Internet Service Provider Research Papers (original) (raw)
Il rapporto tra scienza giuridica e tecnologie informatiche rappresenta una questione ormai ineludibile per chiunque intenda misurarsi con le istanze della società digitale. I due autori si confrontano su temi attuali e decisivi relativi... more
Il rapporto tra scienza giuridica e tecnologie informatiche rappresenta una questione ormai ineludibile per chiunque intenda misurarsi con le istanze della società digitale. I due autori si confrontano su temi attuali e decisivi relativi all’informatica giuridica e al diritto dell’informatica, esaminando l’impatto della tecnologia sulla società nel suo complesso, sulla persona e i suoi diritti, sugli istituti e sugli strumenti del diritto. Le tematiche spaziano dalla problematica tutela dei dati personali e del right to be forgotten al riconoscimento dei diritti digitali, dal governo di dati e algoritmi alle questioni poste dall’intelligenza artificiale e dalla blockchain, dall’affermarsi pervasivo di documenti informatici, firme elettroniche e contratti telematici alla complessa protezione di opere digitali e beni informatici, dalla necessità di un’amministrazione digitale e aperta all’emersione di nuove geometrie di potere, dagli inediti bilanciamenti tra interessi ai difficili equilibri in tema di responsabilità, dalla diffusione endemica della criminalità informatica ai nuovi e cupi scenari della guerra cibernetica. L’obiettivo del volume è quello di proporre al lettore alcuni punti di osservazione privilegiati per riflettere sul destino della scienza giuridica nell’era tecnologica, avvalendosi anche dell’analisi di significativi casi di studio: regolare la dimensione digitale della vita umana costituisce una sfida impegnativa ma inevitabile, cui il diritto è chiamato a rispondere.
The Internet is growing to the point of needing more serious, scalable management infrastructure. Telecommunications companies and Internet Service Providers alike face the pressures of upgrading and provisioning their networks while... more
The Internet is growing to the point of needing more serious, scalable management infrastructure. Telecommunications companies and Internet Service Providers alike face the pressures of upgrading and provisioning their networks while constraining their infrastructure costs to maintain profitability and to stay competitive in an industry that is financially stressed with tight profit margins. In order to be financially successful in this environment, service providers will have to support a variety of services and applications on a combined packet infrastructure, carrying increased varieties of traffic with different performance characteristics and predictable levels of managed Quality of Service (QoS). Multi-Protocol Label Switching (MPLS) traffic engineering enables service providers to engineer their networks to provide such QoS; however, this task brings along with it a plethora of management challenges. This paper discusses these management challenges and our experience with the design and implementation of a policy-based management system, PECAN, for managing MPLS networks. PECAN provides the ability for a network operator to define high-level policies that control the operation of the management system. These high-level policies control admission of traffic into the network based on the QoS guarantees required; placement of traffic flows on MPLS traffic engineered paths; and the feedback loop between network fault/performance monitoring and reconfiguration of the network to alleviate the effects of any observed problems.
Internet usage has changed dramatically in the past few years. Content is no longer dominated by static websites, but comprises an increasing number of multimedia streams. With the widespread availability of broadband connections, the... more
Internet usage has changed dramatically in the past few years. Content is no longer dominated by static websites, but comprises an increasing number of multimedia streams. With the widespread availability of broadband connections, the quality of the media provided by video-on-demand as well as streaming services increases constantly. Even though today most videos are still encoded with a rather low bit rate, large Internet service providers already foresee highdefinition media becoming the predominant format in the near future. However, a larger number of clients requesting media at high bit rates poses a challenge for the server infrastructure. Conventional stream dissemination methods, such as RTP over UDP or HTTP over TCP, result in high server loads due to excessive local data copy, context switching, and interrupt processing overhead. In this paper, we illustrate and discuss this problem in detail through extensive experiments with existing solutions. We then present a new approach based on zero-copy protocol stack implementations in software as well as dedicated RDMA hardware. Our performance experiments indicate that these optimizations allow servers to scale better and remove most of the overhead caused by current approaches.
In order to promote public understanding of the impact of regulations on consumers, business, and government, the American Enterprise Institute and the Brookings Institution established the AEI-Brookings Joint Center for Regulatory... more
In order to promote public understanding of the impact of regulations on consumers, business, and government, the American Enterprise Institute and the Brookings Institution established the AEI-Brookings Joint Center for Regulatory Studies. The Joint Center's primary purpose is to hold lawmakers and regulators more accountable by providing thoughtful, objective analysis of relevant laws and regulations. Over the past three decades, AEI and Brookings have generated an impressive body of research on regulation. The Joint Center builds on this solid foundation, evaluating the economic impact of laws and regulations and offering constructive suggestions for reforms to enhance productivity and welfare. The views expressed in Joint Center publications are those of the authors and do not necessarily reflect the views of the Joint Center.
