• Title/Summary/Keyword: Infrastructure-free

Search Result 144, Processing Time 0.024 seconds

Paid Peering: Pricing and Adoption Incentives

  • Courcoubetis, Costas;Sdrolias, Kostas;Weber, Richard
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.975-988
    • /
    • 2016
  • Large access providers (ISPs) are seeking for new types of business agreements and pricing models to manage network costs and monetize better the provision of last-mile services. A typical paradigm of such new pricing norms is the proliferation of paid peering deals between ISPs and content providers (CPs), while on top of this, some ISPs are already experimenting with usage-based tariffs, usually through data-plans, instead of the typical fixed-based charging. In this work we define as common platform, the infrastructure in which a single ISP transacts with several CPs through peering agreements. In this context, we examine whether, and under which market conditions, the profitability of the involved stakeholders improves when the establishment of this platform is accompanied by a monetary compensation from the CPs to the ISP (paid peering), v.s. a scenario where their deal is a typical settlement-free one. In both cases, we assume that the ISP implements a usage-based access pricing scheme, implying that end-users will pay more for higher transaction rates with the CPs. Our framework captures some of the most important details of the current market, such as the various business models adopted by the CPs, the end-users' evaluation towards the ISP's and CPs' level of investments and the traffic rates per transaction for the offered services. By analysing the equilibrium derived by a leader-follower game, it turns out (among other practical takeaways) that whether or not the profitability of a CP improves, it highly depends on whether its business model is to sell content, or if it obtains its revenue from advertisements. Finally, we extract that consumer surplus is considerably higher under paid peering, which in turn implies improved levels of social welfare.

Legal Aspects of International Joint Ventures (합작투자계약(合作投資契約)에 관한 법적(法的) 문제(問題))

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.18
    • /
    • pp.159-188
    • /
    • 2002
  • International joint ventures are usually formed and managed by domestic companies and foreign investors for the common objectives. They offer an opportunity for each partner to benefit significantly from the comparative advantages of the other. Local partners bring knowledge of the domestic market; familiarity with government bureaucracies and regulations; understanding of local labor markets; and existing manufacturing facilities. Foreign partners can offer advanced process and product technologies, management know-how, and access to export markets. In Korea, joint ventures have been encouraged to usher in foreign investors with foreign currency capital badly needed during the IMF financial crisis. In the meantime, Korean laws and regulations with respect to joint ventures have been largely overhauled to promote foreign direct investment (FDI) both inbound and outbound. They include four types of FDI, i.e., acquisition of foreign stocks, provision of long-term loans, participation in joint operations like resources development, and establishment of foreign offices. From the legal point of view, the formal joint venture agreement must be an offspring of a series of tough negotiations between domestic and foreign partners. They usually stress the long-term relationship with the good will and dedication to each other, and restrict the free transfer of stocks. Both partners are earnestly interested in the ownership and management of the joint venture. So they keep a close eye on the articles of incorporation, changes of business environment, conflict resolution methods, transparency of accounting and other financial matters. When a multinational corporation (MNC) is involved in the joint venture, conflicts over management strategies, marketing and other issues take place more often than not between the MNC and local partners. We have to pay attention to joint ventures, particularly, in China and North Korea. As witnessed in other transition economies, China is eagerly bringing in foreign direct investments for the development of nation's economy. China encourages foreign investors to establish ordinary joint ventures, contractual joint ventures, solely invested foreign capital companies and jointly operated development companies with local partners. In North Korea, however, joint ventures have a different meaning like contractual joint ventures in China, in which North Korean partners have an initiative in the management. Rather, jointly operated companies or simply processing-for-wage companies are recommended in view of the unpredictable legal infrastructure in North Korea.

