Bandwidth Is Political: De-Peering, Net Neutrality and Internet Governance

Total Page:16

File Type:pdf, Size:1020Kb

Bandwidth Is Political: De-Peering, Net Neutrality and Internet Governance Bandwidth is Political: Reachability in the Public Internet Nancy Paterson A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY JOINT GRADUATE PROGRAM IN COMMUNICATION & CULTURE YORK UNIVERSITY, TORONTO, ONTARIO DECEMBER 2009 Electronic copy available at: http://ssrn.com/abstract=2355762 BANDWIDTH IS POLITICAL By Nancy Paterson A dissertation submitted to the Faculty of Graduate Studies of York University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Copyright © 2009 by Nancy Paterson. Permission has been granted to: a) YORK UNIVERSITY LIBRARIES to lend or sell copies of this dissertation in paper, microform or electronic formats, and b) LIBRARY AND ARCHIVES CANADA to reproduce, lend, distribute, or sell copies of this dissertation anywhere in the world in microform, paper, or electronic formats and to authorize or procure the reproduction, loan, distribution or sale of copies of this dissertation anywhere in the world in microform, paper, or electronic formats. The author reserves other publication rights, and neither the dissertation nor extensive extracts from it may be printed or otherwise reproduced without the author’s written permission. Electronic copy available at: http://ssrn.com/abstract=2355762 BANDWIDTH IS POLITICAL By Nancy Paterson By virtue of submitting this document electronically, the author certifies that this is a true electronic equivalent of the copy of the dissertation approved by York University for the award of the degree. No alteration of the content has occurred and if there are any minor variations in formatting, they are the result of the conversion to Adobe Acrobat format (or similar software application). Examination Committee members: 1. Dr. Michael Murphy 2. Dr. Jerome Durlak 3. Dr. Fred Fetcher iv Bandwidth is Political Abstract - Summary thesis statement The global public Internet faces a growing but little studied threat from the use of intrusive traffic management practices by both wholesale and retail Internet service providers. Unlike research concerned with bandwidth and traffic growth, this study shifts the risk analysis away from capacity issues to focus on performance standards for interconnection and data reachability. The long-term health of the Internet is framed in terms of “data reachability” – the principle that any end-user can reach any part of the Internet without encountering arbitrary actions on the part of a network operator that might block or degrade transmission. Risks to reachability are framed in terms of both systematic traffic management practices and “de-peering,” a more aggressive tactic practised by Tier-1 network operators to resolve disputes or punish rivals. De-peering is examined as an extension of retail network management practices that include the growing use of deep packet inspection (DPI) technology for traffic-shaping. De-peering can also be viewed as a close relative of Net Neutrality, to the extent that both concepts reflect arbitrary practices that interfere with the reliable flow of data packets across the Internet. In jurisdictional terms, v however, de-peering poses a qualitatively different set of risks to stakeholders and end-users, as well as qualitatively different challenges to policymakers. It is argued here that risks to data unreachability represent the next stage in debates about the health and sustainability of the global Internet. The study includes a detailed examination of the development of the Internet’s enabling technologies; the evolution of telecommunications regulation in Canada and the United States, and its impact on Internet governance; and an analysis of the role played by commercialization and privatization in the growth of risks to data reachability. vi DEDICATION “Not all those who wander are lost. J. R. R. Tolkien” is the author’s notation added to the chapter one title Networking and Network Routing: An Introduction in D. Medhi & K. Ramasamy’s 2007 book titled Network Routing. I could not have said it better. This is dedicated to my committee Dr. Jerome Durlak, Dr. Fred Fletcher and Dr. Michael Murphy. Assistance from Tracey Bickford, Julie Birkle, Karen Brophy, Dr. David Ellis, Dr. Caitlin Fisher, Diane Jenner, Ian Lumb, Sal Panudero, Eriks Rugelis, Elvira Sanchez de Malicki and Lynn Walker is gratefully appreciated. Without their support this work would not have been possible. vii Table of Contents Abstract - Summary thesis statement ...............................................................iv List of Figures ................................................................................................... x Introduction: A New Internet Era.....................................................1 The Commercialization of Bandwidth Stakeholders.......................................... 3 Reachability and Net Neutrality......................................................................... 7 Dominant Role of the United States.................................................................. 9 Literature Review ............................................................................................ 11 Chapter I. Peering, Transit and Bandwidth Stakeholders...........18 Peering and Transit in Practice....................................................................... 18 Peering ........................................................................................................... 21 Transit............................................................................................................. 