the network flow among multiple disjoint paths. Its novel idea is to avoid network congestion and attacks that might exist in edge and node disjoint paths between two core network nodes. This paper aims to develop an adaptive, robust, and reliable traffic engineering scheme to improve performance and reliability of communication networks. This scheme will also provision Quality of Server (QoS) and protection of traffic engineering to maximize network efficiency. Specifically, S-MATE (secure MATE) is proposed to protect the network traffic between two core nodes (routers, switches, etc.) in a cloud network. S-MATE secures against a single link attack/failure by adding redundancy in one of the operational redundant paths between the sender and receiver nodes. It is also extended to secure against multiple attacked links. The proposed scheme can be applied to secure core networks such as optical and IP networks.
2025, ACM SIGCOMM Computer Communication Review
Recently there has been much interest in combining the speed of layer-2 switching with the features of layer-3 routing. This has been prompted by numerous proposals, including: IP Switching [1], Tag Switching [2], ARIS [3], CSR [4], and... more
Recently there has been much interest in combining the speed of layer-2 switching with the features of layer-3 routing. This has been prompted by numerous proposals, including: IP Switching [1], Tag Switching [2], ARIS [3], CSR [4], and IP over ATM [5]. In this paper, we study IP Switching and evaluate the performance claims made by Newman et al in [1] and [6]. In particular, using ten network traces, we study how well IP Switching performs with traffic found in campus, corporate, and Internet Service Provider (ISP) environments. Our main finding is that IP Switching will lead to a high proportion of datagrams that are switched; over 75% in all of the environments we studied. We also investigate the effects that different flow classifiers and various timer values have on performance, and note that some choices can result in a large VC space requirement. Finally, we present recommendations for the flow classifier and timer values, as a function of the VC space of the switch and the n...
2025, Journal of College of Education for Pure Sciences
IPSec (IP security) technology is used to protect the local computer networks and the internet from attacks. The most illustrious attacks against networks are the replay attacks where IPSec technology introduces a solution called sliding... more
IPSec (IP security) technology is used to protect the local computer networks and the internet from attacks. The most illustrious attacks against networks are the replay attacks where IPSec technology introduces a solution called sliding window through which the packets will be protected. This window involves packets each has a distinct sequence number. This sequence number prevents replay attacks. But, there is a problem related to this solution: when the packet is received late it will be discarded whether it was good or forged. This usually causes a big losses in the good packets. In this paper, the researcher discusses the use of the dynamic sliding window which is a window added to the original one. This window keeps most of the good packets that have been discarded (reorder packets) and which comes before the original window. The dynamic window moves automatically with the original window. This dynamic window makes the modified protocol introduce the best solution which is more efficient than the original protocol since it keeps a large set of good reorder packets. It has been found that the dynamic window saves more than %85 of the reorder packets.
2025, In S. Del Puglia (a cura di), Fake News. Il Progetto di un algoritmo contro le false verità (pp. 71-81). Palermo : Caracol srl.
Dal 2016, la letteratura scientifica ha registrato una drastica crescita dell’interesse per il tema delle fake news e ha dimostrato la responsabilità dei progettisti nel supportare fenomeni di polarizzazione. L’applicazione malevola di... more
Dal 2016, la letteratura scientifica ha registrato una drastica crescita dell’interesse per il tema delle fake news e ha dimostrato la responsabilità dei progettisti nel supportare fenomeni di polarizzazione. L’applicazione malevola di principi di psicologia cognitiva alla progettazione delle interfacce digitali, detta deceptive design, persegue la manipolazione dell’utente e gioca un ruolo chiave nella diffusione delle fake news: questo contributo offre un insieme di strumenti utili all’identificazione di notizie false, testati in fase di popolazione del database di news per l’addestramento di un algoritmo di verifica nell’ambito del progetto Fake News.
2025
Avvocato e Ricercatore di Diritto privato SINTESI a) Avvento di internet e crisi del diritto Con l'avvento dell'informatica di rete (anche detta telematica), e di internet in particolare, sono emerse nuove dimensioni spazio/temporali ed e... more
Avvocato e Ricercatore di Diritto privato SINTESI a) Avvento di internet e crisi del diritto Con l'avvento dell'informatica di rete (anche detta telematica), e di internet in particolare, sono emerse nuove dimensioni spazio/temporali ed e `cambiato radicalmente il modo in cui l'uomo si relaziona con i prodotti, con le informazioni, con i suoi simili e con se ´stesso; il che ha determinato una vera e propria ''crisi'' dell'ordinamento giuridico. ''Tecnica'' e ''crisi'' del diritto privato
2025, Journal of Global Research in Computer …
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site,... more
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc. Every service provider wants to increase his traffic share and way, which creates the competition among the providers. Simulation study is performing to analysis the better proportion of traffic by the users.
