Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

NET NEUTRALITY final

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Net Neutrality
Net Neutrality
Chargement dans…3
×

Consultez-les par la suite

1 sur 26 Publicité
Publicité

Plus De Contenu Connexe

Similaire à NET NEUTRALITY final (20)

Publicité

NET NEUTRALITY final

  1. 1. PRESENTED BY: BIDISHA BISWAS FALL 2016 – ISQA-8310-002 DATA COMMUNICATIONS Net Neutrality
  2. 2. CONTENTS  What is net neutrality?  Birth and Development of Net neutrality  Reasons for net neutrality  Design  Net neutrality vs mobile networks  FCC’s 2014 Notice of Proposed Rulemaking (NPRM)  Evolution of mobile networks and their effect on net neutrality  Consumer Exploitation  Challenges  Examples  Conclusion
  3. 3. WHAT IS NET NEUTRALITY?  Internet Freedom  Equality of (a) Contents (b) Sites (c) Applications (d) Communications Net Neutrality is the name of the movement to keep the Internet “free and open”.
  4. 4. BIRTH AND DEVELOPMENT OF NET NEUTRALITY  First coined by Columbia university law professor Tim Wu in 2003 in his seminal paper “Network Neutrality, Broadband Discrimination.”  This paper evaluated neutrality between applications, different types of data and traffic at the network infrastructure level  The idea has been developing gradually ever since, and its appropriation by numerous actors with divergent goals has made net neutrality polysemic
  5. 5. REASONS FOR NET NEUTRALITY  No discrimination  Free expression  Privacy  Access to Information  Democratic process  Tool against censorship  Consumer choice  Innovation and competition  Protecting a global Internet
  6. 6. DESIGN Goal ISP should not discriminate packets Techniques (a) End-to-end encryption (b) Neutralizer installation: Hide the IP address
  7. 7. S (source) KM (neutralizer) KS = hash ( nonce, KM, sourceIP) Encryption (neutralizer) Decryption of packet (src) Encrypt destination address (src) Source sends nonce in cleartext to neutralizerKS = hash ( new nonce, KM,sourceIP) KEY SETUP BETWEEN SOURCE AND NEUTRALIZER
  8. 8. Symmetric key Generation Exchange Addresses
  9. 9. PROBLEMS WITH THE DESIGN  Denial of Service (DoS) attacks  Packet discrimination  Good-intentioned discrimination
  10. 10. USER DRIVEN APPROACH
  11. 11. WORKFLOW OF COOKIE ENABLED DEVICE
  12. 12. BOOST
  13. 13. NET NEUTRALITY VS MOBILE NETWORKS Equal Access to internet on equal terms. Is that possible?
  14. 14. FCC’S 2014 NOTICE OF PROPOSED RULEMAKING (NPRM)  Transparency Rule  No Blocking rule  Anti Discrimination rule
  15. 15. EVOLUTION OF MOBILE NETWORKS
  16. 16. WHAT IS LTE?
  17. 17. LTE (LONG TERM EVOLUTION)  Long term Evolution (LTE) is a standard for high speed communication for mobile networks.  It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvements.  LTE is registered trademark owned by ETSI (European Telecommunications Standard Institute) for the wireless data communication.
  18. 18. HOW DOES NET NEUTRALITY AFFECT MOBILE NETWOKS?
  19. 19. CONSUMER EXPLOITATION  Force to used certain services  Block all Peer to Peer Technologies  “Exclusive” Deals with content providers.  Monitor all the online activity.
  20. 20. ARGUMENTS IN FAVOUR OF NET NEUTRALITY  Control of Data  Digital rights and freedom  User intolerance for slow loading sites  Competition and Innovation  Preserving internet standards  End to end principle
  21. 21. ARGUMENTS AGAINST NET NEUTRALITY  Reduction in Innovation and Investments  Counterweight to server side non-neutrality  Broadband infrastructure  Significant and growing competition  Broadband choice  Deterring Competition  Potentially Increased taxes  High costs to entry for cable broadband  Unnecessary regulations
  22. 22. EXAMPLES  MADISON RIVER  COMCAST  AT&T  WINDSTREAM  VERIZON
  23. 23. CONCLUSION
  24. 24. REFERENCES https://edri.org/files/EDRi_NetNeutrality.pdf https://en.wikipedia.org/wiki/Net_neutrality#Definition_and_related_principles http://leftwardthinking.com/learning-example-net-neutrality-violations/ http://www.ctia.org/docs/default-source/default-document-library/net-neutrality-and-technical- challenges-of-mobile-broadband-networks-9.pdf NET NEUTRALITY AND CONSUMER WELFARE by Gary S. Becker, Dennis W. Carlton† & Hal S. Sider. http://faculty.chicagobooth.edu/dennis.carlton/research/pdfs/netneutralityconsumerwelfare.p df http://pubsonline.informs.org.leo.lib.unomaha.edu/doi/pdf/10.1287/isre.2015.0567’ Net Neutrality's Technical Troubles. http://spectrum.ieee.org/telecom/internet/net-neutralitys- technical-troubles A Technical Approach to Net Neutrality by Xiaowei Yang, Gene Tsudik, Xin Liu, Department of Computer Science University of California,Irvine Accessible at https://www.cs.umd.edu/class/spring2007/cmsc711/papers/yang06technical.pdf https://www.cs.columbia.edu/~smb/papers/pushback-impl.pdf Neutral Net Neutrality, Yiannis Yiakoumis, Sachin Katti, and Nick McKeown, Stanford University Accessible at: http://yuba.stanford.edu/~yiannis/docs/sigcomm-neutrality.pdf http://www.rcrwireless.com/20160727/analyst-angle/analyst-angle-net-neutrality-mobile-rise- private-networks-tag9
  25. 25. THANK YOU

×