Contributions to Mechanisms for Adaptive Use of Mobile Network Resources Olivier Mehani

Total Page:16

File Type:pdf, Size:1020Kb

Contributions to Mechanisms for Adaptive Use of Mobile Network Resources Olivier Mehani Contributions to Mechanisms for Adaptive Use of Mobile Network Resources Olivier Mehani To cite this version: Olivier Mehani. Contributions to Mechanisms for Adaptive Use of Mobile Network Resources. Au- tomatic. École Nationale Supérieure des Mines de Paris; University of New South Wales - Australie, 2011. English. NNT : 2011ENMP0096. pastel-00711154 HAL Id: pastel-00711154 https://pastel.archives-ouvertes.fr/pastel-00711154 Submitted on 22 Jun 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSTITUT DES SCIENCES ET TECHNOLOGIES École doctorale n◦432 : SMI—Sciences des métiers de l’ingénieur Doctorat ParisTech THÈSE pour obtenir le grade de docteur délivré par l’École nationale supérieure des mines de Paris en cotutelle avec School of Electrical Engineering and Telecommunications University of New South Wales, Australie Spécialité « Informatique temps-réel, robotique et automatique » présentée et soutenue publiquement par Olivier Mehani le 14 décembre 2011 Contributions aux mécanismes de réseau pour un usage adaptatif des ressources mobiles Direction de la thèse: Roksana Boreli Arnaud de La Fortelle Encadrement de la thèse: Thierry Ernst Jury Christian Bonnet, Professeur, EURECOM Rapporteur Roksana Boreli, Chercheuse, NICTA Examinatrice Thierry Ernst, Chercheur, Mines ParisTech Examinateur T Arnaud de La Fortelle, Professeur, Mines ParisTech Examinateur François Spies, Professeur, Université de Franche-Comté Président H Andreas Timm-Giel, Professeur, Hamburg University of Technology Rapporteur È MINES ParisTech S Dép. Mathématiques et Systèmes—Centre de Robotique 60, Boulevard Saint-Michel 75272 PARIS cedex 06 E Contributions to Mechanisms for Adaptive Use of Mobile Network Resources Olivier Mehani A dissertation submitted in fulfilment of the requirements for the degree of Doctor of Philosophy The School of Electrical Engineering and Telecommunications The University of New South Wales in a cotutelle agreement with D´ep. Math´ematiques et Syst`emes—Centre de Robotique Ecole´ Nationale Sup´erieure des Mines–ParisTech, France 14 December 2011 Acknowledgements I would first like to thank my supervisors, Roksana Boreli, Thierry Ernst, Arnaud de La Fortelle and Aruna Seneviratne for their support throughout my work on this thesis. Rok- sana has been a great help while refining and expressing the ideas presented in this thesis, while Thierry’s input put them into different and wider perspectives. Arnaud accepted to supervise me for Mines–ParisTech which allowed me to work in this international col- laboration context, and Aruna was a strong support at NICTA without whom coming to Australia and securing (and extending) my scholarship would have been much harder. I am grateful to NICTA and Inria, which have financially supported my doctoral studies, and provided a most adequate work environment throughout my research. I am also very thankful to Christine at Ecole´ des Mines, Victoria at UNSW, Rema at NICTA and Chantal at Inria for their help making all administrative hurdles vanish almost magically. This thesis has benefited at all stages from my interactions with many people. I am ex- tremely grateful to Guillaume J. who has been a constant support in many ways (ideas, advice, proofreading and beers) throughout these four years. It was also very insightful to work on research papers with my various co-authors (amongst others and in no partic- ular order, Jolyon, Michael and Thierry R.). Rodrigo’s advice, even before I started my thesis, has helped me structure my work into something hopefully more coherent. Finally, I extend my gratitude to all the other people I had the opportunity to meet, both in NICTA’s Network Research Group (particularly those who willingly exposed themselves to proofreading drafts of this dissertation: Guillaume S., Babil, Yan and Mentari) and Inria’s Imara project-team (Armand, Laurent, Fran¸cois, Cl´ement) for making these labs exciting places to work, learn and develop new ideas. Finally, I would like to thank my parents, who have always been very supportive, even when some decisions did not seem to be the most optimal at the time, or when some others would take me geographically further and further away from them. I also thank Jenny, for her constant support, understanding, and everything else. Moreover, without her, the word “quintessential” would not have appeared in this dissertation. iii Abstract With the widespread availability of multiple