Going Mobile

Total Page:16

File Type:pdf, Size:1020Kb

Going Mobile Going Mobile: Technology and Policy Issues in the Mobile Internet Richard Bennett Information Technology and Innovation Foundation Going Mobile: Technology and Policy Issues in the Mobile Internet Richard Bennett March 2010 THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON Table of Contents I. Executive Summary ............................................................................................ 1 II. Introduction ......................................................................................................... 7 A. Advent of Broadband ............................................................................. 7 B. Rise of the Cell Phone ............................................................................ 8 B. Convergence ............................................................................................. 8 C. Reader’s Guide to the Report ................................................................ 8 III. Issues in Internet Design and Operation ........................................................ 8 A. Brief History ............................................................................................ 9 B. Modularity ................................................................................................. 9 C. Efficiency ................................................................................................11 D. Manageability .........................................................................................11 E. Innovation ..............................................................................................12 F. Subsidies .................................................................................................13 G. Specific Example: Inter-Domain Quality of Service .......................15 H. Why the Internet Works ......................................................................16 IV. Issues in Mobile Network Design and Operation .......................................18 A. Brief History ..........................................................................................18 B. Modularity ...............................................................................................19 C. Efficiency ................................................................................................20 D. Manageability .........................................................................................20 E. Innovation ..............................................................................................23 F. Specific Example: Voice over LTE .....................................................25 G. Status of Internet Design and Wireless Networks ..........................26 V. The Mobile Network Infrastructure ................................................................26 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2009 PAGE II THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON A. Essential Parts of the Mobile Network .............................................26 B. Spectrum .................................................................................................27 1. Licenses ...........................................................................................27 2. Efficient Use ...................................................................................28 3. Roaming ..........................................................................................28 4. Coordination ...................................................................................28 C. Base Station Siting .................................................................................29 D. Backhaul ...................................................................................................30 1. Technologies ...................................................................................31 2. Specific Examples: GigaBeam and Ceragon .............................31 3. Backhaul Bottom Line ..................................................................32 VI. Emerging Mobile Internet Applications .......................................................32 A. Content Delivery ...................................................................................32 1. Example: Kindle ............................................................................33 2. Benefits of Ubiquity ......................................................................33 3. Innovation from Differentiation .................................................33 B. Wireless VoIP ........................................................................................34 1. Example: Skype on the 3 Network .............................................35 2. Example: Other Ways to Skype ...................................................35 3. Economic Implications of Skype ...............................................36 C. Wireless Video Streaming .....................................................................36 1. Example: Video Streaming System: MediaFLO .......................37 2. Example Video Streaming: MobiTV ..........................................37 D. Mobile Augmented Reality ...................................................................38 1. Example: Layar Platform ..............................................................38 E. Internet of Things.................................................................................38 VI. Mobile Internet Policy Issues ..........................................................................39 A. Net Neutrality ........................................................................................39 1. Transparency-based Net Neutrality Lite ....................................39 2. Transparency ...................................................................................40 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2009 PAGE II THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON 3. Content Freedom ...........................................................................40 4. Application Freedom ....................................................................40 5. Reasonable Limits on “Device Freedom” .................................41 6. Managed Services ..........................................................................42 7. Enabling Innovation ......................................................................42 8. Specific Example: EU Telecoms Package ..................................43 9. Services-Oriented Framework .....................................................43 C. Spectrum Policy .....................................................................................44 1. The Value of Open Spectrum .....................................................44 2. The Limits of Open Spectrum ....................................................45 3. What Licensed Spectrum Does Well ..........................................46 4. Spectrum Inventory and Review .................................................46 5. Reassigning Spectrum ...................................................................47 6. Future Proofing the Spectrum .....................................................48 VIII. Policy