This Electronic Thesis Or Dissertation Has Been Downloaded from the King's Research Portal At

Total Page:16

File Type:pdf, Size:1020Kb

This Electronic Thesis Or Dissertation Has Been Downloaded from the King's Research Portal At This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Understanding the feasibility of network edge caching through measurements Raman, Aravindh Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 07. Oct. 2021 Understanding the feasibility of network edge caching through measurements Aravindh Raman Understanding the feasibility of network edge caching through measurements Aravindh Raman Department of Informatics, Faculty of Natural and Mathematical Sciences King's College London This dissertation is submitted for the degree of Doctor of Philosophy 2020 Understanding the feasibility of network edge caching through measurements Abstract Recent developments in both hardware industry to bring down the cost/size of the user devices and in content systems to deliver various forms of content have resulted in the burdening of the Internet. In this work, we study how to tackle this growing network burden, leveraging local content access patterns, and the presence of edge caches and computes. The analysis is done through the data gathered from three new and trending applications: (i) on- demand video streaming (ii) live video streaming and (iii) decentralised social web, with the analysis being carried out on BBC iPlayer, Facebook Live and Mastodon respectively. Our proposition is { careful planning to share content at the edge would not only earn significant traffic savings but also improves resiliency due to a redundant availability of content. We notice that the traffic load of on-demand video traffic can be decreased by up to 70% by strategic content sharing at the edge and 22% of upload live-traffic can be saved just by offloading the content to the edge and sharing amongst the local viewers. We also find, instead of popularity based content replication in the decentralised social web (which happens at present based on the federating nodes), strategic placements are much more efficient. For example, random replication of content in 5 different nodes improves the content availability by 68% even when 25 most popular nodes are down. Thus, we investigate the spread of diverse media content arising from three different popular applications and propose how to optimally serve the content making use of the storage available at network edge. Thesis Supervisor: Prof. Nishanth Sastry Thesis Examiners: Dr. Marwan Fayed Prof. S. Keshav To Geeth and Sid Acknowledgements I am grateful to everyone who helped me along the path of writing this dissertation. First and foremost, I would like to express the deepest gratitude to my advisor Nishanth Sastry, and I am thankful for his unwavering support throughout my Ph.D. The right questions and suggestions made by him have helped me in structuring my research. Nishanth's unique way of deriving insights and his balanced style of mentoring will have an influence on me for the years to come. I am truly fortunate to work with and learn from Nishanth, for without his guidance, this dissertation would have been a distant dream! My journey as a Ph.D student would not have been possible without amazing collabora- tions. I was lucky enough to team up with brilliant people from both academia and industry, to name a few { Gareth Tyson, Diego Perino, Arjuna Sathiaseelan, Mostafa Salehi, Nader Mokari, Ming-chun Lee and Andy Molisch. Their ideas and perspective have always helped me in shaping my research in a much better way. I am incredibly fortunate to share the lab with smart computer scientists who are also excellent friends. Uncountable coffees accompanied with intellectual discussions, arguments, lunches and the humour I have shared with Sagar Joglekar, Dmytro Karamshuk, Pushkal Agarwal, Emeka Obiodu and Changtao Zhong are simply priceless. In fact, some of the chats have turned into impactful research papers/grants. Beyond our lab, I am also grateful to friends and colleagues at Center for Telecommunication Research { Mischa Dohler, Maria Lema, Fragkiskos Sardis, Oliver Holland and Luis Sequeira for involving me in networking implementations. My sincere thanks to King's College London, for supporting me with a Professor Sir Richard Trainor Scholarship. The confidence to choose the research path was seeded at Tata Institute of Fundamental Research and nurtured at IIT Delhi. I would like to thank all mentors and friends especially Aaditeshwar Seth, Zahir Koradia, Dipanjan Chakraborty, Karthyek Murthy and Nithin Varma. Indeed, they are the biggest inspirations to land in network measurements and data research. 