2025, Journal of Global Research in Computer Sciences
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site,... more
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc. Every service provider wants to increase his traffic share and way, which creates the competition among the providers. Simulation study is performing to analysis the better proportion of traffic by the users.
2025
Naldi (2002) presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on... more
Naldi (2002) presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the traffic distribution between the operators. It is also shown that smaller blocking competitors can be benefited from call-by-call basis assumption. In this paper this criteria of Call-by-call attempt is converted into two call attempts and new mathematical results are derived. A comparative study between call-attempts is made with Naldi (2002) expressions. It is found that, by two-call attempt model, the operator gains more traffic than one-call attempt.
2025, Int. J. of Advanced Networking …
Naldi presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the... more
Naldi presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the traffic distribution between the operators. It is also shown that smaller blocking competitors can be benefited from call-by-call basis assumption. In this paper this criteria of Call-by-call attempt is converted into two call attempts and new mathematical results are derived. A comparative study between call-attempts is made with Naldi [1] expressions. It is found that, by twocall attempt model, the operator gains more traffic than one-call attempt.
2025, El Profesional de la Informacion
Resumen: Se muestra la evolución experimentada por los primeros buscadores, índices y proveedores de servicios internet hacia su conversión en portales, los cuales se pueden clasificar en portales generales, verticales y corporativos. Se... more
Resumen: Se muestra la evolución experimentada por los primeros buscadores, índices y proveedores de servicios internet hacia su conversión en portales, los cuales se pueden clasificar en portales generales, verticales y corporativos. Se analizan algunas de sus características diferenciadoras y la razón de su presencia en internet, así como los principales elementos que favorecen su éxito, entre los que destaca la generación de contenidos, creación de comunidades virtuales, la potenciación de la fidelización del usuario y el desarrollo del comercio electrónico.
2025, Keçeci Layout
Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes... more
Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes sequentially, placing them along a user-defined primary axis (e.g., top-down or left-to-right) while applying an offset on the secondary axis in a zigzag pattern. This zigzag pattern helps prevent node overlaps while maintaining an orderly structure. The function is designed to be compatible with popular Python graph libraries, including NetworkX, Rustworkx, igraph, Networkit, and Graphillion (via GraphSet objects). It takes a graph object from one of these libraries as input, processes the nodes (usually by sorting their IDs), and returns a Python dictionary mapping each node's identifier (in the library-specific format) to its calculated (x, y) coordinates. Users can customize the node spacing along the primary and secondary axes (`primary_spacing`, `secondary_spacing`), the main direction of the layout (`primary_direction`), and the starting side of the zigzag pattern (`secondary_start`) through parameters. This regular and predictable structure is useful, particularly when the order of nodes is significant or when a simple, aesthetically pleasing, and easily traceable graph visualization is desired. Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes sequentially, placing them along a user-defined primary axis (e.g., top-down or left-to-right) while applying an offset on the secondary axis in a zigzag pattern. This zigzag pattern helps prevent node overlaps while maintaining an orderly structure. The function is designed to be compatible with popular Python graph libraries, including NetworkX, Rustworkx, igraph, Networkit, and Graphillion (via GraphSet objects). It takes a graph object from one of these libraries as input, processes the nodes (usually by sorting their IDs), and returns a Python dictionary mapping each node's identifier (in the library-specific format) to its calculated (x, y) coordinates. Users can customize the node spacing along the primary and secondary axes (`primary_spacing`, `secondary_spacing`), the main direction of the layout (`primary_direction`), and the starting side of the zigzag pattern (`secondary_start`) through parameters. This regular and predictable structure is useful, particularly when the order of nodes is significant or when a simple, aesthetically pleasing, and easily traceable graph visualization is desired.
2025, Revista Universitária Brasileira - RUB
Com o advento do Marco Civil da Internet (MCI), houve um inegável avanço na regulamentação de temas relacionados ao ambiente digital, sobretudo no que tange ao estabelecimento de regras voltadas à proteção do direito à privacidade do... more
Com o advento do Marco Civil da Internet (MCI), houve um inegável avanço na regulamentação de temas relacionados ao ambiente digital, sobretudo no que tange ao estabelecimento de regras voltadas à proteção do direito à privacidade do usuário de internet. Com o objetivo então de privilegiar a liberdade de expressão, o MCI adotou como regra o modelo de judicial notice and takedown, que impõe a responsabilização civil das plataformas digitais somente após o descumprimento de notificação judicial determinando a remoção do conteúdo reputado ilícito, em contraposição ao sistema de notice and takedown, que vinha sendo aplicado pela jurisprudência brasileira. Essa inovação legislativa suscitou críticas, já que a exigência de ordem judicial prévia torna o processo de retirada de conteúdos ofensivos mais lento e burocrático, comprometendo a rápida proteção dos direitos fundamentais das vítimas. Tal controvérsia chegou, assim, ao Supremo Tribunal Federal (STF) por meio do Recurso Extraordinário (RE) nº 1.037.396/SP, Tema 987 da repercussão geral, cujo julgamento, ainda pendente, terá um papel crucial na definição dos limites da responsabilidade civil das plataformas digitais no Brasil. Nesse contexto, este artigo se propõe a analisar a (in)constitucionalidade do artigo 19 da Lei nº 12.965/2014, que condiciona a responsabilização civil dos provedores de aplicações ao descumprimento de ordem judicial específica. A pesquisa segue uma abordagem qualitativa, fundamentada em revisão bibliográfica e no exame do voto já disponível, eletronicamente, do Ministro Dias Toffoli, relator do caso no STF.