Recommendations ..............................................................................49 A. Stick with Light-touch Regulation ......................................................49 B. Enact a Sensible Transparency Rule ...................................................50 C. Legitimize Enhanced Transport Services ..........................................50 D. Define Reasonable Network Management ........................................50 E. Preserve Engineering and Operations Freedom ..............................50 F. Review Existing Spectrum Licenses ...................................................51 G. Eliminate Redundant and Archaic Licenses......................................51 H. Protect Spectrum Subleasing ................................................................51 I. Cautiously Enable Secondary Uses ......................................................51 J. Allow the Experiment to Continue ......................................................52 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2009 PAGE II THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON List of Figures Figure 1: Classical Internet Protocol Version 4 Header .......................................... 9 Figure 2: Hot Potato Routing ....................................................................................13 Figure 3: Mobile Technology Summary ..................................................................17 Figure 4: Carrier-sensing overhead in an IEEE 802.11g Contention System ... 21 Figure 5: Carrier-sensing overhead in an IEEE 802.11n Contention System. .. 21 Figure 6: Deering’s Hourglass ...................................................................................23 Figure 7: Internal Architecture of the RACS Model .............................................24 Figure 8: Cell tower disguised in cross by Larson Camoflage ..............................28 Figure 9: Internet is a Virtual Network Composed of Physical Networks ....... 29 Figure 10: Cergagon FibeAir ® IP-10 Switch. .......................................................30 Figure 11: GigaBeam installation providing backhaul for Google’s Mountain View Wi-Fi Network .............................................................................31 Figure 12: Amazon Kindle. .......................................................................................32
Recommended publications
  • Reform of the Telecommunications Industry Ombudsman
    Reform of the Telecommunications Industry Ombudsman May 2012 Table of contents Executive summary ................................................................................................................................. 5 Recommendations .................................................................................................................................. 7 Recommendation 1: Improved regulatory framework ........................................................................ 7 Recommendation 2: Compliance incentives ........................................................................................ 7 Part 1: Regulatory Compliance incentives....................................................................................... 7 Part 2: Referral of non-compliance to the ACMA ........................................................................... 7 Part 3: Public reporting of non-compliance and binding decisions and non-binding recommendations ............................................................................................................... 8 Part 4: Improving industry’s Internal Dispute Resolution (IDR) mechanisms ................................. 8 Recommendation 3: Systemic issues ................................................................................................... 8 Recommendation 4: Governance structure ......................................................................................... 9 Part 1: Unitary governance structure .............................................................................................
    [Show full text]
  • C:\Working Papers\10525.Wpd
    NBER WORKING PAPER SERIES THE GERMAN PUBLIC PENSION SYSTEM: HOW IT WAS, HOW IT WILL BE Axel Börsch-Supan Christina B. Wilke Working Paper 10525 http://www.nber.org/papers/w10525 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts Avenue Cambridge, MA 02138 May 2004 This paper was commissioned by the Michigan Retirement Research Center (MRRC). Additional financial support was provided by the National Institute on Aging (NIA) through the NBER, the German Science Foundation (DFG) through the Sonderforschungsbereich 504, the State of Baden-Württemberg and the German Insurers Association (GDV). We are grateful for many helpful comments by Anette Reil-Held and the participants of the MRRC Conference on Improving Social Security Programs at the University of Maryland, September 13, 2003. The views expressed herein are those of the author(s) and not necessarily those of the National Bureau of Economic Research. ©2004 by Axel Börsch-Supan and Christina B. Wilke. All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit, including © notice, is given to the source. The German Public Pension System: How it Was, How it Will Be Axel Börsch-Supan and Christina B. Wilke NBER Working Paper No. 10525 May 2004 JEL No. H0, H8 ABSTRACT Germany still has a very generous public pay-as-you-go pension system. It is characterized by early effective retirement ages and very high effective replacement rates. Most workers receive virtually all of their retirement income from this public retirement insurance. Costs are almost 12 percent of GDP, more than 2.5 times as much as the U.S.
    [Show full text]
  • How Did They Get to the Moon Without Powerpoint?
    How Did They Get to the Moon Without PowerPoint? Mordechai (Moti) Ben-Ari Department of Science Teaching Weizmann Institute of Science [email protected] Keynote speech at the Finnish Computer Science Society, May, 2003. 1 Developing a Technology The invention of writing, however, was the invention of an entirely new Let me start with a description of one of my first technology.[3, p. 9] full-time jobs: There is something to be said for this definition: I developed a technology for data min- do you remember those old movies that show “typ- ing in order to consolidate enterprise- ing pools,” where rows and rows of people, usually customer relations. women, sat pecking away at keyboards all day? Since I held that job in the early 1970s, clearly I would not have described my work in this terminol- ogy! What I actually did was: I wrote a program that read the system log, computed usage of CPU time and printed reports so that the users could be billed. My point in this talk is that hi-tech in general and computer science in particular did not begin in the 1990s, but that we have been doing it for decades. I believe that today’s students are being fed a lot of marketing propaganda to the contrary, and that they Well, things haven’t changed all that much! have completely lost a historical perspective of our discipline. I further believe that we have a respon- sibility as educators to downgrade the hype and to give our students a firm background in the scientific and engineering principles of computer science.
