SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
Going Mobile:
Technology and Policy Issues in the Mobile Internet




                                   Richard Bennett

Information Technology and Innovation Foundation
Going Mobile:
Technology and Policy Issues in the Mobile Internet




               Richard Bennett




                  March 2010
T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n




Table of Contents

       I.      Executive Summary ............................................................................................ 1
       II.     Introduction ......................................................................................................... 7
                  A. Advent of Broadband ............................................................................. 7
                  B. Rise of the Cell Phone ............................................................................ 8
                  B. Convergence ............................................................................................. 8
                  C. Reader’s Guide to the Report ................................................................ 8
       III.    Issues in Internet Design and Operation........................................................ 8
                  A. Brief History ............................................................................................ 9
                  B. Modularity ................................................................................................. 9
                  C. Efficiency ................................................................................................ 11
                  D. Manageability ......................................................................................... 11
                  E. Innovation .............................................................................................. 12
                  F.     Subsidies ................................................................................................. 13
                  G. Specific Example: Inter-Domain Quality of Service....................... 15
                  H. Why the Internet Works ...................................................................... 16
       IV.     Issues in Mobile Network Design and Operation ....................................... 18
                  A. Brief History .......................................................................................... 18
                  B. Modularity ............................................................................................... 19
                  C. Efficiency ................................................................................................ 20
                  D. Manageability ......................................................................................... 20
                  E. Innovation .............................................................................................. 23
                  F.     Specific Example: Voice over LTE ..................................................... 25
                  G. Status of Internet Design and Wireless Networks .......................... 26
       V.     The Mobile Network Infrastructure ................................................................ 26


The informaTion Technology & innovaTion foundaTion | sep Tember 20 09                                                                     page II
T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n

                 A. Essential Parts of the Mobile Network ............................................. 26
                 B. Spectrum ................................................................................................. 27
                          1. Licenses ........................................................................................... 27
                          2. Efficient Use ................................................................................... 28
                          3. Roaming .......................................................................................... 28
                          4. Coordination................................................................................... 28
                 C. Base Station Siting ................................................................................. 29
                 D. Backhaul ................................................................................................... 30
                          1. Technologies ................................................................................... 31
                          2. Specific Examples: GigaBeam and Ceragon ............................. 31
                          3. Backhaul Bottom Line .................................................................. 32
       VI.    Emerging Mobile Internet Applications ....................................................... 32
                 A. Content Delivery ................................................................................... 32
                          1. Example: Kindle ............................................................................ 33
                          2. Benefits of Ubiquity ...................................................................... 33
                          3. Innovation from Differentiation ................................................. 33
                 B.     Wireless VoIP ........................................................................................ 34
                          1. Example: Skype on the 3 Network ............................................. 35
                          2. Example: Other Ways to Skype ................................................... 35
                          3. Economic Implications of Skype ............................................... 36
                 C. Wireless Video Streaming..................................................................... 36
                          1. Example: Video Streaming System: MediaFLO ....................... 37
                          2. Example Video Streaming: MobiTV .......................................... 37
                 D. Mobile Augmented Reality................................................................... 38
                          1. Example: Layar Platform .............................................................. 38
                 E. Internet of Things................................................................................. 38
       VI.    Mobile Internet Policy Issues.......................................................................... 39
                 A. Net Neutrality ........................................................................................ 39
                          1. Transparency-based Net Neutrality Lite .................................... 39
                          2. Transparency................................................................................... 40



The informaTion Technology & innovaTion foundaTion | sep Tember 20 09                                                                  page II
T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n

                           3. Content Freedom........................................................................... 40
                           4. Application Freedom .................................................................... 40
                           5. Reasonable Limits on “Device Freedom” ................................. 41
                           6. Managed Services .......................................................................... 42
                           7. Enabling Innovation...................................................................... 42
                           8. Specific Example: EU Telecoms Package .................................. 43
                           9. Services-Oriented Framework ..................................................... 43
                  C. Spectrum Policy ..................................................................................... 44
                           1. The Value of Open Spectrum ..................................................... 44
                           2. The Limits of Open Spectrum .................................................... 45
                           3. What Licensed Spectrum Does Well .......................................... 46
                           4. Spectrum Inventory and Review ................................................. 46
                           5. Reassigning Spectrum ................................................................... 47
                           6. Future Proofing the Spectrum ..................................................... 48
       VIII. Policy Recommendations .............................................................................. 49
                  A. Stick with Light-touch Regulation ...................................................... 49
                  B. Enact a Sensible Transparency Rule ................................................... 50
                  C. Legitimize Enhanced Transport Services .......................................... 50
                  D. Define Reasonable Network Management........................................ 50
                  E. Preserve Engineering and Operations Freedom .............................. 50
                  F.    Review Existing Spectrum Licenses ................................................... 51
                  G. Eliminate Redundant and Archaic Licenses...................................... 51
                  H. Protect Spectrum Subleasing................................................................ 51
                  I. Cautiously Enable Secondary Uses ...................................................... 51
                  J. Allow the Experiment to Continue ...................................................... 52




The informaTion Technology & innovaTion foundaTion | sep Tember 20 09                                                           page II
T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n




                                                               List of Figures
       Figure 1: Classical Internet Protocol Version 4 Header.......................................... 9
       Figure 2: Hot Potato Routing .................................................................................... 13
       Figure 3: Mobile Technology Summary .................................................................. 17
       Figure 4: Carrier-sensing overhead in an IEEE 802.11g Contention System ... 21
       Figure 5: Carrier-sensing overhead in an IEEE 802.11n Contention System. .. 21
       Figure 6: Deering’s Hourglass ................................................................................... 23
       Figure 7: Internal Architecture of the RACS Model ............................................. 24
       Figure 8: Cell tower disguised in cross by Larson Camoflage .............................. 28
       Figure 9: Internet is a Virtual Network Composed of Physical Networks ....... 29
       Figure 10: Cergagon FibeAir ® IP-10 Switch. ....................................................... 30
       Figure 11: GigaBeam installation providing backhaul for Google’s Mountain
                         View Wi-Fi Network............................................................................. 31
       Figure 12: Amazon Kindle. ....................................................................................... 32
       Figure 13: Skypephone ............................................................................................... 34
       Figure 14: Example of FLO Network..................................................................... 35
       Figure 15: ATSC-M/H Simulcast ............................................................................. 36
       Figure 16: Beatles Discovery Tour starting at Abbey Road.................................. 37
       Figure 17: Licensed LTE is more efficient than license-exempt Wi-Fi. ............. 45
       Figure 18: Novatel Mi-Fi Device. ............................................................................. 47




The informaTion Technology & innovaTion foundaTion | sep Tember 20 09                                                             page II
T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n




                                  Executive Summary



                                    T
                                              en years ago, the typical network experience was limited to
Even with all the network                     dialing-up a walled garden to see if we had mail and then
magic we enjoy today, we’re                   poking around a few familiar parts of the Internet. The ad-
still at a very early stage in      vent of broadband networking changed this dramatically: it sped up
the development of the Mo-          the Web and brought about a host of innovative new applications and
bile Internet. For the Mo-
                                    services. While the Internet was permeating modern life, a parallel de-
bile Internet to achieve its
                                    velopment was taking place that would have even greater significance
full potential policymakers
must do two key things:
                                    for billions of people around the world:                     perience we enjoy today. The flowering
First, they need to refrain         the development of the cell phone. In-                       of the Mobile Internet will only come
from strangling the Mobile          evitably, these two transformative tech-                     to pass, however, when engineering and
                                    nologies began to merge, enabling the                        policy collaborate to successfully over-
Internet with excessive regu-       rise of the Mobile Internet.                                 come the challenges to the develop-
lation, realizing that the well                                                                  ment of a Mobile Internet that lives up
                                    Convergence is now beginning to re-                          to its full potential. For this to happen,
of innovation that brought          build the Web into a personalized, real-                     policymakers must do two key things:
us where we are has not run         time system that responds to the loca-                       First, they need to refrain from stran-
                                    tions, tastes, and whims of billions of                      gling the Mobile Internet with excessive
dry. Second, policy makers
                                    people as they live their lives at their                     regulation, realizing that the well of in-
need to ensure that the mo-         desks, in their living rooms, or moving                      novation that brought us where we are
                                    through the world with the flow of ex-                       has not run dry. Second, policy makers
bile Internet can develop the
                                    perience. Over the next decade, many                         need to ensure that the mobile Internet
infrastructure it needs, the        more people will use the Mobile Inter-                       can develop the infrastructure it needs,
most important part of              net, and it will produce an enormous                         the most important part of which is
                                    array of innovations and quality of life                     spectrum. Policymakers need to make
which is spectrum.                  benefits.                                                    tough choices, transferring spectrum
                                                                                                 from less compelling historical uses to
                                    Even with all the network magic we en-                       the emerging Mobile Internet.
                                    joy today, we’re still at a very early stage
                                    in the development of the Mobile In-                         This report examines changes that must
                                    ternet; with any luck, we’ll look back in                    be made to the Internet and to the mo-
                                    another ten years and wonder how we                          bile network to make the Mobile In-
                                    could ever have been so naïve as to tol-                     ternet a pervasive and universal reality
                                    erate the limitations of the network ex-                     in the United States and the rest of the
world. Some of these changes are purely technical, but       of innovation. We might also expect increased fracture
their scope affects Internet engineering as well as mo-      between mobile applications and stationary ones, in
bile network, device, and application engineering. The       part because the bandwidth gap between the two can
rest of the changes will take place in the policy sphere,    only grow larger. Nevertheless, the benefits of mobility
affecting notions of network neutrality and spectrum         are so great that the rate of Mobile Internet innovation
policy. The examination of technology is quite exten-        is bound to increase beyond anything we’ve seen so far,
sive, and is illustrated with specific examples of emerg-    bandwidth constraints notwithstanding.
ing devices and applications.
                                                             Mobile networks require more extensive management
In order to make effective policy for the mobile In-         and tuning than wired networks, as their capacity is rel-
ternet it’s necessary to understand the development of       atively more constrained and demand for this limited
the Internet, the dynamics of the mobile network, and        capacity is more variable because of roaming. Mobile
how the converged Mobile internet differs from both          networks differentiate packets by application, provid-
of these ancestors. While the traditional Internet and       ing very different routing and processing to voice pack-
the Mobile Internet share some common features, they         ets than to data packets. This differentiated treatment
operate very differently. The traditional Internet was       is a reflection of application requirements; the need for
designed for a small group of low duty cycle, occasional     it will persist after mobile networks are fully integrated
use applications for locked-down computers shared by         with the Internet.
a modest number of highly-skilled, trustworthy users
in a non-commercial setting; but mobile telephony’s          While the design and engineering challenges to the full
heritage is one of real-time communication-oriented          integration of the Internet with the mobile network are
applications, a diverse group of mobile users, and per-      serious, considerable progress has been made and the
sonal devices competing for market share. It’s not sur-      path to success is reasonably clear. The Mobile Inter-
prising that there’s friction between Internet culture       net is already emerging, and with it an exciting new
and mobile culture.                                          category of applications known as Mobile Augmented
                                                             Reality.
The mobile network was originally designed to serve
as an extension of the telephone network that added          Operational challenges to the adoption of the Mobile
mobility at the network edge without altering the tele-      Internet are also well understood, but less easily solved.
phone network’s fundamentals. Initially, it used ana-        Networks operators need to build more base stations,
log technology, and converted to digital in the 1990s.       add more radio sectors to existing base stations, and
Data services were a special feature added on to the         increase backhaul bandwidth. While these challenges
mobile network roughly during the period of its transi-      are relatively simple in the suburbs and exurbs – all it
tion from analog to digital. As presently operated, the      takes is money and accommodating local governments
mobile network is still more efficient at providing tele-    – they’re much more difficult in central cities and in
phone service than data service.                             rural areas. Next generation systems such as LTE con-
                                                             sume more bandwidth than traditional cellular, which
Mobile data rates have doubled roughly every 30              requires a beefed up middle mile. Increased use of fi-
months, as predicted by Cooper’s Law. By way of con-         ber to connect cell towers with operator facilities and
trast, Butter’s Law predicts that the data rate of optical   on to Internet exchanges may have positive spillover
fiber doubles every nine months. Because of this, some       effects for residential broadband as more dark fiber is
have said that wireless is a generation behind wired         deployed.
systems and always will be.
                                                             There are two key policy issues for the Mobile Internet:
This is important because the rate of progress for In-       net neutrality and spectrum. The net neutrality pro-
ternet applications is largely driven by price/capacity      ceeding currently before the FCC – the Open Internet
improvements in physical networking since the Inter-         Notice of Proposed Rulemaking – proposes to envelope
net protocols have been stagnant since 1993. As Inter-       the Mobile Internet within the same, highly stringent,
net use shifts to wireless networks with slower intrinsic    regulatory umbrella as the wired Internet. Harmonized
rates of advance, we might expect a slower overall rate      regulation is philosophically appealing, but has a num-


The informaTion Technology & innovaTion foundaTion | march 2010                                                      page 2
ber of practical drawbacks. If the framework itself        conduct. Second, policymakers should embark on a
were clear and fundamentally sound, a common re-           program of spectrum modernization and expansion
gime would make sense: after all, the Internet is not      to ensure that mobile services can continue to grow.
as much as wired network as a virtual network and          A special focus should be placed on the transfer of
its structure is meant to be technology neutral. How-      licenses from inefficient DTV use to the general pool
ever, if the approach is based on preserving wired net-    of spectrum available for auction.
work operational norms, as it currently is, then the
common umbrella becomes a common straightjacket,           Spectrum modernization should also be employed to
undesirable for both wired and mobile networks.            replace inefficient federal, state and local government
                                                           uses and release unneeded spectrum to an auction
Spectrum policy has historically featured conflict be-     pool. Finally, regulations should encourage technical
tween licensing regimes and unlicensed “Open Spec-         solutions to be developed and deployed that enable
trum” models such as the White Spaces system. With         consumers to obtain the best possible service for the
the parties to this controversy in détente, the focus      best prices. Doctrinaire net neutrality heavy formulas
shifts to the struggle among various license holders.      simply don’t accomplish these ends for mobile net-
The United States unfortunately adopted an obso-           works.
lete standard for Digital TV ten years ago, and has
failed to reap as large a digital dividend as Europe       1. Stick with Light-touch Regulation
and Asia will gain as they transition away from analog     If heavy-handed net neutrality regulation is ultimately
television. Extracting poorly utilized DTV spectrum        bad for investment, deployment, and adoption of wire-
from broadcasters is a daunting challenge that must        line networks, as it is, it is potentially a fatal disaster for
be solved by federal regulators with all the creativity    mobile networks. A key way to ensure that networks
they can muster. It’s unfortunate that TV broadcast-       serve the public interest is through market mecha-
ing casts such a long shadow on mobile networking          nisms based on meaningful competition. The United
at a time when 85% of Americans watch TV over a            States enjoys among the most competitive intermodal
cable or satellite system and few of the over-the-air      wireline broadband and even stronger wireless com-
subscribers watch on HD screens. The broadcast             petition, with four national wireless networks, as well
filibuster can be mitigated by offering incentives for     as a number of regional networks and Mobile Virtual
broadcasters to share spectrum with each other and         Network Operators (MVNOs) such as Virgin Mobile.
give back the excess for auction, and by modernizing       Fixed wireless networks such as Clearwire and the
government’s spectrum use.                                 emerging LTE system are both reasonable substitutes
                                                           for wired broadband, and the two satellite networks
The general approach we recommend is for the gov-          are in the process of upgrading capacity significantly.
ernment to facilitate the Mobile Internet by remov-        Competition can be made more effective by ensuring
ing impediments to further build-out and adoption.         there are minimal delays in switching between mobile
Speculative fears have played too large a role in the      providers.
Internet regulation debates of the last decade, and
it’s more productive to shift the emphasis toward the
government’s role in facilitating progress.                2. enact a Sensible Transparency Rule
                                                           Just as a well-functioning democracy requires an in-
First, it would be a mistake to impose the “net neutral-   formed citizenry, a well-functioning network eco-
ity heavy” guidelines on either wired ISP networks or      system requires its well-informed and honest critics.
mobile networks. Rather than enacting overly pre-          While the new European Internet transparency rule
scriptive regulations banning experiments with new         is too new to be judged a complete success, it repre-
transport services and business models, the FCC            sents a promising direction for which there is broad
should rely primarily on transparency and disclosure       consensus. There is still disagreement regarding the
to protect consumers from speculative harms, main-         specific nature of required disclosure, which is un-
tain active oversight of provider practices, and reserve   derstandable given the complexity of network sys-
direct intervention for instances of clearly harmful       tems and the gap between consumer awareness and



