Will the Telco Survive to an Ever Changing World? Technical Considerations Leading to Disruptive Scenarios

Total Page:16

File Type:pdf, Size:1020Kb

Will the Telco Survive to an Ever Changing World? Technical Considerations Leading to Disruptive Scenarios Will the Telco survive to an ever changing world ? Technical considerations leading to disruptive scenarios Roberto Minerva To cite this version: Roberto Minerva. Will the Telco survive to an ever changing world ? Technical considerations leading to disruptive scenarios. Other [cs.OH]. Institut National des Télécommunications, 2013. English. NNT : 2013TELE0011. tel-00917966 HAL Id: tel-00917966 https://tel.archives-ouvertes.fr/tel-00917966 Submitted on 12 Dec 2013 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT CONJOINT TELECOM SUDPARIS et L’UNIVERSITE PIERRE ET MARIE CURIE Spécialité: Informatique et Télécommunications Ecole doctorale: Informatique, Télécommunications et Electronique de Paris Présentée par : Roberto Minerva Pour obtenir le grade de DOCTEUR DE TELECOM SUDPARIS LES OPERATEURS SAURONT-ILS SURVIVRE DANS UN MONDE EN CONSTANTE EVOLUTION? CONSIDERATIONS TECHNIQUES CONDUISANT A DES SCENARIOS DE RUPTURE Soutenue le 12 Juin 2013 devant le jury composé de : Noel CRESPI Professeur, HDR, IMT, TSP Directeur de thèse Stéphane FRENOT Professeur, HDR, INSA Lyon Rapporteur Yvon KERMARREC Professeur, HDR, Telecom Bretagne Rapporteur David HAUSHEER Professeur, TU Darmstadt, Allemagne Examinateur Guy PUJOLLE Professeur, HDR, UPMC Examinateur Joerg WIDMER Chief Researcher, IMDEA Examinateur Max MICHEL Docteur, Networks and IT Coordination Examinateur Director, Group IT, Orange Thèse n° 2013TELE0011 Page 2 Dedication To my kids: Mauro, Fabrizio and Sveva, evoking their appalling past and wishing them a bright future; and to Stefania; their courageous mother and my beautiful wife. Page 3 Acknowledgments During 2008 I was researching in the “usual way” within the Innovation department of my company. That was the period of a deep transformation from Research to Innovation. At that time, researchers were put within v ery confined and limited terrains to explore. It was a sort of intellectual “prison” that many Operators were constructing in order to tackle the challenges of the Web world. Instead of opening up minds and research, the approach was to leverage the assets and competitive advantages of the Operators. This approach was aggravating even more the “attitude” of Operators to feel better and more capable of other Competitors. I felt a compelling need to break these glass walls and breath fresh air. On the other side, the success of Web Companies was so stimulating and challenging that there was (is) the need to understand how to build the future of communication service. One thing was puzzling me: how much the needs and rights of users were disregarded. So I decided to put on my “User Hat ” and figure out if a more user centric web was possible. This was the main personal motivation to enter in a Doctorate. This thesis is the result of many lucky circumstances, the first is the encounter with Professor Noël Crespi that greatly helped me in finding a way towards the enrollment in a Doctorate and constantly supported me with patience and scientific rigor towards the completion of this thesis; to Dr. Roberto Saracco that allowed me to endeavor this journey within my company, Telecom Italia, demonstrating once more his open mind; to my colleagues and friends, Antonio Manzalini and Corrado Moiso that supported me with a lot of technical discussions and cooperative work in writing papers and technical documentation. Other colleagues have variously helped me during these years, from Dr. Giovanni Colombo to Ing. Carlo Eynard that encouraged me and helped in finding good research topics. Thanks also to Prof. Djamal Zeghlache for showing me viable paths and objectives. I want also to thank Prof. Tiziana Margaria and Prof. Yvon Kermarrec for their valuable and enlighten suggestions during the mid-term review. Other important people were: Prof. Stephane Frenot and Prof. Yvon Kermarrec that, as Rapporteurs, devoted valuable time in reviewing and suggesting a lot of improvements to this work. I’m pretty sure that their insights helped a lot in increasing the value of this document. My gratitude goes also to all the Examiners that spent time in reading and commenting the document. I want to thank also all the people in the Institute given a hand in sorting out all kinds of problems and issues and acknowledge the people of TMSP and UPMC for easing the administrative matters. Finally thanks to all my family that patiently has supported me in undertaking this enterprise and has waited for me to finish. Roberto Minerva 12 June 2013 Page 4 Abstract The telecom sector is going through a very challenging phase due to radical technological developments (even transformations) -- driven mainly by the constant evolution of the Internet. -- These transformations will have a huge impact on the telecom industry as a whole and, as a consequence, on the future deployment of new networks, platforms, and services. These new technologies and new solutions can be differently shaped according to the specific views, paradigms and models proposed by the various actors in the communication industry. Much of this innovation is promoted and introduced by prominent actors in their efforts to conquer new shares of the Internet market. This approach is particularly fierce in the mobile sector, where the rapid innovation in mobile