5 6 Moving abroad and pursuing Ph.D could not have been possible without the support of my family. I would like to thank amma and appa for unwavering belief in my decisions at every point of time and instilling the desire in me to strive for the best. I am greatly indebted to my anna and manni, who have always encouraged me through my successes and been pillars of support during trough times. I am forever grateful to my beautiful and caring wife, Geetha, who has been a constant source of support while writing this dissertation. She has always stood by me and filled my life with fun and happiness. Finally, I would like to thank my Ph.D examiners, Marwan Fayed and Srinivasan Keshav. Their valuable suggestions greatly helped to improve the presentation of this dissertation. Contents Acknowledgments 5 Contents 7 List of Figures 10 List of Tables 13 List of Acronyms 14 1 Introduction 17 1.1 Thesis Statement . 19 1.2 Research Goals . 20 1.3 Methodology & Challenges . 21 1.3.1 Data Anonymisation and Integrity . 22 1.3.2 Data Consistency . 22 1.3.3 Data Storage and Ethics . 22 1.4 Contributions . 23 1.5 List of Publications . 23 2 Background 26 2.1 Web Caching: A Brief History . 26 2.1.1 Intercache Protocols . 27 2.1.2 Early Caching Topologies . 28 2.2 Content Delivery Networks . 29 2.2.1 Content Distribution and Management . 30 2.2.2 Challenges . 32 7 CONTENTS 8 2.3 Caching at the Network Edge . 33 2.3.1 Video Caching . 34 2.3.2 Information-centric Networking (ICN) Architectures . 35 2.3.3 Heterogeneous networks and D2D Caching . 38 2.3.4 Co-operation at the Edge . 38 2.3.5 Inference at the Edge . 39 2.4 Measurement & Content: State-of-the-art . 39 2.4.1 Network Measurements . 39 2.4.2 Studying the Content Systems . 41 3 On Demand Streaming and Content Sharing 45 3.1 Introduction . 45 3.2 Dataset . 48 3.2.1 BBC iPlayer. 48 3.2.2 Wireless Geographic Logging Engine (WiGLE) . 49 3.3 Exploring traffic savings from sharing . 51 3.3.1 Distribution of Access Points . 51 3.3.2 Potential bounds on savings . 52 3.3.3 Effect of storage limits . 53 3.3.4 On Scalability of Sharing . 54 3.3.5 Towards strategic content caching and sharing at the Edge . 55 3.4 Wi-Stitch: A framework for content sharing . 59 4 Live Broadcasts and Content Caching 61 4.1 Introduction . 61 4.2 Dataset . 63 4.2.1 Data Capture Methodology . 63 4.2.2 On Facebook's geo-coordinates . 65 4.2.3 On Facebook's infrastructure . 66 4.3 Characterising Live Broadcasts . 67 4.3.1 How popular is Facebook Live? . 67 4.3.2 How long are broadcasts? . 70 4.3.3 Is broadcast really necessary? . 71 4.4 Geographical Exploration . 72 4.4.1 Where are the users? . 72 4.4.2 How far away are viewers? . 73 4.4.3 Domestic or international? . 74 CONTENTS 9 4.5 Understanding Engagement . 76 4.5.1 Evolution of views over time . 76 4.5.2 Social engagement . 78 5 Decentralised web and Content Replication 80 5.1 Introduction . 80 5.2 Dataset . 82 5.3 Characterising Mastodon . 85 5.3.1 Instance Categories . 88 5.4 Exploring Instances . 90 5.4.1 Instance Hosting . 90 5.4.2 Instance Availability . 92 5.5 Exploring Federation . 97 5.5.1 Breaking the Content Federation . 97 6 Summary and Conclusions 101 6.1 Summary and Takeaways . 101 6.1.1 Content Sharing . 101 6.1.2 Content Caching . 102 6.1.3 Content Replication . 103 6.2 Future Directions . 104 6.3 Final Remarks . 104 Bibliography 106 List of Figures 2-1 Taxonomy of Cache and Content Distribution research in Content Delivery Networks . 30 3-1 Heatmap showing the clumped dispersion of home Wi-Fi access points across six districts in the United Kingdom, indicating a potential density of caches 46 3-2 Dispersion of Wi-Fi access points in 37 adjacent cells at Hammersmith and Fulham .