The informaTion Technology & innovaTion foundaTion | march 2010                                                          page 3
technology. The challenge for a transparency rule is          the market for video streaming and telephony. If ISPs
to disclose the things that must be disclosed in order        who operate the so-called “eyeball networks,” includ-
for users to gauge the experience they’ll have on any         ing wireless mobile Internet services, serving retail
given part of the Internet ecosystem in terms the aver-       customers are permitted to compete with CDNs and
age person can understand, while making additional            Overlays, new application entrants can expect lower
information available to the audience of technologists        prices and more competition, and end users can expect
and policy analysts. Certain details of practice repre-       a wider array of options, especially among mobile ap-
sent trade secrets and need not be disclosed; the means       plications.
by which a particular user-visible effect is produced
are less important than the effect itself. One approach       5. preserve engineering and Operations Freedom
that recommends itself is the co-regulatory approach          The primary emphasis of the Open Internet NPRM’s
championed by Marsden, in which stakeholders con-             framework of rules is on the preservation of users’ free-
vene with the regulator to draft specific guidelines.         dom to experience the Internet as they see fit, without
Toward that end, we encourage stakeholders to form            arbitrary limitations. A key way to preserve this free-
a working group to advise the FCC on the particulars          dom is to address the dynamics of technical freedom
of disclosure.                                                that make it possible. Users experience the Internet as
                                                              they do now because engineers, network operators,
3. Define Reasonable Network Management                       and application innovators have been free to improve
The transparency rule, and its specific implementa-           networks, network technology, and user experience.
tion, provides insight into the boundaries of reason-
able network management practices. While the use of           Toward that end, the NPRM should make it clear noth-
the term “reasonable” without definition is impossibly        ing in the FCC’s approach denies the freedom to in-
vague, anchoring management practices to service dis-         vent, develop, and adopt new networking technologies,
closure resolves a great deal of the mystery. We know         business models, and practices that have the potential
that a practice is reasonable if it does what the operator    to enhance the Internet’s power, efficiency, vitality, or
says it does, conforms to standards devised by respon-        effectiveness.
sible bodies such as IEEE 802, IETF, and the ITU,
and doesn’t violate basic user freedoms. We know that
it’s unreasonable if it fails to accomplish its stated pur-   The FCC should consider adding two additional principles to its
poses, arbitrarily restricts the use of applications, or      list: Engineering Freedom and Operations Freedom.
restricts basic user rights. Beyond these general guide-
lines, a Technical Advisory Group must work with the
                                                              To operationalize this, the FCC should consider adding
FCC to develop additional clarity regarding manage-
                                                              two additional principles to its list: Engineering Free-
ment boundaries and help advise on a case-by-case ba-
                                                              dom and Operations Freedom. The telephones that
sis when needed.
                                                              worked on the PSTN in the first year of the Carterfone
                                                              regime still work 35 years later. If the cell phones we
4. Legitimize enhanced Transport Services
                                                              use today are still usable on the mobile network 35 years
There is widespread agreement among filers in the             from now (or even ten years from now), that should be
FCC’s Open Internet NPRM that differentiated ser-             regarded as a failure of innovation. The Mobile Inter-
vices for differentiated fees are legitimate in their own     net is driven by an ethic of continual improvement and
right, and not simply as an adjunct to network man-           this principle more than any other must remain in the
agement. Similar services have a long history on the          forefront. Thus, we propose two additional rules for
Internet, where they are known as Content Delivery            the Open Internet NPRM:
Networks, Overlay Networks, and Transit Networks.
The logic of “pay more to get more” has long been                 	 No   part of this regulation shall be con-
accepted practice. These practices have proved worth-             strued as limiting the freedom of network en-
while for content resellers and application service pro-          gineering to devise, develop, and deploy tech-
viders such as Netflix and Skype, so it stands to reason          nologies to enhance the Internet or to improve
that they would be beneficial for future competitors in           user experience.



The informaTion Technology & innovaTion foundaTion | march 2010                                                             page 4
	   No part of this regulation shall be con-            are experimental ones renewable day-by-day. Proven
    strued as limiting the freedom of Internet               applications can be rewarded under this system with
    Service Providers, other network operators, or           license of longer duration.
    other service providers to devise new finan-
    cial or business models that better align user           In addition, spectrum grants for DTV greatly exceed
    incentives with those of network operators or            consumer demand and should be reduced in the pub-
    application-based service providers without              lic interest with the freed up spectrum auctioned off.
    limiting user choice.                                    Spectrum policy should respect the public’s evident
                                                             wishes and make more spectrum available for Mobile
These rules make it clear that innovation is the engine      Internet services for which demand is growing.
that best ensures the Internet’s continued public val-
ue.                                                          8. protect Spectrum Subleasing
6. Review existing Spectrum Licenses                         Secondary markets for licensed spectrum enabled by
The FCC needs to complete its inventory of the licens-       resale and subleasing have proved useful in the U. S.,
es it has issued over the years, and implement a system      where dozens of Mobile Virtual Network Operators
that eliminates or reduces ambiguity about licenses go-      (MVNOs) lease capacity from license holders and
ing forward. If it’s true that the FCC has somehow lost      roaming agreements permit licensees to share capacity.
track of some licenses, as some have suggested, this         These kinds of secondary markets are also useful in the
error should be corrected. It’s simply not acceptable        microwave backhaul and point-to-point space where a
for the national regulator of wireless networks to lose      given license holder can adjust microwave paths with
track of issued licenses. Legislation to create a national   relays and dogleg arrangements to accommodate most
spectrum map introduced by Sen. Kerry (D-MA) and             effective use. Therefore it is important for policy to
Sen. Snowe (R-ME), is a step in the right direction.         permit the trading and leasing of most licensed spec-
                                                             trum.
7. eliminate Redundant and archaic Licenses                  9. Cautiously enable Secondary Uses
Once the license inventory is complete, it will be possi-    One area of controversy concerns such secondary uses
ble to examine licenses to determine which are unused,       as wireless underlay and overlays on licensed spectrum.
which are redundant, and which can be combined with          Advocates insist that such uses are non-interfering
others to free up spectrum for auction or other kinds of     with properly restricted, and license holders are skepti-
assignment. Part of this process will entail reassigning     cal. The reality is that the nature of the interference
some occasional uses to the control of other agencies,       caused by overlay networks such as Ultra-Wideband
license holders, or custodians of other kinds. Rarely        depends on the nature of the incumbent service. Ultra-
used public safety applications can be combined with         Wideband interferes, in some installations, with highly
consumer services, for example, by allowing public           sensitive applications such as radio astronomy, but this
safety uses to take precedence in times of emergency.        fact is known and the Ultra-Wideband waveform is ad-
The general principle that should hold in the process        justed accordingly. When the details of the incumbent
of review is modernization, replacing archaic analog         service are known, in terms of coding, modulation,
applications with more spectrum-efficient digital ones.      and framing protocols, overlay and underlay services
No single approach to spectrum management exceeds            can be engineered for cooperation without interfer-
all others in terms of general utility, but there should     ence. Nevertheless, when details of the primary service
be a bias in favor of spectrum custodians in either the      change, interference may arise anew. For this reason,
public or the private sector with vested interests in ef-    all secondary uses should be required to back off and
ficient use. Sufficient spectrum exists, in principle, to    even shut down completely until they can be certified
meet projected user requirements for mobile network-         as non-interfering with the primary license holder.
ing. There is not sufficient spectrum that we can af-        The principle use of secondary services should be in
ford to waste large swathes on speculative projects of       areas where the primary user is not active; this is the
uncertain utility, however. A reasonable approach is         logic behind the Dynamic Frequency Selection (DFS)
embodied in the White Spaces order, where all licenses       system in IEEE 802.11a Wi-Fi. This system requires



The informaTion Technology & innovaTion foundaTion | march 2010                                                     page 5
Wi-Fi systems to look for the use of radar on certain
channels, and to refrain from using channels where ra-
dar is found.

In all cases, the burden falls on the secondary user
to avoid causing interference with the primary user.
Systems of enforcement for this principle need to be
incorporated into all secondary use regulations; the
White Spaces database has this capability.

10. allow the experiment to Continue
The Internet as we know it today is the fruit of a 35-
year experiment. In the beginning, it was the proto-
typical science project, albeit one with government
support shepherded by a highly skilled and dedicated
band of researchers, champions, and developers out to
prove that a new vision of networking was not only
practical but superior to the old one.

The mobile data network has a completely different
creation story, originating in a commercial context and
targeted toward adding an important new feature to
the existing network without fundamentally altering
its nature.

Each of these networks has a story, a set of champi-
ons, and a vision. Each has been transformative in its
own way, giving rise to its own industry, and liberating
some vital element of human society along the way. It’s
not surprising that the convergence of these networks
should occasion debate and conflict, some of it intense
and heated.

The way forward requires some give and take. It’s not
enough to impose the Internet’s operational traditions
on the mobile network, because the Internet’s opera-
tional community has chosen not to adopt the Internet
standards most relevant to mobile networking: RSVP,
IntServ, and Mobile IP. It’s not enough for mobile op-
erators to demand that Internet users abandon open
access to the web at reasonable speeds in favor of a
constrained system of locked-down portals and prox-
ies. Each culture has things to learn from the other.

The way forward is a careful, diligent, step-by-step
process beginning with reviews of historical rules and
precedents and ending in the creation of a new frame-
work that will enable the next generation of network-
ing to flourish. The evidence of an emerging consensus
among responsible parties in the United States and Eu-
rope suggests it’s well underway.


The informaTion Technology & innovaTion foundaTion | march 2010   page 6
Going Mobile: Technology and Policy Issues in the
 Mobile Internet



T
         en years ago, the typical American             advent of Broadband
                                                        The advent of broadband networking changed this
         used the Internet through a dial-              system in many ways: it sped up the Web and brought
         up modem. Going on-line was a                  indexers and mapmakers like Google and Yahoo! into
                                                        the picture. It made e-mail a more useful, always-on
dramatic event accompanied by a full range              system, and it changed the choice formula for ISPs.
of sound effects as the modem spat out a se-            Instead of dozens of places to buy an equivalent low-
                                                        speed service, we had a smaller number of broadband
ries of tones to make a connection and then             ISPs, but their service differences were real, and they
                                                        actually competed on quality as well as price. More-
exchanged screeches and whirs with the an-              over, with the advent of broadband, the Internet began
swering modem to assess the telephone net-              to create different kinds of applications, such as the
                                                        Voice over IP (VoIP) systems from Vonage and Skype
work’s signal quality. With luck, the network           that lowered our phone bills and systems like Napster
might support 48 Kbps downstream and 33                 and KaZaA that magically provided us with free enter-
                                                        tainment (we later found it was pirated, of course.)
Kbps upstream. The Internet Service Pro-
                                                        Technically, it wasn’t hard to bring VoIP to an Inter-
vider (ISP) industry was still emerging, and            net dominated by the Web. VoIP is a narrowband ap-
more likely than not the early Internet con-            plication that scarcely consumes more bandwidth than
                                                        a dialup modem. The technical demands of web surf-
sumer dialed-in to a walled garden system               ing are greater – all those pictures to download – but
such as America On-Line or CompuServe.                  web surfing is on-again, off-again from the network’s
                                                        point of view. Web pages require human time to read,
The primary application of the day was e-               and while that’s going on, the network has capacity to
                                                        spare. Adding VoIP to this system was just like pouring
mail, but the adventurous explored Usenet               sand into a bucket of rocks. There was plenty of room
discussion groups and tried this new thing              to spare as long as we weren’t too carried away with the
                                                        free entertainment on The Pirate Bay.
called The Web. The Web was challenging
because it didn’t have a map, the pages were            From the consumer’s point of view, the transition
                                                        from dial-up to broadband was perfectly seamless.
full of strange acronyms and opinions, and              With broadband the web got faster, applications be-
                                                        came more enjoyable, and eventually the Internet be-
pictures dribbled onto the screen at a snail’s          came more or less indispensible, despite the nuisance
pace. Surfing the web was like wandering                of spam and the occasional virus. We were no longer
                                                        locked-in to the small community on AOL; we could
the public library with your eyes closed and            be inspired as well as irritated by people all over the
picking books off the shelf at random: al-              world and we had much of the world’s vast stores of
                                                        information, commerce, learning, and cultural heritage
ways unexpected.                                        at our fingertips.



The informaTion Technology & innovaTion foundaTion | march 2010                                               page 7
Rise of the Cell phone                                         whims of billions of people as they live their lives, at
While the Internet was permeating modern life, a par-          their desks or moving through the world with the flow
allel development was taking place that would have             of experience.
perhaps even greater significance for billions of people
all over the world. On April 3, 1973, Martin Cooper,           Even with all of network magic we enjoy today, we’re
the general manager of Motorola’s Communications               still at a very early stage in the development of the Mo-
Systems Division, had placed the first telephone call          bile Internet; with any luck, we’ll one day look back
ever from a portable cell phone. By the turn of the            to where we are today the same way we remember the
century, cell phones were common business tools, and           dial-up era, wondering how we could ever have been
they eventually became the preeminent global means             so naïve as to tolerate the limitations of the bygone era.
of personal communication at a distance. For billions          The flowering of the Mobile Internet will only come
of people in the undeveloped world, the cell phone was         to pass, however, when engineering and policy col-
the first telephone they ever had, and it quickly became       laborate to successfully overcome the major challenges
the indispensible means of communicating.                      standing in the way of the development of a Mobile
                                                               Internet that lives up to its full potential. For this to
Inevitably, these two transformative technologies be-          happen, policymaker must refrain from strangling the
gan to merge, giving rise to an ocean of social and eco-       Mobile Internet with excessive regulation.
nomic benefits and to a host of policy challenges. The
Internet had a legacy of distributed computers, open           Reader’s guide to the Report
systems designed around end-to-end arguments, a reflec-        This report consists of two major parts, the first on
tion of its heritage as a tool originally built to stimulate   technology and the second on policy. The technology
academic research in the new communications tech-              section is a deep dive into the history and develop-
nology known as packet switching.2 Cellular telephony          ment of both the wired Internet and the mobile net-
had a more humble legacy, as it simply aimed to extend         work, ending in an explanation of the way the mobile
the reach of the existing telephone network, not re-           network connects to the Internet. The information in
place it wholesale with a bombproof alternative.               these sections informs the policy discussion that fol-
                                                               lows by showing implications that policy choices have
Convergence                                                    on technical evolution. At the conclusion of the tech-
From the engineering viewpoint, the cell phone net-            nology section, the patient reader is rewarded with a
work and the broadband Internet could hardly be                palate-cleansing glimpse at new and emerging applica-
more different: one is mobile, the other locked-down           tions before the report turns fully to policy matters.
in space; one is high capacity, the other narrowband;
one is personal and intimate, involved in relation-            One of the challenges the Mobile Internet faces is the
ships where “content” doesn’t exist until the moment           reconciliation of the norms of two technical cultures
it’s communicated, the other is part of a wide-open,           that have always seen the world in different ways. C.
always-on system that pulls information from multi-            P. Snow was much too optimistic when declared there
ple sources at once, and one is built around portable          was a single technical culture; in fact, with respect to
battery-powered devices, while the other draws power           the mobile Internet, there are two. The other policy
from a plug.                                                   challenge relates to radio spectrum, which has various-
                                                               ly been called the lifeblood, the oxygen, and the energy
People now want both the Internet and mobility, so             of the Mobile Internet. The report concludes with a
it became necessary to bring the Internet to the cell          series of recommendations for policymakers on the key
phone, just as it had once been brought to the home            issues before them in the United States.
phone, and vice versa. The mobile Internet borrowed
some of Steve Jobs’ pixie dust and transformed the cell        ISSUeS IN INTeRNeT DeSIgN aND OpeRaTION
phone into a smartphone, and then expanded the mo-             There’s a tendency to view the Internet as a force of na-
bile network from narrowband to broadband. It’s now            ture, something that sprang up spontaneously. In fact,
beginning to rebuild the Web into a personalized, real-        it’s a man-made system was designed by engineers in a
time system that responds to the locations, tastes, and        cultural context that could easily have been designed