platforms (e.g., new operating systems such as iOS or Android) has led, on one hand, to the explosion of the mobile internet nurtured by the boom of so called “smartphones”, while simultaneously contributing to the creation of closed environments that are fully controlled (at the client and at the server level) by a single company. As a consequence, the (mobile) Internet is highly fragmented and users are usually trapped into walled gardens. The situation of mobile internet users is just one case, as the whole Internet is going through several major transformations. For instance, some of the disruptions are determined by the intertwining of technological issues that different disciplines are analyzing and solving. This yields to multiple solutions produced by different industries; solutions that can be adopted in different contexts. One clear-cut example is the case of NBIC (Nano, bio, information and cognitive) technologies. It obviously will be quite useful to identify when these transformations will accelerate in accordance with the maturation of technological and industry factors. The industry is heavily impacted and hence transformed during these rapid changes, which occur during what this thesis defines as Inflection Points. A first goal is to identify a set of potential and future inflection points made possible by the evolution of technologies. The evolution of the Internet has a particularly strong impact on Telecomm Operators (TelCos). In fact, the telecommunication industry is on the verge of substantial changes due to many factors: e.g., the progressive commoditization of connectivity, the increasing importance of software-based solutions and the flexibility that introduces (compared to the static TelCo systems), and the dominance in the service realm of Web Companies (WebCos). Page 5 The thesis is not centered on a socio-political discussion, but elaborates, proposes and compares possible inflection points in evolutionary contexts in order to determine and consolidate possible scenarios based on solutions and approaches that are technologically viable (i.e., that follow a plausible technological trajectory). The identified scenarios cover a broad range of possibilities: 1) Traditional TelCos, an evolutionary path: the TelCos will essentially maintain their role in connectivity and related services (even if it must be in a consolidated market -- i.e., a market that is not growing, but essentially maintaining the same perimeter); 2) TelCos as Bit Carriers: this scenario is made possible by the progressive decrease in the value of connectivity and related services. Connectivity is a commodity and TelCos will build networks capable of conveying large amount of data with minimal infrastructural costs. The TelCo will merely forward data from edge to edge with the simplest possible network; 3) TelCos as Platform Enablers: Operators will be able to accommodate for the needs of customers by putting together different classes of resources such as connectivity, processing, storage and sensing/actuation. The TelCo will be able to create a networked platform offering resources and control/management functions that customers will be using to create overlay solutions on top of this infrastructure. This scenario can be seen as a logical evolution of the introduction of the XaaS in the TelCo Networks, where X stands for {N= network, P = platform, I = infrastructure}. Services will mainly be provided by third parties; 4) TelCos as Service Providers: this is an optimistic scenario in which Operators are able to position themselves as successful Service Providers. In this scenario, the networked platform is used by the TelCo to directly provide desirable services to their customers. These services are communication services, as well as new
Recommended publications
  • The 2009 Shift Index
    Measuring the forces of long-term change The 2009 Shift Index Deloitte Center for the Edge John Hagel III, John Seely Brown, and Lang Davison Core Research Team Duleesha Kulasooriya Tamara Samoylova Brent Dance Mark Astrinos Dan Elbert Foreword A seemingly endless stream of books, articles, reports, applications, it may have more impact in how it changes and blogs make similar claims: The world is flattening; our conception of the economy. Interpreted through the the economy has picked up speed; computing power is lens of neoclassical economics, the Shift Index captures increasing; competition is intensifying. shifts in fundamentals, particularly on the cost side where technological changes allow firms to do more with less. Though we’re aware of these trends in the abstract, But, the Shift Index, by name alone, calls into question the we lack quantified measures. We know that a shift is neoclassical mindset that focuses on re-equilibration. underway, but we have no method of characterizing its speed or acceleration or making comparisons. Are The Shift Index resonates instead with a conceptual model rates of change increasing, decreasing, or settling into of the world economy based on complex dynamics. In stable patterns (e.g. Moore’s Law)? How do we compare this framework, the economy can be conceptualized as a exponential changes in bandwidth to linear increases complex adaptive system with diverse entities adaptively in Internet usage? Without times series data and a interacting to produce emergent patterns (and occasional methodology for integrating those data, we cannot large events). If one embraces the complex, dynamic identify, anticipate, or plan for change.