Recommended publications
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • A Cryptocurrency Spectrum Short Analysis
    Journal of Risk and Financial Management Review A Cryptocurrency Spectrum Short Analysis 1 2 3 Mircea Constantin S, cheau , Simona Liliana Crăciunescu , Iulia Brici and Monica Violeta Achim 3,* 1 Faculty of Automation, Computers and Electronics, University of Craiova, 200585 Craiova, Romania; [email protected] 2 Simona Liliana Crăciunescu, The Bucharest University of Economic Studies, 010374 Bucharest, Romania; [email protected] 3 Faculty of Economics and Business Administration, Babes, -Bolyai University, 400591 Cluj-Napoca, Romania; [email protected] * Correspondence: [email protected] Received: 30 June 2020; Accepted: 11 August 2020; Published: 17 August 2020 Abstract: Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a prudent attitude. Achieving this goal sometimes requires the development of standards and regulations applicable at the national or global level. This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime. Without impeding creativity, implementing suggested proposals must comply with the rules in effect and provide sufficient flexibility for adapting and integrating them. Different segments need to align or reposition, as alteration is only allowed in a positive way. Adopting cryptocurrency decisions should be unitary, based on standard policies. Keywords: cryptocurrencies; fraud; algorithms; correlations; impact; risks; regulation; blockchain 1. Introduction In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability.
    [Show full text]
  • Whitepaper [2], Nakamoto Explains That
    Introduction Since its inception in 2009, Bitcoin [1] and the concept of a blockchain, was developed in response to an inherent flaw in the way transactions were processed on the Internet. In his whitepaper [2], Nakamoto explains that Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model (Nakamoto, 2007) Bitcoin has been rapidly adopted into today’s modern marketplaces. A primary issue with Bitcoin’s rapid adoption is the increase of demand on the original blockchain to handle varying degrees of large transactions. With increased demand comes increased transactional waiting periods, and this has resulted in higher transactional fees in attempts to try and speed-up transaction confirmation times. Official Verge Blackpaper 5.0 2 Table of contents Introduction 2 1.0 Overview 4 1.1 Multi-Algo PoW 4 1.2 Tailored transactional applications 4 1.3 Simple transactions 4 1.4 Stealth transactions 5 1.5 Anon transactions 5 2.0 The Verge Network 6 2.1 TOR Integration 6 2.2 I2P Integration 7 2.3 Electrum 7 2.4 TOR Android 9 3.0 Encrypted Messaging 10 3.1 Message Propagation 11 4.0 Dual-Key Stealth Addressing 12 4.1 Dual-Key Stealth Address Protocol 13 4.2 Key Agreements 14 4.3 The Diffie-Hellman algorithm 14 4.4 Elliptic-Curve Diffie-Hellman (ECDH) 15 4.5 Key Take-aways 17 5.0 Atomic Swaps 18 5.1 What is a Hash Time-Locked Contract (HTLC)? 18 5.2 How do Hash Time-Locked Contracts work? 18 5.3 What are the benefits of HTLC’s? 19 5.4 What are the benefits of Atomic Swaps? 19 5.5 What are the limitations of on-chain Atomic Swaps? 19 5.6 What is the Lightning Network? 19 6.0 Rootstock (RSK) 21 7.0 Ring confidential transactions 24 7.1 Ring Signatures 25 7.2 Pendersen Commitment 25 7.3 Range Proofs 26 Conclusion 26 References 28 Personal Note 30 Official Verge Blackpaper 5.0 3 1.0 Overview The core innovation behind Bitcoin is its decentralized structure.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • Challenges in the Decentralised Web: the Mastodon Case∗
    Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems.