22 Interconnection: Border Gateway Protocol & Autonomous System Numbers. 22 Emergence and Development of Bandwidth Stakeholders ............................. 30 Regional Peering Practices............................................................................. 34 Chapter II. Conflict and Confluence: Legacy Telephone Networks and the Emergence of the Internet................................................40 U.S. Role and Influence .................................................................................. 42 Gatekeeping and Net Neutrality...................................................................... 44 viii Clash of Two Cultures..................................................................................... 46 Rival Solutions to the Problem of Internetworking........................................... 55 Deregulation and Privatization: the Internet Becomes a Business.................. 66 The FCC and Internet Backbone Policy.......................................................... 75 Telecommunications Services vs Information Services .................................. 81 Ad Hoc Oversight of the U.S. Backbone Marketplace..................................... 91 Chapter III. Internet Governance Before and After Commercialization..........................................................................98 Development of the Technical Governing Bodies ......................................... 101 ARPANET and After: Managing the Internet................................................. 104 The National Science Foundation and NSFNET........................................... 109 A New Architecture: Network Access Points................................................. 114 Commercialization: The NSF Withdraws and Transit Begins........................ 118 The Impact of Commercialization on IANA: Old Functions, New Problems .. 122 ICANN: the Domain Name System and other Conflicts ................................ 128 The IANA Function and Autonomous System Numbers (ASNs)................... 132 Governance in a New Light........................................................................... 135 Chapter IV. Risks to Reachability................................................146 Peering, Interconnection and Market Concentration..................................... 146 Reachability as a Net Neutrality Issue .......................................................... 153 ix Traffic Management Practices Affecting Reachability ................................... 162 Packet Filtering ............................................................................................. 163 Traffic-shaping .............................................................................................. 167 AS Path Filtering & De-peering ..................................................................... 173 MPLS: Expanding the Scope of Traffic Management ................................... 185 Chapter V. Conclusions and Future Directions .........................189 Lessons of History ........................................................................................ 190 Disclosure as an Instrument of Reform......................................................... 195 Appendix A – IXmaps ...................................................................205 Appendix B – Tier-1 Networks.....................................................207 Appendix C – Sample Weekly Routing Table Report ................214 Appendix D – Autonomous Systems ..........................................227 References ....................................................................................237 x List of Figures Figure 1. Internet timeline. p. 55. Figure 2. OSI Layered Model. p. 61. Figure 3. MPLS logical topology. p. 187. 1 Introduction: A New Internet Era The reliability of data transmission across the global public Internet is being compromised by the expanding use of traffic filtering, traffic-shaping
Recommended publications
  • Why Youtube Buffers: the Secret Deals That Make—And Break—Online Video When Isps and Video Providers Fight Over Money, Internet Users Suffer
    Why YouTube buffers: The secret deals that make—and break—online video When ISPs and video providers fight over money, Internet users suffer. Lee Hutchinson has a problem. My fellow Ars writer is a man who loves to watch YouTube videos— mostly space rocket launches and gun demonstrations, I assume—but he never knows when his home Internet service will let him do so. "For at least the past year, I've suffered from ridiculously awful YouTube speeds," Hutchinson tells me. "Ads load quickly—there's never anything wrong with the ads!—but during peak times, HD videos have been almost universally unwatchable. I've found myself having to reduce the quality down to 480p and sometimes even down to 240p to watch things without buffering. More recently, videos would start to play and buffer without issue, then simply stop buffering at some point between a third and two-thirds in. When the playhead hit the end of the buffer—which might be at 1:30 of a six-minute video—the video would hang for several seconds, then simply end. The video's total time would change from six minutes to 1:30 minutes and I'd be presented with the standard 'related videos' view that you see when a video is over." Hutchinson, a Houston resident who pays Comcast for 16Mbps business-class cable, is far from alone. As one Ars reader recently complained, "YouTube is almost unusable on my [Verizon] FiOS connection during peak hours." Another reader responded, "To be fair, it's unusable with almost any ISP." Hutchinson's YouTube playback has actually gotten better in recent weeks.