2025
The eBusiness environment has been undergoing constant transformation in the last decade, creating new opportunities for all kinds of business to be carried out. The IST project VISP (Virtual ISP) is developing a software platform to... more
The eBusiness environment has been undergoing constant transformation in the last decade, creating new opportunities for all kinds of business to be carried out. The IST project VISP (Virtual ISP) is developing a software platform to support the collaboration of small companies in a cluster of Internet Service Providers (ISPs) so that they can provide tailored niche services over the Internet in competition with larger telecommunication companies. This paper investigates the relevant business process management and workflow standards that may be used in the implementation of this software platform. The standards are evaluated and their applicability for VISP discussed.
2025
En España existe una amplia oferta de empresas proveedoras de Internet (ISP). Con este panorama resulta extremadamente difícil para los clientes elegir el proveedor. Por tanto, este trabajo trata de analizar los factores que contribuyen a... more
En España existe una amplia oferta de empresas proveedoras de Internet (ISP). Con este panorama resulta extremadamente difícil para los clientes elegir el proveedor. Por tanto, este trabajo trata de analizar los factores que contribuyen a la elección de proveedor de servicios de Internet por parte de los clientes. Para ello, se ha utilizado una muestra de jóvenes universitarios a los que se han analizado sus preferencias. Los jóvenes universitarios generalmente constituyen un grupo representativo de las tendencias en este sector. Además, para analizar el comportamiento de los clientes se utiliza por primera vez el análisis conjunto. Nuestros resultados muestran que el precio y la posibilidad de obtener un terminal móvil son los dos atributos más valorados. Por el contrario, otros atributos como la permanencia o el número de megas no son muy tenidos en cuenta por los jóvenes a la hora de seleccionar al proveedor de Internet. Estos resultados proporcionan una información muy valiosa tanto para los usuarios como para las empresas del sector ISP. [EN] In Spain, there is a wide range of Internet Service Providers (ISP). Within this context, it is extremely difficult for consumers to determine which ISP is the most beneficial for them. Therefore, this article aims to identify the factors that most influence consumers' choice of ISP companies. The analysis of these factors is based the opinions of a sample of university students, who are generally considered to be representative of the trends taking place in the ISP sector. In addition, conjoint analysis is used for the first time to analyse consumers' preferences on the choice of ISP companies. Our results show that price and the inclusion of a mobile phone in the package are the two most valuable attributes for university students. Meanwhile, other attributes like the requirement to sign a fixed-term contract and data allowance in offer are not taken into account as much by university students when choosing an ISP. Therefore, our results may be highly valuable for both users and ISP brands.
2025
This paper provides an in-depth analysis of the evolving legal framework governing online copyright infringement within the European Union, while drawing comparative insights from the United Kingdom and the United States. It examines the... more
2025, arXiv (Cornell University)
VISP (Virtual Internet Service Provider) is an IST-STREP project, which is conducting research in the field of these new technologies, targeted to telecom/ISP companies. One of the first tasks of the VISP project is to identify the most... more
VISP (Virtual Internet Service Provider) is an IST-STREP project, which is conducting research in the field of these new technologies, targeted to telecom/ISP companies. One of the first tasks of the VISP project is to identify the most appropriate technologies in order to construct the VISP platform. This paper presents the most significant results in the field of choreography and orchestration, two key domains that must accompany process modeling in the construction of a workflow environment.
2025, Telecommunications Policy
Customer churn remains a significant area of concern in the telecommunications sector due to its high prevalence. As Fixed Wireless Access (FWA) gains traction, the field is witnessing heightened competition, especially with the... more
Customer churn remains a significant area of concern in the telecommunications sector due to its high prevalence. As Fixed Wireless Access (FWA) gains traction, the field is witnessing heightened competition, especially with the integration of 5G technology, which serves dual purposes for cellular communications and FWA. This research delves into a comprehensive analysis of risk factors that impact churn via Random Survival Forests, the Cox regression model, and Kaplan-Meier Survival Plots. Our results indicate that fiber, sales zone (i.e., brand presence), age, speed, and discounts are some of the more important variables with regard to the cumulative hazard ratio. Although discounts were effective in many sales zones, their impact was diminished for more expensive internet services. The insights garnered provide a foundational basis for telecom providers to devise robust strategies to curtail customer churn over time, ensuring sustained growth and customer satisfaction in the burgeoning FWA market.