    [Show full text]
  • Blockchain in Japan
    Blockchain in Japan " 1" Blockchain in Japan " "The impact of Blockchain is huge. Its importance is similar to the emergence of Internet” Ministry of Economy, Trade and Industry of Japan1 1 Japanese Trade Ministry Exploring Blockchain Tech in Study Group, Coindesk 2" Blockchain in Japan " About this report This report has been made by Marta González for the EU-Japan Centre for Industrial Cooperation, a joint venture between the European Commission and the Japanese Ministry of Economy, Trade and Industry (METI). The Centre aims to promote all forms of industrial, trade and investment cooperation between Europe and Japan. For that purpose, it publishes a series of thematic reports designed to support research and policy analysis of EU-Japan economic and industrial issues. To elaborate this report, the author has relied on a wide variety of sources. She reviewed the existing literature, including research papers and press articles, and interviewed a number of Blockchain thought leaders and practitioners to get their views. She also relied on the many insights from the Japanese Blockchain community, including startups, corporation, regulators, associations and developers. Additionally, she accepted an invitation to give a talk1 about the state of Blockchain in Europe, where she also received input and interest from Japanese companies to learn from and cooperate with the EU. She has also received numerous manifestations of interest during the research and writing of the report, from businesses to regulatory bodies, revealing a strong potential for cooperation between Europe and Japan in Blockchain-related matters. THE AUTHOR Marta González is an Economist and Software Developer specialized in FinTech and Blockchain technology.
    [Show full text]
  • Funkwhale (Semblable À : Soundcloud Et Grooveshark) Copie D’Écran, Funkwhale
    La Fée diverse déploie ses ailes Il n’est pas si fréquent que l’équipe Framalang traduise un article depuis la langue italienne, mais la récapitulation bien documentée de Cagizero était une bonne occasion de faire le point sur l’expansion de la Fediverse, un phénomène dont nous nous réjouissons et que nous souhaitons voir gagner plus d’amplitude encore, tant mieux si l’article ci-dessous est très lacunaire dans un an ! Article original : Mastodon, il Fediverso ed il futuro decentrato delle reti sociali Traduction Framalang : alainmi, Ezelty, goofy, MO Mastodon, la Fediverse et l’avenir des réseaux décentralisés par Cagizero Peu de temps après une première vue d’ensemble de Mastodon il est déjà possible d’ajouter quelques observations nouvelles. Tout d’abord, il faut noter que plusieurs personnes familières de l’usage des principaux médias sociaux commerciaux (Facebook, Twitter, Instagram…) sont d’abord désorientées par les concepts de « décentralisation » et de « réseau fédéré ». En effet, l’idée des médias sociaux qui est répandue et bien ancrée dans les esprits est celle d’un lieu unique, indifférencié, monolithique, avec des règles et des mécanismes strictement identiques pour tous. Essentiellement, le fait même de pouvoir concevoir un univers d’instances séparées et indépendantes représente pour beaucoup de gens un changement de paradigme qui n’est pas immédiatement compréhensible. Dans un article précédent où était décrit le média social Mastodon, le concept d’instance fédérée était comparé à un réseau de clubs ou cercles privés associés entre eux. Certains aspects exposés dans l’article précédent demandent peut-être quelques éclaircissements supplémentaires pour celles et ceux qui abordent tout juste le concept de réseau fédéré.
    [Show full text]
  • Towards Secure Blockchains
    Towards Secure Blockchains Concepts, Requirements, Assessments | EDITORIAL Editorial Blockchain is currently one of the most widely Consequently, the analysis on the following discussed topics in the area of information pages presents blockchain technology in detail technology. This technology for distributed data and extensively studies its aspects relevant to IT storage originated from the cryptocurrency security. It also assesses to what extent blockchain Bitcoin, which became famous especially due to technology is able to achieve the security prop- the record highs its market value attained in 2017. erties ascribed to it and how it may be evaluated Based on its promise of preventing manipulation within the current legal framework. of data on a purely technical level using its decen- tralised structure, offering maximum transpar- This document thus supports developers and ency and replacing intermediaries within business potential users of blockchain solutions in per- processes, many ideas for applying blockchain forming a well-founded assessment of risks technology in fairly different areas have been and in taking IT security into account from the developed in recent years. start. Furthermore, the dynamic development of blockchain technology offers the possibility Politics has also increasingly taken up blockchain of using the results of this analysis as a basis for technology. For instance, the term blockchain is future discussions on both the national and inter- used several times within the coalition agreement national level. With blockchain—as with other of the 19th election period of the German parlia- topics in IT security—the BSI thus strives to shape ment dating from 2018, and the German federal information security for government, business government has set itself the target of developing and society.