  • PDF

The solar photospheric and chromospheric magnetic field as observed in the near-infrared

  • Collados, Manuel
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.31.4-32
    • /
    • 2016
  • Observing the solar atmosphere with ground-based telescopes in the near-infrared has a number of advantages when compared to classical measurements in visible wavelengths. One of them comes from the magnetic sensitivity of spectral lines, which varies as ${\lambda}_g$, where g is the effective $Land{\acute{e}}$ factor of the transition. This wavelength dependence makes the near-infrared range adequate to study subtle spatial or temporal variations of the magnetic field. Spectral lines, such as the photospheric Fe I $1.5648{\mu}m$ spectral line, with a $Land{\acute{e}}$ factor g=3, have often been used in the past for this type of studies. To study the chromosphere, the Ca II IR triplet and the He I $1.0830{\mu}m$ triplet are the most often observed lines. The latter has the additional advantage that the photospheric Si I $1.0827{\mu}m$ is close enough so that photosphere and chromosphere can be simultaneously recorded with a single detector in a spectrograph. The instrument TIP (Tenerife Infrared Polarimeter) has been continuously operating since 1999 at the 70-cm German VTT of the Observatorio del Teide and has been recently moved to the 1.5-m German GREGOR. During all this time, results have been obtained concerning the nature of the weak photospheric magnetic field of the quiet sun, magneto-acoustic wave propagation, evolution with the cycle of sunspot magnetic fields, photospheric and chromospheric magnetic field in emerging regions, magnetic field in chromospheric structures such as filaments, prominences, flares, and spicules, etc. In this talk, I will review the main results obtained after all these observations and mention the main challenges for the future. With its novel polarization-free design and a complete suite of instruments aimed at simultaneous (imaging and spectroscopic) observations of the solar photosphere and chromosphere, the EST (European Solar Telescope) will represent a major world-wide infrastructure to understand the physical nature of all these phenomena.

  • PDF

A Multi-Channel Scheduling MAC (MCS-MAC) Protocol for Wi-Fi Mesh Networks (Wi-Fi 메쉬 네트워크를 위한 다중 채널 스케줄링 MAC (MCS-MAC) 프로토콜)

  • Wu, Ledan;Yang, Jae-Young;Zhou, Yafeng;Jeong, Han-You
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.54-62
    • /
    • 2012
  • A Wi-Fi mesh network providing multi-hop wireless connections based on IEEE 802.11 PHY/MAC technology has recently received a significant attention as a network infrastructure that interconnects RFID systems and wireless sensor networks (WSNs). However, the current IEEE 802.11 contention-based MAC protocol cannot fully utilize the network capacity due to eithor frame collisions or unused network resources. In this paper, we propose a novel multi-channel scheduling MAC (MCS-MAC) protocol for Wi-Fi mesh networks. Under the secondary interference model of Wi-Fi mesh networks, the MCS-MAC protocol can maximize the network throughput via activation of collision-free links that has a maximal link weight. Through the simulations, we show that the throughput of the MCS-MAC protocol is at least three times higher than that of existing MAC protocols in Wi-Fi mesh networks.

System identification of an in-service railroad bridge using wireless smart sensors

  • Kim, Robin E.;Moreu, Fernando;Spencer, Billie F.
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.683-698
    • /
    • 2015
  • Railroad bridges form an integral part of railway infrastructure throughout the world. To accommodate increased axel loads, train speeds, and greater volumes of freight traffic, in the presence of changing structural conditions, the load carrying capacity and serviceability of existing bridges must be assessed. One way is through system identification of in-service railroad bridges. To dates, numerous researchers have reported system identification studies with a large portion of their applications being highway bridges. Moreover, most of those models are calibrated at global level, while only a few studies applications have used globally and locally calibrated model. To reach the global and local calibration, both ambient vibration tests and controlled tests need to be performed. Thus, an approach for system identification of a railroad bridge that can be used to assess the bridge in global and local sense is needed. This study presents system identification of a railroad bridge using free vibration data. Wireless smart sensors are employed and provided a portable way to collect data that is then used to determine bridge frequencies and mode shapes. Subsequently, a calibrated finite element model of the bridge provides global and local information of the bridge. The ability of the model to simulate local responses is validated by comparing predicted and measured strain in one of the diagonal members of the truss. This research demonstrates the potential of using measured field data to perform model calibration in a simple and practical manner that will lead to better understanding the state of railroad bridges.