wireless network technologies, mobile com- puting devices can benefit from almost uninterrupted connectivity by changing network attachments as they move. This however raises the problem of the selection method to be used for the choice of the wireless networks to associate with, in order to provide the best performance. Moreover, mobility events may result in poor application quality, due to either a disruption in connectivity during the handover or the heterogeneity of the charac- teristic of different access networks. To address these problems, this thesis introduces and studies all three elements (observation, decision, action) of a control framework to enable better use of available network resources. We first show that a decision mechanism which directly considers the relevant user- and application-centric metrics is more appropriate than using the common network metrics- based indirect approach. This mechanism is used to control the entire network stack of the mobile node in a coordinated way, rather than individual components, to avoid potentially conflicting combinations. Our results indicate that, by exploiting the flexibility of application parameters, it is possible to maintain high application quality while reducing both the power consumption and access price. We then introduce a mobility-aware extension to the TCP-Friendly Rate Control mechan- ism (TFRC), as an action element, to address the disruption in connectivity resulting from the mobility events. We propose to suspend the transmission before disconnections and to probe the network after reconnections. Simulations demonstrate how this enables faster recovery after disconnected periods as well as a significantly improved adaptation to the newly available network conditions. When used with the Datagram Congestion Control Protocol (DCCP), experiments show that it provides better support for real-time applica- tions for which the user-perceived quality is very dependent on the immediate transmission rate. Finally, we present an experimental process to evaluate the OMF Measurement Library (OML), a lightweight instrumentation and reporting tool which we propose to use as the observation element of our framework. We show that this library does not significantly impact the performance of the instrumented applications, while accurately reporting the observed metrics. Keywords network mobility, communication stack, cross-layer framework, optimisation, quality of experience, transport protocol. v R´esum´e Avec les larges d´eploiements de multiples technologies sans fil, les terminaux informatiques mobiles b´en´eficient d’une connectivit´epresque permanente, changeant de r´eseaux d’acc`es au gr´ede leurs d´eplacements. Ceci pose cependant le probl`eme de la s´election de ces r´eseaux, afin de fournir les meilleures performances. Cette mobilit´erisque aussi d’impacter la qualit´edes applications, souvent lors des « handovers » d’un r´eseau `al’autre, ou en raison de la disparit´edes caract´eristiques des r´eseaux d’acc`es. Pour aborder ces probl`emes, cette th`ese introduit et ´evalue trois ´el´ements de contrˆole (observation, d´ecision, action) permettant une meilleure utilisation des ressources r´eseau par les ´equipements mobiles. Nous montrons d’abord qu’un m´ecanisme de d´ecision qui utilise directement les m´etriques pertinentes pour les utilisateurs et les applications est plus appropri´eque l’approche indi- recte classique bas´ee sur les m´etriques r´eseau. Ce m´ecanisme contrˆole de mani`ere coordon- n´ee l’ensemble de la pile protocolaire, plutˆotque des composants s´epar´es, afin d’´eviter des combinaisons conflictuelles. Nous d´emontrons que la flexibilit´edes param`etres applicatifs peut ˆetre exploit´ee et permet de maintenir une qualit´e´elev´ee pour les applications tout en r´eduisant les coˆuts d’acc`es (´energ´etique et financier). Une extension au TCP-Friendly Rate Control mechanism (TFRC) est ensuite introduite, en tant qu’´el´ement d’action, pour att´enuer les perturbations lors des handovers. Nous proposons de suspendre la transmission avant la d´econnexion, puis de sonder le r´eseau apr`es reconnexion. Nous montrons que cela permet un r´etablissement plus rapide et une meilleure adaptabilit´eaux conditions du nouveau r´eseau. Son usage en combinaison avec le Datagram Congestion Control Protocol (DCCP) offre un meilleur support aux applications temps-r´eel, dont la qualit´ed´epend de la vitesse de transmission imm´ediate. Finalement, nous pr´esentons une m´ethode pour ´evaluer la OMF Measurement Library (OML), une biblioth`eque d’instrumentation dont nous proposons l’usage comme ´el´ement d’observation.