    [Show full text]
  • Dr. Hamadoun I. Touré
    This PDF is provided by the International Telecommunication Union (ITU) Library & Archives Service from an officially produced electronic file. Ce PDF a été élaboré par le Service de la bibliothèque et des archives de l'Union internationale des télécommunications (UIT) à partir d'une publication officielle sous forme électronique. Este documento PDF lo facilita el Servicio de Biblioteca y Archivos de la Unión Internacional de Telecomunicaciones (UIT) a partir de un archivo electrónico producido oficialmente. ﺟﺮﻯ ﺇﻟﻜﺘﺮﻭﻧﻲ ﻣﻠﻒ ﻣﻦ ﻣﺄﺧﻮﺫﺓ ﻭﻫﻲ ﻭﺍﻟﻤﺤﻔﻮﻇﺎﺕ، ﺍﻟﻤﻜﺘﺒﺔ ﻗﺴﻢ ، (ITU) ﻟﻼﺗﺼﺎﻻﺕ ﺍﻟﺪﻭﻟﻲ ﺍﻻﺗﺤﺎﺩ ﻣﻦ ﻣﻘﺪﻣﺔ PDF ﺑﻨﺴﻖ ﺍﻟﻨﺴﺨﺔ ﻫﺬﻩ .ﺭﺳﻤﻴﺎ ً◌ ﺇﻋﺪﺍﺩﻩ 本PDF版本由国际电信联盟(ITU)图书馆和档案服务室提供。来源为正式出版的电子文件。 Настоящий файл в формате PDF предоставлен библиотечно-архивной службой Международного союза электросвязи (МСЭ) на основе официально созданного электронного файла. © International Telecommunication Union N.° 6 Agosto de 2013 UNIÓN INTERNACIONAL DE TELECOMUNICACIONES itunews.itu.int Join us in Comunicaciones digitales y reglamentación Los organismos reguladores y la industria mundiales intercambian puntos de vista en Varsovia to continue the conversation that matters Nuevas aplicaciones, nuevas plataformas • Servicio universal • Polonia se pasa a la televisión digital • Innovación del espectro • La Internet de las Cosas… Facilitamos la gestión de sus Espacios en Blanco Le cuenta lo que ocurre en el mundo de las telecomunicaciones Cada vez que hace una llamada telefónica, utiliza un móvil, emplea el Correo-e, ve la televisión o © vario images GmbH & Co.KG/Alamy Philips accede a Internet, se está beneficiando de la labor que entraña Tomorrow´s Communications la misión de la UIT: Designed Today Conectar al mundo Stockxpert Fotosearch Soluciones informáticas y pericia para la Gestión y Control del Espectro y para la Si desea información para anunciarse, Anúnciese en Actualidades de la UIT Planificación e Ingeniería de Redes Radioeléctricas.
    [Show full text]
  • Phd Thesis. Loughborough University, 2014
    Building blocks for the internet of things Citation for published version (APA): Stolikj, M. (2015). Building blocks for the internet of things. Technische Universiteit Eindhoven. Document status and date: Published: 01/01/2015 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim.