The informaTion Technology & innovaTion foundaTion | march 2010                                                        page 8
Figure 1: Classical Internet protocal Version 4 Header
                0         4           8                    16                 19                             31

                  Version     IHL         Type of Service                          Total Length

                               Identification                      Flags                 Fragment Offset

                     Time To Live               Protocol

                                                      Source of IP Address

                                                     Destination IP Address

                                                    Options                                        Padding


differently. The different orientations of the Internet’s         IP is very simple, and is in fact is more a format than
“Netheads” and the telephone network’s “Bellheads”                a protocol since it doesn’t describe any specific se-
are the source of much unnecessary conflict. Often-               quences of behavior; it’s easily implemented over any
times it seems that members of these tribes disagree              packet-switched network. TCP, on the other hand, is a
with each other for the sake of it, but most of their en-         complex, high performance system that can keep mul-
gineering differences are related to the relative impor-          tiple packets in flight between source and destination,
tance of different kinds of applications within their             a crucial requirement of high delay satellite networks.
networks.                                                         TCP is easily an order of magnitude more complex
                                                                  than the rudimentary end-to-end protocols of the day
Brief History                                                     such as IBM’s Binary Synchronous Communications
The Internet was conceived in the early- to mid-                  and ARPANET’s Network Control Program.
1970s to interconnect three research networks: AR-
PANET; the San Francisco Bay Area Packet Radio                    The Internet design team allocated functions as they
Network (PRNET); and the Atlantic Packet Satellite                did in order to provide the greatest opportunities for
                                                                  experimentation with network protocols. Subsequent-
Net (SATNET).3 By 2010 standards, these constitu-
                                                                  ly, researchers developed end-to-end arguments aligning
ent networks were very primitive; each was the first
                                                                  such function placement with a general theory of dis-
of its type and computer technology was much less
                                                                  tributed system design, and in so doing inadvertently
advanced than it is today. Each was built on a differ-
                                                                  generated elements of the policy argument that has
ent technology, and each was separately administered.
                                                                  come to be known as network neutrality. End-to-end
As the operational parameters of these networks var-              in the hands of the policy community has very differ-
ied radically, designers of the Internet protocols, led           ent implications than it has in the engineering world.6
by ARPA’s Bob Kahn and Vint Cerf, couldn’t rely on
network-specific features to pass information between             Modularity
networks; instead, they adopted a lowest common de-               The Internet is a collection of separate, replaceable ele-
nominator approach for the Internet Protocol (IP),                ments called “modules” by engineers; its overall struc-
the “datagram” network abstraction borrowed from                  ture has been described by philosopher David Wein-
France’s CYCLADES network.4 In order to match                     berger as “small pieces loosely joined”.7
the speeds of sending and receiving stations (called
“hosts,” following timesharing terminology), the de-              Modular design decomposes a technical system into
signers developed a sliding window overlay above IP               functions that can be implemented in separate compo-
called Transmission Control Protocol (TCP) that con-              nents called “modules”. “Platforms” such as the Web
formed to the model established by the CYCLADES                   are collections of modules. This strategy, sometimes
Transfer Station protocol.5                                       called “divide and conquer,” has a number of benefits.



The informaTion Technology & innovaTion foundaTion | march 2010                                                            page 9
It enables functions to be specified, developed, and         RFC 795 specified the interpretation of the Type of
tested in isolation from the rest of the system, facili-     Service field by ARPANET, PRNET, SATNET, and
tates reuse of modules in different systems, and makes       AUTODIN II.9 Because the Internet design delegates
it easy to improve the implementation of a function          such matters as service differentiation to physical net-
without destabilizing the entire system.                     works, a myth has developed to the effect that the In-
                                                             ternet is a “stupid network” that can’t differentiate. In
Modular design is practiced in a number of technical         fact the Internet leaves all functions not directly perti-
fields, including computer science and network engi-         nent to cross-network packet formatting and payload
neering. As the seminal work on modular computer             processing to individual networks; the Internet is not
systems design was presented at the same forum as the        hostile to service differentiation, but differentiation is
seminal work on the design of ARPANET, it’s fair to          outside the scope of internetworking.
say that modular computer systems and the Internet
developed hand-in-hand.8                                     Modular design separates functions and creates design
                                                             hierarchies. Modular systems such as the THE multi-
Internet design begins by distinguishing internetwork-
                                                             programming system and the Internet protocols orga-
ing from networking, thus confining the Internet’s role
                                                             nize vertically, into higher-level and lower-level func-
to interconnecting networks rather than providing ba-
                                                             tions, where dependency increases with altitude.
sic network services. This important element of Inter-
net design often escapes policy advocates, who mis-          The Internet’s modular design produces benefits for
takenly believe that the Internet specifies a particular     innovation by creating platforms that simplify applica-
method of network operation. An Internet is a virtual        tion development. Just as physical networks are plat-
network (or a “meta-network”) that works with net-           forms for IP datagrams, IP datagrams are a platform
works as they are, imposing a minimal set of require-        for TCP, which in turn is a platform for the web, which
ments.                                                       is a platform for Facebook, which serves as a platform
The Internet doesn’t care whether a member network           for Facebook applications. Each platform simplifies
is public or private, fair or unfair, fast or slow, highly   the creation of new applications by managing aspects
reliable or frequently broken. The operator of an In-        of the application, but this simplification comes at a
ternet member network may route all packets on equal         cost in terms of efficiency.
terms, and he or she may differentiate.
                                                             Internet modularity preserves the opportunity for ex-
IP was initially designed to preserve service informa-       perimentation on applications that take the Internet as
tion that may have had no meaning outside a particular       a platform, and on the elements of the Internet itself,
member network, such as the Type of Service specified        such as TCP, IP, and the systems of naming, routing,
in bits 8 – 15 of the IP header and subsequently rede-       and security.
fined by the Differentiated Services protocol.



    MINI-TUTORIaL: WHy IS INTeRNeT DOWNLOaDINg FaSTeR THaN UpLOaDINg?
    Each of the 1.6 billion Internet users in the world relies on fewer than 1,000 Internet Exchange Points or
    IXPs to get from one network to another. Between the consumer and the nearest IXP are a number of
    switches that “aggregate” or combine packets sent on lower speed data links onto higher speed data links.
    In the opposite direction, each of these switches “disaggregates” or un-combines. The number of times a
    wire can be aggregated is limited by the speed of the fastest technology the IXP can buy, and by the number
    of networks the IXP can interconnect. Currently, most IXPs interconnect ISP networks at 10 Gbps. Upload
    speed is therefore limited by the Internet’s traditional methods of operation. High-speed Content Delivery
    Networks don’t aggregate as much as large ISP networks, so their upload speeds are faster than those of
    ordinary consumers.




The informaTion Technology & innovaTion foundaTion | march 2010                                                     page 10
MINI-TUTORIaL: IS THe INTeRNeT a FIRST-COMe, FIRST-SeRVeD NeTWORk?
    Many advocates of anti-discrimination regulations insist that the Internet has always handled all packets on
    a first-in, first-out basis. This common simplification has never been true. Internet edge routers, the devices
    that connect ISP networks to the Internet core, are typically configured to apply a “weighted fair queuing”
    algorithm across either packet streams or users to ensure fair and equal access to common resources. Simply
    put, fair queuing systems select packets from each user in round-robin fashion. Advocates of the first-in, first
    out rule confuse the reality of network management with the simplified public story.



efficiency                                                     of applications to transfer information quickly. It also
The design of the Internet generally sacrifices effi-          contains a feature called “multiplicative backoff” that
ciency to flexibility, as one would expect in a research       divides the application’s self-imposed bandwidth quota
network.                                                       in half in response to each indication of congestion.
                                                               The net result of these features is to prevent Internet
The separation of functions required by modular de-            core data links (communication circuits) from utiliz-
sign tends to reduce system efficiency by partitioning         ing more than 30 percent of designed capacity.11 Given
information, increasing generalization, and imposing           that Moore’s Law has caused data links to become
interface costs. An application that relies on a platform      cheaper and faster since this system was deployed, its
function for authentication, for example, has to request       benefits in terms of stability outweigh its inefficiency.
and wait for authentication services from the platform.        The same calculus does not apply to wireless data links,
As the platform is more general than the application,          however.
its way of performing authentication may require more
processing time than the application would require if
                                                               Manageability
it performed this task itself; the benefit is that the ap-
                                                               The Internet is relatively weak in terms of manage-
plication programmer doesn’t need to worry about au-
                                                               ability, in contrast to its constituent physical networks.
thentication and can focus on the more unique aspects
                                                               ARAPNET was managed from a central control point
of application logic.
                                                               in Cambridge, Massachusetts, where operators were
Modular organization lends generality to systems,              able to view the status of each separate data link from
simplifying higher-level components, but in so doing           a single console, as PSTN operators can do. The In-
increases the information-processing burden. In most           ternet standard for network management, the Simple
cases, this is a reasonable tradeoff: skilled system pro-      Network Management Protocol (SNMP) relies on a
grammers are highly paid, and hardware components              system for viewing and modifying the state of physical
are cheap; modularity reduces the number of software           network components that hasn’t responded well to se-
bugs; and modular systems can re-use components                curity challenges or the sheer growth in the Internet’s
developed and verified in other systems. In cases              size, although it has proved helpful in tracking down
where efficiency is a paramount goal, modularity can           cybercriminals in some cases.12 SNMP is dependent in
be a burden if the system is not so well designed that         any case on physical network facilities. In response to
modules are partitioned exactly according to natural           SNMP’s weaknesses, the members of the Broadband
boundaries.                                                    Forum (mainly network operators) have devised an al-
                                                               ternative system more aligned with the security norms
There are many examples of the Internet’s inefficiency         of telephone network management, TR-069.13
in action. The best well-known concerns the Internet’s
congestion control system, implemented between in-             The elements of the Internet unique to internetwork-
terior IP routers and end-user systems.10 This system          ing, principally routing and the information exchanges
requires new connections to begin in a low through-            that make routing possible, are handled by IETF stan-
put condition called “slow start,” defeating the desire        dards such as Border Gateway Protocol (BGP). BGP



The informaTion Technology & innovaTion foundaTion | march 2010                                                        page 11
was thrown together hastily in order to allow the tran-      It’s likely that significant changes are coming to the
sition of the Internet from the subsidized NSFNET            Internet in order to improve basic manageability, espe-
backbone to the current system where for-profit enti-        cially in the routing function, so historical limitations
ties provide network interconnection and packet tran-        in BGP shouldn’t drive the network regulation debate
sit. While BGP had the ability to assign and exchange        one way or another. Moreover, advances in congestion
QoS information in routes, it was very rudimentary           management are likely to connect economics with the
due to unresolved research questions and “political”         resolution of micro-congestion events. This is a rea-
issues.14 Fundamentally, the problem of network-wide         sonable approach for a user-financed Internet.
QoS was complex and network operators were unmo-
tivated to solve it in 1989 absent a compelling applica-     Innovation
tion need. Lackluster support for QoS routing and the        The Internet has unquestionably served as a tremen-
predominance of a single application slowed the devel-       dously successful platform for innovation. Economic
opment of large-scale QoS across the public Internet,        powerhouses such as Google, Amazon, Yahoo!, eBay,
which is one reason that net neutrality advocates in-        Facebook, Twitter, Skype, and YouTube are household
sist that the Internet is a “best-efforts network.” BGP      names thanks to the Internet, and some have become
doesn’t alter the nature of IP, however, and there are       verbs in official dictionaries.18 Successful Internet in-
ways around the initial limitations in BGP regarding         novations are typically file transfer-oriented web ap-
QoS.
                                                             plications.19 Even video streaming, the Internet’s tele-
                                                             vision analogy, is implemented on YouTube and Net-
BGP is in crisis, according to a report issued by the
                                                             flix “Watch Instantly” as a file transfer, which is why
IETF’s Internet Architecture Board Workshop on
                                                             traditional “trick play” VCR features such as fast for-
Routing and Addressing in 2007.15 The transition to          ward and rewind function so poorly on these systems.
IPv6 and the onrush of new mobile users place re-            Communication-oriented innovations such as Skype
quirements on Internet edge routers that exceed the          and other VoIP services don’t follow the file transfer
pace of progress in fundamental computer hardware            paradigm, but their share of the innovation space (as
technology.                                                  well as their contribution to total Internet traffic) is
                                                             relatively small.
The Internet architecture and protocols also lack di-
rect facilities for dealing with malicious behaviors such    Web applications have predominated as long as the
as bandwidth hogging and Denial of Service attacks,          Internet has been a mass phenomenon, so the innova-
which it relegates to network operators, IP routers,         tion barrier that new systems have had to overcome is
firewalls, and Network Address Translators. The ar-          co-existence with the web. This hasn’t been difficult.
chitecture needn’t address these issues since the con-       Like sand poured into a bucket of rocks, VoIP uses the
stituent networks are perfectly capable of handling          capacity that the web can’t consume because of the on-
them on their own. Some advocates insist that the            again, off-again “episodic” nature of web access.
Internet’s architecture makes “discrimination” impos-
sible.16 It’s difficult to see where this naïve idea comes   Because it takes human time to read web pages, the
from, since every IP datagram displays source and des-       web generates short periods of network activity fol-
tination IP addresses, and IP’s most common payload,         lowed by long periods (in computer terms anything
TCP, prominently displays a destination port number          over a millisecond can be considered “a long time”) of
clearly identifying the application protocol.17 Most IP      inactivity. VoIP is an adaptable, persistent, narrowband
payload is carried in clear text, so this information is     application that can run with an average allocation of 4
discernable to anyone with access to a shared network        to 100 kilobits per second; it easily finds transmission
link and an off-the-shelf protocol analyzer such as          opportunities on all but the most overloaded broad-
Wireshark. The clear-text IP format is practically an        band facilities.
invitation to discriminate.




The informaTion Technology & innovaTion foundaTion | march 2010                                                    page 12
Figure 2: Hot potato Routing




VoIP didn’t have any major problems on the Inter-            to see more instances of friction between applications
net until a second non-web category of innovation            such as Skype and BitTorrent. Some advocates who
emerged, peer-to-peer file transfer. Peer-to-peer appli-     looked backwards can try to pretend that these con-
cations such KaZaA and BitTorrent, used mainly for           flicts are not real, but they are and they will test the
piracy,20 have an appetite for bandwidth that exceeds        ability of the regulatory system to respond effectively,
that of VoIP and the web by several orders of magni-         and its record thus far does not inspire confidence. For
tude: The typical web page is 130 kilobytes, while the       example, the FCC’s ruling on petitions filed against
typical pirated video ranges from 350 to 1,400 mega-         Comcast by peer-to-peer indexer Vuze, Inc. and a host
bytes per hour, depending on resolution.21 The typical       of law professors and public interest groups in 2007
peer-to-peer transaction is equivalent to loading two        was troubling on both factual and legal grounds, and is
web pages per second for an hour or two.                     likely to be overturned by the courts.23

Peer-to-peer also fills the spaces between the Internet’s    Moreover, on today’s Internet, most innovation fric-
rocks – the idle periods between web accesses – and          tion takes place between some applications and other
makes VoIP a challenging application, and it continues       applications, not just between applications and network
to do so after the user has downloaded a particular file     operators. The net neutrality movement’s exclusive fo-
since it is both a file server and a download client. His-   cus on operator behavior obscures this very important
torically, the Internet has relied on the good will and      fact.
good behavior of end users to prevent the instances
of congestion that can cause applications to fail, but       Subsidies
peer-to-peer design chooses not to comply with these
voluntary norms of conduct.22                                The Internet’s current business models effectively sub-
                                                             sidize content-oriented innovation. Packet routing fol-
As innovation seeks opportunities beyond the web             lows a model that assigns the lion’s share of informa-
paradigm and applications diversify, we should expect        tion transfer costs to the ISPs that are content receiv-