Recommended publications
  • Check Detailed Interview In
    Interviewee: Shigeki Goto Interviewer: Fan Yuanyuan Date: April 13th, 2018 Location: Cyberlabs, Beijing Transcriber: Hong Wei 1:34 FYY: Ok, so let's begin. But today is thirteenth of April, 2018.We’re in office of cyber labs in Beijing and we feel so honored to be able to interview doctor Shigeki Goto here? Am pronouncing it right? (Yes). I’ll briefly introduce the history of Internet project to you. The project is launched in …… It's launched in 2007 to celebrate the first fifty years of the Internet by recording and preserving the personal narratives of global Internet pioneers, uh, their extraordinary contributions to the Internet development. And by 2018, we should have interviewed 500 Internet pioneers, as we planned, and by now is interviewed more than 170 pioneers around the world and about 80 are from overseas of China, and let’s start from the very beginning of you like, uh, your name, where and when were you born and what did your parents do, when you were young? SG: I was born in Utsunomiya city that is near Nikko, Tochigi Prefecture in Japan. Both of my parents basically were school teachers and my father spent most of his life at the unified school district. He was a school teacher. He worked for the administrative structure of the school system. It covers from elementary school, middle school, and high school if they are public. FYY: So that's a big school covered all three… SG: Yes. All the regional public schools are under control of the unified school district.
    [Show full text]
  • Internet Hall of Fame Announces 2013 Inductees
    Internet Hall of Fame Announces 2013 Inductees Influential engineers, activists, and entrepreneurs changed history through their vision and determination Ceremony to be held 3 August in Berlin, Germany [Washington, D.C. and Geneva, Switzerland -- 26 June 2013] The Internet Society today announced the names of the 32 individuals who have been selected for induction into the Internet Hall of Fame. Honored for their groundbreaking contributions to the global Internet, this year’s inductees comprise some of the world’s most influential engineers, activists, innovators, and entrepreneurs. The Internet Hall of Fame celebrates Internet visionaries, innovators, and leaders from around the world who believed in the design and potential of an open Internet and, through their work, helped change the way we live and work today. The 2013 Internet Hall of Fame inductees are: Pioneers Circle – Recognizing individuals who were instrumental in the early design and development of the Internet: David Clark, David Farber, Howard Frank, Kanchana Kanchanasut, J.C.R. Licklider (posthumous), Bob Metcalfe, Jun Murai, Kees Neggers, Nii Narku Quaynor, Glenn Ricart, Robert Taylor, Stephen Wolff, Werner Zorn Innovators – Recognizing individuals who made outstanding technological, commercial, or policy advances and helped to expand the Internet’s reach: Marc Andreessen, John Perry Barlow, Anne-Marie Eklund Löwinder, François Flückiger, Stephen Kent, Henning Schulzrinne, Richard Stallman, Aaron Swartz (posthumous), Jimmy Wales Global Connectors – Recognizing individuals from around the world who have made significant contributions to the global growth and use of the Internet: Karen Banks, Gihan Dias, Anriette Esterhuysen, Steven Goldstein, Teus Hagen, Ida Holz, Qiheng Hu, Haruhisa Ishida (posthumous), Barry Leiner (posthumous), George Sadowsky “This year’s inductees represent a group of people as diverse and dynamic as the Internet itself,” noted Internet Society President and CEO Lynn St.