    [Show full text]
  • A Survey on Peer-To-Peer (P2P)
    ISSN (Online) 2278-1021 ISSN (Print) 2319-5940 IJARCCE International Journal of Advanced Research in Computer and Communication Engineering ICRITCSA M S Ramaiah Institute of Technology, Bangalore Vol. 5, Special Issue 2, October 2016 A Survey on Peer-to-Peer (P2P) Shruti Ghatnatti1, Patil Aishwarya Prasanna2, Shailaja2 Assistant Professor, BCA, P.C. Jabin Science College, Hubballi, India1 Student, BCA, P.C. Jabin Science College, Hubballi, India2 Abstract: Today‟s world the internet is on boom. Its trending on a very high basis.Its a food for many organizations and apllications in computer field. The communication is high over the internet. It‟s a good practice to have a secured communication over a peers. This paper attempts to survey on the peer-to-peer communication over a distributed networking. Its working and features are clearly explained. Keywords: P2P, Peers,Distributed Network, Network. I. INTRODUCTION Peer-to-peer (P2P) is an application that is used for search engines , virtual file systems ,and supercomputers”. computable process or to connect two or more computers In earlier software systems and networking discussions the or other devices that distributes the architecture to separate peer-to-peer was primary concept that is used for jobs or labors between peers. They are privileged equally, computable process visualized, stated in the first Request strong participants in the application program .And also for comments as reaching back to a P2P that is near to they are interconnected with several networks that are the principles
    [Show full text]
  • THE TECHNOLOGICAL CONDITION Erich Hörl, Translatd by Anthony Enns1
    PARRHESIA NUMBER 22 • 2015 • 1-15 THE TECHNOLOGICAL CONDITION Erich Hörl, translatd by Anthony Enns1 “It is possible to imagine a world that in a gradual yet also sudden way is moving away from all of its acquired conditions of truth, sense, and value.” Jean-Luc Nancy THE TECHNOLOGICAL DISPLACEMENT OF SENSE “The meaning [Sinn] pervading technology [der technischen Welt] hides itself.”2 This is how Martin Heidegger characterized the situation in 1959, twenty years after he unambiguously spoke of the “age of consummate meaninglessness” that pervades the “essence of modernity” and described “meaninglessness” as the unconditional “horizon of modernity.”3 Yet in the face of the irretrievable loss of the “old rootedness,” which could no longer be maintained after industrialization, two high-tech world wars, and the beginning of the cybernetic transformation of human reality, Heidegger in the end did not mourn the passing of the old sense but rather focused on the rise of a “new autochthony”4 and the coming of a new sense under technological conditions. With an exceptional philosophical intuition for a transformation that was to a large extent still imminent, Heidegger sought to identify “a new ground and foundation” that will “be granted again to man” so he “can flourish in a new way.”5 Heidegger was thus far from opposing technology and sense and thereby understanding sense as a fundamentally pre-, counter-, or non-technical entity derived from a pure transcendental subjectivity and interiority that was threatened by the mass production of technical objects, from the technical apparatuses and automata that permeate all areas of existence, in short from the domination of instrumental reason—namely, the dogmatic philosophical attitude that extended from Husserl to the Frankfurt School.
    [Show full text]
  • Scalable Mesh Networks and the Address Space Balancing Problem
    Scalable Mesh Networks and The Address Space Balancing Problem Andrea Lo Pumo Girton College A dissertation submitted to the University of Cambridge in partial fulfilment of the requirements for the degree of Master of Philosophy in Advanced Computer Science University of Cambridge Computer Laboratory William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom Email: [email protected] May 31, 2010 Declaration I Andrea Lo Pumo of Girton College, being a candidate for the M.Phil in Advanced Computer Science, hereby declare that this report and the work described in it are my own work, unaided except as may be specified below, and that the report does not contain material that has already been used to any substantial extent for a comparable purpose. Total word count: 14980 Signed: Date: This dissertation is copyright c 2010 Andrea Lo Pumo. All trademarks used in this dissertation are hereby acknowledged. Abstract Mesh network architectures are reliable and efficient. They maximize the network throughput with multiple paths and adopt alternative routes when a component fails. Moreover, network applications can optimize their performances by exploit- ing updated routing informations. Large scale versions of mesh networks are attractive both for ISPs, as a mean to lower the management cost of their infrastructure, and also for communities, as they can build and sustain city-wide wireless networks without requiring any third party support. Hierarchical routing protocols are natural candidates for implementing scalable mesh networks. However, when the network is dynamic, the hierarchical topology must be reconfigured after each event. In order to reduce the installation and management costs of a hierarchical mesh network, we propose distributed proto- cols for automatically creating and maintaining the routing architecture.