High-speed internet service as Universal service (초고속 인터넷서비스의 보편적 서비스 지정의 필요성: 융합시대 초고속 인터넷서비스의 확산 방안에 대한 모색)

  • Jung, Nak-won;Kim, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.11-25
    • /
    • 2017
  • The primary purpose of this study is to present the fact that high-speed internet service should be designated as universal service because it becomes an indispensible and crucial service in the modern information society but free market system fails to implement universal service of high-speed internet service. To do so, it theoretically analyses previous works related to the issue of high-speed internet service and universal service in a critical point of view and investigates the current situation that high-speed internet service is not designated as universal service. In conclusion, this paper suggests that high-speed internet service should be included in the scope of universal service, in terms of infrastructure and minimum transmission speed, for the development of democracy and the information society.

Reliability-Based Adaptive Consensus Algorithm for Synchronization in a Distributed Network (분산 네트워크에서 단말 간 동기화를 위한 신뢰도 기반의 적응적 컨센서스 알고리즘)

  • Seo, Sangah;Yun, Sangseok;Ha, Jeongseok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.545-553
    • /
    • 2017
  • This paper investigates a synchronization algorithm for a distributed network which does not have a centralized infrastructure. In order to operate a distributed network, synchronization across distributed terminals should be acquired in advance, and hence, a plenty of distributed synchronization algorithms have been studied extensively in the past. However, most of the previous studies focus on the synchronization only in fault-free networks. Thus, if there are some malfunctioning terminals in the network, the synchronization can not be guaranteed with conventional distributed synchronization methods. In this paper, we propose a reliability-based adaptive consensus algorithm which can effectively acquire the synchronization across distributed terminals and confirm performance of the proposed algorithm by conducting numerical simulations.

Implementation of Multimedia Services in a Mobile Ad-hoc Network (이동 Ad-hoc 네트워크에서의 멀티미디어 서비스 구현)

  • Ro Kwang-Hyun;Kwon Hye-Yeon;Shin Jae-Wook;Park Ae-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.2
    • /
    • pp.45-52
    • /
    • 2006
  • Mobile Ad-hoc Network(MANET) could be applied to various applications by virtue of its characteristics such as self-organizing and infrastructure-free network. This paper proposes a multimedia application service model for MANET, called multi-hop Relay(mRelay) system. It supports a multi-hop communication-based multimedia service interworked with Internet by using an unmanned moving robot with wireless multimedia communication function as a mRelay terminal. The modified AODV routing protocol was applied to the terminal and it was verified that composition and maintenance of mobile Ad-hoc network in mRelay system under the various indoor scenarios were successful and stable multi-hop multimedia services were possible. The mRelay system can be applicable to various application services of mobile Ad-hoc networks.

  • PDF

Impact of Online Learning in India: A Survey of University Students during the COVID-19 Crisis

  • Goswami, Manash Pratim;Thanvi, Jyoti;Padhi, Soubhagya Ranjan
    • Asian Journal for Public Opinion Research
    • /
    • v.9 no.4
    • /
    • pp.331-351
    • /
    • 2021
  • The unprecedented situation of COVID-19 caused the government of India to instruct educational institutions to switch to an online mode to mitigate the losses for students due to the pandemic. The present study attempts to explore the impact of online learning introduced as a stop-gap arrangement during the pandemic in India. A survey was conducted (N=289), via Facebook and WhatsApp, June 1-15, 2020 to understand the accessibility and effectiveness of online learning and constraints that students of higher education across the country faced during the peak times of the pandemic. The analysis and interpretation of the data revealed that the students acclimatized in a short span of time to online learning, with only 33.21% saying they were not satisfied with the online learning mode. However, the sudden shift to online education has presented more challenges for the socially and economically marginalized groups, including Scheduled Caste (SC), Scheduled Tribes (ST), Other Backward Class (OBC), females, and students in rural areas, due to factors like the price of high-speed Internet (78.20% identified it as a barrier to online learning), insufficient infrastructure (23.52% needed to share their device frequently or very frequently), poor Internet connectivity, etc. According to 76.47% of respondents, the future of learning will be in "blended mode." A total of 88.92% of the respondents suggested that the government should provide high-quality video conferencing facilities free to students to mitigate the division created by online education in an already divided society.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.