    [Show full text]
  • Securing the Border Gateway Protocol by Stephen T
    September 2003 Volume 6, Number 3 A Quarterly Technical Publication for From The Editor Internet and Intranet Professionals In This Issue The task of adding security to Internet protocols and applications is a large and complex one. From a user’s point of view, the security- enhanced version of any given component should behave just like the From the Editor .......................1 old version, just be “better and more secure.” In some cases this is simple. Many of us now use a Secure Shell Protocol (SSH) client in place of Telnet, and shop online using the secure version of HTTP. But Securing BGP: S-BGP...............2 there is still work to be done to ensure that all of our protocols and associated applications provide security. In this issue we will look at Securing BGP: soBGP ............15 routing, specifically the Border Gateway Protocol (BGP) and efforts that are underway to provide security for this critical component of the Internet infrastructure. As is often the case with emerging Internet Virus Trends ..........................23 technologies, there exists more than one proposed solution for securing BGP. Two solutions, S-BGP and soBGP, are described by Steve Kent and Russ White, respectively. IPv6 Behind the Wall .............34 The Internet gets attacked by various forms of viruses and worms with Call for Papers .......................40 some regularity. Some of these attacks have been quite sophisticated and have caused a great deal of nuisance in recent months. The effects following the Sobig.F virus are still very much being felt as I write this. Fragments ..............................41 Tom Chen gives us an overview of the trends surrounding viruses and worms.
    [Show full text]
  • Timeline & History of the Internet in Asia and the Pacific, 1992-2017
    The Internet Society's 25th anniversary timeline & history of the Internet in Asia and the Pacific 1992-2017 When countries first had Asia-Pacific Internet Global Internet connection milestones Society milestones (based on establishment milestones date of first commercial Internet service provider) 1st IETF meeting in San Diego, USA (1986) Australia (1989) World Wide Web opened to the public (1991) New Zealand (1989) Linux source code released (1991) Internet Society Established 1992 INET '92 Kobe in Japan Hong Kong Japan Malaysia APNIC, the regional Internet address registry National Center for Supercomputing for the Asia-Pacific, 1993 Applications released Mosaic Web Browser established Bangladesh Indonesia st Republic of Korea 1994 1 Internet Society Chapter Philippines founded in Japan Singapore Brunei Darussalam Nepal Windows 95 launched China Pakistan Fiji Sri Lanka 1995 India Taiwan Thailand Yahoo! launched 1st Asia Pacific Regional Maldives Nokia 9000 Communicator released, the Internet Conference on 1st mobile phone with Internet capabilities Mongolia Operational Technologies 1996 Viet Nam (APRICOT) in Singapore Hotmail and Rocketmail launched Cambodia Lao PDR 1997 Solomon Islands Google launched Nauru Asia Pacific Top Level Samoa 1998 ICANN established Domain Name Association (APTLD) established IPv6 specification released by IETF Bhutan Papua New Guinea 1st Blackberry 1999 device launched Alibaba established 1st IETF meeting in the Asia-Pacific Myanmar SEA-ME-WE3 region in Adelaide, Australia Tuvalu submarine cable 2000 completed Trek
    [Show full text]
  • The Amateur Computerist Gathers an Article Was Written and Published in the Some Documents from That Celebration
    The Amateur Comp u terist http://www.ais.org/~jrh/acn/ Summer 2008 ‘Across the Great Wall’ Volume 16 No. 2 2007. Participating were international Internet pio- Celebration neers, representatives of the Internet in China and The First Email Message from China to CSNET historians and journalists. From 1983 to 1987, two teams of scientists and engineers worked to overcome the technical, financial, and geographic obstacles to set up an email connection between China and the interna- tional CSNET. One team was centered around Werner Zorn at Karlsruhe University in the Federal Republic of Germany. The other team was under the general guidance of Wang Yuenfung at the In- stitute for Computer Applications (ICA) in the Peo- ple’s Republic of China. The project succeeded based on the scientific and technical skill and friendship, resourcefulness and dedication of the members of both teams. The first successful email message was sent on Sept 20, 1987 from Beijing to computer scien- tists in Germany, the U.S. and Ireland. The China- CSNET connection was granted official recogni- tion and approval on Nov 8 1987 when a letter (Composed 14 Sept 1987, sent 20 Sept 1987) signed by the Director of the U.S. National Science Foundation Division of Networking and Commu- A celebration of the 20th anniversary of the nications Research and Infrastructure Stephen first email message that was sent from China to the Wolff was forwarded to the head of the Chinese world via the international Computer Science Net- delegation, Yang Chuquan at an International work (CSNET) was held at the Hasso Plattner In- Networkshop in the U.S.