2025
Kar amacli tuzel kisi olan sirketler gerek uluslararasi gerekse de ulusal duzeyde insan haklarinin sagladigi guvencelerden gittikce artan bir sekilde yararlanmaya calismaktadirlar. Şirketlerin, sozlesme ozgurlugu, adil yargilanma ve... more
Kar amacli tuzel kisi olan sirketler gerek uluslararasi gerekse de ulusal duzeyde insan haklarinin sagladigi guvencelerden gittikce artan bir sekilde yararlanmaya calismaktadirlar. Şirketlerin, sozlesme ozgurlugu, adil yargilanma ve mulkiyet gibi haklardan yararlanirken, son yillarda ozel hayatin korunmasi ve din ozgurlugu gibi geleneksel olarak onlarla ozdeslesmeyen alanlarda da hak oznesi olma iddialarinda bulunduklarini gormekteyiz. Bu calisma, sirketlerin “insan” haklarinin oznesi olup olmayacaklari tartismasindan hareketle Avrupa Insan Haklari Mahkemesi, Amerikan Yuksek Mahkemesi ve Turk Anayasa Mahkemesinin sirketlerin hak ihlali iddialari karsisindaki tutumlarini incelemektedir. Calismada, sirketlerin korunmasi gereken haklari olmakla beraber bunlarin insan haklari baglaminda genisletilmesinin insan haklarinin korunmasi ve gelistirilmesine cok fazla katki yapmayacagi sonucuna ulasilmistir.
2025, Technology in Society
Faced with the challenge of distributing digital product in the digital realm, the American film industry is acutely aware of its increasing vulnerability to piracy and is currently considering two solutions to protect its copyrights-a... more
Faced with the challenge of distributing digital product in the digital realm, the American film industry is acutely aware of its increasing vulnerability to piracy and is currently considering two solutions to protect its copyrights-a legislative solution (e.g., the Digital Millennium Copyright Act of 1998) and a technical solution (e.g., digital watermarking). We suggest that a better way of dealing with piracy is an economic solution, such as neutralizing piracy by reengineering the supply chain across all three sectors of the motion picture industry: distribution, exhibition, production. In distribution, the industry can make legitimate downloading of high-quality movie files easier and cheaper (than pirating) by strategically locating ''e-Blockbusters'' (i.e., digital movie libraries) at or near Internet service provider (ISP) sites and making them attractive through feasible pricing schemes. In exhibition, innovative digital theaters could offer virtual reality viewing experiences and flexible windowing systems that maximize revenue for each feature film. In production, work would be done primarily or entirely in the digital domain. Digital film reservoirs would provide universal naming and indexing functions for easy access, reuse, and extension, and the industry would achieve a new diversity of quality and quantity. In addition, dynamic cross-media convergence can be expected as a function of the complementarities created by content digitization. To prosper in the new digital economy, the motion picture industry must closely collaborate with the information industry to achieve a new supply chain rather than competing with it to the detriment of both.
2025, PRJ Publication
This report examines the automation of critical IT operations through the use of shell scripting, aimed at improving system monitoring, resource management, and issue resolution. As a seasoned IT professional with expertise in network... more
This report examines the automation of critical IT operations through the use of shell scripting, aimed at improving system monitoring, resource management, and issue resolution. As a seasoned IT professional with expertise in network infrastructure and cloud solutions, I discuss how automation was leveraged to address key challenges such as monitoring critical alarms for 3G/4G devices, streamlining manual IP management, managing file system issues, preventing database user deletions, and mitigating downtime through cloud migration. By implementing custom shell scripts, significant time savings were achieved, resulting in increased operational efficiency and reduced system outages. Additionally, the migration of on-premises applications to the Azure cloud platform resolved ongoing infrastructure challenges, further enhancing system reliability and scalability. This report provides insights into how automation and cloud migration are revolutionizing modern IT management, offering organizations the ability to significantly reduce manual efforts, downtime, and operational costs while improving the overall performance and stability of their systems.