    [Show full text]
  • Who Owns the Eyeballs? Backbone Interconnection As a Network Neutrality Issue Jonas from Soelberg
    Who Owns the Eyeballs? Backbone interconnection as a network neutrality issue Jonas From Soelberg Name: Jonas From Soelberg CPR: - Date: August 1, 2011 Course: Master’s thesis Advisor: James Perry Pages: 80,0 Taps: 181.999 Table of Contents 1 Introduction ..................................................................................................................... 4 1.1 Methodology ....................................................................................................................................... 6 2 Understanding the Internet ........................................................................................ 9 2.1 The History of the Internet ............................................................................................................ 9 2.1.1 The Internet protocol ................................................................................................................................. 9 2.1.2 The privatization of the Internet ......................................................................................................... 11 2.2 The Architecture of the Internet ................................................................................................ 12 2.2.1 A simple Internet model .......................................................................................................................... 12 2.2.2 The e2e principle and deep-packet inspection ............................................................................. 14 2.2.3 Modern challenges to e2e ......................................................................................................................
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Volume 1, Section 5.1: Managed Tiered Security
    Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES Enterprise SM 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA’s Multi-Tier Security Profiles (MTSP) initiative in accordance with Tier-2 – Protected Service specifications. We teamed with one of the world’s leading Managed Security Services providers, , to offer one of the most complete and reliable Managed Security Solutions available. Our solution is designed to meet or exceed the Government’s requirements for MTSP Tier 2 service, as defined in RFP Section C.2.7.4.1.1.2. A description of our offering is provided below. Responses to the requirements of RFP Section L.34.1.6 follow. The Level 3 MTSP Tier 2 solution includes the Help Desk function specified for Tier 1 service, and additional technical and management components to support security needs of Sensitive but Unclassified (SBU) mission functions and information. Our Managed Tiered Security Service (MTSS) offering will provide a vehicle for agencies to order individual managed security services a la carte or in a bundle. The components include: Volume 1, Section 5.1 Page 667 Rev. 3-5-2007 Managed Tiered Security Services TQC-JTB-05-0002 © 2007 Level 3 Communications, Inc. All rights reserved. Use or disclosure of data contained on this sheet is subject to the restric ions on the title page of this proposal. Enterprise SM Agencies will gain efficiencies and cost savings through service bundling, versus ordering any of the Managed Security Services a la carte.
    [Show full text]
  • Economic Study on IP Interworking
    Prepared For: GSM Association 71 High Holborn London WC1V E6A United Kingdom Economic study on IP interworking Prepared By: Bridger Mitchell, Paul Paterson, Moya Dodd, Paul Reynolds, Astrid Jung of CRA International Peter Waters, Rob Nicholls, Elise Ball of Gilbert + Tobin Date: 2 March 2007 TABLE OF CONTENTS EXECUTIVE SUMMARY .................................................................................................. 1 1. INTRODUCTION........................................................................................................ 8 1.1. AIM AND SCOPE..............................................................................................................8 1.2. STRUCTURE OF THE REPORT...........................................................................................9 2. IP INTERCONNECTION IN THE CURRENT PUBLIC INTERNET ......................... 10 2.1. INTRODUCTION.............................................................................................................10 2.1.1. Implications of packet switching and circuit switching ................................................ 10 2.2. INTERCONNECTING IP NETWORKS .................................................................................11 2.2.1. Direct interconnection................................................................................................. 11 2.2.2. Indirect interconnection .............................................................................................. 12 2.3. ANY-TO-ANY CONNECTIVITY ..........................................................................................13
    [Show full text]
  • Download (PDF)
    April-May, Volume 12, 2021 A SAMENA Telecommunications Council Publication www.samenacouncil.org S AMENA TRENDS FOR SAMENA TELECOMMUNICATIONS COUNCIL'S MEMBERS BUILDING DIGITAL ECONOMIES Featured Annual Leaders' Congregation Organized by SAMENA Council in April 2021... THIS MONTH DIGITAL INTERDEPENDENCE AND THE 5G ECOSYSTEM APRIL-MAY, VOLUME 12, 2021 Contributing Editors Knowledge Contributions Subscriptions Izhar Ahmad Cisco [email protected] SAMENA Javaid Akhtar Malik Etisalat Omantel Advertising TRENDS goetzpartners [email protected] Speedchecker Editor-in-Chief stc Kuwait SAMENA TRENDS Bocar A. BA TechMahindra [email protected] Tel: +971.4.364.2700 Publisher SAMENA Telecommunications Council FEATURED CONTENTS 05 04 EDITORIAL 23 REGIONAL & MEMBERS UPDATES Members News Regional News Annual Leaders' Congregation Organized by SAMENA 82 SATELLITE UPDATES Council in April 2021... Satellite News 17 96 WHOLESALE UPDATES Wholesale News 103 TECHNOLOGY UPDATES The SAMENA TRENDS eMagazine is wholly Technology News owned and operated by The SAMENA Telecommunications Council (SAMENA 114 REGULATORY & POLICY UPDATES Council). Information in the eMagazine is Regulatory News Etisalat Group-Digital not intended as professional services advice, Transformation is at the core and SAMENA Council disclaims any liability A Snapshot of Regulatory of ‘Customer Excellence’... for use of specific information or results Activities in the SAMENA Region thereof. Articles and information contained 21 in this publication are the copyright of Regulatory Activities SAMENA Telecommunications Council, Beyond the SAMENA Region (unless otherwise noted, described or stated) and cannot be reproduced, copied or printed in any form without the express written ARTICLES permission of the publisher. 63 Omantel Goals in Sync with ITU’s The SAMENA Council does not necessarily Spectrum Auction in Planning 78 stc Leads MENA Region in Launching endorse, support, sanction, encourage, in Saudi Arabia verify or agree with the content, comments, Innovative End-to-end..