- by Robert Litan and +1
- •
- Legislation, Internet Service Provider
Network robustness and network reliability are important issues in the design of Internet Service Providers’ topologies. In this paper, we examine the structural characteristics of network topologies that affect robustness and... more
Network robustness and network reliability are important issues in the design of Internet Service Providers’ topologies. In this paper, we examine the structural characteristics of network topologies that affect robustness and reliability. We examine the interplay between the structural characteristics of network topologies and the resource capacity over-provisioning strategies when the network breakdowns subject to practical constraints (router technology) and economic considerations (link costs). We study the robustness of the Internet connectivity under node intentional harmful attack using two attacks strategies: static degree-based and static load-based. We find that the robustness of network topologies is affected by the variation of their structural characteristics. In our proposed approach, we show that highly-heterogeneous topologies have less robustness compared with lightly-heterogeneous topologies. The observations from the robustness study provide us useful insights for proposing multiple efficient preventive resource capacity over-provisioning strategies for mitigation of intentional attacks. The proposed strategies utilize the structural properties by calculating the excess traffic in case of single global cascading failure for each node and measure its influence on the other nodes as well as locally. The results show that our proposed strategies can significantly enhance the robustness and increase the resilience of network topology. We also show that highly-heterogeneous topologies have high resilience compared with lightly-heterogeneous topologies. By using real data from the Sprint network at the router level, we provide further empirical evidence in support of the proposed approach.
Communication between institutions, or domains, residing in the Internet requires a route to be created between the routing domains. Each of these domains is controlled by a single administrative authority, and is referred to as an... more
Communication between institutions, or domains, residing in the Internet requires a route to be created between the routing domains. Each of these domains is controlled by a single administrative authority, and is referred to as an autonomous system (AS). Control of routes that move the data in the Internet between ASes is problematic. If an AS requires certain route characteristics beyond the selection of the first hop, the AS must pay for some type of special service from its Internet service provider (ISP). The ISP can provide integrity of the data using end-to-end encryption, but the customer AS still does not have control over the route. In other words, an organization is unable to prevent its data from passing through certain parts of the Internet. We believe that a service allowing an AS to select from alternate routes, on behalf of an organization, could meet this need for route customization. The alternate routes could be created to meet the requirements of the source AS, such as the avoidance of another AS. The service must minimize the incremental cost (in hops) of the alternate routes and maximize the probability that an alternate route will be found. We measure the effectiveness of several algorithms as they are used to select ASes to deploy a solution, called inter-domain collaborative routing (IDCR), that allows ''friend'' routers to collaboratively determine a route. Key to the performance of IDCR is the placement of ''friend'' routers in the Internet. We explore the trade-off between placing ''friend'' routers in various levels of the hierarchy of routers in the Internet. In order to measure the effectiveness of IDCR as the set of ASes deploying the service is varied, we track the probability of routing success and monitor the incremental cost in hops as the service creates alternate routes in several small but representative network models. We evaluate three algorithms used to determine which routers should support the IDCR service. The first, called the degree algorithm, categorizes the routers into a hierarchy, based only on the nodal degree of the router [1]. The second, called the factor algorithm, calculates an IDCR factor for each router and uses that to rank select routers to provide the service. Finally, the greedy algorithm, serving as the baseline, iterates across all candidate routers, selecting routers one at a time based on the performance of the service.
Due to the recent evolution of telecommunications infrastructure and the Internet as a commodity market for bandwidth, Internet Service Providers (ISPs) encounter new issues concerned with bandwidth management for the network... more
Due to the recent evolution of telecommunications infrastructure and the Internet as a commodity market for bandwidth, Internet Service Providers (ISPs) encounter new issues concerned with bandwidth management for the network interconnection. Bandwidth commodity exchange is considered a new B2B (Business-to-Business) electronic commerce application that brings new market opportunities to carriers and service providers for managing their bandwidth resources. This paper develops market-based bandwidth management optimization models for Differentiated Service (DiffServ) QoS (Quality of Service) networks using an implementation of the bandwidth management agent, BMP (Bandwidth Management Point). We use network economic models to formulate an optimization problem for the interconnection and resource allocation policy of the DiffServ network. We formulate and develop those economic models as optimization problems of LP, NLP, MILP and mixed integer nonlinear programming (MINLP), and discuss the pricing mechanisms and available solution approaches for the implementation of the BMP's resource optimization process. Different opportunity costs are estimated based on the results of a network simulation using traffic flow statistics measured from a recent Internet backbone. We then numerically simulate the behavior of backbone network ISPs to optimize their profits for various demand scenarios.
Bisnis penyedia jasa internet/Internet Service Provider (ISP) mengalami pertumbuhan yang pesat seiring bertumbuhnya pula kebutuhan akan akses internet bagi masyarakat. Seiring pertumbuhan bisnis yang berbanding lurus dengan berkembangnya... more
- by Iwan Krisnadi and +1
- •
- Internet Service Provider, FCAPS
I am a certifiesd tutor with a Master,s degree in Languages and International Business. My skills in various writing formats such as APA, MLA and CMS enable me to meet the learning expectations of individual students.
Bacteria are classified as "spore forming" and "non spore forming" Spore -enables a cell to survive environmental stress such as cooking,Freezing, high salt condition, drying and high acid condition. Spore forming bacteria are found in... more
Bacteria are classified as "spore forming" and "non spore forming" Spore -enables a cell to survive environmental stress such as cooking,Freezing, high salt condition, drying and high acid condition. Spore forming bacteria are found in foods that are grown in soil and animal products.
Sobre el debate de la regulación acerca de la circulación de contenidos en nuevas plataformas digitales en Argentina, se focaliza en el proyecto “de Responsabilidad de Proveedores de Servicios de Internet” (con media sanción en Senado,... more
Sobre el debate de la regulación acerca de la circulación de contenidos en nuevas plataformas digitales en Argentina, se focaliza en el proyecto “de Responsabilidad de Proveedores de Servicios de Internet” (con media sanción en Senado, caducado en Diputados). Se aborda el sesgo corporativo de la consulta en la hechura de las políticas sectoriales hasta 2017.