2025, Proceedings of the 2004 ACM workshop on Next-generation residential broadband challenges
This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the... more
This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the characterization is performed along four criteria: (i) session arrival process, (ii) session duration, (iii) number of bytes transferred within a session and (iv) user request patterns. Our results show that both residential and SOHO session inter-arrival times are exponentially distributed. Whereas residential session arrival rates remain relatively high during the day, SOHO session arrival rates vary much more significantly during the day. On the other hand, a typical SOHO user session is longer and transfers a larger volume of data. Furthermore, our analysis uncovers two main groups of session request patterns within each user category. The first group consists of user sessions that use traditional Internet services, such as e-mail, instant messenger and, mostly, www services. On the other hand, sessions from the second group, a smaller group, use typically peer-to-peer file sharing applications, remain active for longer periods and transfer a large amount of data. Looking further into the e-business services most commonly accessed, we found that subscription-based and advertising services account for the vast majority of user HTTP requests in both residential and SOHO workloads. Understanding these user behavior patterns is important to the development of more efficient applications for broadband users.
2025, Computer Networks
There is a growing need for large-scale distribution of realtime multicast data such as Inter-29 net TV channels and scientific and financial data. Internet Service Providers (ISPs) face an 30 urgent challenge in supporting these... more
There is a growing need for large-scale distribution of realtime multicast data such as Inter-29 net TV channels and scientific and financial data. Internet Service Providers (ISPs) face an 30 urgent challenge in supporting these services; they need to design multicast routing paths 31 that are reliable, cost-effective, and scalable. To meet the realtime constraint, the routing 32 paths need to be robust against a single IP router or link failure, as well as multiple such 33 failures due to sharing fiber spans (SRLGs). Several algorithms have been proposed to solve 34 this problem in the past. However, they are not suitable for today's large networks, because 35 either they do not find a feasible solution at all or if they do, they take a significant amount 36 of time to arrive at high-quality solutions. In this paper, we present a new Integer Linear Programming (ILP) model for designing a 38 cost-effective and robust multicast infrastructure. Our ILP model is extremely efficient and 39 can be extended to produce quality-guaranteed network paths. We develop two heuristic 40 algorithms for solving the ILP. Our algorithms can guarantee to find high-quality, feasible 41 solutions even for very large networks. We evaluate the proposed algorithms using topol-42 ogies of four operational backbones and demonstrate their scalability. We also compare the 43 capital expenditure of the resulting multicast designs with existing approaches. The eval-44 uation not only confirms the efficacy of our algorithms, but also shows that they outper-45 form existing schemes significantly. 46
2025
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal... more
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
2025, Journal of Engineering and Sustainable Development
The performance and reliability of the internet depend in large part on properties of routing techniques. IP routing protocols nowadays compute paths based on the network configuration parameters and topology, missing view to the current... more
The performance and reliability of the internet depend in large part on properties of routing techniques. IP routing protocols nowadays compute paths based on the network configuration parameters and topology, missing view to the current traffic load on the routers and links. This paper discusses routing optimization using Genetic Algorithm (GA) then studies and analyzes the problems in order to increase routing performance in median networks. A genetic algorithm will be proposed in a detail to advise the performance of Open Shortest Path First (OSPF) routing Protocol. The simulated results show that the probability of convergence to shortest path has been superior via momentary using GA in OSPF protocol.
2025, African Journal of Legal Studies
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organisations and even government arms and the internet and the liabilities placed on them by the law with regard to... more
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organisations and even government arms and the internet and the liabilities placed on them by the law with regard to wrongful acts of their subscribers or clients under the laws of Nigeria. It is common knowledge that actions against ISPs are commonest with defamation and infringement of copyright. The legal framework in the US and the UK are examined to determine if there are lessons to learn for Nigeria. The Nigerian legal framework also places some responsibilities on ISPs with regard to crime prevention and prosecution. This is because private rights are not yet much of an issue in the Nigerian cyberspace. The paper points out that much of the regulation governing ISPs liability in respect of civil matters do not have legislative power but are mere guidelines and suggests that the US and UK patterns have a lot to offer Nigeria.
2025, African Journal of Legal Studies
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organizations even government arms and the Internet and the liabilities placed on them by the law with regard to wrongful... more
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organizations even government arms and the Internet and the liabilities placed on them by the law with regard to wrongful acts of their subscribers or clients under the laws of Nigeria. It is common knowledge that actions againstISPs are commonest with defamation and infringement of copyright. The legal framework in theUSand the UKare examined to determine if there are lessons to learn for Nigeria. The Nigerian legal framework also places some responsibilities on ISPs with regard to crime prevention and prosecution. This is because private rights are not yet much of an issue in the Nigerian cyberspace. The paper points out that much of the regulation governingISPs liability in respect of civil matters do not have legislative power but are mere guidelines and suggests that theUSand UKpatterns have a lot to offer Nigeria.
2025
La Collana editoriale "Studi per le Scienze Politiche" ('Collana Discipol') è stata istituita con lo scopo di valorizzare le attività di studio e ricerca che caratterizzano le aree scientifiche afferenti al Dipartimento di Scienze... more
La Collana editoriale "Studi per le Scienze Politiche" ('Collana Discipol') è stata istituita con lo scopo di valorizzare le attività di studio e ricerca che caratterizzano le aree scientifiche afferenti al Dipartimento di Scienze Politiche. Con questa Collana si intende, inoltre, condividere e sostenere scientificamente il progetto di Roma TrE-Press, che si propone di promuovere la cultura incentivando la ricerca e diffondendo la conoscenza mediante l'uso del formato digitale in open access.