    [Show full text]
  • China IGF Main Events
    China IGF Main Events July 11, 2019--The "China Internet Governance Forum (China IGF) Initiative" was launched at the 18th China Internet Conference. According to the Initiative, the China IGF is expected to promote China's Internet industry and community better participating in the global Internet governance process, with its main missions to foster a bottom-up, participatory, open, transparent, and inclusive platform where government, business, tech-community, civil society, and all stakeholders can exert their respective roles in enhancing internet security, accelerating industry development, advancing good internet governance, and promoting digital economy. The Initiative started the establishment of China IGF Secretariat, and called on multi-stakeholders to join the process. May 28, 2020--The inaugural meeting of the China IGF was held online. Based on multi-stakeholder principle, the 27 founding organizations including well-known domestic research institutions (China Academy of Information and Communications Technology, Fuxi Institute) and universities (Tsinghua University, Beijing University of Posts and Telecommunications), industry associations (Internet Society of China, CyberSecurity Association of China), technology communities (Computer Network Information Center of the Chinese Academy of Sciences, China Future Internet Engineering Center), Internet and digital technology companies (Tencent, Alibaba, Baidu, JD.com, Huawei), and telecom operators (China Telecom, China Mobile, China Unicom). The Multi-stakeholder Advisory Committee of China IGF was set up with 32 members. Meanwhile, the official website of China IGF (http://igfchina.caict.ac.cn) was approved by the UN IGF Secretariat and was added into the National IGF Initiatives family list. July 24, 2020--With the theme of "Inclusive Governance, Digital Inclusion", the 1st China Internet Governance Forum was successfully held online during the 2020 China Internet Conference.
    [Show full text]
  • Ieee Internet Award Recipients
    IEEE INTERNET AWARD RECIPIENTS 2018 - RAMESH GOVINDANs “For sustained contributions to the dynamic Northrop-Grumman Chair in analysis of the Internet (protocols, Engineering, Professor of topologies, configurations) and the Internet Computer Science and Electrical of Things (sensor networks).” Engineering, University of Southern California, Los Angeles, California, USA 2017 - DEBORAH ESTRIN “For formative contributions and thought Professor, Department of leadership in Internet routing and in mobile Computer Science, Cornell NYC sensing techniques and applications, from Tech, New York, New York, USA environmental monitoring to personal and community health.” 2016 – HENNING SCHULZRINNE “For formative contributions to the design Professor, Department of and standardization of Internet multimedia Computer Science, Columbia protocols and applications.” University, New York, New York, USA 2015 - KC CLAFFY "For seminal contributions to the field of Principal Investigator, CAIDA, La Internet measurement, including security Jolla, California, USA and network data analysis, and for AND distinguished leadership in and service to VERN PAXSON the Internet community by providing open- Professor, University of California, access data and tools." Berkeley, California, USA 2014 - JON CROWCROFT “For contributions to research in and Professor, University of Cambridge, teaching of Internet protocols, including Cambridge, United Kingdom multicast, transport, quality of service, security, mobility, and opportunistic networking.” 2013 - DAVID MILLS “For significant