Señalamos los principales aspectos conceptuales y procesales de este debate, y los problemas de regulación (y riesgos de cesión de autorregulación empresarial) de servicios digitales y derechos humanos.
Se propone ampliar la caracterización de conflictos de intereses por “puertas giratorias” enfocando, no sólo las relaciones entre la función pública y el empresariado, sino también la vinculación de la “sociedad civil” y la “academia” con las corporaciones trasnacionales.
Se aporta una visión crítica del desbalanceo de la participación invocada y la falta de ponderación de las incidencias sobre la cuestión.
Ante el discurso democratizador políticamente correcto derivado de los organismos multilaterales y los foros globales, espejado por los decisores políticos parlamentarios, se actualiza la doctrina para la elaboración de proyectos que efectivamente dispongan una mirada “heterostakeholder”.
This paper presents the bringing of optical fibre to domestic users in the Republic of Slovenia. Slovenia has two main Fibre-to-the-Home (FTTH) providers, deploying access network infrastructure based on Point to Point (P2P) fibre links.... more
This paper presents the bringing of optical fibre to domestic users in the Republic of Slovenia. Slovenia has two main Fibre-to-the-Home (FTTH) providers, deploying access network infrastructure based on Point to Point (P2P) fibre links. In recent years, accelerated deployment of the optical access network and the consequent increase in the number of optical household connections has been noted. These
These ten last years, the emergences of new applications through Internet such as multimedia applications VoIP, video broadcasting …) or networked control application, users need more and more quality of service (QoS) when using Internet.... more
These ten last years, the emergences of new applications through Internet such as multimedia applications VoIP, video broadcasting …) or networked control application, users need more and more quality of service (QoS) when using Internet. However, the requested QoS is not the same depending on the application. Some of them request a lot of bandwidth like video broadcasting others need short guaranteed delays … . Several new models to manage internet traffic have been proposed. Most of them focus on specific QoS criteria that they want to optimize. This paper focus on approaches based on MPLS that are more adapted to the configuration of ISP networks. The paper first introduces the different mechanisms that can be used to improve the QoS of a network such as the models of traffic classification (IntServ or DiffServ) or multipath routing. It also justifies the choice of MPLS technology versus a simple use of IP. After that, the paper presents main MPLS approaches such as MATE, LDM or LBWDP that try to guaranty a certain quality with respect to specific criteria. In the last part, it presents new models such as PEMS that try to adapt the offered quality depending on the class of the routed traffic. Keywords: traffic engineering, multipath routing, quality of service, differentiated service, QoS routing.
The fast proliferation of services over the Internet and the development of new Internet standards and technologies are affecting the existing business models of the traditional telecommunications market. This holds, in particular, for... more
The fast proliferation of services over the Internet and the development of new Internet standards and technologies are affecting the existing business models of the traditional telecommunications market. This holds, in particular, for the ISP market. This paper assesses the impacts of basic elements of business strategies on the relative competitive position of selected types of ISPs. One result is that the incumbent telcos have a relatively strong starting point in the ISP market, while small regional ISPs have a weak starting point. * Activities of the functional value chain. See and table 1.
E-commerce has grown exponentially in recent years. For instance, the European e-commerce market broke the €500 billion mark in 2016, with the UK accounting for around €157 billion.1 These numbers reflect the increasing importance of... more
E-commerce has grown exponentially in recent years. For instance, the European e-commerce market broke the €500 billion mark in 2016, with the UK accounting for around €157 billion.1 These numbers reflect the increasing importance of e-commerce to the growth of the e-commerce regime and strengthening the harmonisation efforts within the EU ISP regulatory regime. In continuing the push towards harmonisation, it is important to consider the liability regime with respect to the activities of ISPs and available exemptions.
Liability for online information can arise with respect to trade marks, privacy, copyright, trade secrets, defamation and unfair competition. This article examines the exemptions available to internet service providers (ISPs) under the EU electronic liability regime. The article will use the term “ISP” to capture service providers as described in Directive 2000/31. The article proceeds as follows. First, it provides a definition of an ISP and describes their activities. Secondly, it discusses the legal regime governing the activities of ISPs. Thirdly, it discusses the exemptions provided under arts 12 to 15 concerning the liability of ISPs as it relates to their activities. Lastly, it concludes by highlighting that it is necessary to balance the responsibilities and activities of ISPs against the intellectual property (IP) rights of owners of materials that are shared through the platform of ISPs.
The study used qualitative and quantitative procedures to collect the data from 291 extension agents and ICTs service providers such as internet cafes, computer training and business centers, computer firms, and information centers in the... more
The study used qualitative and quantitative procedures to collect the data from 291 extension agents and ICTs service providers such as internet cafes, computer training and business centers, computer firms, and information centers in the selected districts capitals in Ghana. Means, percentages, frequencies, and standard deviation were generated to describe the general trend of the data. The study revealed that extension agents have high and positive demand for ICTs for extension. There is a prospect for involving private and public institutional sources in extension delivery. The respondents have high knowledge about the advantages of using ICTs which will probably enhance their application of the technologies in extension. However, extension agents need ICT training opportunities, infrastructure, financial resources and technical backstopping to enhance the use of ICTs in extension. The study recommends a systems approach involving major stakeholders such as training institutions, Internet service providers, research institutions, farmers, policy makers to collaborate in the use of ICTs for extension. (1988), extension workers are often ineffective in their communication with farmer because they lack training in the scientific principles and methods of communication. They often have technical, but not communication orientation .