2025
O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que... more
O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que existem várias espécies de provedores de internet, existindo, igualmente, distinções no que toca à responsabilidade civil dos diversos provedores de internet: provedor de backbone, provedor de acesso, provedor de hospedagem, provedor de conteúdo, provedor de busca ou pesquisa e provedor de correio eletrônico. O texto estuda a responsabilidade civil dos provedores antes e depois da Lei 12.965/2014, incluindo as exceções feitas pela Lei 12.965/2014 ao regime geral de responsabilização dos provedores, ou seja, os direitos autorais e a pornografia de vingança. -chave: Direito à imagem. Direitos da personalidade. Responsabilidade civil. Internet. Provedores. 1 CHINELLATO, Silmara Juny de Abreu. Direitos da personalidade: o art. 20 do Código Civil e a biografia de pessoas notórias. In: CASSETTARI, Christiano (coord.). 10 anos de vigência do Código Civil brasileiro de 2002: estudos em homenagem ao professor Carlos
2025
Resumo: O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet.... more
Resumo: O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que existem várias espécies de provedores de internet, existindo, igualmente, distinções no que toca à responsabilidade civil dos diversos provedores de internet: provedor de backbone, provedor de acesso, provedor de hospedagem, provedor de conteúdo, provedor de busca ou pesquisa e provedor de correio eletrônico. O texto estuda a responsabilidade civil dos provedores antes e depois da Lei 12.965/2014, incluindo as exceções feitas pela Lei 12.965/2014 ao regime geral de responsabilização dos provedores, ou seja, os direitos autorais e a pornografia de vingança.
2025
Cloud computing is a rapidly developing information technology concept. Within a few years, cloud computing has become the fastest emerging technology. It is internet based computing software and resources are shared and information is... more
Cloud computing is a rapidly developing information technology concept. Within a few years, cloud computing has become the fastest emerging technology. It is internet based computing software and resources are shared and information is provided to computers on demand. It is a low cost computing entity that uses the advanced business or service models such as SaaS(Software as Service), PaaS (Platform as Service), IaaS (Infrastructure as Service) and deployment models such as Public, Private , Hybrid and Community cloud to distribute the powerful computing capability to end user. This paper highlights the emergence of cloud computing from a style of computing to a on demand full fledged service model. Comparative study of various service and deployment models for cloud computing is also presented.
2025, Information & Management
Relationship quality -based on Commitment-Trust theory -can explain and predict the success of a relationship between an ISP and its customers, measured in terms of loyalty. We proposed a model to express the relationship and included... more
Relationship quality -based on Commitment-Trust theory -can explain and predict the success of a relationship between an ISP and its customers, measured in terms of loyalty. We proposed a model to express the relationship and included gender as a moderator in the relationship. We then developed a questionnaire to test the model empirically and used a sample in Spain to check its validity and reliability. Analysis provided strong support for our hypotheses that gender exerted a significant moderating role on our model relationships. The influence of trust on commitment and of commitment on loyalty was significantly stronger for females than males, while the effects of satisfaction on commitment and of trust on loyalty were significantly stronger for males. Implications were drawn for practitioners.
2025, Rechtsgeleerd Magazijn Themis
2025
— A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server... more
— A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server process is said to “listen ” to a port until a client connects to it. A “port ” is a numbered socket on a particular machine. Proxy servers are commonly used to create an access point to the Internet that can be shared by all users. In this paper we present a new method of caching HTTP Proxy servers which takes lower bandwidth by maintaining a cache of Internet objects like html files, image files, etc. which are obtained via HTTP in local machine. The size of cache is dynamic and automatically determined time to time. When the local system memory is not enough to store the internet objects then paging system is implemented automatically without interference of users. Once an internet o...
2025, RePEc: Research Papers in Economics
In this paper we study concentration in the European Internet upstream access market. The possibility of measuring market concentration depends on a correct definition of the market itself; however, this is not always possible, since, as... more
In this paper we study concentration in the European Internet upstream access market. The possibility of measuring market concentration depends on a correct definition of the market itself; however, this is not always possible, since, as it is the case of the Internet industry, very often Antitrust authorities lack reliable pricing and traffic data. This difficulty motivates our paper. We present an alternative approach based on the inference of the Internet Operators interconnection policies using micro-data sourced from their Border Gateway Protocol tables. We assess market concentration following a two step process: firstly we propose a price-independent algorithm for defining both the vertical and geographical relevant market boundaries, then we calculate market concentration indexes using two novel metrics. These assess, for each undertaking, both its role in terms of essential network facility and of wholesale market dominance. The results, applied to four leading Internet Exchange Points in London, Amsterdam, Frankfurt and Milan, show that some vertical segments of these markets are highly concentrated, while others are extremely competitive. According to the Merger Guidelines some of the estimated market concentration values would immediately fall within the special attention category.