    [Show full text]
  • Ubiquitous Computing Research at PARC in the Late 1980S
    The origins of ubiquitous computing research at PARC in the late 1980s by M. Weiser R. Gold † J. S. Brown ‡ Ubiquitous computing began in the Electronics At the same time, the anthropologists of the Work and Imaging Laboratory of the Xerox Palo Alto Practices and Technology area within PARC, led by Research Center. This essay tells the inside story of its evolution from “computer walls” to “calm Lucy Suchman, were observing the way people re- computing.” ally used technology, not just the way they claimed to use technology. To some of the technologists at PARC, myself included, their observations led toward thinking less about particular features of a comput- er—such as random access memory and number of pixels or megahertz—and much more about the de- n late 1987, Bob Sprague, Richard Bruce, and tailed situational use of the technology. In partic- other members of the Xerox Palo Alto Research I ular, how were computers embedded within the com- Center (PARC) Electronics and Imaging Laboratory plex social framework of daily activity, and how did (EIL) proposed fabricating large, wall-sized, flat- they interplay with the rest of our densely woven panel computer displays from large-area amorphous physical environment (also known as “the real silicon sheets. It was thought at the time that this world”)? technology might also permit these displays to func- tion as input devices for electronic pens and also for From these converging forces (“from atoms to cul- the scanning of images (by placing documents di- ture,” as we like to say of PARC) emerged the Ubiq- rectly against the displays).
    [Show full text]
  • Learning in and for the 21St Century
    Learning in and for the 21st Century CJ Koh Professorial Lecture Series No. 4 Series Editor: Associate Professor Ee Ling Low Guest Editor: Associate Professor Manu Kapur Writing & Editorial Team: Mingfong Jan Ai-Leen Lin Nur Haryanti Binti Sazali Jarrod Chun Peng Tam Ek Ming Tan SYMPOSIUM AND PUBLIC LECTURE PROFESSOR JOHN SEELY BROWN 21–22 NOVEMBER 2012 Introduction for a World of Constant Change (2011), provides )*S-curves, the Digital Revolution, white-water a compelling view of a new learning culture that is rafting, World of Warcraft, Jeff Bezos, Jurassic Park, emerging with the digital revolution. Jokingly, JSB Wikipedia and Harry Porter have to do with each other \ when we talk about education? Professor John Seely Brown (or JSB as he is fondly referred to) weaves ideas In the following, we report on JSB’s insights and regarding these seemingly unconnected things into a arguments about 21st century learning, based on his cohesive argument about 21st century learning. symposium at NIE on 21 November, 2012, and public lecture at NTU@One-North on 22 November 2012. JSB is also advisor to the Provost at University of Southern California, and the eighth CJ Koh Professor %+'+-%.\/ at NIE. His 1989 seminal article with Allen Collins and Scalable Learning Paul Duguid, “Situated cognition, and the culture of From S-curve to the Big Shift learning”, has been cited more than 11,000 times. From the 18th century to the 20th century, we lived in A recent publication with Douglas Thomas, A New the era of the S-curve – an era of relative stability with Culture of Learning: Cultivating the Imagination regards to social and cultural development (Figure 1).
    [Show full text]
  • Development of Algorithms of Self-Organizing Network for Reliable Data Exchange Between Autonomous Robots
    Original article Dependability, vol. 20 no. 2, 2020 https://doi.org/10.21683/1729-2646-2020-20-2-35-42 Development of algorithms of self-organizing network for reliable data exchange between autonomous robots Alexander V. Ermakov1*, Larisa I. Suchkova1 1Polzunov Altai State Technical University, Russian Federation, Altai Krai, Barnaul *[email protected] Abstract. Factors affecting the reliability of data transmission in networks with nodes with periodic availability were considered. The principles of data transfer between robots are de- scribed; the need for global connectivity of communications within an autonomous system is shown, since the non-availability of information on the intentions of other robots reduces the effectiveness of the robotics system as a whole and affects the fault tolerance of a team of in- dependent actors performing distributed activities. It is shown that the existing solutions to the problem of data exchange based on general-purpose IP networks have drawbacks; therefore, as the basis for organizing autonomous robot networks, we used developments in the domain of topological models of communication systems allowing us to build self-organizing computer networks. The requirements for the designed network for reliable message transfer between Alexander V. autonomous robots are listed, the option of organizing reliable message delivery using overlay Ermakov networks, which expand the functionality of underlying networks, is selected. An overview of existing popular controlled and non-controlled overlay networks is given; their applicability for communication within a team of autonomous robots is evaluated. The features and specifics of data transfer in a team of autonomous robots are listed. The algorithms and architecture of the overlay self-organizing network were described by means of generally accepted methods of constructing decentralized networks with zero configurations.