    [Show full text]
  • Caseyrthesis.Pdf (5.347Mb)
    ICANN or ICANN’t Represent Internet Users Rebecca E. Casey Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of requirements for the degree of Master of Arts In Political Science Karen M. Hult, Chair Charles E. Walcott Brent K. Jesiek August 21, 2008 Blacksburg, Virginia Keywords: ICANN, descriptive representation, substantive representation, formal representation, Internet users, ICANN Board of Directors ICANN or ICANN’t Represent Internet Users Rebecca E. Casey ABSTRACT The Internet Corporation for Assigned Names and Numbers (ICANN) is the organization that provides the technical support for the Internet. ICANN is a nonprofit organization based in California and is under contract to the United States Department of Commerce. It has come under attack from many sides because it is contracted through the U.S. government and it is a private entity. One of the main components of the controversy surrounding ICANN is whether it can represent a global society as a private entity and whether that private entity can represent Internet users. I focus my study on ICANN’s Board of Directors. I evaluated the Board on the dimensions of descriptive, substantive, and formal representation (Pitkin 1967). Evaluation of ICANN’s descriptive representation focused on the Board members’ sex, educational backgrounds, and nationalities and compared the geographic representation on the Board to the global distribution of Internet users. The assessment of substantive representation looked at the Board members’ votes to determine if patterns could be viewed based on members’ descriptive characteristics. Finally, the evaluation of ICANN’s formal representation examined its Bylaws, its 2006 contract with the U.S.
    [Show full text]
  • The End of the Experiment: How Icann's Foray Into Global Internet Democracy Failed
    Harvard Journal of Law & Technology Volume 17, Number 2 Spring 2004 THE END OF THE EXPERIMENT: HOW ICANN’S FORAY INTO GLOBAL INTERNET DEMOCRACY FAILED John Palfrey* TABLE OF CONTENTS I. INTRODUCTION .................................................................... 410 II. ICANN’S HISTORY, STRUCTURE, AND IMPORTANCE ................ 418 A. History and Principles...................................................... 418 B. ICANN’s Hybrid Structure and Its Drain on Legitimacy........ 425 1. ICANN as a Standards Body........................................... 426 2. ICANN as a Corporation ................................................ 427 3. ICANN as a Government Entity ...................................... 429 C. Does ICANN Need Legitimacy: Does It Matter Whether ICANN Lives Up to Its Principles?................................... 432 III. THE FAILURE OF THE EXPERIMENT IN LEGITIMACY THROUGH OPENNESS............................................................ 437 A. Confusion about “Openness” ............................................ 437 B. The Limits of Public Input in Decision Making at ICANN ......................................................................... 440 IV. THE FAILURE OF ICANN’S EXPERIMENT IN REPRESENTATION ................................................................ 446 A. The Election of 2000 ........................................................ 446 B. Why ICANN’s Semidemocratic Structure Was Doomed to Fail.......................................................................... 450 1. ICANN as a Semidemocracy.........................................
