Governance in Namespaces
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Voip): SIP and Related Protocols Fall 2013, Period 1 Lecture Notes of G
IK2554 Practical Voice Over IP (VoIP): SIP and related protocols Fall 2013, Period 1 Lecture notes of G. Q. Maguire Jr. For use in conjunction with: Henry Sinnreich and Alan B. Johnston, Internet Communications Using SIP: Delivering VoIP and Multimedia KTH Information and Services with Session Initiation Protocol, 2nd Edition, Wiley, Communication Technology August 2006, ISBN: 0-471-77657-2. © 2004-2013 G.Q.Maguire Jr. All rights reserved. No part of this course may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the author. Last modified: 2013.08.30:12:51 Maguire Cover.fm Total pages: 1 [email protected] 2013.08.30 Module 1: Introduction........................................................................... 35 Welcome to the course! .......................................................................... 36 Staff Associated with the Course............................................................ 37 Instructor (Kursansvarig) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 37 Goals, Scope and Method....................................................................... 38 Goals of the Course - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38 Scope and Method - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network
A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network oMi-Ryong Park, Chang-Min Park, and Jong-Hyup Lee Router Technology Department, Network Research Lab., ETRI 161 Kajong-Dong, Yusong-Gu, Taejon, 305-350, Korea Tel: +82-42-860-1211, Fax: +82-42-860-5213 Abstract: - Lately, Internet is generally accepted as a principle communication protocol for voice and data networks. Moreover data and voice is converging with one network over the Internet. Each node has its own IP address for existing packet data on the Internet. Even multi-media terminals including Internet phone, Internet fax, and Internet-enabled electric devices, are transferring variable-sized packets. There are several working groups for studying converged data and voice communication in Internet. Such converged network services especially for Internet telephony as Voice over IP (VoIP) or SoftSwitch have already been suggested. We believe that the VoIP service become a killer application on the Internet for the future. Many protocols such as Session Initiation Protocol (SIP), Media Gateway Control Protocol (MGCP), MEGACO, SIGTRAN of Internet Engineering Task Force (IETF) and H.323 series of International Telecommunication Unit (ITU-T), are accepted as standards required for the VOIP service. In this paper, we suggest a Telephone-Domain Name System (T-DNS) architecture for detecting simply the destination IP address at the converged network. T-DNS is based on a Client and Server and an original Internet Domain Name Service (DNS) model. But it expands the DNS architecture for detecting destination IP address by querying the Uniform Resource Locator (URL) of telephone numbers. -
Privacy Vs. Piracy
KATYAL: PRIVACY VS. PIRACY ARTICLE PRIVACY VS. PIRACY SONIA K. KATYAL* I. COMPETING FRAMEWORKS OF PRIVACY AND PROPERTY ...... 231 A. A SYMBIOTIC VIEW FROM REAL SPACE ........................... 233 B. A HIERARCHICAL VIEW FROM CYBERSPACE ................... 241 1. PLACE AND PANOPTICISM ......................................... 244 2. THE DIGITAL PERSONA AS PROPERTY ....................... 251 II. THE CONVERGENCE BETWEEN CONSUMER AND PIRACY SURVEILLANCE .................................................................... 263 A. ORIGINS OF PIRACY SURVEILLANCE ............................... 271 1. THE DIGITAL MILLENNIUM COPYRIGHT ACT AND PEER- TO-PEER JURISPRUDENCE ......................................... 271 2. THE LEGACY OF VERIZON ......................................... 281 B. SPECTERS OF PIRACY SURVEILLANCE ............................. 290 1. M ONITORING ............................................................ 293 2. M ANAGEM ENT .......................................................... 304 3. INTERFERENCE ......................................................... 311 III. TOWARDS A REGIME OF PANOPTIC PUBLICATION ................. 316 A. PRIVACY AND AUTONOMY ............................................... 319 B. DUE PROCESS AND FREEDOM OF EXPRESSION ............... 328 IV. BALANCING PRIVATE AND PUBLIC ENFORCEMENT .............. 335 V . C ON CLU SION ....................................................................... 345 This article was jointly reviewed and edited by YALE JOURNAL OF LAW & TECHNOLOGY and INTERNATIONAL JOURNAL -
Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks
University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2003 Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks Lior Strahilevitz Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Lior Strahilevitz, "Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks," 89 Virginia Law Review 505 (2003). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. VIRGINIA LAW REVIEW VOLUME 89 MAY 2003 NUMBER 3 ARTICLE CHARISMATIC CODE, SOCIAL NORMS, AND THE EMERGENCE OF COOPERATION ON THE FILE- SWAPPING NETWORKS Lior Jacob Strahilevitz * INTROD U CTION ................................................................................... 507 I. AN INTRODUCTION TO NAPSTER, GNUTELLA, AND THE FILE-SWAPPING HYBRIDS ........................................... 510 A . Nap ster ................................................................................... 511 1. Napster in Brief ............................... 511 2. Napster's G rowth ............................................................. 512 3. The Napster Litigation and Its Fallout.......................... 513 B . G n utella ................................................................................. -