The informaTion Technology & innovaTion foundaTion | march 2010                                                   page 13
ers, rather than content creators and middlemen. As          mediate customers do in fact pay most of the costs of
IETF member Iljitsch van Beijnum explains:24                 transporting packets across the Internet. In this sense,
                                                             it’s somewhat analogous to how consumers pay the
   Unless you go out of your way to make things hap-         Post Office to have a package shipped to their house
   pen differently, Internet routing follows the early       that they bought online or in a catalog: on the Internet,
   exit or “hot potato” model: when traffic is destined      users “order packets” from other places and pay for
   for another network, it gets handed over to that net-     most of their delivery. Whiteacre’s complaining not-
   work as quickly as possible by sending it to the clos-    withstanding, this is not a bad system.
   est interconnect location.
                                                             This economic system has unquestionably helped en-
When ISP executives such as Ed Whiteacre, the for-           able the Internet innovations with which we’re all fa-
mer CEO of AT&T, complain about innovators “using            miliar by lowering entry barriers to small, new content
[ISP] pipes for free,” hot potato routing is part of the     creators and aggregators. Preserving this financial sys-
context, because handing a packet from one network           tem is perhaps the central issue for network neutral-
to another also hands over the costs of transporting         ity advocates who characterize deviations from it as a
it the rest of the way.25 When packets are handed over       counter-productive wealth transfers from innovators
as early as possible, hot potato style, the receiving net-   to incumbent operators. As Institute for Policy Integ-
work ends up paying the bulk of the costs for end-to-        rity economists J. Scott Holladay and Inimai M. Chet-
end packet transport.                                        tiar say:26

The network diagram in Figure 2 helps us understand          At its heart, net neutrality regulation is about who will
hot potato routing between the Verizon customer in           get more surplus from the Internet market. Retaining
Richmond and the AT&T customer in San Diego.                 net neutrality would keep more surplus in the hands of
Packets sent by the Richmond customer leave the Ve-          the content providers, and eliminating it would trans-
rizon network in Chicago, and are transported most of        fer some surplus into the hands of the ISPs. Changing
the way by AT&T. Packets sent by the AT&T customer           wealth distribution would affect the ability and incen-
leave the AT&T network in San Francisco, and are             tive of the respective market players to invest in the
transported most the way by Verizon. For streaming           portions of the Internet they own.
applications such as YouTube and Netflix, 99% of the
traffic goes from server to user, so the receiving user’s    Making retail Internet customers cover most of the
network pays most transit costs. The question of sur-        costs of generic IP transit isn’t the end of the story,
plus doesn’t arise until transit costs are covered.          however. When IP transit services are completely de-
                                                             coupled from content, applications, and services, the
When we combine the practice of hot potato routing           economic incentives of network operators become es-
with the fact that web users receive much more data          pecially misaligned with those of the innovators whose
than they transmit, by a factor two or more orders of        systems depart from the traditional web model. If we
magnitude, it becomes clear that ISPs and their im-          want next-generation networks (NGN) to enable next-




   MINI-TUTORIaL: HOW DOeS THe INTeRNeT aDapT TO aLL THeSe DIFFeReNT NeTWORkS?
   The Internet’s secret is that its smallest and most fundamental element is nothing more complicated than a
   message format, which we call “Internet Protocol.” Protocols are usually complicated procedures, but IP is
   simply a way of organizing messages so that they can pass between networks. The U. S. Postal Service can
   pass postcards to Canada Post because both postal services share a common understanding of addressing (and
   revenue sharing,) not because they operate the same trucks, trains, and airplanes.




The informaTion Technology & innovaTion foundaTion | march 2010                                                    page 14
generation applications, we probably need next-genera-            Specific example: Inter-Domain Quality of Service
tion economics to align incentives, by providing send-            Quality of Service (QoS) is the technical term for sys-
ers of packets (e.g., application and content providers)          tems that match application requirements to available
with the ability to pay a bit more to send packets by             network capabilities. Some applications, most notable
“Express Mail” rather the traditional best-effort “First          telephone service, require low delay or latency be-
Class mail.” The complete decoupling of applications              tween on caller and another, and other applications
from networks creates regulatory friction and the need            simply require low cost. QoS differentiation was part
for enhanced packet delivery systems.                             of the original design the Internet Protocol and of
                                                                  subsequent work by the Internet Engineering Task
However, the subsidy for basic packet delivery that               Force on the following standards:
lowers entry barriers for small businesses evaporates
for many larger ones. Most large content-oriented                 	Multiprotocol    Label Switching (MPLS)28
firms use for-fee Content Delivery Networks (CDNs)
                                                                  	Differentiated   Services (DiffServ)29
to deliver packets to ISPs from nearby locations with
minimal transit expenses and faster and more reliable             	Integrated   Services (IntServ)30
delivery. Even though the large firm’s path to the ISP is
                                                                  	Real   Time Protocol (RTP)31
short and relatively inexpensive, the cost of transport-
ing a single copy of a movie to a CDN and then paying             	Real-Time    Streaming Protocol (RTSP)32
a higher fee for each copy the CDN delivers to the ISP            	Resource   Reservation Protocol (RSVP)33
is worthwhile from the Quality of Service (QoS) point
of view. CDNs decrease ISP transit costs and reduce               	Work   in progress on Congestion Exposure
the traffic load on the Internet core, so they represent          	Work   in progress on Inter-domain routing
the happy alignment of interests that can come about
when parties voluntarily choose to abandon subsidized             In addition, ICANN has assigned numbers to popu-
transport for enhanced service: quality improves, costs           late portions of BGP Community Attributes with QoS
are realigned, and the core becomes more robust.                  level identifiers. The idea that the Internet requires a
These things are true when the ISP provides the CDN               single service level persists because of the confusion
service as well.                                                  between theory and practice, architecture and imple-
                                                                  mentation.

                                                                  Recall that BGP was created in a few short months
If a blunt packet non-discrimination mandate were in effect,      out of the necessity of replacing the NSF backbone,
wireless operators would not be able to sell “bulk mail” packet   at a time when nearly all Internet use was file trans-
                                                                  fer oriented. BGP is a mechanism that allows network
delivery to firms like Amazon at attractive prices.               operators to exchange routes based on policy, such
                                                                  that each partner network of a given network opera-
                                                                  tor can be shown a different set of routes tailored to
An additional complication in the existing system of
                                                                  the business relationship between the networks. BGP
allocating payments on the Internet arises in the so-
                                                                  is capable of advertising routes based on a variety of
called “middle mile” networks between ISPs and In-
                                                                  internal policies, which may reflect QoS attributes. In
ternet Exchange Providers (IXPs), especially in rural
                                                                  practice, BGP has not been used for this purpose sim-
settings. As Christopher Marsden explains, Internet
                                                                  ply because networks have not chosen to include QoS
regulators have long overlooked the economic role of
                                                                  routing in their terms of interconnection. The ability
the middle mile: “until recently, many analysts did not
                                                                  to do this has always been present, but the will has
fully appreciate that so much traffic on the Internet
                                                                  been lacking for a number of reasons.
was monetized and had to pay its way.”27 High transit
fees are the reason some small ISPs (e.g. Wireless ISP            For one thing, there’s little to be gained in applying
LARIAT in Laramie, Wyoming) ban the use of P2P                    QoS on the high-speed links (40 and 100 Gbps) that
outright on their lowest-tier pricing plans.                      form the Internet’s optical core. Active QoS measures



The informaTion Technology & innovaTion foundaTion | march 2010                                                         page 15
are most valuable on data links where load is highly        BGP prefers more specific routes over general ones, so
variable, but the core is so far removed from statistical   as soon as the bogus Pakistani routes were advertised
variations and so well provisioned for peak load that       across the Internet they became the preferred routes
QoS measures would rarely be invoked. Core traffic          for everyone; a 24-bit network address, even if it’s fake,
is aggregated from so many different sources that its       is more specific than the 23-bit address advertised by
contours only show slow diurnal variation. The value        YouTube, even though it’s real. Making QoS a feature
of QoS increases, however, as the packet traffic on the     of routes would make it that much easier for malicious
highest speed links is disaggregated onto slower links      users or careless administrators to exhaust network re-
with more variable load. The problem with imple-            sources by elevating P2P to highest priority, for exam-
menting QoS at this level, between origin network and       ple. This would be disastrous for the victim network.
destination network, is complicated by the fact that        BGP insecurity is a second barrier to wide-scale QoS
the operators of the relevant networks may not have         deployment through the Internet core.
a business relationship with each other. Consider two
networks, A and B, who exchange packets through a
common transit network, C. A and B both have busi-          While network neutrality advocates fear change in the Internet,
ness relationships with C, but not with each other. A
and B have no reason to specify QoS with core net-          engineers fear the lack of change.
work C, for the reasons given. Hence, they have no
agreement with each other for QoS.                          Nevertheless, it is a fact that most home gateways sup-
Developing QoS relationships between non-core net-          port user-controlled QoS, as do all major operating
works would require a number of negotiations to take        systems, as well as the Internet routers sold by major
place that haven’t been necessary in the past. Core net-    firms such as Cisco, Juniper, Huawei, and Alcatel.
works – both Tier 1s and Tier 2s – can facilitate this      Hence, the barriers to the implementation of end-to-
process by adding QoS to the agreements they have           end QoS across the Internet can be overcome. Ulti-
with other, as some have done according to the cryp-        mately, it’s an operational and business case problem
tic information that’s publicly available about peering     that can be addressed by ISPs when they see the need,
agreements.34 What’s needed is a set of transitive35        so long as regulators haven’t foreclosed the option and
agreements on core networks that transfer to edge           an efficient marketplace exists in which these transac-
networks automatically, essentially a marketplace like      tions can be made.
the stock exchange or eBay that allows the owners of
the 30,000 networks within the Internet to make such        Why the Internet Works
deals.                                                      According to Professor Mark Handley of University
                                                            College, London, the Internet “only just works.”36 It has
Another reason that end-to-end QoS isn’t widely im-         been architecturally stagnant since 1993 because it’s
plemented is that BGP is a fundamentally insecure           difficult to make changes in such a large system except
protocol. Network operators misconfigure BGP route          as they’re motivated by fear:
advertisements on a regular basis, and a number of at-
tacks are trouble for BGP.                                     …technologies get deployed in the core of the
                                                               Internet when they solve an immediate problem
The best-known example of this was the misconfigu-             or when money can be made. Money-making
ration of routes to YouTube by a network technician            changes to the core of the network are rare in-
in Pakistan intended to block access from within that          deed — in part this is because changes to the core
country. YouTube had a block of IP addresses consist-          need to be interoperable with other providers to
ing of a 23-bit network number and 9-bit host num-             make money, and changes that are interoperable
bers. The Pakistani technician set his router to adver-        will not differentiate an ISP from its competi-
tise two 24-bit network numbers for YouTube, which             tors. Thus fear seems to dominate, and changes
allowed his equipment to block requests to YouTube             have historically been driven by the need to fix
(network administrators call this practice “blackhol-          an immediate issue. Solutions that have actu-
ing.”)                                                         ally been deployed in the Internet core seem to


The informaTion Technology & innovaTion foundaTion | march 2010                                                           page 16
have been developed just in time, perhaps be-                  …there has been no substantial change at layer
   cause only then is the incentive strong enough.                3 [IP] for a decade and no substantial change
   In short, the Internet has at many stages in its               at layer 4 [TCP] for nearly two decades. Clearly
   evolution only just worked.                                    then the Internet is suffering from ossification.
                                                                  The original general-purpose Internet which
IP Multicast, Mobile IP, Quality of Service, Explicit             could evolve easily to face new challenges has
Congestion Notification, secure BGP, and secure DNS               been lost, and replaced with one that can only
are all significant enhancements to the Internet ar-              satisfy applications that resemble those that are
chitecture that solve real problems and have not been             already successful…
widely adopted (although we are finally making prog-
ress with DNS.) One of the implications of the Inter-             … The number of ways in which [the Internet]
net’s end-to-end architecture is that major changes need          only just works seems to be increasing with
to be implemented among all, or at least most of the              time, as non-critical problems build. The main
hundreds of millions of end-user computers and net-               question is whether it will take failures to cause
work routers that comprise the Internet. Greed alone              these problems to be addressed, or whether they
has never been sufficient to motivate such change, only           can start to be addressed before they need to be
collapse or near collapse has been a sufficient. The In-          fixed in an ill co-ordinated last-minute rush.
ternet itself only replaced ARPANET’s NCP protocol
because ARPA issued an edict that users had to up-            Primarily, the Internet works because network opera-
grade to TCP by January 1, 1983 or lose access to the         tors spend enormous amounts of money to ensure it
network.                                                      works as well tomorrow as it did yesterday when the
                                                              workload was less. It doesn’t solve any problem – other
While network neutrality advocates fear change in the         than file transfer – especially well, but it solves many
Internet, engineers fear the lack of change:37                problems just well enough for general utility. The
                                                              backlog of non-deployed enhancements and upgrades

       Figure 3: Mobile Technology Summary39

                                                                   Channel    Peak   Typical
                   3GPP                                                                          Efficiency   Delay
                             Year   Coding    Modulation   MIMO    Width in   D/L     D/L
                   version                                                                        bits/Hz      ms.
                                                                    MHz       Mbps   Mbps
         EDGE                1997   TDMA        QPSK                  5       0.5                             500
        WCDMA      Rel 99    1999   WCDMA                                     1.8                             150
         HSDPA      Rel 5    2002                                             3.6                             100
         HSUPA
                    Rel 6    2004                                             7.2    0.7 - 1.7                 75
          7.2
          HSPA
                                                16 QAM                        14.4
           14.4
        HSPA+21     Rel 7    2007               64 QAM                        21.6   1.5 - 7
        HSPA+28     Rel 7                                   2x2                28
        HSPA+42              2009                                    10       42.2
        HSPA+84              2010                           2x2      10        84
                                    DFTS/
          LTE       Rel 8    2009                           2x2    1.4 - 20   150     4 -24        1.69        25
                                    OFDM


          LTE                       OFDMA/                  4x4               300                  2.67
                   Rel 10+   2011                                  10 - 100            100                    <25
        Advanced                    SCDMA                   8x4               1000                 3.7




The informaTion Technology & innovaTion foundaTion | march 2010                                                        page 17
is growing, as is the friction between new devices, new     Data services on mobile networks were initially enabled
applications, and new users and the installed base.         by the Cellular Digital Packet Data (CDPD) standard
                                                            developed in the early 1990s. CDPD provided data
The most immediate stimulus for a wholesale upgrade         transfer rates of 9.6 to 19.2 Kbps, roughly comparable
of the Internet architecture – the only thing that might    to PSTN modems; it was adopted by AT&T, Cingular
motivate a major improvement in the design of TCP           and Palm. Primarily noteworthy for providing digital
and IP – is address depletion, using up all possible        service over the analog cell phone networks of the day,
IPv4 addresses. Unfortunately, the large-address re-        CDPD demonstrated the utility of data over mobile
placement for IPv4, IPv6, does not sufficiently address     networks. It was subsequently replaced by faster, all
the myriad of small but growing problems that hold          digital systems such as EDGE, WCDMA, HSPA and
convergence back. IPv6 deployment will cause a crisis       HSPA+; the next big phases of mobile networking are
in edge router design because it will cause a massive       LTE and LTE Advanced, data-oriented architectures.
increase in the number of routes each edge router must      When mobile networks convert to LTE, the transition
hold in its specialized memory, however, and the reso-      from a voice-centric to a data-centric network will be
lution to that problem may enable necessary changes         complete.
to be made.38 Opportunities to upgrade the Internet’s
major protocols – BGP, IP, and DNS – are few and far        The data rates of these systems have doubled roughly
between, so they can’t be squandered.                       every 30 months, as predicted by Cooper’s Law.40 By
It would be unfortunate if well-meaning regulators          way of contrast, Butter’s Law predicts that the data rate
added to the Internet’s general ossification by forbid-     of optical fiber doubles every nine months; these rates
ding necessary and constructive changes while the           of improvement are different because they reflect the
question of the Internet’s future architecture remains      differential effects that Moore’s Law has on different
unresolved.                                                 semiconductor processes. Moore’s Law affects mass-
                                                            market chips built in the newest fabs, but many radio
                                                            parts are analog components whose manufacturing
ISSUeS IN MOBILe NeTWORk DeSIgN aND Op-                     process progresses more slowly. It’s also the case that
eRaTION
                                                            air is a more challenging medium for data communica-
While the Internet was designed to support a simple         tion than copper or optical fiber; some have said that
group of low duty cycle applications (remote login,         wireless is a generation behind wired systems and al-
e-mail and occasional file transfer) for locked-down        ways will be.
computers shared by a modest number of highly-
skilled, trustworthy users in a non-commercial set-         This is important because the rate of progress for In-
ting, mobile telephony’s heritage is one of real-time       ternet applications is largely driven by price/capacity
communication-oriented applications, large numbers          improvements in physical networking since the virtual
of mobile users, and personal devices competing for         network – the Internet protocols – has been stagnant
market share. It’s not surprising that there’s friction     since 1993. As Internet use shifts to wireless networks
between Internet culture and mobile culture.                with slower intrinsic rates of advance, we might ex-
                                                            pect a slower overall rate of innovation, assuming all
Brief History                                               other factors remain constant. We should also expect
The mobile network was originally designed to serve         increased fracture between mobile applications and
as an extension of the telephone network that added         stationary ones, in part because the bandwidth gap be-
mobility at the network edge without altering the tele-     tween the two can only grow larger but also because of
phone network’s fundamentals. Initially, it used ana-       intrinsic differences between fixed and mobile applica-
log technology, and converted to digital in the 1990s.      tions. Such factors are among the causes of application
Data services were a special feature added on to the        diversity. These factors combine in such a way as to
mobile network roughly during the period of its transi-     suggest that innovation will actually accelerate.
tion from analog to digital. As presently operated, the
mobile network is still more efficient at providing tele-
phone service than data service.