    [Show full text]
  • Ieee Nominations and Appointments Committee
    IEEE NOMINATIONS AND APPOINTMENTS COMMITTEE History of Service Manual 1963-2013 IEEE 445 Hoes Lane Piscataway, NJ 08855, USA TABLE OF CONTENTS BOARD OF DIRECTORS COMPOSITION CHART . 1 IEEE STANDING COMMITTEES AND BOARDS Admission and Advancement Committee . 16 Audit Committee . 22 Awards Board . 25 Compensation Committee . 29 Conference Board . 30 Conferences Committee . 31 Corporate Communications Advisory Committee . 32 Credentials Committee . 33 Educational Activities Board . 34 Employee Benefits Committee . 38 Employee Benefits and Compensation Committee. 39 Ethics Committee . 41 Ethics and Member Conduct Committee . 42 Executive Committee . 43 Facilities Committee . 46 Fellow Committee . 47 Finance Committee . 53 Governance Committee . 56 History Committee . 57 Individual Benefits and Services Committee . 61 Information Technology Strategy Committee . 63 Infrastructure Oversight Committee . 64 Insurance Committee . 65 Investment Committee . 66 Life Member Fund Committee . 68 Life Members Committee . 70 Long Range Planning Committee . 71 Marketing and Sales Committee . 73 Meetings and Services Committee . 74 Member and Geographic Activities Board . 75 Member Conduct Committee . 76 Membership and Transfers Committee . 77 Membership Development Committee . 79 New Initiatives Committee . 82 Nominations and Appointments Committee . 83 Public Information Committee . 87 Public Relations Advisory Committee . 88 Public Visibility Committee . 89 Publications Board . 90 Publications Services and Products Board . 94 Regional Activities Board . 96 SPECTRUM/INSTITUTE Advisory Board . 99 Standards Board . 100 Standards Association Board of Governors . 104 Strategic Planning Committee . 105 Technical Activities Board . 107 IEEE Society and Council Presidents . 111 Tellers Committee . 122 United States Activities Board . 125 IEEE-USA . 127 Women in Engineering Committee . 129 LISTING OF IEEE AWARD RECIPIENTS . 128 i IEEE BOARD OF DIRECTORS - COMPOSITION CHART 1963 1964 1965 1966 President Ernst Weber Clarence H.
    [Show full text]
  • The Practice of Change(本文)
    doctoral dissertation academic year 2018 The Practice of Change keio university graduate school of media & governance j o i c h i i t o Joichi Ito: The Practice of Change, How I survived being interested in everything, © 2018 cb ABSTRACT Over the last century civilization has systematically supported a market- based approach to developing technical, financial, social and legal tools that focus on efficiency, growth and productivity. In this manner we have achieved considerable progress on some of the most press- ing humanitarian challenges, such as eradicating infectious diseases and making life easier and more convenient. However, we have often put our tools and methods to use with little regard to their systemic or long-term effects, and have thereby created a set of new, inter- connected, and more complex problems. Our new problems require new approaches: new understanding, solution design and interven- tion. Yet we continue to try to solve these new problems with the same tools that caused them. Therefore in my dissertation I ask: How can we understand and effectively intervene in interconnected complex adaptive systems? In particular, my thesis presents through theory and practice the following contributions to addressing these problems: 1. A post-Internet framework for understanding and interven- ing in complex adaptive systems. Drawing on systems dynam- ics, evolutionary dynamics and theory of change based on causal networks, I describe a way to understand and suggest ways to intervene in complex systems. I argue that an anti-disciplinary approach and paradigm shifts are required to achieve the out- comes we desire. 2. Learnings from the creation and management of post-Internet organizations that can be applied to designing and deploying interventions.
    [Show full text]
  • Scaling the Root
    Scaling the Root Report on the Impact on the DNS Root System of Increasing the Size and Volatility of the Root Zone Prepared by the Root Scaling Study Team for the Root Scaling Steering Group Jaap Akkerhuis Lyman Chapin Patrik Fältström Glenn Kowack Lars-Johan Liman Bill Manning Version 1.0 7 September 2009 Executive Summary Until recently the root zone of the Domain Name System (DNS) has enjoyed two important stabilizing properties: • it is relatively small— currently the root zone holds delegation information for 280 generic, country-code, and special-purpose top-level domains (TLDs), and the size of the root zone file is roughly 80,000 bytes; and • it changes slowly—on average, the root zone absorbs fewer than one change per TLD per year, and the changes tend to be minor. The root system has therefore evolved in an environment in which information about a small number of familiar TLDs remains stable for long periods of time. However, the type, amount, and volatility of the information that is contained in the root zone are expected to change as a result of the following four recent or pending policy decisions: • support for DNS security (DNSSEC), or “signing the root”; • the addition of “internationalized” top-level domain names (IDN TLDs); • support for the additional larger addresses associated with Internet Protocol version 6 (IPv6); and • the addition of new TLDs. This report presents the results of a study that was undertaken to determine if, how, and to what extent “scaling the root” will affect the management and operation of the root system.
    [Show full text]