The area of Internet traffic measurement has advanced enormously over the last couple of years. This was mostly due to the increase in network access speeds, due to the appearance of bandwidth-hungry applications, due to the ISPs'... more
The area of Internet traffic measurement has advanced enormously over the last couple of years. This was mostly due to the increase in network access speeds, due to the appearance of bandwidth-hungry applications, due to the ISPs' increased interest in precise user traffic profile information and also a response to the enormous growth in the number of connected users. These changes greatly affected the work of Internet Service Providers and network administrators, which have to deal with increasing resource demands and abrupt traffic changes brought by new applications. This survey explains the main techniques and problems known in the field of IP traffic analysis and focuses on application detection. First, it separates traffic analysis into packet-based and flow-based categories and details the advantages and problems for each approach. Second, this work cites the techniques for traffic analysis accessible in the literature, along with the analysis performed by the authors. Relevant techniques include signature-matching, sampling and inference. Third, this work shows the trends in application classification analysis and presents important and recent references in the subject. Lastly, this survey draws the readers' interest to open research topics in the area of traffic analysis and application detection and makes some final remarks.
Gender harassment through cyberspace has become a common phenomenon in the internet era (Citron, 2009a). But harassment is worsened when victims face further victimization due to denial of justice at the hands of the criminal justice... more
Gender harassment through cyberspace has become a common phenomenon in the internet era (Citron, 2009a). But harassment is worsened when victims face further victimization due to denial of justice at the hands of the criminal justice system. Countries such as the United States, the UK, and India have codified laws dealing with cybercrimes and cyber-harassment to protect the victim. Ironically, the same systems pave the way for secondary victimization. Citron (2009b) had pointed out that trivialization of the problems by laws or criminal justice systems further victimize the crime victim. The questions that arise from this are several. Why does the criminal justice system fail to help victims in certain cyber-harassment cases? How are the victims of such crimes dealt with by criminal justice systems and Internet Service Providers (ISPs)? What could be done to end this harassment? This article will try to answer these questions from a comparative perspective of the situations in the United States, the UK, and India.
Pricing on the newly introduced advanced product.
Define DNS Why is DNS important? How DNS Works IP Addresses and Domain Names Internet Service Providers (ISPs) TYPES OF DOMAIN GENERIC DOMAIN Country Domain Top Level Domains Registrars sell domain names Registering a domain – check for... more
Define DNS
Why is DNS important?
How DNS Works
IP Addresses and Domain Names
Internet Service Providers (ISPs)
TYPES OF DOMAIN
GENERIC DOMAIN
Country Domain
Top Level Domains
Registrars sell domain names
Registering a domain – check for availability
Larrypress.com was taken, but these are available and for sale
Getting a Web Page
DNS SERVER
Types of Name Servers
DNS TOOLS
DNS Queries
DNS NAME SPACE
DNS Components
Subdomains
Loads On DNS
Zones
Name Servers and Zones
Dividing a Domain into Zones
Internet Corporation for Assigned Names and Numbers (ICANN)
The study used qualitative and quantitative procedures to collect the data from 291 extension agents and ICTs service providers such as internet cafes, computer training and business centers, computer firms, and information centers in the... more
The study used qualitative and quantitative procedures to collect the data from 291 extension agents and ICTs service providers such as internet cafes, computer training and business centers, computer firms, and information centers in the selected districts capitals in Ghana. Means, percentages, frequencies, and standard deviation were generated to describe the general trend of the data. The study revealed that extension agents have high and positive demand for ICTs for extension. There is a prospect for involving private and public institutional sources in extension delivery. The respondents have high knowledge about the advantages of using ICTs which will probably enhance their application of the technologies in extension. However, extension agents need ICT training opportunities, infrastructure, financial resources and technical backstopping to enhance the use of ICTs in extension. The study recommends a systems approach involving major stakeholders such as training institutions, Internet service providers, research institutions, farmers, policy makers to collaborate in the use of ICTs for extension. (1988), extension workers are often ineffective in their communication with farmer because they lack training in the scientific principles and methods of communication. They often have technical, but not communication orientation .
Purpose -The purpose of this research is to examine different customer satisfaction and loyalty metrics and test their relationship to customer retention, recommendation and share of wallet using micro (customer) level data.... more
Purpose -The purpose of this research is to examine different customer satisfaction and loyalty metrics and test their relationship to customer retention, recommendation and share of wallet using micro (customer) level data. Design/methodology/approach -The data for this study come from a two-year longitudinal Internet panel of over 8,000 US customers of firms in one of three industries (retail banking, mass-merchant retail, and Internet service providers (ISPs)). Correlation analysis, CHAID, and three types of regression analyses (best-subsets, ordinal logistic, and latent class ordinal logistic regression) were used to test the hypotheses. Findings -Contrary to Reichheld's assertions, the results indicate that recommend intention alone will not suffice as a single predictor of customers' future loyalty behavior. Use of a multiple indicator instead of a single predictor model performs better in predicting customer recommendations and retention.