The informaTion Technology & innovaTion foundaTion | march 2010                                                   page 18
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile
100302 going mobile

Contenu connexe

Tendances

Desislava Stankova's Master Thesis
Desislava Stankova's  Master ThesisDesislava Stankova's  Master Thesis
Desislava Stankova's Master ThesisBoril Bogoev, Ph.D.
 
The Impact of Information and Communications Technologies on the Teaching of...
The Impact of Information and Communications  Technologies on the Teaching of...The Impact of Information and Communications  Technologies on the Teaching of...
The Impact of Information and Communications Technologies on the Teaching of...Hicham El Moueden
 
Ict in africa education fullreport
Ict in africa education fullreportIct in africa education fullreport
Ict in africa education fullreportStefano Lariccia
 
Errors in-english-tests-sample
Errors in-english-tests-sampleErrors in-english-tests-sample
Errors in-english-tests-sampleshyamsiva83
 
ICT SBA final
ICT SBA finalICT SBA final
ICT SBA finalLuke Chen
 
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1SANTIAGO PABLO ALBERTO
 
First7124911 visual-cpp-and-mfc-programming
First7124911 visual-cpp-and-mfc-programmingFirst7124911 visual-cpp-and-mfc-programming
First7124911 visual-cpp-and-mfc-programmingxmeszeus
 
BlackBerry Torch 9860 Monza Black (Unlocked Quadband) GSM Cell Phone
BlackBerry Torch 9860  Monza Black (Unlocked Quadband) GSM Cell PhoneBlackBerry Torch 9860  Monza Black (Unlocked Quadband) GSM Cell Phone
BlackBerry Torch 9860 Monza Black (Unlocked Quadband) GSM Cell PhoneCellhut
 
Pedagogical appraches-for-using-technology-literature-review-january-11-final
Pedagogical appraches-for-using-technology-literature-review-january-11-finalPedagogical appraches-for-using-technology-literature-review-january-11-final
Pedagogical appraches-for-using-technology-literature-review-january-11-finalMartin Compton, SFHEA
 
Lista 301 2009 30 de abril
Lista 301 2009 30 de abrilLista 301 2009 30 de abril
Lista 301 2009 30 de abrilGonzalo Martín
 
Uni cambridge
Uni cambridgeUni cambridge
Uni cambridgeN/A
 
Indian securities market_2008
Indian securities market_2008Indian securities market_2008
Indian securities market_2008Projects Kart
 
Layout for the project
Layout for the projectLayout for the project
Layout for the projectKrupol Phato
 
Import export procedure flowchart
Import export procedure flowchartImport export procedure flowchart
Import export procedure flowchartTushar G
 
Doctrine Manual 1.2
Doctrine Manual 1.2Doctrine Manual 1.2
Doctrine Manual 1.2guest9e8c7a
 

Tendances (19)

Desislava Stankova's Master Thesis
Desislava Stankova's  Master ThesisDesislava Stankova's  Master Thesis
Desislava Stankova's Master Thesis
 
Icp
IcpIcp
Icp
 
c
cc
c
 
The Impact of Information and Communications Technologies on the Teaching of...
The Impact of Information and Communications  Technologies on the Teaching of...The Impact of Information and Communications  Technologies on the Teaching of...
The Impact of Information and Communications Technologies on the Teaching of...
 
Ict in africa education fullreport
Ict in africa education fullreportIct in africa education fullreport
Ict in africa education fullreport
 
Errors in-english-tests-sample
Errors in-english-tests-sampleErrors in-english-tests-sample
Errors in-english-tests-sample
 
ICT SBA final
ICT SBA finalICT SBA final
ICT SBA final
 
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1
Arduino: Arduino para dummies 2 edición por Wiley Brand parte 1
 
First7124911 visual-cpp-and-mfc-programming
First7124911 visual-cpp-and-mfc-programmingFirst7124911 visual-cpp-and-mfc-programming
First7124911 visual-cpp-and-mfc-programming
 
BlackBerry Torch 9860 Monza Black (Unlocked Quadband) GSM Cell Phone
BlackBerry Torch 9860  Monza Black (Unlocked Quadband) GSM Cell PhoneBlackBerry Torch 9860  Monza Black (Unlocked Quadband) GSM Cell Phone
BlackBerry Torch 9860 Monza Black (Unlocked Quadband) GSM Cell Phone
 
Pedagogical appraches-for-using-technology-literature-review-january-11-final
Pedagogical appraches-for-using-technology-literature-review-january-11-finalPedagogical appraches-for-using-technology-literature-review-january-11-final
Pedagogical appraches-for-using-technology-literature-review-january-11-final
 
E sword guide-1006
E sword guide-1006E sword guide-1006
E sword guide-1006
 
Lista 301 2009 30 de abril
Lista 301 2009 30 de abrilLista 301 2009 30 de abril
Lista 301 2009 30 de abril
 
Uni cambridge
Uni cambridgeUni cambridge
Uni cambridge
 
Indian securities market_2008
Indian securities market_2008Indian securities market_2008
Indian securities market_2008
 
Layout for the project
Layout for the projectLayout for the project
Layout for the project
 
Gemini Manual
Gemini ManualGemini Manual
Gemini Manual
 
Import export procedure flowchart
Import export procedure flowchartImport export procedure flowchart
Import export procedure flowchart
 
Doctrine Manual 1.2
Doctrine Manual 1.2Doctrine Manual 1.2
Doctrine Manual 1.2
 

En vedette

GBI USAID Simple Deck
GBI USAID Simple Deck GBI USAID Simple Deck
GBI USAID Simple Deck Erin Mote
 
Digitial Development and Mobile Money at USAID
Digitial Development and Mobile Money at USAIDDigitial Development and Mobile Money at USAID
Digitial Development and Mobile Money at USAIDErin Mote
 
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...Erin Mote
 
Gbi nethope core slides
Gbi nethope core slidesGbi nethope core slides
Gbi nethope core slidesErin Mote
 
The Currency of Connectivity
The Currency of ConnectivityThe Currency of Connectivity
The Currency of ConnectivityErin Mote
 
05.25 m m_presentation
05.25 m m_presentation05.25 m m_presentation
05.25 m m_presentationErin Mote
 
The Currency of Connectivity - Re-imagining the Future of Education
The Currency of Connectivity - Re-imagining the Future of EducationThe Currency of Connectivity - Re-imagining the Future of Education
The Currency of Connectivity - Re-imagining the Future of EducationErin Mote
 
Games for Change Presentation
Games for Change Presentation Games for Change Presentation
Games for Change Presentation Erin Mote
 

En vedette (16)

GBI USAID Simple Deck
GBI USAID Simple Deck GBI USAID Simple Deck
GBI USAID Simple Deck
 
Digitial Development and Mobile Money at USAID
Digitial Development and Mobile Money at USAIDDigitial Development and Mobile Money at USAID
Digitial Development and Mobile Money at USAID
 
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...
Currency of Connectivity: Expanding Digital Inclusion - Access, Literacy and ...
 
Game halo
Game haloGame halo
Game halo
 
Gbi nethope core slides
Gbi nethope core slidesGbi nethope core slides
Gbi nethope core slides
 
Expo de ingles ii
Expo de ingles iiExpo de ingles ii
Expo de ingles ii
 
The Currency of Connectivity
The Currency of ConnectivityThe Currency of Connectivity
The Currency of Connectivity
 
05.25 m m_presentation
05.25 m m_presentation05.25 m m_presentation
05.25 m m_presentation
 
Basquetbool
BasquetboolBasquetbool
Basquetbool
 
Game halo
Game haloGame halo
Game halo
 
The Currency of Connectivity - Re-imagining the Future of Education
The Currency of Connectivity - Re-imagining the Future of EducationThe Currency of Connectivity - Re-imagining the Future of Education
The Currency of Connectivity - Re-imagining the Future of Education
 
Basquetbool
BasquetboolBasquetbool
Basquetbool
 
Description 2 schools
Description 2 schoolsDescription 2 schools
Description 2 schools
 
Game halo
Game haloGame halo
Game halo
 
Game halo
Game haloGame halo
Game halo
 
Games for Change Presentation
Games for Change Presentation Games for Change Presentation
Games for Change Presentation
 

Similaire à 100302 going mobile

G Streamer Apps Development Manual
G Streamer Apps Development   ManualG Streamer Apps Development   Manual
G Streamer Apps Development ManualCaglar Dursun
 
דו"ח פשיטת הרגל של סולינדרה
דו"ח פשיטת הרגל של סולינדרהדו"ח פשיטת הרגל של סולינדרה
דו"ח פשיטת הרגל של סולינדרהTashtiot media
 
Whitepaper on distributed ledger technology
Whitepaper on distributed ledger technologyWhitepaper on distributed ledger technology
Whitepaper on distributed ledger technologyUnder the sharing mood
 
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wpchgibbs7
 
Introduction to system_administration
Introduction to system_administrationIntroduction to system_administration
Introduction to system_administrationmeoconhs2612
 
Integrating developing countries’ SMEs into Global Value Chain.
Integrating developing countries’ SMEs into Global Value Chain.Integrating developing countries’ SMEs into Global Value Chain.
Integrating developing countries’ SMEs into Global Value Chain.Ira Tobing
 
Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции Sergey Zhdanov
 
Rails Cookbook
Rails CookbookRails Cookbook
Rails Cookbookjonkinney
 
Codendi 4.0 User Guide
Codendi 4.0 User GuideCodendi 4.0 User Guide
Codendi 4.0 User GuideCodendi
 
Skripsi - Daftar Isi
Skripsi - Daftar IsiSkripsi - Daftar Isi
Skripsi - Daftar IsiRian Maulana
 
Reinventing the City
Reinventing the CityReinventing the City
Reinventing the CityDean Pallen
 
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdf
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdfSample econsultancy-real-time-bidding-buyers-guide-2012.pdf
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdfAndrey Zhukov
 
National Broadband Plan
National Broadband PlanNational Broadband Plan
National Broadband Planguest334d2285
 

Similaire à 100302 going mobile (20)

Report on dotnetnuke
Report on dotnetnukeReport on dotnetnuke
Report on dotnetnuke
 
G Streamer Apps Development Manual
G Streamer Apps Development   ManualG Streamer Apps Development   Manual
G Streamer Apps Development Manual
 
דו"ח פשיטת הרגל של סולינדרה
דו"ח פשיטת הרגל של סולינדרהדו"ח פשיטת הרגל של סולינדרה
דו"ח פשיטת הרגל של סולינדרה
 
Whitepaper on distributed ledger technology
Whitepaper on distributed ledger technologyWhitepaper on distributed ledger technology
Whitepaper on distributed ledger technology
 
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wp
 
E participation study
E participation study E participation study
E participation study
 
Introduction to system_administration
Introduction to system_administrationIntroduction to system_administration
Introduction to system_administration
 
Integrating developing countries’ SMEs into Global Value Chain.
Integrating developing countries’ SMEs into Global Value Chain.Integrating developing countries’ SMEs into Global Value Chain.
Integrating developing countries’ SMEs into Global Value Chain.
 
Assessment Report
Assessment ReportAssessment Report
Assessment Report
 
Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции
 
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
 
Business Plan
Business PlanBusiness Plan
Business Plan
 
Rails Cookbook
Rails CookbookRails Cookbook
Rails Cookbook
 
Codendi 4.0 User Guide
Codendi 4.0 User GuideCodendi 4.0 User Guide
Codendi 4.0 User Guide
 
Skripsi - Daftar Isi
Skripsi - Daftar IsiSkripsi - Daftar Isi
Skripsi - Daftar Isi
 
Reinventing the City
Reinventing the CityReinventing the City
Reinventing the City
 
Icra internship report
Icra internship reportIcra internship report
Icra internship report
 
It project development fundamentals
It project development fundamentalsIt project development fundamentals
It project development fundamentals
 
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdf
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdfSample econsultancy-real-time-bidding-buyers-guide-2012.pdf
Sample econsultancy-real-time-bidding-buyers-guide-2012.pdf
 
National Broadband Plan
National Broadband PlanNational Broadband Plan
National Broadband Plan
 

Dernier

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Dernier (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