2025, International Symposium on Software Testing and Analysis
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting... more
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the-first version of RMP with limited functionality to handle only nominal requirements of data delivery. This initial version did not handle off-nominal cases such as network partitions or site failures. Meanwhile, the V&V team concurrently developed a formal model of the requirements using a variant of SCR-based state tables. Based on these requirements tables, the V&V team developed test cases to exercise the implementation. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test in the model and implementation agreed, then the test either found a potential problem or verified a required behavior. However, if the execution of a test was different in the model and implementation, then the differences helped identify inconsistencies between the model and implementation. In either case, the dialogue between both teams drove the co-evolution of the model and implementation. We have found that this interactive, iterative approach to development allows software designers to focus on delivery of nominal functionality while the V&V team can focus on analysis of offnominal cases. Testing serves as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; "and (2) three example problems found during the development of RMP. Although RMP has provided our research effort with a rich set of test cases, it also has practical applications within NASA. For example, RMP is being considered for use in the NASA EOSDIS project due to its significant performance benefits in applications that need to replicate large amounts of data to many network sites. The RMP source code and documentation are currently available on the WWW via .
2025, OSIPTEL
En el contexto de la creciente demanda en el acceso a internet en el Perú, aún existen desafíos para mejorar la calidad y disponibilidad de este servicio. Uno de ellos es la falta o asimetría de información sobre la ruta de conectividad... more
En el contexto de la creciente demanda en el acceso a internet en el Perú, aún existen desafíos para mejorar la calidad y disponibilidad de este servicio. Uno de ellos es la falta o asimetría de información sobre la ruta de conectividad que posee nuestro país, los niveles de conexión y los agentes que integran el ecosistema. La transparencia de esta información permite una mejor toma de decisiones por parte de los agentes, con el objetivo de optimizar la provisión de los servicios de acceso a internet. Este documento aborda esa brecha informativa al ofrecer una descripción integral del esquema de interconexión de la ruta de conectividad peruana, haciendo un análisis descriptivo de la conectividad internacional y la interconexión local, proporcionando una visión del estado actual y una prospectiva de indicadores clave del ecosistema al 2025. Asimismo, considerando el fuerte despliegue de redes de fibra óptica al hogar que experimenta nuestro mercado, se presentan los resultados del cuestionario “Panorama del despliegue de infraestructura de fibra óptica al hogar (FTTH)”, dirigido a los proveedores de servicios de internet (ISP) que operan en el mercado peruano, recogiendo sus apreciaciones sobre las problemáticas que enfrentan para el despliegue de sus redes a nivel nacional. Sobre la base de la información trabajada, se derivan conclusiones orientadas a promover un ecosistema de Internet más desarrollado, basado en el conocimiento de toda la ruta de conectividad peruana; y acciones para mejorar las condiciones del despliegue de las redes FTTH en nuestro mercado, coadyuvando así con el avance y la eficiencia en el sector de telecomunicaciones.
2024, SPIE Proceedings
Free Space Optics (FSO) has become a viable, high-bandwidth wireless alternative to fiber optic cabling. The primary advantages of FSO over fiber are its rapid deployment time and significant cost savings. The disadvantage of FSO over... more
Free Space Optics (FSO) has become a viable, high-bandwidth wireless alternative to fiber optic cabling. The primary advantages of FSO over fiber are its rapid deployment time and significant cost savings. The disadvantage of FSO over fiber is that laser power attenuation through the atmosphere is variable and difficult to predict, since it is weather dependent. This factor limits the distance at which FSO should be deployed. Using historical weather data collected at airports, the link availability as a function of distance can be predicted for any FSO system. These availability curves provide a good indication of the reasonable link distances for FSO systems in a particular geographical area. FSO link distances can vary greatly from desert areas like Las Vegas to heavy-fog cities like St. Johns NF. Another factor in determining FSO distance limitations is the link availability expectation of the application. For enterprise applications, link availability requirements are generally greater than 99%. This allows for longer FSO link ranges, based on the availability curves. The enterprise market is where the majority of FSO systems have been deployed. The carriers and ISPs are another potential large user of FSO systems, especially for "last-mile" metro access applications. If FSO systems are to be used in telecommunication applications, they will need to meet much higher availability requirements. Carrier-class availability is generally considered to be 99.999% ("5 nines"). An analysis of link budgets and visibility-limiting weather conditions indicates that to meet carrier-class availability, FSO links should normally be less than 140 m (there are cities like Phoenix and Las Vegas where this 99.999% distance limitation increases significantly). This calculation is based on a 53 dB link budget. This concept is extended to the "best possible" FSO system, which would have a 10 W transmitter and a photocounting detector with a sensitivity of 1 nW. This FSO system would have a 100 dB link margin, which would only increase the 99.999% link distance to 286 m. A more practical solution to extending the high availability range would be to back-up the FSO link with a lower data rate radio frequency (RF) link. This hybrid FSO/RF system would extend the 99.999% link range to longer distances and open up a much larger metro/access market to the carriers. It is important to realize that as the link range increases, there will be a slight decrease in overall bandwidth. To show the geographical dependence of FSO performance, the first map of FSO availabilities contoured over North America is presented. This map is the first step to developing an attenuation map for predicting FSO performance, which could be used in a similar fashion to the International Telecommunication Union (ITU)/Crane maps for predicting microwave performance.