ENUM: an Enabler for Voip and Next Generation Services
ITU Workshop on “Origin Identification and Alternative Calling Procedures” (Geneva, Switzerland, 19-20(AM) 2012) ENUM: an Enabler for VoIP and Next Generation Services Steven D. Lind Senior Member of the Technical Staff, AT&T [email protected] Geneva, Switzerland, 19-20 March(AM) 2012 What is ENUM? Provides mapping from E.164 numbers to IP resources Telephone number as domain name Built on top of DNS Number “holder” needs to opt-in Example: +1-973-236-6787 Lookup 7.8.7.6.6.3.2.3.7.9.1.e164.arpa sip:[email protected] DNS sip: [email protected] mailto:[email protected] mailto:[email protected] Geneva, Switzerland, 19-20 March(AM) 2012 2 Assumption Use of standard telephone numbers (ITU-T Recommendation E.164) is not going away PSTN/analog terminals are going to be around IP phones will use 12-button keypad Globally unique identifier that has established familiarity with end users Geneva, Switzerland, 19-20 March(AM) 2012 3 Types of ENUM End-User ENUM used to discover IP endpoints where data is placed in a public ENUM tree by end-users (or their agents) Provider ENUM (aka Carrier or Infrastructure ENUM) used to discover IP-based points of interconnection where data is placed in a private ENUM tree by carriers of record Geneva, Switzerland, 19-20 March(AM) 2012 4 Why is ENUM Important? ENUM will enable VoIP interoperability E.164 addresses will be used as names in VoIP networks ENUM enables call routing between VoIP service providers E.164 addresses are not directly routable in an IP/VoIP network Use ENUM to map E.164 number to an Internet address that can be used to setup communication (e.g. -
ENUM & DNS Principles for an Interoperator IP Backbone Network
ETSI TS 184 010 V3.1.1 (2011-08) Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networks (TISPAN); ENUM & DNS Principles for an Interoperator IP backbone network 2 ETSI TS 184 010 V3.1.1 (2011-08) Reference DTS/TISPAN-04015-NGN-R3 Keywords DNS, ENUM ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Itu-T Supplement to Rec. E.164 Operational and Administrative Issues Associated with National Implementations of the Enum Functi
ITU-T SUPPLEMENT TO REC. E.164 (CLEAN VERSION) OPERATIONAL AND ADMINISTRATIVE ISSUES ASSOCIATED WITH NATIONAL IMPLEMENTATIONS OF THE ENUM FUNCTIONS DRAFT # 11.2 STATUS: REVISED DRAFT #11.2 UPDATED DURING THE 7-16 MAY 2002 STUDY GROUP 2 MEETING IMPORTANT NOTE on the STATUS of ITU-T SUPPLEMENTS: Supplements are only informative and are, therefore, not considered to be an integral part of any Recommendation(s). They do not imply any agreement on the part of the ITU-T (Recommendation A.13, 10/2000, Section 2.4) - 2 - ENUM supplement to ITU-T Rec. E.164 OPERATIONAL AND ADMINISTRATIVE ISSUES ASSOCIATED WITH NATIONAL IMPLEMENTATIONS OF THE ENUM FUNCTIONS Table of Contents 1 Introduction ............................................................................................................................... 2 2 Scope ........................................................................................................................................... 2 3 References .................................................................................................................................. 2 3.1 IETF .................................................................................................................................... 2 3.2 ITU ...................................................................................................................................... 2 4 Definitions .................................................................................................................................. 2 4.1 General -
When Code Isn't Law
Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2003 When Code Isn't Law Tim Wu Columbia Law School, [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Tim Wu, When Code Isn't Law, VIRGINIA LAW REVIEW, VOL. 89, P. 679, 2003; UNIVERSITY OF VIRGINIA SCHOOL OF LAW PUBLIC LAW & LEGAL THEORY RESEARCH WORKING PAPER NO. 03-10 (2003). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/1290 This Working Paper is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. UNIVERSITY OF VIRGINIA SCHOOL OF LAW 2003 SPRING PUBLIC LAW AND LEGAL THEORY RESEARCH PAPERS SERIES WHEN CODE ISN’T LAW TIM WU WORKING PAPER NO. 03-10 This Paper Can Be Downloaded Without Charge From The Social Science Research Network Electronic Paper Collection Http://Ssrn.Com/Abstract_Id=413201 101 102 Virginia Law Review Vol. 89:nnn 2003] Compliance & Code 103 VIRGINIA LAW REVIEW VOLUME 89 JUNE 2003 NUMBER 4 ARTICLE WHEN CODE ISN’T LAW Tim Wu* INTRODUCTION...................................................................................104 I. A THEORY OF CODE, CHANGE, AND AVOIDANCE ...........................110 A. Reactions to Law in General Theories of Regulation .............110 B. When Groups Get Sick of Complying.....................................112 1. Avoidance Mechanisms ...................................................112 2. Change Mechanisms........................................................116 3. Summary: The Change/Avoidance Choice .......................118 C. -