100302 going mobile

  • 1. Going Mobile: Technology and Policy Issues in the Mobile Internet Richard Bennett Information Technology and Innovation Foundation
  • 2.
  • 3. Going Mobile: Technology and Policy Issues in the Mobile Internet Richard Bennett March 2010
  • 4. T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n Table of Contents I. Executive Summary ............................................................................................ 1 II. Introduction ......................................................................................................... 7 A. Advent of Broadband ............................................................................. 7 B. Rise of the Cell Phone ............................................................................ 8 B. Convergence ............................................................................................. 8 C. Reader’s Guide to the Report ................................................................ 8 III. Issues in Internet Design and Operation........................................................ 8 A. Brief History ............................................................................................ 9 B. Modularity ................................................................................................. 9 C. Efficiency ................................................................................................ 11 D. Manageability ......................................................................................... 11 E. Innovation .............................................................................................. 12 F. Subsidies ................................................................................................. 13 G. Specific Example: Inter-Domain Quality of Service....................... 15 H. Why the Internet Works ...................................................................... 16 IV. Issues in Mobile Network Design and Operation ....................................... 18 A. Brief History .......................................................................................... 18 B. Modularity ............................................................................................... 19 C. Efficiency ................................................................................................ 20 D. Manageability ......................................................................................... 20 E. Innovation .............................................................................................. 23 F. Specific Example: Voice over LTE ..................................................... 25 G. Status of Internet Design and Wireless Networks .......................... 26 V. The Mobile Network Infrastructure ................................................................ 26 The informaTion Technology & innovaTion foundaTion | sep Tember 20 09 page II
  • 5. T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n A. Essential Parts of the Mobile Network ............................................. 26 B. Spectrum ................................................................................................. 27 1. Licenses ........................................................................................... 27 2. Efficient Use ................................................................................... 28 3. Roaming .......................................................................................... 28 4. Coordination................................................................................... 28 C. Base Station Siting ................................................................................. 29 D. Backhaul ................................................................................................... 30 1. Technologies ................................................................................... 31 2. Specific Examples: GigaBeam and Ceragon ............................. 31 3. Backhaul Bottom Line .................................................................. 32 VI. Emerging Mobile Internet Applications ....................................................... 32 A. Content Delivery ................................................................................... 32 1. Example: Kindle ............................................................................ 33 2. Benefits of Ubiquity ...................................................................... 33 3. Innovation from Differentiation ................................................. 33 B. Wireless VoIP ........................................................................................ 34 1. Example: Skype on the 3 Network ............................................. 35 2. Example: Other Ways to Skype ................................................... 35 3. Economic Implications of Skype ............................................... 36 C. Wireless Video Streaming..................................................................... 36 1. Example: Video Streaming System: MediaFLO ....................... 37 2. Example Video Streaming: MobiTV .......................................... 37 D. Mobile Augmented Reality................................................................... 38 1. Example: Layar Platform .............................................................. 38 E. Internet of Things................................................................................. 38 VI. Mobile Internet Policy Issues.......................................................................... 39 A. Net Neutrality ........................................................................................ 39 1. Transparency-based Net Neutrality Lite .................................... 39 2. Transparency................................................................................... 40 The informaTion Technology & innovaTion foundaTion | sep Tember 20 09 page II
  • 6. T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n 3. Content Freedom........................................................................... 40 4. Application Freedom .................................................................... 40 5. Reasonable Limits on “Device Freedom” ................................. 41 6. Managed Services .......................................................................... 42 7. Enabling Innovation...................................................................... 42 8. Specific Example: EU Telecoms Package .................................. 43 9. Services-Oriented Framework ..................................................... 43 C. Spectrum Policy ..................................................................................... 44 1. The Value of Open Spectrum ..................................................... 44 2. The Limits of Open Spectrum .................................................... 45 3. What Licensed Spectrum Does Well .......................................... 46 4. Spectrum Inventory and Review ................................................. 46 5. Reassigning Spectrum ................................................................... 47 6. Future Proofing the Spectrum ..................................................... 48 VIII. Policy Recommendations .............................................................................. 49 A. Stick with Light-touch Regulation ...................................................... 49 B. Enact a Sensible Transparency Rule ................................................... 50 C. Legitimize Enhanced Transport Services .......................................... 50 D. Define Reasonable Network Management........................................ 50 E. Preserve Engineering and Operations Freedom .............................. 50 F. Review Existing Spectrum Licenses ................................................... 51 G. Eliminate Redundant and Archaic Licenses...................................... 51 H. Protect Spectrum Subleasing................................................................ 51 I. Cautiously Enable Secondary Uses ...................................................... 51 J. Allow the Experiment to Continue ...................................................... 52 The informaTion Technology & innovaTion foundaTion | sep Tember 20 09 page II
  • 7. T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n List of Figures Figure 1: Classical Internet Protocol Version 4 Header.......................................... 9 Figure 2: Hot Potato Routing .................................................................................... 13 Figure 3: Mobile Technology Summary .................................................................. 17 Figure 4: Carrier-sensing overhead in an IEEE 802.11g Contention System ... 21 Figure 5: Carrier-sensing overhead in an IEEE 802.11n Contention System. .. 21 Figure 6: Deering’s Hourglass ................................................................................... 23 Figure 7: Internal Architecture of the RACS Model ............................................. 24 Figure 8: Cell tower disguised in cross by Larson Camoflage .............................. 28 Figure 9: Internet is a Virtual Network Composed of Physical Networks ....... 29 Figure 10: Cergagon FibeAir ® IP-10 Switch. ....................................................... 30 Figure 11: GigaBeam installation providing backhaul for Google’s Mountain View Wi-Fi Network............................................................................. 31 Figure 12: Amazon Kindle. ....................................................................................... 32 Figure 13: Skypephone ............................................................................................... 34 Figure 14: Example of FLO Network..................................................................... 35 Figure 15: ATSC-M/H Simulcast ............................................................................. 36 Figure 16: Beatles Discovery Tour starting at Abbey Road.................................. 37 Figure 17: Licensed LTE is more efficient than license-exempt Wi-Fi. ............. 45 Figure 18: Novatel Mi-Fi Device. ............................................................................. 47 The informaTion Technology & innovaTion foundaTion | sep Tember 20 09 page II
  • 8. T h e I n f o r m aT I o n T e c h n o l o g y & I n n o v aT I o n f o u n d aT I o n Executive Summary T en years ago, the typical network experience was limited to Even with all the network dialing-up a walled garden to see if we had mail and then magic we enjoy today, we’re poking around a few familiar parts of the Internet. The ad- still at a very early stage in vent of broadband networking changed this dramatically: it sped up the development of the Mo- the Web and brought about a host of innovative new applications and bile Internet. For the Mo- services. While the Internet was permeating modern life, a parallel de- bile Internet to achieve its velopment was taking place that would have even greater significance full potential policymakers must do two key things: for billions of people around the world: perience we enjoy today. The flowering First, they need to refrain the development of the cell phone. In- of the Mobile Internet will only come from strangling the Mobile evitably, these two transformative tech- to pass, however, when engineering and nologies began to merge, enabling the policy collaborate to successfully over- Internet with excessive regu- rise of the Mobile Internet. come the challenges to the develop- lation, realizing that the well ment of a Mobile Internet that lives up Convergence is now beginning to re- to its full potential. For this to happen, of innovation that brought build the Web into a personalized, real- policymakers must do two key things: us where we are has not run time system that responds to the loca- First, they need to refrain from stran- tions, tastes, and whims of billions of gling the Mobile Internet with excessive dry. Second, policy makers people as they live their lives at their regulation, realizing that the well of in- need to ensure that the mo- desks, in their living rooms, or moving novation that brought us where we are through the world with the flow of ex- has not run dry. Second, policy makers bile Internet can develop the perience. Over the next decade, many need to ensure that the mobile Internet infrastructure it needs, the more people will use the Mobile Inter- can develop the infrastructure it needs, most important part of net, and it will produce an enormous the most important part of which is array of innovations and quality of life spectrum. Policymakers need to make which is spectrum. benefits. tough choices, transferring spectrum from less compelling historical uses to Even with all the network magic we en- the emerging Mobile Internet. joy today, we’re still at a very early stage in the development of the Mobile In- This report examines changes that must ternet; with any luck, we’ll look back in be made to the Internet and to the mo- another ten years and wonder how we bile network to make the Mobile In- could ever have been so naïve as to tol- ternet a pervasive and universal reality erate the limitations of the network ex- in the United States and the rest of the
  • 9. world. Some of these changes are purely technical, but of innovation. We might also expect increased fracture their scope affects Internet engineering as well as mo- between mobile applications and stationary ones, in bile network, device, and application engineering. The part because the bandwidth gap between the two can rest of the changes will take place in the policy sphere, only grow larger. Nevertheless, the benefits of mobility affecting notions of network neutrality and spectrum are so great that the rate of Mobile Internet innovation policy. The examination of technology is quite exten- is bound to increase beyond anything we’ve seen so far, sive, and is illustrated with specific examples of emerg- bandwidth constraints notwithstanding. ing devices and applications. Mobile networks require more extensive management In order to make effective policy for the mobile In- and tuning than wired networks, as their capacity is rel- ternet it’s necessary to understand the development of atively more constrained and demand for this limited the Internet, the dynamics of the mobile network, and capacity is more variable because of roaming. Mobile how the converged Mobile internet differs from both networks differentiate packets by application, provid- of these ancestors. While the traditional Internet and ing very different routing and processing to voice pack- the Mobile Internet share some common features, they ets than to data packets. This differentiated treatment operate very differently. The traditional Internet was is a reflection of application requirements; the need for designed for a small group of low duty cycle, occasional it will persist after mobile networks are fully integrated use applications for locked-down computers shared by with the Internet. a modest number of highly-skilled, trustworthy users in a non-commercial setting; but mobile telephony’s While the design and engineering challenges to the full heritage is one of real-time communication-oriented integration of the Internet with the mobile network are applications, a diverse group of mobile users, and per- serious, considerable progress has been made and the sonal devices competing for market share. It’s not sur- path to success is reasonably clear. The Mobile Inter- prising that there’s friction between Internet culture net is already emerging, and with it an exciting new and mobile culture. category of applications known as Mobile Augmented Reality. The mobile network was originally designed to serve as an extension of the telephone network that added Operational challenges to the adoption of the Mobile mobility at the network edge without altering the tele- Internet are also well understood, but less easily solved. phone network’s fundamentals. Initially, it used ana- Networks operators need to build more base stations, log technology, and converted to digital in the 1990s. add more radio sectors to existing base stations, and Data services were a special feature added on to the increase backhaul bandwidth. While these challenges mobile network roughly during the period of its transi- are relatively simple in the suburbs and exurbs – all it tion from analog to digital. As presently operated, the takes is money and accommodating local governments mobile network is still more efficient at providing tele- – they’re much more difficult in central cities and in phone service than data service. rural areas. Next generation systems such as LTE con- sume more bandwidth than traditional cellular, which Mobile data rates have doubled roughly every 30 requires a beefed up middle mile. Increased use of fi- months, as predicted by Cooper’s Law. By way of con- ber to connect cell towers with operator facilities and trast, Butter’s Law predicts that the data rate of optical on to Internet exchanges may have positive spillover fiber doubles every nine months. Because of this, some effects for residential broadband as more dark fiber is have said that wireless is a generation behind wired deployed. systems and always will be. There are two key policy issues for the Mobile Internet: This is important because the rate of progress for In- net neutrality and spectrum. The net neutrality pro- ternet applications is largely driven by price/capacity ceeding currently before the FCC – the Open Internet improvements in physical networking since the Inter- Notice of Proposed Rulemaking – proposes to envelope net protocols have been stagnant since 1993. As Inter- the Mobile Internet within the same, highly stringent, net use shifts to wireless networks with slower intrinsic regulatory umbrella as the wired Internet. Harmonized rates of advance, we might expect a slower overall rate regulation is philosophically appealing, but has a num- The informaTion Technology & innovaTion foundaTion | march 2010 page 2
  • 10. ber of practical drawbacks. If the framework itself conduct. Second, policymakers should embark on a were clear and fundamentally sound, a common re- program of spectrum modernization and expansion gime would make sense: after all, the Internet is not to ensure that mobile services can continue to grow. as much as wired network as a virtual network and A special focus should be placed on the transfer of its structure is meant to be technology neutral. How- licenses from inefficient DTV use to the general pool ever, if the approach is based on preserving wired net- of spectrum available for auction. work operational norms, as it currently is, then the common umbrella becomes a common straightjacket, Spectrum modernization should also be employed to undesirable for both wired and mobile networks. replace inefficient federal, state and local government uses and release unneeded spectrum to an auction Spectrum policy has historically featured conflict be- pool. Finally, regulations should encourage technical tween licensing regimes and unlicensed “Open Spec- solutions to be developed and deployed that enable trum” models such as the White Spaces system. With consumers to obtain the best possible service for the the parties to this controversy in détente, the focus best prices. Doctrinaire net neutrality heavy formulas shifts to the struggle among various license holders. simply don’t accomplish these ends for mobile net- The United States unfortunately adopted an obso- works. lete standard for Digital TV ten years ago, and has failed to reap as large a digital dividend as Europe 1. Stick with Light-touch Regulation and Asia will gain as they transition away from analog If heavy-handed net neutrality regulation is ultimately television. Extracting poorly utilized DTV spectrum bad for investment, deployment, and adoption of wire- from broadcasters is a daunting challenge that must line networks, as it is, it is potentially a fatal disaster for be solved by federal regulators with all the creativity mobile networks. A key way to ensure that networks they can muster. It’s unfortunate that TV broadcast- serve the public interest is through market mecha- ing casts such a long shadow on mobile networking nisms based on meaningful competition. The United at a time when 85% of Americans watch TV over a States enjoys among the most competitive intermodal cable or satellite system and few of the over-the-air wireline broadband and even stronger wireless com- subscribers watch on HD screens. The broadcast petition, with four national wireless networks, as well filibuster can be mitigated by offering incentives for as a number of regional networks and Mobile Virtual broadcasters to share spectrum with each other and Network Operators (MVNOs) such as Virgin Mobile. give back the excess for auction, and by modernizing Fixed wireless networks such as Clearwire and the government’s spectrum use. emerging LTE system are both reasonable substitutes for wired broadband, and the two satellite networks The general approach we recommend is for the gov- are in the process of upgrading capacity significantly. ernment to facilitate the Mobile Internet by remov- Competition can be made more effective by ensuring ing impediments to further build-out and adoption. there are minimal delays in switching between mobile Speculative fears have played too large a role in the providers. Internet regulation debates of the last decade, and it’s more productive to shift the emphasis toward the government’s role in facilitating progress. 2. enact a Sensible Transparency Rule Just as a well-functioning democracy requires an in- First, it would be a mistake to impose the “net neutral- formed citizenry, a well-functioning network eco- ity heavy” guidelines on either wired ISP networks or system requires its well-informed and honest critics. mobile networks. Rather than enacting overly pre- While the new European Internet transparency rule scriptive regulations banning experiments with new is too new to be judged a complete success, it repre- transport services and business models, the FCC sents a promising direction for which there is broad should rely primarily on transparency and disclosure consensus. There is still disagreement regarding the to protect consumers from speculative harms, main- specific nature of required disclosure, which is un- tain active oversight of provider practices, and reserve derstandable given the complexity of network sys- direct intervention for instances of clearly harmful tems and the gap between consumer awareness and The informaTion Technology & innovaTion foundaTion | march 2010 page 3