2024, jurid
Em 18.12.2024, o Plenário do Supremo Tribunal Federal retomou o julgamento que discute a constitucionalidade do artigo 19 do Marco Civil da Internet (MCI) e a possibilidade de as plataformas digitais serem responsabilizadas por conteúdo... more
Em 18.12.2024, o Plenário do Supremo Tribunal Federal retomou o julgamento que discute a constitucionalidade do artigo 19 do Marco Civil da Internet (MCI) e a possibilidade de as plataformas digitais serem responsabilizadas por conteúdo de usuários.
O atual presidente do STF, o Ministro Luís Roberto Barroso foi o terceiro a votar e divergiu parcialmente dos votos já apresentados pelos Ministros Toffoli e Fux, relatores de dois casos julgados pelo STF.
2024, SSRN Electronic Journal
Network neutrality is a policy proposal that would regulate how network providers manage and price the use of their networks. Congress has introduced several bills on network neutrality. Proposed legislation generally would mandate that... more
Network neutrality is a policy proposal that would regulate how network providers manage and price the use of their networks. Congress has introduced several bills on network neutrality. Proposed legislation generally would mandate that Internet service providers exercise no control over the content that flows over their lines and would bar providers from charging more for preferentially faster access to the Internet. These proposals must be considered carefully in light of the underlying economics. Our basic concern is that most proposals aimed at implementing net neutrality are likely to do more harm than good.
2024, 2012 Proceedings IEEE INFOCOM Workshops
We propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is... more
We propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is assumed, favoring a major step towards making sleep mode enabled networks practical in the current Internet architecture. Our algorithms are able to automatically adapt the state of network links to the actual traffic in the network. Moreover, the required input parameters are intuitive and easy to set. Extensive simulations that consider a real network and traffic demand prove that our algorithms are able to follow the daily variation of traffic, reducing energy consumption up to 70% during off peak time, with little overheads and while guaranteeing Quality of Service constraints.
2024, ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology
In this era of digitalization, the number of users of social networking sites, especially females, is increasing significantly in Bangladesh. Social networking sites see users as a great platform for expressing their ideologies, thoughts... more
In this era of digitalization, the number of users of social networking sites, especially females, is increasing significantly in Bangladesh. Social networking sites see users as a great platform for expressing their ideologies, thoughts and feelings with others. Women users share their personal problems, emotional needs and also use as stress reliever in social networking websites like Facebook, Instragram, Twitter, Viber, Google, Imo, Messenger and so on. Cyber bulling, pornography, hacking, virtual rape, blackmailing are common nature of online victimization to face by young women more likely than men that is sexual and violent in social networking sites. This study is made with an aim to present the actual causes of women victimization in social networking sites and tends to explore the current nature and its impact on women in their daily lives. This study demonstrates that social networking sites have opened up a new platform of socialization. Women user seems to be greater tendency to share their private information and activities with unknown person targeted as potential victims by the criminals. Lack of awareness, improper security setting, insufficient knowledge, moral devaluation, ignorance and negligence of policy guidelines increases victimization such experiences create insecurity, depression, isolation, damage relations and to a very large extent suicide. Cyber victimization relatively new phenomenon it becomes a major challenges for cyber security world. Greater awareness, proper privacy setting, legal laws and regulation, raise voice against cybercrime, immediate actions taken by the SNWs authority can overcome this problem.
2024
The traditional global (i.e., submarine + terrestrial) network architecture needs to be revamped to meet contemporary needs. This paper deals with the validation of new global network concepts through a Test Bed, jointly provided by... more
The traditional global (i.e., submarine + terrestrial) network architecture needs to be revamped to meet contemporary needs. This paper deals with the validation of new global network concepts through a Test Bed, jointly provided by KDD-SCS and Lucent Technologies. This Test Bed consists of the latest products and technologies from the two companies, and is a unique and innovative collaboration between them.