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]
  • List of Cryptoassets That Can Be Legally Traded in Indonesia
    List of Cryptoassets That Can Be Legally Traded in Indonesia Approved cryptoassets under Bappebti Regulation No. 7 of 2020 regarding the Stipulation of the List of Cryptoassets that Are Allowed to Be Traded in the Cryptoasset Physical Market. 1. Bitcoin 81. Verge 161. Storm 2. Ethereum 82. Pax gold 162. Vertcoin 3. Tether 83. Matic network 163. Ttc 4. Xrp/ripple 84. Kava 164. Metadium 5. Bitcoin cash 85. Komodo 165. Pumapay 6. Binance coin 86. Steem 166. Nav coin 7. Polkadot 87. Aelf 167. Dmarket 8. Chainlink 88. Fantom 168. Spendcoin 9. Lightcoin 89. Horizen 169. Tael 10. Bitcoin sv 90. Ardor 170. Burst 11. Litecoin 91. Hive 171. Gifto 12. Crypto.com coin 92. Enigma 172. Sentinel protocol 13. Usd coin 93. V. Systems 173. Quantum resistant ledger 14. Eos 94. Z coin 174. Digix gold token 15. Tron 95. Wax 175. Blocknet 16. Cardano 96. Stratis 176. District0x 17. Tezos 97. Ankr 177. Propy 18. Stellar 98. Ark 178. Eminer 19. Neo 99. Syscoin 179. Ost 20. Nem 100. Power ledger 180. Steamdollar 21. Cosmos 101. Stasis euro 181. Particl 22. Wrapped bitcoin 102. Harmony 182. Data 23. Iota 103. Pundi x 183. Sirinlabs 24. Vechain 104. Solve.care 184. Tokenomy 25. Dash 105. Gxchain 185. Digitalnote 26. Ehtereum classic 106. Coti 186. Abyss token 27. Yearn.finance 107. Origin protokol 187. Cake 28. Theta 108. Xinfin network 188. Veriblock 29. Binance usd 109. Btu protocol 189. Hydro 30. Omg network 110. Dad 190. Viberate 31. Maker 111. Orion protocol 191. Rupiahtoken 32. Ontology 112. Cortex 192.
    [Show full text]
  • Development of Education in the United Statw and How Major Schools of Educational Thoughtave Affected It
    DOCUMENT RESUME ED 132 232 UD 016 630 AUTHOR Lawrence, -Joyce V.; Mamola, Claire Z. TITLE public Education in the United States. A Modularized Course. Elementary Education 301e. Secondary Education 3040. SPONS AGENCY Appalachian/State Univ., Boone, N.C. Center for Instructional Development. PUB DATE [75] NOTE EDRS PRICE MF-$0.83 HC-$19.41 Plus Postage. DESCRIPTORS College Curriculum; Course Descriptions; Course Organization; *Education Courses; Education Majors; Elementary Secondary Education; Independent Study; Individualized Instruction; Instructional Materials;, /*Learning Modules; *Programed Instruction; Public Education; *Teacher Education Curriculum; Teaching Methods; *UnderyLaduate Students ABSTPACT . This modularized,.self-paced study program in Elementary 4nd Secondary Education for K-12 majors is an evolving course of study designed for responsible students.The course is organized into six modules: Trends and Issues in Contemporary Education, Phil6sOphical and Historical Foundations of Education, Administrative Structure and Financing of Public Education, Curriculum/Instruction, Students with Special Needs, and Legal Aspects of Public Education. Module One examines current writers and crucial questions in American education. Options for study within n this module also include examinatiOn of these questions: What could evaluation be? Is education a profession? What's "in"? Whose values? How can we foster creativity? Module Two is an overview of the development of education in the United Statw and how major schools of educational thoughtave affected it. Moable Three examines patterns of organizati n and ways of financing the educational proqess. Module Four is4'.. an pverview of o-ganizational conceptsin today!s schools including alternatives % traditional schooling. Module Five is an opportunity to become. acquainted with problems face& by students of various cultures and by students designated "exceptional" as they experience public schooling.
    [Show full text]