TRIP, ENUM and Number Portability
TRIP, ENUM and Number Portability Nicklas Beijar Networking Laboratory, Helsinki University of Technology P.O. Box 3000, FIN-02015 HUT, Finland [email protected] order to make connectivity between all IP- and PSTN- Abstract terminals possible, the problem of terminal and gateway location must be solved. In these problems, addressing is This paper describes the problem of locating terminals central. Number portability allows users to change using E.164 numbers, and the problem of selecting a operators and locations without changing the telephone suitable gateway for calls from an IP telephony network number. To smoothen the transition to an IP-based to the public switched telephone network (PSTN). telephone network, number portability is also required Generally, these are the problems of mapping the name between PSTN and IP-networks. of a destination into an address, and to find the best route to the destination in a combined IP and PSTN network. The main signaling protocols for IP telephony are Number portability is closely related to these problems. Session Initiation Protocol (SIP) [1] and H.323 [2]. The Due to number portability the address of a destination is architectures that they define are similar, although changed without changing its name. Number portability different names are used for the network elements. Calls may also change the optimal route to a destination. can be established between IP telephony terminals directly, but usually the call setup signaling passes Two protocols are being developed by the Internet through a gatekeeper (in H.3232) or signaling server (in Engineering Task Force (IETF) to solve these problems. -
TR 184 007 V2.1.1 (2008-08) Technical Report
ETSI TR 184 007 V2.1.1 (2008-08) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Naming/Numbering Address Resolution (NAR) 2 ETSI TR 184 007 V2.1.1 (2008-08) Reference DTR/TISPAN-04011-NGN-R2 Keywords addressing, enum, DNS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. -
Peer-To-Peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a Copyright Nirvana Or Gehenna? Damien A
William Mitchell Law Review Volume 27 | Issue 3 Article 1 2001 Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna? Damien A. Riehl Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Recommended Citation Riehl, Damien A. (2001) "Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna?," William Mitchell Law Review: Vol. 27: Iss. 3, Article 1. Available at: http://open.mitchellhamline.edu/wmlr/vol27/iss3/1 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Riehl: Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Fr PEER-TO-PEER DISTRIBUTION SYSTEMS: WILL NAPSTER, GNUTELLA, AND FREENET CREATE A COPYRIGHT NIRVANA OR GEHENNA? Damien A. Riehl I. INTRODUCTION ....................................................................1762 II. DESCRIPTION OF PEER-TO-PEER SYSTEMS ............................1764 III. N APSTER ...............................................................................1766 A. Introduction .............................................................. 1766 B. Napster's Software Architecture ..................................... 1768 C. A & M Records, Inc. v. Napster, Inc ............................1768 -
MAGIC: a Collaboration Project to Globally Connect Researchers and Academics
MAGIC: A collaboration project to globally connect researchers and academics Leandro Marcos de O. GUIMARÃES1, María José LÓPEZ2 1RNP, Rua Lauro Müller, 116, sala 1103 - Botafogo, Rio de Janeiro - RJ - 22290-906, Brazil Tel: + 55 21 2102-9660, Fax: + 55 21 2279-3731, Email: [email protected] 2RedCLARA, Av. El Parque 4680-A, Oficina 108, Santiago, Chile Tel: + 56 2 584 86 18 , Email: [email protected] Abstract Building on the success of the ELCIRA project, RedCLARA - with partners from Latin America, Europe, the Caribbean, West and Central Africa, Eastern and Southern Africa, North Africa and the Middle East, Central Asia and Asia-Pacific is leading MAGIC (Middleware for collaborative Applications and Global vIrtual Communities), a cooperation project that aims to significantly improve the ability of researchers and academics around the world to collaborate together. MAGIC might be the first really global collaborative project in the REN environment. But which are the benefits of the project to its partner institutions’ (UbuntuNet and WACREN) members? How can the African researchers and academics benefit from MAGIC? By fostering and easing collaboration and mobility, MAGIC is fostering intra-regional and global collaboration, helping to reduce the technological gap, and as a consequence, in the long term, to reduce the brain drain. Keywords Collaboration, identity federations, eduroam, eduGAIN, scientific communities, researchers, academics, RENs, NRENs. Introduction A collaboration project to globally connect researchers and academics - aims to establish a set of agreements for all the participating world regions, aimed at consolidating and completing the building blocks of middleware necessary for the establishment of a marketplace of services and real-time applications which will facilitate mobility and the work of global science communities.