O trabalho é a Dissertação de Mestrado aprovada em 2018 com distinção na Faculdade de Direito da USP. O objetivo central do estudo foi analisar a responsabilidade civil dos provedores de internet com o advento do Marco Civil da Internet.... more
O trabalho é a Dissertação de Mestrado aprovada em 2018 com distinção na Faculdade de Direito da USP. O objetivo central do estudo foi analisar a responsabilidade civil dos provedores de internet com o advento do Marco Civil da Internet. Antes da promulgação da Lei n. 12.965/14, resolvia-se o conflito aplicando-se o Código Civil de 2002 ou o Código de Defesa do Consumidor. Com o advento da Lei n. 12.965/14, diversas mudanças ocorreram na responsabilização civil dos provedores. O Código de Defesa do Consumidor, que possuía status de norma constitucional e consolidou diversos direitos aos usuários, foi substituído pela Lei n. 12.965/14 nas relações via Internet. Essa sucessão de leis no tempo gerou grande celeuma doutrinária. Alguns sustentaram, inclusive, a inconstitucionalidade do Marco Civil da Internet nos pontos em que suprimia direitos já consolidados. Indo ao encontro do posicionamento da Espanha, Itália e outros países, o Brasil, através da Lei n. 12.965/14, optou pela mudança no que concerne ao período de guarda das informações pelos provedores, mudando entendimento pacificado do Superior Tribunal de Justiça baseado no Código Civil de 2002. Além disso, mudou a forma de notificação dos provedores por conteúdo ilícito, onerando o usuário e acarretando em um acúmulo de processos no judiciário brasileiro. Tais mudanças merecem um estudo mais aprofundado, analisando a responsabilidade dos provedores com a jurisprudência e doutrina anteriores ao Marco Civil da Internet e a legislação posterior, traçando um paralelo e uma solução aos conflitos ora elencados.
Intisari - Penggunaan internet saat ini menjadi hal yang wajib dalam dunia pendidikan saat ini, khususnya STIMIK AKBA yang terkenal dengan jurusan komputer dan menjadi perguruan tinggi unggulan di Makassar. Keadaan manajemen kampus saat... more
Intisari - Penggunaan internet saat ini menjadi hal yang wajib dalam dunia pendidikan saat ini, khususnya STIMIK AKBA yang terkenal dengan jurusan komputer dan menjadi perguruan tinggi unggulan di Makassar. Keadaan manajemen kampus saat ini dihadapkan dengan berbagai masalah yang berhubungan dengan internet yaitu koneksi internet saat ini menjadi lambat dan terkadang koneksi terputus tanpa sebab, sehingga akses mahasiswa dan dosen ke sistem informasi akademik ikut bermasalah. Manajemen kampus berinisiatif untuk mengganti langganan internet saat ini dengan ISP (Internet Service Provider) lain yang lebih terjangkau di Makassar. Akan tetapi banyaknya ISP saat ini yang menyediakan layanan yang beragam tidak hanya sebatas kecepatan tetapi banyak kriteria-kriteria lain yang ditawarkan dan perlu untuk dipertimbangkan seperti jenis koneksi, maintenance, kestabilan koneksi, kecepatan, harga dan lain-lain.
Sistem pengambilan keputusan dapat menghitung pembobotan untuk pemilihan ISP yang paling sesuai untuk mengatasi masalah yang terjadi pada STMIK AKBA Makassar. Sistem pengambilan keputusan (SPK) sangat membantu dalam hal pengambilan keputusan yang kemudian di analisis dengan metode Weighted Product adalah salah satu metode penyelesaian padamasalah Multi-Atribut Decision Making(MADM). Metode ini mengevaluasi beberapa alternatif terhadap sekumpulan atribut atau kriteria, dimana setiap atribut saling tidak bergantungan satu dengan yang lainnya. Kriteria-kriteria yang dianalisis menghasilkan kesimpulan bahwa ISP yang paling sesuai untuk digunakan di STMIK AKBA adalah Icon+ karena di pandang dari berbagai kriteria yang disebutkan maka ISP Icon+ bisa menjadi solusi yang tepat untuk mengatasi masalah saat ini.
Kata kunci : internet, isp, sistem pendukung keputusan, Weighted Product, manajemen kampus
Abstract - The use of internet has been a necessity in the education field nowadays, especially for STIMIK AKBA which has been famous for the computer department and eminent collage in Makassar. The condition of the campus management today are faced by various problems related to the Internet, namely the internet connection is slow and sometimes lost without any reason, so that the student’s and lecture’s access to the academic information system get a problem. The management of campus initiatively replace the current internet subscription with an ISP (Internet Service Provider) which currently prepare diverse services not only limited for the speed but also a lot of other criterias that are offered and need to be considered, such as the type of connection, maintenance, stability of connection, speed, price and others.
The decision-making system can calculate the weighting for the selection of the most appropriate ISP to overcome the problems that occured in STMIK AKBA Makassar. The decision-making system (DSS) is very helpful in terms of decision-making which is then analyzed by the method of Weighted Product. It is one of the method of the problem solving of Multi-Attribute Decision Making (MADM). This method evaluates several alternatives to a set of attributes or criteria, where each attribute is not mutually dependent with each other. The criteria analyzed result to the conclusion that the ISP is most suitable for being used in STMIK AKBA is Icon+ because in view of the various criteria mentioned, so the ISP Icon+ could be the perfect solution to overcome the current problems.