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Digital Infrastructure in the Netherlands the Third Mainport
    Digital Infrastructure in the Netherlands The Third Mainport November 14, 2013 Content 1. A technology backbone: the third mainport 2. A digital nervous system: sector overview - Products and services - Supplier ecosystem - Size of the digital infrastructure sector - Historic growth - Ecological footprint 3. Healthy blood, healthy body: sector contribution - International position/ranking - Attractiveness and strengths - Governmental policy - A leading position through research - Significance for the Dutch economy 4. A high performance sector: future potential - Drivers for future growth - Conclusions - Recommendations 5. Appendices - List of sources - About the authors 1 Digital Infrastructure in the Netherlands – The Third Mainport © 2013 Deloitte The Netherlands 1. A technology backbone: The third mainport 2 Digital Infrastructure in the Netherlands – The Third Mainport © 2013 Deloitte The Netherlands The Digital Infrastructure, our third mainport, is mainly invisible yet the arteries for economic lifeblood of the digital economy The Rotterdam harbour and Schiphol airport are two major assets of the Dutch economy. They both have the position as ‘mainport’; an international gateway for physical products and passengers. This importance of these mainports for the Dutch economy is on two levels. First, they have a direct impact on the economy, for instance through employment of people working at the container terminals in Rotterdam or at Schiphol airport. In addition, there is also an indirect effect as these mainports attract various
    [Show full text]
  • Peering Tutorial APRICOT 2012 Peering Forum Jan 28, 2012 William B Norton, New Delhi, India Executive Director, Drpeering.Net
    + Peering Tutorial APRICOT 2012 Peering Forum Jan 28, 2012 William B Norton, New Delhi, India Executive Director, DrPeering.net http://DrPeering.net © 2012 DrPeering Press + Overview n Start assuming no knowledge of Internet Interconnection 1. Internet Transit 2. Internet Peering 3. The Business Case for Peering 4. The ISP Peering Playbook (selections) 5. The IX Playbook (if there is time, how IX builds critical mass) 6. The Peering Simulation Game n Finish with an understanding of how the core of the Internet is interconnected + Internet Transit – APRICOT 2012 Peering Forum Interconnection at the edge Jan 28, 2012 William B Norton, New Delhi, India Executive Director, DrPeering.net http://DrPeering.net © 2012 DrPeering Press + Overview of this section n Start assuming no knowledge n I know… many of you are very knowledgeable in this stuff n See how I explain things n These build effectively n Introduce the Global Internet Peering Ecosystem n In this context, metered Internet transit service n Measurement and pricing models n The Internet Transit Playbook + The Internet n Network of Networks n Organic from ARPANET, NSFNET n Commercialization 1994 n Planned economy n Corporate interests 1997 onward n Limited information sharing n Evolution: “Global Internet Peering Ecosystem” + The Global Internet Peering Ecosystem n Definition: The Global Internet Peering Ecosystem models the internal structure of the Internet as a set of Internet Regions (typically bound by country borders), each with its own Internet Peering Ecosystem. + The Global Internet Peering Ecosystem n Definition: An Internet Region is a portion of the Internet, usually defined by geographical boundaries (country or continent borders), in which an Internet Peering ecosystem is contained.