    [Show full text]
  • The Daily Egyptian, September 01, 1995
    Southern Illinois University Carbondale OpenSIUC September 1995 Daily Egyptian 1995 9-1-1995 The Daily Egyptian, September 01, 1995 Daily Egyptian Staff Follow this and additional works at: https://opensiuc.lib.siu.edu/de_September1995 Volume 81, Issue 10 This Article is brought to you for free and open access by the Daily Egyptian 1995 at OpenSIUC. It has been accepted for inclusion in September 1995 by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. Inside: USG establishes task force to examine USSA's importance to SIUC - page 3 9 Daily Egyptian F,r~tt Southern Illinois University at Carbondale Vol. 81, No. 10, 24 pages Clin,ton's visit official! White House confirms: He's coming Sept. 11 By David R. Kasak Belleville. said 'This i.~ obviously a "Obviously this is a great opportunity Loan Program, will accompany Gus Bode and Donita Polly great boost for SIU and a very appro­ that will put SIU in the national and Clinton during his visit. D,,ilv Eg,1it,an Reporters priate location for a speech on student international spotlight.'' Sanders said SrlJC Financial Aid Director Pam aid and higher cducatinn:· "It will show what a great Britton said there is a great deal of A flcr nearly a week of speculation. Jack Dyer. executive director of Univcrsitv SIUC is. a.< well a., what it concern right now about the cuts to a White House official confirmed Universitv Relations, r.aid he i, does for Southern lllinoi;.'" he ,aid. the Direct Student Loan Program. Thursday that President Bill Clinton thrilk-<l about the visit and focls thi~ David Carle.
    [Show full text]
  • Rulemaking: 1999-10 FSOR Emission Standards and Test Procedures
    State of California Environmental Protection Agency AIR RESOURCES BOARD EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES FINAL STATEMENT OF REASONS October 1999 State of California AIR RESOURCES BOARD Final Statement of Reasons for Rulemaking, Including Summary of Comments and Agency Response PUBLIC HEARING TO CONSIDER THE ADOPTION OF EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES Public Hearing Date: December 10, 1998 Agenda Item No.: 98-14-2 I. INTRODUCTION AND BACKGROUND ........................................................................................ 3 II. SUMMARY OF PUBLIC COMMENTS AND AGENCY RESPONSES – COMMENTS PRIOR TO OR AT THE HEARING .................................................................................................................. 7 A. EMISSION STANDARDS ................................................................................................................... 7 1. Adequacy of National Standards............................................................................................. 7 2. Lead Time ................................................................................................................................. 8 3. Technological Feasibility ........................................................................................................ 13 a. Technological Feasibility of California-specific Standards ..............................................................13
    [Show full text]
  • Assignment #4: Big−O, Sorting, Tables, History − Soln
    Assignment #4: Big−O, Sorting, Tables, History − Soln 1. Consider the following code fragment: for (int pass = 1; pass <= 10; pass++) { for (int index = 0; index < k; index += 10) { for (int count = 0; count < index; count++) { do_something(); } } } Assuming that the execution time of do_something() is independent of k, what is the most accurate description of the worst case run−time for this algorithm? a) O(1) b) O(k ) c) O(k log(k) ) 2 d) O(k ) ← 3 e) O(k ) Briefly explain your reason for choosing this answer. The outer loop executes (10+1-1)/1=10 times, and the middle loop executes (k-0)/10 = k/10 times for each execution of the outer loop. The innermost loop executes no times at first, then once, then twice, until k-1 times the last time that the middle loop executes, and the body runs O(1) time. Thus the run time is 10*(0+1+2+?+k- 1)*O(1) = O(k2). 2. Consider the following code fragment: for (int pass = 1; pass <= k; pass++) { for (int index = 0; index < 100*k; index += k) { do_something(); } } Assuming that the execution time of do_something() is O(log(k) ), what is the most accurate description of the worst case run−time for this algorithm? f) O(log(k) ) g) O(k ) h) O(k log(k) ) ← 2 i) O(k ) 2 j) O(k log(k) ) Briefly explain your reason for choosing this answer. The outer loop is executed (k+1-1)/1 = k times, the inner loop is exectuted (100k-0)/k = 100 times, and the innermost block takes time O(log(k)).
    [Show full text]
  • Core Magazine February 2002
    FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before.