Keywords: internet, isp, Decision Supporting System, Weighted Product, Campus Management
The monopoly of state ownership of telecommunication industry in Taiwan was lifted in 1997. In choosing an ISP, pricing was and still is a main differentiating factor in the mind of customers; however, service quality has emerged as a... more
The monopoly of state ownership of telecommunication industry in Taiwan was lifted in 1997. In choosing an ISP, pricing was and still is a main differentiating factor in the mind of customers; however, service quality has emerged as a major concern among users lately. Management of ISP has discovered that service quality is important not only for attracting new customers, but, more importantly, for retaining existing customers who may otherwise be lured away by lower fees. Hence, it is essential to develop a CRM system, which could help keeping existing customers and exploring further business opportunities at the same time. In this study, we, based on the IP traffic data, developed a CRM systematic approach for a major ISP company in Taiwan to enhance customers' longer-term loyalty. This approach employs CRISP-DM methodology, and applies Attribute-Oriented Induction as the mining technique to discover network usage behaviors of customers, which help management identify usage pattern and also pinpoint the time when usage is excessively heavy. The former allows management to make effective personal calls for services or maintenance, and the latter presents opportunities for management to offer personalized cares and advanced products. Pixel-oriented visualization is applied to improve the understanding of mining results. q
The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product... more
The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product ratings. While most, if not all of the following guidelines apply to all Internet-connected devices, the presented guidelines focus on internet traffic security best practices for wired or wireless networks. They detail security mechanisms necessary for consideration at the manufacturing design phase rather than after deployment of devices to internet service providers and end users. The paper leads with the assertion that a thorough study on protecting Internet traffic does not yet exist, and proposes, based on our findings, that existing technology is not yet sufficient to meet the goal of protecting Internet traffic. The best practices presented are centered around countering and preventing malicious activity. By setting up a secure network with industry standard security protocols, the risk and potential legal liabilities associated with an unsecured network can be proactively addressed.
Research on the CRM-performance link has been fragmented due to various perspectives on CRM. This study, considering different concepts of CRM, proposes a process-oriented framework for examining the relationship among CRM resources, CRM... more
Research on the CRM-performance link has been fragmented due to various perspectives on CRM. This study, considering different concepts of CRM, proposes a process-oriented framework for examining the relationship among CRM resources, CRM process capabilities, and organizational performance. Based on the resource-based view (RBV) of the firm, CRM resources are classified as "technological CRM resources" and "infrastructural CRM resources". Data from 77 Iranian Internet service provider firms were gathered in a field survey. The empirical work indicates that the measured constructs demonstrate key psychometric properties including reliability and validity. The results reveal that CRM processes are more affected by infrastructural CRM resources rather than technological CRM resources. Moreover, the findings indicate that firms with improved CRM process capabilities enjoy better organizational performance.
In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to difficult... more
In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to difficult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide differentiated service subscriptions for those clients who are willing to pay more for value added services. Furthermore, a tremendous development of several types of overlay ...
3GPP Long Term Evolution atau yang biasa disingkat LTE adalah sebuah standar komunikasi akses data nirkabel tingkat tinggi yang berbasis pada jaringan GSM/EDGE dan UMTS/HSPA. Jaringan antarmuka-nya tidak cocok dengan jaringan 2G dan 3G,... more
3GPP Long Term Evolution atau yang biasa disingkat LTE adalah sebuah standar komunikasi akses data nirkabel tingkat tinggi yang berbasis pada jaringan GSM/EDGE dan UMTS/HSPA. Jaringan antarmuka-nya tidak cocok dengan jaringan 2G dan 3G, sehingga harus dioperasikan melalui spektrum nirkabel yang terpisah. Teknologi ini mampu download sampai dengan tingkat 300mbps dan upload 75mbps. Layanan LTE pertama kali diadopsi oleh operator seluler TeliaSonera di Stockholm dan Oslo pada tanggal 14 desember 2009.
Ağ tarafsızlığı kavramına ilişkin tartışmalar gerek insan hakları hukuku gerekse de rekabet hukuku kapsamında güncelliğini korumaktadır. Türkiye’de henüz ağ tarafsızlığına ilişkin hukuki düzenleme mevcut olmamakla birlikte, Amerika... more
Ağ tarafsızlığı kavramına ilişkin tartışmalar gerek insan hakları hukuku gerekse de rekabet hukuku kapsamında güncelliğini korumaktadır. Türkiye’de henüz ağ tarafsızlığına ilişkin hukuki düzenleme mevcut olmamakla birlikte, Amerika Birleşik Devletleri’ndeki ağ tarafsızlığı düzenlemeleri ile bunların ilga edilmesi ve Avrupa Birliği’nin ağ tarafsızlığına ilişkin düzenlemeleri, bu alandaki tartışmalara büyük oranda yön vermektedir. Bununla birlikte henüz internet servis sağlayıcıların tarafsızlığının nasıl düzenlenmesi gerektiğine ilişkin bir görüş birliği bulunmamaktadır. Fakat günümüzde, internetin sosyal yaşamda sahip olduğu büyük önem dolayısıyla, temel hak ve özgürlüklerin internet üzerinde de etkili bir şekilde korunması ile bunun önemi sıklıkla dile getirilmektedir. Bu çerçevede internet servis sağlayıcıların tarafsızlıklarını korumasının, temel hak ve özgürlükler açısından önemi gerek insan hakları aktivistleri tarafından gerekse de uluslararası insan hakları örgütleri tarafından gündeme getirilmektedir. Bu çalışmada ise ağ tarafsızlığı kavramı ve ağ tarafsızlığına ilişkin mevcut düzenlemeler Avrupa İnsan Hakları Sözleşmesi kapsamında değerlendirilerek, internet servis sağlayıcıların ağa müdahalelerinin insan hakları hukuku açısından olası etkileri incelenmiştir. Bu kapsamda öncelikle konuya ilişkin terimler açıklanmış, kavramın tarihsel gelişimi ile farklı sistemlerdeki ağ tarafsızlığı düzenlemeleri değerlendirilmiştir. Ağ tarafsızlığı tartışmaları doğrultusunda, internet servis sağlayıcıların problemli kabul edilen ağ yönetimi teknikleri, Avrupa İnsan Hakları Sözleşmesi’nin ifade özgürlüğü hakkı, özel yaşama ve aile yaşamına saygı hakkı ve mülkiyet hakkı çerçevesinde incelenmiştir. Bu incelemede, Avrupa İnsan Hakları Mahkemesi’nin içtihatları doğrultusunda ilgili haklar ile bu hakların sınırlandırılması, Sözleşmeci devletlerin pozitif yükümlülükleri ve hakların çatışması göz önünde bulundurulmuş olup Avrupa Konseyi Bakanlar Komitesi’nin tavsiye kararları ile konuya ilişkin uluslararası düzenlemeler ve politikalar da değerlendirilmiştir. Çalışma ile iv ağ tarafsızlığı kavramının temel hak ve özgürlükler açısından önemi ile konu hakkında düzenleme yapılmasının gerekliliğinin ortaya konulması amaçlanmıştır.
