Network (Internet) Neutrality CMPT 771 Qiang (Scott) Zhang.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv6 Victor T. Norman.
Net Neutrality Content Providers vs. ISP vs. Consumers Blake Wright.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access to Internal Resources.
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Human Rights in the Digital Era Conference Net Neutrality Policy in the UK & the Citizen’s Interest in Neutral Networks Giles Moss Institute of Communications.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
IS 247 Introduction to Web Application Development Tim Wu.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Maputo, Mozambique, April 2014 QoS Framework for Broadband Internet Service Country Case: Mauritius Roubee GADEVADOO, Engineer/Licensing Officer,
1 Enabling Secure Internet Access with ISA Server.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Technical Refresher Session 3. Overview Difference between communication between devices on a single logical network and communication between different.
Rules of Packet Transmission
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
APNIC Update The state of IP address distribution and IPv6 deployment status Miwa Fujii Senior IPv6 Program Specialist APNIC.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Overview Managing a DHCP Database Monitoring DHCP
Overview of Network Neutrality Kyle D. Dixon Senior Fellow & Director, Federal Institute for Regulatory Law & Economics The Progress & Freedom Foundation.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
The Intranet.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Module 10: Providing Secure Access to Remote Offices.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
1 Beginning & Intermediate Algebra – Math 103 Math, Statistics & Physics.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Managing the (Traffic) Managers
Firewall Techniques Matt Cupp.
The Intranet.
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
How is all that data traffic controlled on the Internet?
Potential Areas of Research Activity – March 2000
Internet and Intranet.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CCNA Network Fundamentals
Implementing TMG Server Publishing
Internet and Intranet.
Network Security: IP Spoofing and Firewall
PPPoE Internet Point to Point Protocol over Ethernet
Chapter 8: Monitoring the Network
ARP Spoofing.
Internet and Intranet.
Introduction to Network Security
Net Neutrality, Internet Freedom, & The Future of Broadband Regulation
Internet and Intranet.
Presentation transcript:

Network (Internet) Neutrality CMPT 771 Qiang (Scott) Zhang

Introduction What is Network Neutrality? ◦ Tim Wu in 2003 ◦ A policy meant to limit a new kind of discrimination: Internet Discrimination  Filtering of data packets

The Debates Technological detail ◦ Quality of service Economic analysis ◦ Differential pricing can increase the economic warfare ◦ Incentive to invest in new technologies Regulatory perspective ◦ Internet freedom ◦ ISPs’ discrimination

Intermediate Approach – x model Dividing the capacity of each ISP into two parts ◦ A fraction 1-x of an ISP’s capacity every T seconds to operate as current ◦ A fraction x every T seconds is granted ownership rights ◦ For example, T = 10ms, x = 0.1  Delay for no-premium user is 1 ms per router

Math Equations Is the ISP profit U is user surplus S is social surplus

Graph

Appling x Rule to All Links

Worse scenario

Enforcement of x-rule Hardware-restrained enforcement ◦ Switch manufactures are responsible for ensuring that the mandated fraction is maintained. Operational enforcement ◦ Each switch is mandated to record the capacity usage by premium traffic

Technical Issues 1 Traffic differentiation ◦ Switch must posses the ability to distinguish between basic and premium traffic  Type of service filed in IPv4  Optional field Tamper-proof counters ◦ Traffic statistics ◦ Network management services -- SNMP

Technical Issue 2 Switch accessibility ◦ Mapping between IP addresses and switches and release such information to inspecting authority Authentication and data encryption ◦ Preventing unauthorized access ◦ Prevent data intercept and manipulation on the path