    [Show full text]
  • I: the Conception
    Excerpt from: Mayo, Keenan and Newcomb, Peter. “How the Web Was Won,” Vanity Fair, July 2008. I: The Conception Paul Baran, an electrical engineer, conceived one of the Internet’s building blocks—packet switching— while working at the Rand Corporation around 1960. Packet switching breaks data into chunks, or “packets,” and lets each one take its own path to a destination, where they are re-assembled (rather than sending everything along the same path, as a traditional telephone circuit does). A similar idea was proposed independently in Britain by Donald Davies. Later in his career, Baran would pioneer the airport metal detector. Paul Baran: It was necessary to have a strategic system that could withstand a first attack and then be able to return the favor in kind. The problem was that we didn’t have a survivable communications system, and so Soviet missiles aimed at U.S. missiles would take out the entire telephone- communication system. At that time the Strategic Air Command had just two forms of communication. One was the U.S. telephone system, or an overlay of that, and the other was high-frequency or shortwave radio. So that left us with the interesting situation of saying, Well, why do the communications fail when the bombs were aimed, not at the cities, but just at the strategic forces? And the answer was that the collateral damage was sufficient to knock out a telephone system that was highly centralized. Well, then, let’s not make it centralized. Let’s spread it out so that we can have other paths to get around the damage.
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • Impact of News Reporting on Victims and Survivors of Traumatic Events
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Research Online Asia Pacific Media ducatE or Issue 7 Article 4 7-1999 Fair game or fair go? Impact of news reporting on victims and survivors of traumatic events T. McLellan Queensland University of Technology Follow this and additional works at: https://ro.uow.edu.au/apme Recommended Citation McLellan, T., Fair game or fair go? Impact of news reporting on victims and survivors of traumatic events, Asia Pacific Media ducatE or, 7, 1999, 53-73. Available at:https://ro.uow.edu.au/apme/vol1/iss7/4 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] TRINA McLELLAN: Fair game or fair go? ... Fair Game Or Fair Go? Impact Of News Reporting On Victims And Survivors Of Traumatic Events When traumatic incidents occur, victims and survivors – as well as their families, friends and immediate communities – respond in varying ways. Over the past century, however, researchers have mapped common psychosocial consequences for victims/survivors in their studies of what has come to be known as Post-Traumatic Stress Disorder (PTSD). Over the same period, journalists and news media managers have adopted local, medium-specific and industry-wide journalistic standards for acceptable ethical and operational behaviours when it comes to covering such incidents. Yet, despite numerous prescriptive codes – and growing public criticism – Australia’s news media continues to confront victims/ survivors in large numbers when they are at their most vulnerable... and sometimes in ways that are, at best, questionable.
    [Show full text]
  • 12Th Annual TELECOM25% DISCOUNT OPERATORS to ORGANIZATIONS
    TO SAVE UP TO US$200! OCTOBERBOOK 26TH BY SUPPORTING 12th Annual TELECOM25% DISCOUNT OPERATORS TO ORGANIZATIONS WHERE MOBILE, ENTERTAINMENT AND INTERNET COME TOGETHER ATTENDED BY 3 – 6 December 2007 • Hong Kong Convention & Exhibition Centre OVER 1500 DELEGATES ANNUALLY MAJOR TECHNOLOGIES AND INDUSTRY INITIATIVES TO BE COVERED: DMB • DVB-H • EV-DO • FMC • HSPA • IMS • LTE • NGN/NGMN • TD-SCDMA • NFC • Mobile VoIP • UMB • WiMAX KEY INDUSTRY CHALLENGES TO BE ADDRESSED: ■ Opportunities from the convergence of mobile, entertainment and Internet ■ Next-generation networks and service strategies to achieve ultramobility ■ Reinventing business models for future service offerings in the new era of convergence ■ Commercial and infrastructure directions for mobile broadband technologies ■ Market dynamics, technology choices, and business challenges and opportunities in emerging markets OPERATOR CASE STUDIES FROM: KEY PARTNERS: SENIOR SPONSORS: www.MobilityWorldCongress.com TakeTTakke advantageaddvanttage ofof thethhe unsurpassedunsurpassed businessbbusiiness ddevelopmentevellopmentt oopportunitiespporttuniities during this week in mobility! Program Overview The Mobility World Congress (formerly 3G World Congress) fully embraces all key technologies within the world of mobility and truly is a week of wireless where mobile, entertainment and Internet will come together. The theme for the two keynote sessions will revolve around the converging world of mobile and broadband. The six congress tracks, two special interests seminars, six interactive workshops
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]