    [Show full text]
  • Spotlight on John Seely Brown in This Issue of Spotlight John Seely Brown
    Spotlight on John Seely Brown In this issue of Spotlight John Seely Brown speaks to editor Sarah Powell about nurturing invention and managing innovation. Dr John Seely Brown, a prominent speaker, author and teacher, and a visiting scholar at the Annenberg Center at University of Southern California (USC), was, until April 2002, Chief Scientist of Xerox Corporation and until June 2000, Director of the Xerox Palo Alto Research Center (PARC) – a position he held for twelve years. At USC John Seely Brown is pursuing his personal research interests which include digital culture, ubiquitous computing, social software and organizational and individual learning. A member of the National Academy of Education and a fellow of the American Association of Artificial Intelligence and the American Association for the Advancement of Science (AAAS), Dr Seely Brown serves on the boards of directors of Amazon, Corning, Varian Medical Systems and Polycom, and on various advisory boards. He has published over a hundred papers and has received several awards. His most recent book, The Social Life of Information, co- authored with Paul Duguid (Harvard Business School Press, 2000), has been translated into nine languages. Spotlight: You have written that ‘you can’t manage invention, just nurture it. but you can manage innovation. .’ How can an organization best nurture invention? John Seely Brown: The catch in nurturing invention is how you authentically create a space for risk-taking. It’s easy for management to say: go ahead and take risks, but risk-taking behaviour is a property of culture and must be an emergent property of the ways things are done around you.
    [Show full text]
  • JUI RAMAPRASAD Robert H. Smith School of Business • University Of
    JUI RAMAPRASAD Robert H. Smith School of Business • University of Maryland 4305 Van Munching Hall • College Park, MD 20742 e-mail: [email protected] tel (m): (773) 809-4584 Academic Appointments Visiting Associate Professor in DOIT August 2019 – Robert H. Smith School of Business, University of Maryland, College, Park, MD Associate Professor (with tenure) of Information Systems, June 2016 – Desautels Faculty of Management, McGill University, Montreal, QC Assistant Professor of Information Systems, July 2009 – May 2016 Desautels Faculty of Management, McGill University, Montreal, QC Research and Teaching Assistant, Paul Merage School of Business, 2003 – 2009 University of California, Irvine, California [Maternity Leave: February – July 2017; July 2018 – December 2018] Education University of California, Irvine Irvine, CA Paul Merage School of Business June 2009 Ph.D. in Management, Information Systems University of Southern California Los Angeles, CA Marshall School of Business, May 2001 BS in Business Administration, Information Systems and Finance Research Interests My program of research examines digital platforms—different types of platforms, IT-enabled features on these platforms, and social activity on these platforms—and how they motivate user participation, interaction, consumption, and payment in in the context of online music and online dating. My teaching at all levels—from undergraduate to executive, my service to the IS and community, and industry talks have stemmed from the expertise I have developed through my research, and in particular my research in the contexts of digital music and online dating. My work thus far has enabled new understandings of how information technology can influence human behavior, shape social interactions, and impact organizations that have been digitally disrupted.
    [Show full text]
  • Architecture of P2P Systems
    Architecture of P2P systems Peer-to-peer systems often implement an abstract overlay network, built at Application Layer, on top of the native or physical network topology. Such overlays are used for indexing and peer discovery and make the P2P system independent from the physical network topology. Content is typically exchanged directly over the underlying Internet Protocol (IP) network. Anonymous peer-to-peer systems are an exception, and implement extra routing layers to obscure the identity of the source or destination of queries. In structured peer-to-peer networks, peers (and, sometimes, resources) are organized following specific criteria and algorithms, which lead to overlays with specific topologies and properties. They typically use distributed hash table-based (DHT) indexing, such as in the Chord system (MIT).[2] Unstructured peer-to-peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion[3]. Ideally, unstructured P2P systems would have absolutely no centralized system, but in practice there are several types of unstructured systems with various degrees of centralization. Three categories can easily be seen. In pure peer-to-peer systems the entire network consists solely of equipotent peers. There is only one routing layer, as there are no preferred nodes with any special infrastructure function. Hybrid peer-to-peer systems allow such infrastructure nodes to exist, often called supernodes.[4] . In centralized peer-to-peer systems, a central server is used for indexing functions and to bootstrap the entire system. Although this has similarities with a structured architecture, the connections between peers are not determined by any algorithm.
    [Show full text]