• Title/Summary/Keyword: ISPS

Search Result 84, Processing Time 0.023 seconds

Analysis of Network Neutrality in Two-sided Markets Using Game Theory (게임이론에 의한 양면시장에서의 망중립성 분석)

  • Oh, Hyung Sool;Lee, Jae Ha
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.162-169
    • /
    • 2018
  • Net neutrality, which has not been a problem, has recently become a problem for ISPs (Internet Service Providers), and their complaints have been paid by domestic platform companies, but overseas global IT companies such as Google and YouTube, generate huge revenues from domestic markets. In this situation, domestic IT companies claim that it is natural to impose more expensive charges or restrict speed on users who generate huge traffic. On the other side, however, the telecommunication network has become an essential public good that is essential to our everyday life, and because it has been given a monopoly position by a private company to efficiently respond to the explosive demand for telecommunication services, It is necessary to provide equal and universal service and fulfill public duty. In this paper, we deal with the network neutrality problem, focusing on the price elasticity between the CP (Contents Provider) and the ISP, rather than the user who is one side of the two-sided market for the already saturated satellites communication market. We present a game model that determines the optimal price for each platform by Nash equilibrium and analyze how the net neutrality affects CP according to the change of exogenous variables through the proposed game model.

Regulation Implication of Broadband Internet Access Service (초고속인터넷접속서비스에 대한 규제 정립)

  • 고순주
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.464-467
    • /
    • 2001
  • There nay be fierce debate over the nature of the medium that will herald the brave new world copper, fiber, wireless or satellite there is little doubt that future networks will be broadband in their capabilities. The Republic of Korea is a significant exception and leads the world, at present, in terms of number of subscribers with broadband access via ADSL. In order to further drive the growth in the broadband Internet access market, the government is scheduled to implement open access for ISPs and unbundling of the local loops of incumbent public telecom operators during the course of 2001. By the Way, Should incumbent telecommunication operators be obliged to provide unbundled access to the local loop\ulcorner

  • PDF

A Study on the Domestic IPv6 Evolution Strategy for Next Generation Internet (차세대 인터넷을 위한 국내 IPv6 진화 방안에 관한 연구)

  • Shin, Myung-Ki;Kim, Yong-Jin;Park, Chee-Hang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3613-3622
    • /
    • 2000
  • This paper presents IPv6 evolution strategies toward Next Generation Internet. We define requirements for IPv6 transition, then propose the IPv6 evolution strategies by considering IPv4/1Pv6 interworking, IPv6 development items with superiority compared to foreign technologies, IPv6 network evolution strategy for operation and management in stages by new Internet site or ISPs. the policy for structure and allocation of production IPv6 addresses, and reinforcement methods of the international activities on IPv6 related areas.

  • PDF

Design and Implementation of a Network Weather Map System (네트워크 기상 관리 시스템의 설계 및 구현)

  • Kim, Hyun-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.113-121
    • /
    • 2013
  • In this paper, we design and implement a network weather map system, which provides a macroscopic view on the whole network topology as well as the network link status and utilization. The proposed system also provides distributed NetFlow-based database facility and Web-based query interface, through which network operators can check the detailed network router or link status as well as submit predefined queries to easily find out and locate heavy hitters and/or their usage. We believe that our develop system will be a useful tool for small-to-mid-scale ISPs or network operators, in managing their own networks in a cost-effective way.

Models for Internet Traffic Sharing in Computer Network

  • Alrusaini, Othman A.;Shafie, Emad A.;Elgabbani, Badreldin O.S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.28-34
    • /
    • 2021
  • Internet Service Providers (ISPs) constantly endeavor to resolve network congestion, in order to provide fast and cheap services to the customers. This study suggests two models based on Markov chain, using three and four access attempts to complete the call. It involves a comparative study of four models to check the relationship between Internet Access sharing traffic, and the possibility of network jamming. The first model is a Markov chain, based on call-by-call attempt, whereas the second is based on two attempts. Models III&IV suggested by the authors are based on the assumption of three and four attempts. The assessment reveals that sometimes by increasing the number of attempts for the same operator, the chances for the customers to complete the call, is also increased due to blocking probabilities. Three and four attempts express the actual relationship between traffic sharing and blocking probability based on Markov using MATLAB tools with initial probability values. The study reflects shouting results compared to I&II models using one and two attempts. The success ratio of the first model is 84.5%, and that of the second is 90.6% to complete the call, whereas models using three and four attempts have 94.95% and 95.12% respectively to complete the call.