Internet Service Providers (ISP) have been recently relying on Deep Packet Inspection (DPI) systems, which are the most accurate techniques for traffic identification and classification. However, building high performance DPI systems... more
Internet Service Providers (ISP) have been recently relying on Deep Packet Inspection (DPI) systems, which are the most accurate techniques for traffic identification and classification. However, building high performance DPI systems requires an in-depth and careful computing system design due to the memory and processing power demands. DPI's accuracy mostly depends on string matching process and regular expression heuristics that go deep down on the packet payloads in a search for networked application signatures. As ISPs backbone links' speed and data volume soar, commodity hardware-based DPI systems start to face performance bottlenecks (e.g., packet losses), which interferes on traffic classification accuracy dramatically. In this paper we propose a lightweight DPI (LW-DPI) system that overcomes performance bottlenecks of traditional DPI systems, without a significant decrease on accuracy. We evaluate LW-DPI's accuracy by inspecting two factors: a limited number of full-payload packets in a given flow or a fraction of the packet payload. Our experiments were performed using more than 6TB of packet-level data from a large ISP and show that there is some interesting trade-offs between such factors and accuracy. Most flows can be classified with only their first 7 packets or a fraction of their payload. We also show that the impact on DPI's processing time may decrease around 75% as compared to analyzing all full-payload packets in a flow.
- by Tord Westholm and +1
- •
- Computer Networks, Spine, System Design, Intrusion Detection
Online service providers (OSPs)—such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment (infosphere) and influence users’ experiences and interactions within it. There is a general agreement... more
Online service providers (OSPs)—such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment (infosphere) and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract (LoAs), we first analyse the moral responsibilities of OSPs in the web (LoAIN). These concern the management of online information, which includes information filtering, Internet censorship, the circulation of harmful content, and the implementation and fostering of human rights (including privacy). We then consider the moral responsibilities ascribed to OSPs on the web (LoAON) and focus on the existing legal regulation of access to users’ data. The overall analysis provides an overview of the current state of the debate and highlights two main results. First, topics related to OSPs’ public role—especially their gatekeeping function, their corporate social responsibilities, and their role in implementing and fostering human rights—have acquired increasing relevance in the specialised literature. Second, there is a lack of an ethical framework that can (a) define OSPs’ responsibilities, and (b) provide the fundamental sharable principles necessary to guide OSPs’ conduct within the multicultural and international context in which they operate. This article contributes to the ethical framework necessary to deal with (a) and (b) by endorsing a LoA enabling the definition of the responsibilities of OSPs with respect to the well-being of the infosphere and of the entities inhabiting it (LoAFor).
On April 12, 2010, Italian Judge Oscar Magi sentenced three Google executives for failing to comply with the Italian privacy code. The case stemmed from a 2006 video showing a boy with down syndrome being taunted at... more
On April 12, 2010, Italian Judge Oscar Magi sentenced three Google executives for failing to comply with the Italian privacy code. The case stemmed from a 2006 video showing a boy with down syndrome being taunted at a Turin school.
In examining the case, the paper will focus on the liability of intermediary service providers, governed in Italy by e-commerce directive 2000/31, as well as on the relationship between human rights and new technologies.
Traffic identification and classification are essential tasks performed by Internet Service Provider (ISPs) administrators. Deep Packet Inspection (DPI) is currently playing a key role in traffic identification and classification due to... more
Traffic identification and classification are essential tasks performed by Internet Service Provider (ISPs) administrators. Deep Packet Inspection (DPI) is currently playing a key role in traffic identification and classification due to its increased expressive power. To allow fair comparison among different DPI techniques and systems, workload generators should have the following characteristics: (i) synthetic packets with meaningful payloads; (ii) TCP and UDP traffic generation; (iii) a configurable network traffic profile, and (iv) a high-speed sending rate. This paper proposes a workload generator framework which inherits all of the above characteristics. A performance evaluation shows that our flexible workload generator system achieves very high sending rates over a 10Gbps network, using a commodity Linux machine. Additionally, we have configured and tested our workload generator following a real application traffic profile. We then analyzed its results within a DPI system, proving its accuracy and efficiency.