  • 11. technology. The challenge for a transparency rule is the market for video streaming and telephony. If ISPs to disclose the things that must be disclosed in order who operate the so-called “eyeball networks,” includ- for users to gauge the experience they’ll have on any ing wireless mobile Internet services, serving retail given part of the Internet ecosystem in terms the aver- customers are permitted to compete with CDNs and age person can understand, while making additional Overlays, new application entrants can expect lower information available to the audience of technologists prices and more competition, and end users can expect and policy analysts. Certain details of practice repre- a wider array of options, especially among mobile ap- sent trade secrets and need not be disclosed; the means plications. by which a particular user-visible effect is produced are less important than the effect itself. One approach 5. preserve engineering and Operations Freedom that recommends itself is the co-regulatory approach The primary emphasis of the Open Internet NPRM’s championed by Marsden, in which stakeholders con- framework of rules is on the preservation of users’ free- vene with the regulator to draft specific guidelines. dom to experience the Internet as they see fit, without Toward that end, we encourage stakeholders to form arbitrary limitations. A key way to preserve this free- a working group to advise the FCC on the particulars dom is to address the dynamics of technical freedom of disclosure. that make it possible. Users experience the Internet as they do now because engineers, network operators, 3. Define Reasonable Network Management and application innovators have been free to improve The transparency rule, and its specific implementa- networks, network technology, and user experience. tion, provides insight into the boundaries of reason- able network management practices. While the use of Toward that end, the NPRM should make it clear noth- the term “reasonable” without definition is impossibly ing in the FCC’s approach denies the freedom to in- vague, anchoring management practices to service dis- vent, develop, and adopt new networking technologies, closure resolves a great deal of the mystery. We know business models, and practices that have the potential that a practice is reasonable if it does what the operator to enhance the Internet’s power, efficiency, vitality, or says it does, conforms to standards devised by respon- effectiveness. sible bodies such as IEEE 802, IETF, and the ITU, and doesn’t violate basic user freedoms. We know that it’s unreasonable if it fails to accomplish its stated pur- The FCC should consider adding two additional principles to its poses, arbitrarily restricts the use of applications, or list: Engineering Freedom and Operations Freedom. restricts basic user rights. Beyond these general guide- lines, a Technical Advisory Group must work with the To operationalize this, the FCC should consider adding FCC to develop additional clarity regarding manage- two additional principles to its list: Engineering Free- ment boundaries and help advise on a case-by-case ba- dom and Operations Freedom. The telephones that sis when needed. worked on the PSTN in the first year of the Carterfone regime still work 35 years later. If the cell phones we 4. Legitimize enhanced Transport Services use today are still usable on the mobile network 35 years There is widespread agreement among filers in the from now (or even ten years from now), that should be FCC’s Open Internet NPRM that differentiated ser- regarded as a failure of innovation. The Mobile Inter- vices for differentiated fees are legitimate in their own net is driven by an ethic of continual improvement and right, and not simply as an adjunct to network man- this principle more than any other must remain in the agement. Similar services have a long history on the forefront. Thus, we propose two additional rules for Internet, where they are known as Content Delivery the Open Internet NPRM: Networks, Overlay Networks, and Transit Networks. The logic of “pay more to get more” has long been  No part of this regulation shall be con- accepted practice. These practices have proved worth- strued as limiting the freedom of network en- while for content resellers and application service pro- gineering to devise, develop, and deploy tech- viders such as Netflix and Skype, so it stands to reason nologies to enhance the Internet or to improve that they would be beneficial for future competitors in user experience. The informaTion Technology & innovaTion foundaTion | march 2010 page 4
  • 12. No part of this regulation shall be con- are experimental ones renewable day-by-day. Proven strued as limiting the freedom of Internet applications can be rewarded under this system with Service Providers, other network operators, or license of longer duration. other service providers to devise new finan- cial or business models that better align user In addition, spectrum grants for DTV greatly exceed incentives with those of network operators or consumer demand and should be reduced in the pub- application-based service providers without lic interest with the freed up spectrum auctioned off. limiting user choice. Spectrum policy should respect the public’s evident wishes and make more spectrum available for Mobile These rules make it clear that innovation is the engine Internet services for which demand is growing. that best ensures the Internet’s continued public val- ue. 8. protect Spectrum Subleasing 6. Review existing Spectrum Licenses Secondary markets for licensed spectrum enabled by The FCC needs to complete its inventory of the licens- resale and subleasing have proved useful in the U. S., es it has issued over the years, and implement a system where dozens of Mobile Virtual Network Operators that eliminates or reduces ambiguity about licenses go- (MVNOs) lease capacity from license holders and ing forward. If it’s true that the FCC has somehow lost roaming agreements permit licensees to share capacity. track of some licenses, as some have suggested, this These kinds of secondary markets are also useful in the error should be corrected. It’s simply not acceptable microwave backhaul and point-to-point space where a for the national regulator of wireless networks to lose given license holder can adjust microwave paths with track of issued licenses. Legislation to create a national relays and dogleg arrangements to accommodate most spectrum map introduced by Sen. Kerry (D-MA) and effective use. Therefore it is important for policy to Sen. Snowe (R-ME), is a step in the right direction. permit the trading and leasing of most licensed spec- trum. 7. eliminate Redundant and archaic Licenses 9. Cautiously enable Secondary Uses Once the license inventory is complete, it will be possi- One area of controversy concerns such secondary uses ble to examine licenses to determine which are unused, as wireless underlay and overlays on licensed spectrum. which are redundant, and which can be combined with Advocates insist that such uses are non-interfering others to free up spectrum for auction or other kinds of with properly restricted, and license holders are skepti- assignment. Part of this process will entail reassigning cal. The reality is that the nature of the interference some occasional uses to the control of other agencies, caused by overlay networks such as Ultra-Wideband license holders, or custodians of other kinds. Rarely depends on the nature of the incumbent service. Ultra- used public safety applications can be combined with Wideband interferes, in some installations, with highly consumer services, for example, by allowing public sensitive applications such as radio astronomy, but this safety uses to take precedence in times of emergency. fact is known and the Ultra-Wideband waveform is ad- The general principle that should hold in the process justed accordingly. When the details of the incumbent of review is modernization, replacing archaic analog service are known, in terms of coding, modulation, applications with more spectrum-efficient digital ones. and framing protocols, overlay and underlay services No single approach to spectrum management exceeds can be engineered for cooperation without interfer- all others in terms of general utility, but there should ence. Nevertheless, when details of the primary service be a bias in favor of spectrum custodians in either the change, interference may arise anew. For this reason, public or the private sector with vested interests in ef- all secondary uses should be required to back off and ficient use. Sufficient spectrum exists, in principle, to even shut down completely until they can be certified meet projected user requirements for mobile network- as non-interfering with the primary license holder. ing. There is not sufficient spectrum that we can af- The principle use of secondary services should be in ford to waste large swathes on speculative projects of areas where the primary user is not active; this is the uncertain utility, however. A reasonable approach is logic behind the Dynamic Frequency Selection (DFS) embodied in the White Spaces order, where all licenses system in IEEE 802.11a Wi-Fi. This system requires The informaTion Technology & innovaTion foundaTion | march 2010 page 5
  • 13. Wi-Fi systems to look for the use of radar on certain channels, and to refrain from using channels where ra- dar is found. In all cases, the burden falls on the secondary user to avoid causing interference with the primary user. Systems of enforcement for this principle need to be incorporated into all secondary use regulations; the White Spaces database has this capability. 10. allow the experiment to Continue The Internet as we know it today is the fruit of a 35- year experiment. In the beginning, it was the proto- typical science project, albeit one with government support shepherded by a highly skilled and dedicated band of researchers, champions, and developers out to prove that a new vision of networking was not only practical but superior to the old one. The mobile data network has a completely different creation story, originating in a commercial context and targeted toward adding an important new feature to the existing network without fundamentally altering its nature. Each of these networks has a story, a set of champi- ons, and a vision. Each has been transformative in its own way, giving rise to its own industry, and liberating some vital element of human society along the way. It’s not surprising that the convergence of these networks should occasion debate and conflict, some of it intense and heated. The way forward requires some give and take. It’s not enough to impose the Internet’s operational traditions on the mobile network, because the Internet’s opera- tional community has chosen not to adopt the Internet standards most relevant to mobile networking: RSVP, IntServ, and Mobile IP. It’s not enough for mobile op- erators to demand that Internet users abandon open access to the web at reasonable speeds in favor of a constrained system of locked-down portals and prox- ies. Each culture has things to learn from the other. The way forward is a careful, diligent, step-by-step process beginning with reviews of historical rules and precedents and ending in the creation of a new frame- work that will enable the next generation of network- ing to flourish. The evidence of an emerging consensus among responsible parties in the United States and Eu- rope suggests it’s well underway. The informaTion Technology & innovaTion foundaTion | march 2010 page 6
  • 14. Going Mobile: Technology and Policy Issues in the Mobile Internet T en years ago, the typical American advent of Broadband The advent of broadband networking changed this used the Internet through a dial- system in many ways: it sped up the Web and brought up modem. Going on-line was a indexers and mapmakers like Google and Yahoo! into the picture. It made e-mail a more useful, always-on dramatic event accompanied by a full range system, and it changed the choice formula for ISPs. of sound effects as the modem spat out a se- Instead of dozens of places to buy an equivalent low- speed service, we had a smaller number of broadband ries of tones to make a connection and then ISPs, but their service differences were real, and they actually competed on quality as well as price. More- exchanged screeches and whirs with the an- over, with the advent of broadband, the Internet began swering modem to assess the telephone net- to create different kinds of applications, such as the Voice over IP (VoIP) systems from Vonage and Skype work’s signal quality. With luck, the network that lowered our phone bills and systems like Napster might support 48 Kbps downstream and 33 and KaZaA that magically provided us with free enter- tainment (we later found it was pirated, of course.) Kbps upstream. The Internet Service Pro- Technically, it wasn’t hard to bring VoIP to an Inter- vider (ISP) industry was still emerging, and net dominated by the Web. VoIP is a narrowband ap- more likely than not the early Internet con- plication that scarcely consumes more bandwidth than a dialup modem. The technical demands of web surf- sumer dialed-in to a walled garden system ing are greater – all those pictures to download – but such as America On-Line or CompuServe. web surfing is on-again, off-again from the network’s point of view. Web pages require human time to read, The primary application of the day was e- and while that’s going on, the network has capacity to spare. Adding VoIP to this system was just like pouring mail, but the adventurous explored Usenet sand into a bucket of rocks. There was plenty of room discussion groups and tried this new thing to spare as long as we weren’t too carried away with the free entertainment on The Pirate Bay. called The Web. The Web was challenging because it didn’t have a map, the pages were From the consumer’s point of view, the transition from dial-up to broadband was perfectly seamless. full of strange acronyms and opinions, and With broadband the web got faster, applications be- came more enjoyable, and eventually the Internet be- pictures dribbled onto the screen at a snail’s came more or less indispensible, despite the nuisance pace. Surfing the web was like wandering of spam and the occasional virus. We were no longer locked-in to the small community on AOL; we could the public library with your eyes closed and be inspired as well as irritated by people all over the picking books off the shelf at random: al- world and we had much of the world’s vast stores of information, commerce, learning, and cultural heritage ways unexpected. at our fingertips. The informaTion Technology & innovaTion foundaTion | march 2010 page 7
  • 15. Rise of the Cell phone whims of billions of people as they live their lives, at While the Internet was permeating modern life, a par- their desks or moving through the world with the flow allel development was taking place that would have of experience. perhaps even greater significance for billions of people all over the world. On April 3, 1973, Martin Cooper, Even with all of network magic we enjoy today, we’re the general manager of Motorola’s Communications still at a very early stage in the development of the Mo- Systems Division, had placed the first telephone call bile Internet; with any luck, we’ll one day look back ever from a portable cell phone. By the turn of the to where we are today the same way we remember the century, cell phones were common business tools, and dial-up era, wondering how we could ever have been they eventually became the preeminent global means so naïve as to tolerate the limitations of the bygone era. of personal communication at a distance. For billions The flowering of the Mobile Internet will only come of people in the undeveloped world, the cell phone was to pass, however, when engineering and policy col- the first telephone they ever had, and it quickly became laborate to successfully overcome the major challenges the indispensible means of communicating. standing in the way of the development of a Mobile Internet that lives up to its full potential. For this to Inevitably, these two transformative technologies be- happen, policymaker must refrain from strangling the gan to merge, giving rise to an ocean of social and eco- Mobile Internet with excessive regulation. nomic benefits and to a host of policy challenges. The Internet had a legacy of distributed computers, open Reader’s guide to the Report systems designed around end-to-end arguments, a reflec- This report consists of two major parts, the first on tion of its heritage as a tool originally built to stimulate technology and the second on policy. The technology academic research in the new communications tech- section is a deep dive into the history and develop- nology known as packet switching.2 Cellular telephony ment of both the wired Internet and the mobile net- had a more humble legacy, as it simply aimed to extend work, ending in an explanation of the way the mobile the reach of the existing telephone network, not re- network connects to the Internet. The information in place it wholesale with a bombproof alternative. these sections informs the policy discussion that fol- lows by showing implications that policy choices have Convergence on technical evolution. At the conclusion of the tech- From the engineering viewpoint, the cell phone net- nology section, the patient reader is rewarded with a work and the broadband Internet could hardly be palate-cleansing glimpse at new and emerging applica- more different: one is mobile, the other locked-down tions before the report turns fully to policy matters. in space; one is high capacity, the other narrowband; one is personal and intimate, involved in relation- One of the challenges the Mobile Internet faces is the ships where “content” doesn’t exist until the moment reconciliation of the norms of two technical cultures it’s communicated, the other is part of a wide-open, that have always seen the world in different ways. C. always-on system that pulls information from multi- P. Snow was much too optimistic when declared there ple sources at once, and one is built around portable was a single technical culture; in fact, with respect to battery-powered devices, while the other draws power the mobile Internet, there are two. The other policy from a plug. challenge relates to radio spectrum, which has various- ly been called the lifeblood, the oxygen, and the energy People now want both the Internet and mobility, so of the Mobile Internet. The report concludes with a it became necessary to bring the Internet to the cell series of recommendations for policymakers on the key phone, just as it had once been brought to the home issues before them in the United States. phone, and vice versa. The mobile Internet borrowed some of Steve Jobs’ pixie dust and transformed the cell ISSUeS IN INTeRNeT DeSIgN aND OpeRaTION phone into a smartphone, and then expanded the mo- There’s a tendency to view the Internet as a force of na- bile network from narrowband to broadband. It’s now ture, something that sprang up spontaneously. In fact, beginning to rebuild the Web into a personalized, real- it’s a man-made system was designed by engineers in a time system that responds to the locations, tastes, and cultural context that could easily have been designed The informaTion Technology & innovaTion foundaTion | march 2010 page 8
  • 16. Figure 1: Classical Internet protocal Version 4 Header 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification Flags Fragment Offset Time To Live Protocol Source of IP Address Destination IP Address Options Padding differently. The different orientations of the Internet’s IP is very simple, and is in fact is more a format than “Netheads” and the telephone network’s “Bellheads” a protocol since it doesn’t describe any specific se- are the source of much unnecessary conflict. Often- quences of behavior; it’s easily implemented over any times it seems that members of these tribes disagree packet-switched network. TCP, on the other hand, is a with each other for the sake of it, but most of their en- complex, high performance system that can keep mul- gineering differences are related to the relative impor- tiple packets in flight between source and destination, tance of different kinds of applications within their a crucial requirement of high delay satellite networks. networks. TCP is easily an order of magnitude more complex than the rudimentary end-to-end protocols of the day Brief History such as IBM’s Binary Synchronous Communications The Internet was conceived in the early- to mid- and ARPANET’s Network Control Program. 1970s to interconnect three research networks: AR- PANET; the San Francisco Bay Area Packet Radio The Internet design team allocated functions as they Network (PRNET); and the Atlantic Packet Satellite did in order to provide the greatest opportunities for experimentation with network protocols. Subsequent- Net (SATNET).3 By 2010 standards, these constitu- ly, researchers developed end-to-end arguments aligning ent networks were very primitive; each was the first such function placement with a general theory of dis- of its type and computer technology was much less tributed system design, and in so doing inadvertently advanced than it is today. Each was built on a differ- generated elements of the policy argument that has ent technology, and each was separately administered. come to be known as network neutrality. End-to-end As the operational parameters of these networks var- in the hands of the policy community has very differ- ied radically, designers of the Internet protocols, led ent implications than it has in the engineering world.6 by ARPA’s Bob Kahn and Vint Cerf, couldn’t rely on network-specific features to pass information between Modularity networks; instead, they adopted a lowest common de- The Internet is a collection of separate, replaceable ele- nominator approach for the Internet Protocol (IP), ments called “modules” by engineers; its overall struc- the “datagram” network abstraction borrowed from ture has been described by philosopher David Wein- France’s CYCLADES network.4 In order to match berger as “small pieces loosely joined”.7 the speeds of sending and receiving stations (called “hosts,” following timesharing terminology), the de- Modular design decomposes a technical system into signers developed a sliding window overlay above IP functions that can be implemented in separate compo- called Transmission Control Protocol (TCP) that con- nents called “modules”. “Platforms” such as the Web formed to the model established by the CYCLADES are collections of modules. This strategy, sometimes Transfer Station protocol.5 called “divide and conquer,” has a number of benefits. The informaTion Technology & innovaTion foundaTion | march 2010 page 9