    [Show full text]
  • International Interconnection Forum for Services Over IP (I3 Forum)
    International Interconnection forum for services over IP (i3 Forum) (www.i3Forum.org) Source: Workstreams: “Technical Aspects”, “Service Requirements” Keywords: IPX Common functionalities and capabilities of an IPX platform (Release 1.2, May 2013) Revision History Date Rel. Subject/Comment Dec. 12th 2012 1.1 First release of IPX Core document – First version May 12th 2013 1.2 First release of IPX Core document – Second version after received comments Executive Summary The IPX model, as defined by the GSMA, is an international, trusted and QoS controlled IP backbone, consisting of a number of competing carriers (IPX Providers) that interconnects Service Providers according to mutually beneficial business models. The objective of this document is to provide a service and technical architecture that allows for both the Service Providers and the IPX Providers to enable a productive IPX business model. This document allows the following requirements to be realized. Service Providers (MNO, FNO, ASP, ISP, OTT Provider): Providing guaranteed service quality, reliability, and security for IP-based service delivery with other Service Providers in the IPX ecosystem. IPX Providers: Allowing for technical and economical efficiencies while providing IPX-based services to Service Providers. This document describes principles and features common to all IPX networks. Topics specific to a given service can be found in separate documents, called Service Schedules. The combination of the GSMA-defined IPX requirements, this Common Functionalities and Capabilities document, and the respective Service Schedules provides a set of IPX requirements that can be implemented, including: . An IPX architecture and reference model; . IP routing and forwarding with the identification of the proper standard/coding for routing, addressing, marking the IP packet; .
    [Show full text]
  • August 25, 2014
    DECLARATION OF HENRY (HANK) KILMER, VICE PRESIDENT OF IP ENGINEERING, COGENT COMMUNICATIONS HOLDINGS, INC. August 25, 2014 1 I. Introduction 1. My name is Hank Kilmer. I am the Vice President of IP Engineering for Cogent Communications Holdings, Inc. (“Cogent”). Prior to joining Cogent, I served as the CTO for GPX Global Systems, Inc. which builds state-of-the-art carrier neutral data centers in rapidly developing commercial markets of the Middle East North Africa (MENA) and South Asia regions. Before joining GPX, I was Senior VP of Network Engineering for Abovenet (Metromedia Fiber Network, MFN). My tenure in the industry also includes positions with UUNET, Sprint and Intermedia/Digex, and I served on the first Advisory Council for ARIN, the American Registry of Internet Numbers. 2. The purpose of this declaration is to provide background information on the various means by which different Internet networks carry data, and to address certain aspects of Cogent’s recent dealings with Comcast. 3. Part II provides a brief overview of Cogent’s business. Part III describes peering and transit services, including an overview of participants in the Internet distribution chain and a discussion of competition in the provision of transit services. Part IV explains why Comcast and Time Warner Cable (“TWC”), though not Tier 1 networks (i.e., transit free), have obtained settlement-free peering, and gives a brief overview of Internet access technologies other than cable. Part V discusses certain facets of Cogent’s recent dealings with Comcast. II. Cogent Communications Holdings, Inc. 4. Cogent is a leading facilities-based provider of low-cost, high-speed Internet access and Internet Protocol (“IP”) communications services.
    [Show full text]
  • Rethinking Routing and Peering in the Era of Vertical Integration of Network Functions
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2019 Rethinking Routing and Peering in the era of Vertical Integration of Network Functions Prasun Kanti Dey University of Central Florida Part of the Computer Engineering Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Dey, Prasun Kanti, "Rethinking Routing and Peering in the era of Vertical Integration of Network Functions" (2019). Electronic Theses and Dissertations, 2004-2019. 6709. https://stars.library.ucf.edu/etd/6709 RETHINKING ROUTING AND PEERING IN THE ERA OF VERTICAL INTEGRATION OF NETWORK FUNCTIONS by PRASUN KANTI DEY M.S. University of Nevada Reno, 2016 A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in the Department of Electrical and Computer Engineering in the College of Engineering and Computer Science at the University of Central Florida Orlando, Florida Fall Term 2019 Major Professor: Murat Yuksel c 2019 Prasun Kanti Dey ii ABSTRACT Content providers typically control the digital content consumption services and are getting the most revenue by implementing an “all-you-can-eat” model via subscription or hyper-targeted ad- vertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend.
    [Show full text]