A Study of security threats and response of Distribute Reflection Denial of Service Attack using IP spoofing (IP Spoofing을 이용한 분산 반사 서비스 거부 공격의 보안 위협과 대응 실태 연구)

  • Hong, YunSeok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.143-145
    • /
    • 2022
  • With the spread of the Internet around the world, devices connected to the Internet are gradually increasing. In addition, the number of distributed reflection service attacks (DrDoS), an attack that maliciously requests large responses by deceiving IPs as if the attacker was a victim, using vulnerabilities in application protocols such as DNS, NTP, and CLDAP, is increasing rapidly. It is believed that the security threat of distributed reflection service attacks will not disappear unless ISPs establish appropriate countermeasures to IP Spoofing. Therefore, this paper describes the security threat and response status of distributed reflection service attacks based on IP Spoofing.

  • PDF

Application of SPS Code and analysis on status of Port State Control in Korea fishery training ship (어업실습선의 SPS Code 적용과 항만국통제 현황 분석)

  • RYU, Kyung-Jin;LEE, Yoo-Won;KIM, Seok-Jae;PARK, Tae-Gun;PARK, Tae-Seon;JO, Hyeon-Jeong;KIM, Hyung-Seok
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.3
    • /
    • pp.711-718
    • /
    • 2017
  • This study identified application range of SPS Code(Special Purpose Ship Code) applied to fishery training ship in Korea, and proposed counterplan for port state control. The latest contents of relevant convention was verified, used APCIS of Tokyo MOU and EQASIS provided by EU to analyze the current condition and deficiencies of port state control of fishery training ship. As the result, the SPS code equal to passenger ship and cargo ship of SOLAS convention should be satisfied with fishery training ship, and must follow ISPS Code. As for the result of record of port state control, it was confirmed that 8 fishery training ships were inspected 76 times and pointed out with 411 deficiencies in Tokyo MOU nation. 75% of deficiencies were related to SOLAS convention, and 71 times of inspections were conducted in Japan. Because it is not free from the fishery training ship, there is a need for active corresponding and preparation by enhancing local cooperative system and sharing the Internet inspection background, and need to develop and implement in-depth internship program to improve port state control counter plan for the trainees.

The study for the differentiation of transmission and vertical integration of Internet Service Provider over the issue of network neutrality (망 중립성 이슈에서 ISP 사업자의 전송 차등화와 수직계열화에 대한 연구)

  • Lee, Jae-Ho;Byun, Dong-Sik;Kim, Hee-Kyung
    • Korean journal of communication and information
    • /
    • v.62
    • /
    • pp.200-222
    • /
    • 2013
  • A recent argument of network neutrality is converted by the differentiation of transmission and cost adjustment. However, It is raised that this phenomenon caused strategy for vertical integration operator to exclude a competitive operator. This study analyzed a number of instances about differentiation of transmission of ISP and problems of ISP that vertical integration in IX markets. The result of research, differentiation of transmission increased service differentiation about application programs used a best effort network like OTT or Smart TV. But this study was analyzed that a related law was vague for solving this issue. Besides, ISPs that is vertical integrated and commercial operated in an IX market discriminated competitive services, and this phenomenon can be proceeded plainly and orginated in an issue of a related law.

  • PDF

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

  • Hamarsheh, Ala;Goossens, Marnix;Alasem, Rafe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1230-1251
    • /
    • 2011
  • This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers' hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user's hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.

Multicast Group Partitioning Algorithm using Status or Receivers in Content Delivery WDM Network (콘텐츠 전달 WDM망에서 수신기의 상태를 고려한 멀티캐스트 그룹화 알고리즘)

  • Kyohong Jin;Jindeog Kim
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1256-1265
    • /
    • 2003
  • Content Delivery Network(CDN) is a mechanism to deliver multimedia content to end users on behalf of web content providers. Provider's content is distributed from content server to a set of delivery platforms located at Internet Service Providers(ISPs) through the CDN in order to realize better performance and availability than the system of centralized provider's servers. Existing work on CDN has primarily focused on techniques for efficiently multicasting the content from content server to the delivery platforms or to end users. Multimedia contents usually require broader bandwidth and accordingly WDM broadcast network has been highly recommended for the infrastructure network of CDN. In this paper, we propose methods for partitioning a multicast group into smaller subgroups using the previous status of receivers. Through the computer simulation, we show that proposed algorithm are useful to reduce the average receiver's waiting time and the number of transmissions.

  • PDF