GIANPAOLO MARIA RUOTOLO · MARZO 29, 2021 0 0 0 Gianpaolo Maria Ruotolo, Università di Foggia 1. Il 15 dicembre 2020 la Commissione europea ha presentato un pacchetto di misure per aggiornare la disciplina UE del settore digitale,... more
GIANPAOLO MARIA RUOTOLO · MARZO 29, 2021 0 0 0 Gianpaolo Maria Ruotolo, Università di Foggia 1. Il 15 dicembre 2020 la Commissione europea ha presentato un pacchetto di misure per aggiornare la disciplina UE del settore digitale, distinte in due proposte di adozione di atti di diritto derivato, sontuosamente de�nite "Acts". Il regolamento Digital Services Act (DSA) mira a regolare la sicurezza, la trasparenza e le condizioni di accesso ai servizi online, mentre il regolamento Digital Markets Act (DMA) si occupa degli aspetti commerciali e di concorrenza.
Il Regolamento (UE) 2016/679, in vigore dal 25 maggio 2018, nello stabilire nuovi obblighi e responsabilità per gli intermediari digitali-i provider, fra cui le piattaforme di social networking-ha integrato, ed in parte superato, le... more
Il Regolamento (UE) 2016/679, in vigore dal 25 maggio 2018, nello stabilire nuovi obblighi e responsabilità per gli intermediari digitali-i provider, fra cui le piattaforme di social networking-ha integrato, ed in parte superato, le precedenti disposizioni in materia. Il contributo in oggetto, dopo un breve excursus che ripercorre nella giurisprudenza europea ed italiana le tappe evolutive dei fondamenti normativi delle responsabilità sancite oggi dal GDPR, ne vuole verificare l'applicabilità alle piattaforme social, partendo dalla definizione stessa del concetto di piattaforma e delle sue funzioni, anche avvalendosi di contributi tratti dai media e cultural studies. L'obiettivo è analizzare l'equilibrio non sempre stabile fra gli obblighi per i Social Network Provider ed i diritti degli interessati nel delicato campo della comunicazione politica sulle piattaforme social: è su questi "campi di battaglia" infatti che si sono recentemente verificati "scandali" quali quello di Cambridge Analytica, che hanno rin-novato l'attenzione sui rischi del trattamento automatizzato dei dati personali e sulla possibilità di data breach. L'articolo vuole dunque verificare la tenuta degli strumenti dispiegati dal GDPR-in primo luogo contro la profilazione degli utenti e l'aggregazione delle tracce digitali tramite algoritmo-quando questi si debbono applicare a scapito degli interessi delle major di Internet.
Using desk research, quantitative approaches and other methods, this study aims at refreshing the previous research1 on the very same subject matter – namely, updating data related to Internet penetration and usage in Kosovo. In the... more
Using desk research, quantitative approaches and other methods, this study aims at refreshing the previous research1 on the very same subject matter – namely, updating data related to Internet penetration and usage in Kosovo. In the course of this study, Internet usage and habits, and demographic Internet penetration based on households and users were studied. In addition, data on geographical Internet penetration was gathered and presented. The findings show that both rural and urban areas utilise Internet connectivity and its benefits. Further, this study reveals that Internet penetration in Kosovo is at satisfactory levels and can be compared to developed countries. Internet penetration based on households is 84.8%, Internet penetration based on users is 76.6%, and geographical Internet penetration shows that on regional roads there are, in average, 9 wireless networks per kilometre. There are various reasons for these levels of penetration, the main ones being Kosovo’s very young median population age who want to follow the latest global trends and Kosovo’s population living abroad who want to stay connected with their families and friends living in Kosovo. According to the findings of this study, most of user habits are comparable to global trends. Social networking and Internet voice communication services are mostly used by women, and this is also a global trend. Kosovars are most active in Facebook, being the main channel for reaching the widest user base. regardless of employment status and family income, Kosovars are a connected society at similar levels as developed countries. Further, the study concludes that there will be a slow down in further Internet penetration in Kosovo due to market maturity. This being the point in time when Kosovo’s institutions, companies, and other organizations will need to further advance general quality of service, e-governance, parental control, market regulation, and information society in general. The study provides additional information that can support the authorities, private sector, international organizations, and potential investors to make policies and decisions based on evidence. Finally, the report suggests that Kosovo’s institutions may wish to consider the establishment of the Ministry of Information Society.
- by Agron Fazliu
- •
- Kosovo, Households, Survey, Kosova
Telecommunication technology is increasingly con- verging towards software-intensive solutions. As the role of software increases, it naturally follows that traditional software development procedures need to be reassessed. In South... more
Telecommunication technology is increasingly con- verging towards software-intensive solutions. As the role of software increases, it naturally follows that traditional software development procedures need to be reassessed. In South Africa, this need is especially urgent because of recent legislation that presages an increase in the number of competitors. This paper assesses two important contemporary software development ap- proaches - namely
Everyday people's opinions and actions matter to governments and corporations because we are both citizens and consumers. Despite the EU's muted response to the USA's and UK's surveillance scandal, we can deliver a strong response (as... more
Everyday people's opinions and actions matter to governments and corporations because we are both citizens and consumers. Despite the EU's muted response to the USA's and UK's surveillance scandal, we can deliver a strong response (as citizens and consumers) by carefully selecting which services, goods, and companies we employ. When citizens and consumers voice their opinions clearly and act upon them, governments and corporations respond accordingly - the EU's experience with ACTA last year proves that, without a doubt.