The Internet beyond the bits on the wire (Tampere, 2016)

Slides:



Advertisements
Similar presentations
INTERNET SHIELD COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY 6.
Advertisements

Understanding Binary Basics
Connectivity as raw material of Digital Economy 'Challenges for telecoms in the new Internet ecosystem' BEREC-EMERG-REGULATEL-EaPeReg Summit Barcelona,
Support For Rural America William Maher Chief, Wireline Competition Bureau July 2, 2003 Universal Service and The FCC.
(Made by Du) (Made by Du) Take a Challenge! `  1. Two 1. Two 1. Two   2. Four 2. Four2. Four   3. One 3. One3. One.
Federal Communications Commission (FCC). The FCC is a United States government agency and was established by the Communications Act of The FCC is.
Expert Group Meeting on Islamic Banking and Finance Statistics Ankara, Turkey March 2014.
____ __ ____ _____ ____ ______ _____ _____ ____ _____ _____ _____ ____ _____ Click to edit Master text styles Second level Third level Fourth level Fifth.
IAEA International Atomic Energy Agency Directions for Strengthening the Agency's Assistance to Countries Considering or Introducing Nuclear Power Technical.
Spectrum and the Concept of Net Neutrality Todd D. Daubert Partner Kelley, Drye & Warren, LLP.
1 1084_06F9_c3 © 1999, Cisco Systems, Inc. The Current State Of Telecommunications Dan Barker TNT Consulting Group.
Net Neutrality Tim Scott MIS 304 October 11, 2011.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
Transitioning research to impact Henning Schulzrinne Columbia University / FCC.
Fixed Broadband Access Technologies FCC NATIONAL BROADBAND PLAN WORKSHOP TECHNOLOGY – FIXED BROADBAND 13 August 2009 Marc Goldburg EVP & CTO ASSIA, Inc.
Policies, Pitfalls and the Pursuit of BYOT Dave Mirra Jay Cooke Stafford County Public Schools.
Global Modular Data Center IT Equipment Industry 2016 Market Research Report The report focuses on global major leading industry players with information.
Overview of FCC’s Fifth Report Definition of Advanced Telecommunications Capability – From upstream and downstream of 200 kbps to speed tiers Developments.
Net Neutrality Gavin Baker Florida Media Reform Conference Sarasota, FL Oct. 6, 2007.
GCSE Computer Science Content Overview
Content distribution in Next Generation Networks
HIPSSA/SA-1. HIPSSA/SA-1 Support for Harmonization of the ICT Policies in Sub-Sahara AfricaФ or the HIPSSA project is part of a programme funded by.
Data Communication Muhammad Waseem Iqbal Assistant Professor
Travel Group Consulting
VCE Practice Test Questions Answers
Comp - 19 Jordan has a job delivering packages to schools in CISD. This morning her first stop was at Johnson where she picked up some packages. Her instructions.
Marketing Management
Marketing Management
Marketing Management
CPSC 441: Computer Communications
Title of the presentation
Class 7 Network Industries, Spring, 2014 The Pole Attachments Act
Overview of Electronic Commerce
Telecommunications for Disaster Relief
VALL Technologies Inc. How Wi-Fi is Helping Students in Low Income Communities Case Study – Glenwood Springs CO By: Ron Valdez – President/CTO June 2018.
Allegheny Communications Connect
Session 2.7- Group activity
مهارات القيادة الحديثة
2015 IT Summit CIO Council Update
Student #7 starts with Locker 7 and changes every seventh door
Lesson Action Guide COURSE LOGO Lesson Title This
Key Issue 3: Example How are U.S. quota laws and temporary migration for work used as immigration policies?
Presenter: Ron Del Sesto
Networks 1 Key Revision Points.
Consumer Behavior and Utility Maximization
H2020 – SCREEN 1st International Workshop
PSerc TAMU Site Meeting
Henning Schulzrinne – Columbia University
Pradeep S. Mehta, Secretary General Interim Review Meeting
4G and the Broadband Stimulus: Closing the Digital Divide
TELECOMMUNICATION UNIVERSAL SERVICE IN VIETNAM
Latin America STG Technical University – Brazil / Sao Paulo
Days of the Week Monday Tuesday Wednesday Friday Thursday Saturday
Path to SAFIRE – A UCT Perspective
President and CEO of Towerstream
Introduction and Objectives Addis Ababa, Ethiopia, December 2012
How to build an Internet Service
Multimedia Training Kit
Acc - 13 Jordan has a job delivering packages to schools in CISD. This morning her first stop was at Johnson where she picked up some packages. Her instructions.
IT Security A management problem Introduction and overview
Acc – 11A Jordan has a job delivering packages to schools in CISD. This morning her first stop was at Johnson where she picked up some packages. Her instructions.
Distribution of access
Bell Schedule for First Two Weeks of School
GFF INVESTORS GROUP MEETING
5th PASET Forum Kigali, Rwanda| May 22, 2019
JANUARY M T W T F S S Monday 1st semester Unit 2.
Overview of the Workshop and Daily Proceedings
Fifty-third plenary session (Geneva, June 2005)
November Exam Season 2019 University Tests: MAT Date AM SESSION Break
Presentation transcript:

The Internet beyond the bits on the wire (Tampere, 2016) Henning Schulzrinne Columbia University & FCC The Internet beyond the bits on the wire (Tampere, 2016)

Summary of course How does the Internet work physically and what are challenges to deploying new Internet access infrastructure, particularly in rural and low-income areas? How do DOCSIS, GPON and VDSL compare? What are their limits? How is money routed in the Internet among the key players - carriers, platform providers and advertisers? Is QoS viable in the Internet? What are the trade-offs of implementing zero-rating? Can we have an all-wireless Internet? What are key spectrum challenges? Most countries have a very small number of facilities-based Internet service providers. Why is that? Can this change? What are the plausible models for competition and where do they face challenges? What is Internet peering and what are the economic and policy considerations? What are definitions of the open Internet and how does this relate to network neutrality? What are key Internet policy questions and how are they decided? Can we get a secure Internet? If not, what can we secure and how? Can we make Internet security usable by non-experts?

Schedule – Monday, June 13 8:30 - 9:00 Registration and coffee 9:00 - 10:00 First session (overview) 10:00 - 10:15 Break 10:15 - 11:00 Second session (technology) 11:00 - 12:00 Lunch 12:00 - 13:00 Third session (technology) 13:00 - 13:15 Break 13:15 - 14:00 Fourth session (economics) 14:00 - 14:15 Coffee break 14:15 - 15:45 Fifth session (economics) 15:45 - 16:00 Break 16:00 - 17:00 Sixth session (economics)

Schedule – Tuesday, June 14 8:30 - 10:00 First session (law) 10:00 - 10:15 Break 10:15 - 11:00 Second session (law) 11:00 - 12:00 Lunch 12:00 - 13:00 Third session (law) 13:00 - 13:15 Break 13:15 - 14:00 Fourth session (security) 14:00 - 14:15 Coffee break 14:15 - 15:45 Fifth session (security) 15:45 - 16:00 Break 16:00 - 17:00 Exam