  • 17. It enables functions to be specified, developed, and RFC 795 specified the interpretation of the Type of tested in isolation from the rest of the system, facili- Service field by ARPANET, PRNET, SATNET, and tates reuse of modules in different systems, and makes AUTODIN II.9 Because the Internet design delegates it easy to improve the implementation of a function such matters as service differentiation to physical net- without destabilizing the entire system. works, a myth has developed to the effect that the In- ternet is a “stupid network” that can’t differentiate. In Modular design is practiced in a number of technical fact the Internet leaves all functions not directly perti- fields, including computer science and network engi- nent to cross-network packet formatting and payload neering. As the seminal work on modular computer processing to individual networks; the Internet is not systems design was presented at the same forum as the hostile to service differentiation, but differentiation is seminal work on the design of ARPANET, it’s fair to outside the scope of internetworking. say that modular computer systems and the Internet developed hand-in-hand.8 Modular design separates functions and creates design hierarchies. Modular systems such as the THE multi- Internet design begins by distinguishing internetwork- programming system and the Internet protocols orga- ing from networking, thus confining the Internet’s role nize vertically, into higher-level and lower-level func- to interconnecting networks rather than providing ba- tions, where dependency increases with altitude. sic network services. This important element of Inter- net design often escapes policy advocates, who mis- The Internet’s modular design produces benefits for takenly believe that the Internet specifies a particular innovation by creating platforms that simplify applica- method of network operation. An Internet is a virtual tion development. Just as physical networks are plat- network (or a “meta-network”) that works with net- forms for IP datagrams, IP datagrams are a platform works as they are, imposing a minimal set of require- for TCP, which in turn is a platform for the web, which ments. is a platform for Facebook, which serves as a platform The Internet doesn’t care whether a member network for Facebook applications. Each platform simplifies is public or private, fair or unfair, fast or slow, highly the creation of new applications by managing aspects reliable or frequently broken. The operator of an In- of the application, but this simplification comes at a ternet member network may route all packets on equal cost in terms of efficiency. terms, and he or she may differentiate. Internet modularity preserves the opportunity for ex- IP was initially designed to preserve service informa- perimentation on applications that take the Internet as tion that may have had no meaning outside a particular a platform, and on the elements of the Internet itself, member network, such as the Type of Service specified such as TCP, IP, and the systems of naming, routing, in bits 8 – 15 of the IP header and subsequently rede- and security. fined by the Differentiated Services protocol. MINI-TUTORIaL: WHy IS INTeRNeT DOWNLOaDINg FaSTeR THaN UpLOaDINg? Each of the 1.6 billion Internet users in the world relies on fewer than 1,000 Internet Exchange Points or IXPs to get from one network to another. Between the consumer and the nearest IXP are a number of switches that “aggregate” or combine packets sent on lower speed data links onto higher speed data links. In the opposite direction, each of these switches “disaggregates” or un-combines. The number of times a wire can be aggregated is limited by the speed of the fastest technology the IXP can buy, and by the number of networks the IXP can interconnect. Currently, most IXPs interconnect ISP networks at 10 Gbps. Upload speed is therefore limited by the Internet’s traditional methods of operation. High-speed Content Delivery Networks don’t aggregate as much as large ISP networks, so their upload speeds are faster than those of ordinary consumers. The informaTion Technology & innovaTion foundaTion | march 2010 page 10
  • 18. MINI-TUTORIaL: IS THe INTeRNeT a FIRST-COMe, FIRST-SeRVeD NeTWORk? Many advocates of anti-discrimination regulations insist that the Internet has always handled all packets on a first-in, first-out basis. This common simplification has never been true. Internet edge routers, the devices that connect ISP networks to the Internet core, are typically configured to apply a “weighted fair queuing” algorithm across either packet streams or users to ensure fair and equal access to common resources. Simply put, fair queuing systems select packets from each user in round-robin fashion. Advocates of the first-in, first out rule confuse the reality of network management with the simplified public story. efficiency of applications to transfer information quickly. It also The design of the Internet generally sacrifices effi- contains a feature called “multiplicative backoff” that ciency to flexibility, as one would expect in a research divides the application’s self-imposed bandwidth quota network. in half in response to each indication of congestion. The net result of these features is to prevent Internet The separation of functions required by modular de- core data links (communication circuits) from utiliz- sign tends to reduce system efficiency by partitioning ing more than 30 percent of designed capacity.11 Given information, increasing generalization, and imposing that Moore’s Law has caused data links to become interface costs. An application that relies on a platform cheaper and faster since this system was deployed, its function for authentication, for example, has to request benefits in terms of stability outweigh its inefficiency. and wait for authentication services from the platform. The same calculus does not apply to wireless data links, As the platform is more general than the application, however. its way of performing authentication may require more processing time than the application would require if Manageability it performed this task itself; the benefit is that the ap- The Internet is relatively weak in terms of manage- plication programmer doesn’t need to worry about au- ability, in contrast to its constituent physical networks. thentication and can focus on the more unique aspects ARAPNET was managed from a central control point of application logic. in Cambridge, Massachusetts, where operators were Modular organization lends generality to systems, able to view the status of each separate data link from simplifying higher-level components, but in so doing a single console, as PSTN operators can do. The In- increases the information-processing burden. In most ternet standard for network management, the Simple cases, this is a reasonable tradeoff: skilled system pro- Network Management Protocol (SNMP) relies on a grammers are highly paid, and hardware components system for viewing and modifying the state of physical are cheap; modularity reduces the number of software network components that hasn’t responded well to se- bugs; and modular systems can re-use components curity challenges or the sheer growth in the Internet’s developed and verified in other systems. In cases size, although it has proved helpful in tracking down where efficiency is a paramount goal, modularity can cybercriminals in some cases.12 SNMP is dependent in be a burden if the system is not so well designed that any case on physical network facilities. In response to modules are partitioned exactly according to natural SNMP’s weaknesses, the members of the Broadband boundaries. Forum (mainly network operators) have devised an al- ternative system more aligned with the security norms There are many examples of the Internet’s inefficiency of telephone network management, TR-069.13 in action. The best well-known concerns the Internet’s congestion control system, implemented between in- The elements of the Internet unique to internetwork- terior IP routers and end-user systems.10 This system ing, principally routing and the information exchanges requires new connections to begin in a low through- that make routing possible, are handled by IETF stan- put condition called “slow start,” defeating the desire dards such as Border Gateway Protocol (BGP). BGP The informaTion Technology & innovaTion foundaTion | march 2010 page 11
  • 19. was thrown together hastily in order to allow the tran- It’s likely that significant changes are coming to the sition of the Internet from the subsidized NSFNET Internet in order to improve basic manageability, espe- backbone to the current system where for-profit enti- cially in the routing function, so historical limitations ties provide network interconnection and packet tran- in BGP shouldn’t drive the network regulation debate sit. While BGP had the ability to assign and exchange one way or another. Moreover, advances in congestion QoS information in routes, it was very rudimentary management are likely to connect economics with the due to unresolved research questions and “political” resolution of micro-congestion events. This is a rea- issues.14 Fundamentally, the problem of network-wide sonable approach for a user-financed Internet. QoS was complex and network operators were unmo- tivated to solve it in 1989 absent a compelling applica- Innovation tion need. Lackluster support for QoS routing and the The Internet has unquestionably served as a tremen- predominance of a single application slowed the devel- dously successful platform for innovation. Economic opment of large-scale QoS across the public Internet, powerhouses such as Google, Amazon, Yahoo!, eBay, which is one reason that net neutrality advocates in- Facebook, Twitter, Skype, and YouTube are household sist that the Internet is a “best-efforts network.” BGP names thanks to the Internet, and some have become doesn’t alter the nature of IP, however, and there are verbs in official dictionaries.18 Successful Internet in- ways around the initial limitations in BGP regarding novations are typically file transfer-oriented web ap- QoS. plications.19 Even video streaming, the Internet’s tele- vision analogy, is implemented on YouTube and Net- BGP is in crisis, according to a report issued by the flix “Watch Instantly” as a file transfer, which is why IETF’s Internet Architecture Board Workshop on traditional “trick play” VCR features such as fast for- Routing and Addressing in 2007.15 The transition to ward and rewind function so poorly on these systems. IPv6 and the onrush of new mobile users place re- Communication-oriented innovations such as Skype quirements on Internet edge routers that exceed the and other VoIP services don’t follow the file transfer pace of progress in fundamental computer hardware paradigm, but their share of the innovation space (as technology. well as their contribution to total Internet traffic) is relatively small. The Internet architecture and protocols also lack di- rect facilities for dealing with malicious behaviors such Web applications have predominated as long as the as bandwidth hogging and Denial of Service attacks, Internet has been a mass phenomenon, so the innova- which it relegates to network operators, IP routers, tion barrier that new systems have had to overcome is firewalls, and Network Address Translators. The ar- co-existence with the web. This hasn’t been difficult. chitecture needn’t address these issues since the con- Like sand poured into a bucket of rocks, VoIP uses the stituent networks are perfectly capable of handling capacity that the web can’t consume because of the on- them on their own. Some advocates insist that the again, off-again “episodic” nature of web access. Internet’s architecture makes “discrimination” impos- sible.16 It’s difficult to see where this naïve idea comes Because it takes human time to read web pages, the from, since every IP datagram displays source and des- web generates short periods of network activity fol- tination IP addresses, and IP’s most common payload, lowed by long periods (in computer terms anything TCP, prominently displays a destination port number over a millisecond can be considered “a long time”) of clearly identifying the application protocol.17 Most IP inactivity. VoIP is an adaptable, persistent, narrowband payload is carried in clear text, so this information is application that can run with an average allocation of 4 discernable to anyone with access to a shared network to 100 kilobits per second; it easily finds transmission link and an off-the-shelf protocol analyzer such as opportunities on all but the most overloaded broad- Wireshark. The clear-text IP format is practically an band facilities. invitation to discriminate. The informaTion Technology & innovaTion foundaTion | march 2010 page 12
  • 20. Figure 2: Hot potato Routing VoIP didn’t have any major problems on the Inter- to see more instances of friction between applications net until a second non-web category of innovation such as Skype and BitTorrent. Some advocates who emerged, peer-to-peer file transfer. Peer-to-peer appli- looked backwards can try to pretend that these con- cations such KaZaA and BitTorrent, used mainly for flicts are not real, but they are and they will test the piracy,20 have an appetite for bandwidth that exceeds ability of the regulatory system to respond effectively, that of VoIP and the web by several orders of magni- and its record thus far does not inspire confidence. For tude: The typical web page is 130 kilobytes, while the example, the FCC’s ruling on petitions filed against typical pirated video ranges from 350 to 1,400 mega- Comcast by peer-to-peer indexer Vuze, Inc. and a host bytes per hour, depending on resolution.21 The typical of law professors and public interest groups in 2007 peer-to-peer transaction is equivalent to loading two was troubling on both factual and legal grounds, and is web pages per second for an hour or two. likely to be overturned by the courts.23 Peer-to-peer also fills the spaces between the Internet’s Moreover, on today’s Internet, most innovation fric- rocks – the idle periods between web accesses – and tion takes place between some applications and other makes VoIP a challenging application, and it continues applications, not just between applications and network to do so after the user has downloaded a particular file operators. The net neutrality movement’s exclusive fo- since it is both a file server and a download client. His- cus on operator behavior obscures this very important torically, the Internet has relied on the good will and fact. good behavior of end users to prevent the instances of congestion that can cause applications to fail, but Subsidies peer-to-peer design chooses not to comply with these voluntary norms of conduct.22 The Internet’s current business models effectively sub- sidize content-oriented innovation. Packet routing fol- As innovation seeks opportunities beyond the web lows a model that assigns the lion’s share of informa- paradigm and applications diversify, we should expect tion transfer costs to the ISPs that are content receiv- The informaTion Technology & innovaTion foundaTion | march 2010 page 13
  • 21. ers, rather than content creators and middlemen. As mediate customers do in fact pay most of the costs of IETF member Iljitsch van Beijnum explains:24 transporting packets across the Internet. In this sense, it’s somewhat analogous to how consumers pay the Unless you go out of your way to make things hap- Post Office to have a package shipped to their house pen differently, Internet routing follows the early that they bought online or in a catalog: on the Internet, exit or “hot potato” model: when traffic is destined users “order packets” from other places and pay for for another network, it gets handed over to that net- most of their delivery. Whiteacre’s complaining not- work as quickly as possible by sending it to the clos- withstanding, this is not a bad system. est interconnect location. This economic system has unquestionably helped en- When ISP executives such as Ed Whiteacre, the for- able the Internet innovations with which we’re all fa- mer CEO of AT&T, complain about innovators “using miliar by lowering entry barriers to small, new content [ISP] pipes for free,” hot potato routing is part of the creators and aggregators. Preserving this financial sys- context, because handing a packet from one network tem is perhaps the central issue for network neutral- to another also hands over the costs of transporting ity advocates who characterize deviations from it as a it the rest of the way.25 When packets are handed over counter-productive wealth transfers from innovators as early as possible, hot potato style, the receiving net- to incumbent operators. As Institute for Policy Integ- work ends up paying the bulk of the costs for end-to- rity economists J. Scott Holladay and Inimai M. Chet- end packet transport. tiar say:26 The network diagram in Figure 2 helps us understand At its heart, net neutrality regulation is about who will hot potato routing between the Verizon customer in get more surplus from the Internet market. Retaining Richmond and the AT&T customer in San Diego. net neutrality would keep more surplus in the hands of Packets sent by the Richmond customer leave the Ve- the content providers, and eliminating it would trans- rizon network in Chicago, and are transported most of fer some surplus into the hands of the ISPs. Changing the way by AT&T. Packets sent by the AT&T customer wealth distribution would affect the ability and incen- leave the AT&T network in San Francisco, and are tive of the respective market players to invest in the transported most the way by Verizon. For streaming portions of the Internet they own. applications such as YouTube and Netflix, 99% of the traffic goes from server to user, so the receiving user’s Making retail Internet customers cover most of the network pays most transit costs. The question of sur- costs of generic IP transit isn’t the end of the story, plus doesn’t arise until transit costs are covered. however. When IP transit services are completely de- coupled from content, applications, and services, the When we combine the practice of hot potato routing economic incentives of network operators become es- with the fact that web users receive much more data pecially misaligned with those of the innovators whose than they transmit, by a factor two or more orders of systems depart from the traditional web model. If we magnitude, it becomes clear that ISPs and their im- want next-generation networks (NGN) to enable next- MINI-TUTORIaL: HOW DOeS THe INTeRNeT aDapT TO aLL THeSe DIFFeReNT NeTWORkS? The Internet’s secret is that its smallest and most fundamental element is nothing more complicated than a message format, which we call “Internet Protocol.” Protocols are usually complicated procedures, but IP is simply a way of organizing messages so that they can pass between networks. The U. S. Postal Service can pass postcards to Canada Post because both postal services share a common understanding of addressing (and revenue sharing,) not because they operate the same trucks, trains, and airplanes. The informaTion Technology & innovaTion foundaTion | march 2010 page 14
  • 22. generation applications, we probably need next-genera- Specific example: Inter-Domain Quality of Service tion economics to align incentives, by providing send- Quality of Service (QoS) is the technical term for sys- ers of packets (e.g., application and content providers) tems that match application requirements to available with the ability to pay a bit more to send packets by network capabilities. Some applications, most notable “Express Mail” rather the traditional best-effort “First telephone service, require low delay or latency be- Class mail.” The complete decoupling of applications tween on caller and another, and other applications from networks creates regulatory friction and the need simply require low cost. QoS differentiation was part for enhanced packet delivery systems. of the original design the Internet Protocol and of subsequent work by the Internet Engineering Task However, the subsidy for basic packet delivery that Force on the following standards: lowers entry barriers for small businesses evaporates for many larger ones. Most large content-oriented  Multiprotocol Label Switching (MPLS)28 firms use for-fee Content Delivery Networks (CDNs)  Differentiated Services (DiffServ)29 to deliver packets to ISPs from nearby locations with minimal transit expenses and faster and more reliable  Integrated Services (IntServ)30 delivery. Even though the large firm’s path to the ISP is  Real Time Protocol (RTP)31 short and relatively inexpensive, the cost of transport- ing a single copy of a movie to a CDN and then paying  Real-Time Streaming Protocol (RTSP)32 a higher fee for each copy the CDN delivers to the ISP  Resource Reservation Protocol (RSVP)33 is worthwhile from the Quality of Service (QoS) point of view. CDNs decrease ISP transit costs and reduce  Work in progress on Congestion Exposure the traffic load on the Internet core, so they represent  Work in progress on Inter-domain routing the happy alignment of interests that can come about when parties voluntarily choose to abandon subsidized In addition, ICANN has assigned numbers to popu- transport for enhanced service: quality improves, costs late portions of BGP Community Attributes with QoS are realigned, and the core becomes more robust. level identifiers. The idea that the Internet requires a These things are true when the ISP provides the CDN single service level persists because of the confusion service as well. between theory and practice, architecture and imple- mentation. Recall that BGP was created in a few short months If a blunt packet non-discrimination mandate were in effect, out of the necessity of replacing the NSF backbone, wireless operators would not be able to sell “bulk mail” packet at a time when nearly all Internet use was file trans- fer oriented. BGP is a mechanism that allows network delivery to firms like Amazon at attractive prices. operators to exchange routes based on policy, such that each partner network of a given network opera- tor can be shown a different set of routes tailored to An additional complication in the existing system of the business relationship between the networks. BGP allocating payments on the Internet arises in the so- is capable of advertising routes based on a variety of called “middle mile” networks between ISPs and In- internal policies, which may reflect QoS attributes. In ternet Exchange Providers (IXPs), especially in rural practice, BGP has not been used for this purpose sim- settings. As Christopher Marsden explains, Internet ply because networks have not chosen to include QoS regulators have long overlooked the economic role of routing in their terms of interconnection. The ability the middle mile: “until recently, many analysts did not to do this has always been present, but the will has fully appreciate that so much traffic on the Internet been lacking for a number of reasons. was monetized and had to pay its way.”27 High transit fees are the reason some small ISPs (e.g. Wireless ISP For one thing, there’s little to be gained in applying LARIAT in Laramie, Wyoming) ban the use of P2P QoS on the high-speed links (40 and 100 Gbps) that outright on their lowest-tier pricing plans. form the Internet’s optical core. Active QoS measures The informaTion Technology & innovaTion foundaTion | march 2010 page 15
  • 23. are most valuable on data links where load is highly BGP prefers more specific routes over general ones, so variable, but the core is so far removed from statistical as soon as the bogus Pakistani routes were advertised variations and so well provisioned for peak load that across the Internet they became the preferred routes QoS measures would rarely be invoked. Core traffic for everyone; a 24-bit network address, even if it’s fake, is aggregated from so many different sources that its is more specific than the 23-bit address advertised by contours only show slow diurnal variation. The value YouTube, even though it’s real. Making QoS a feature of QoS increases, however, as the packet traffic on the of routes would make it that much easier for malicious highest speed links is disaggregated onto slower links users or careless administrators to exhaust network re- with more variable load. The problem with imple- sources by elevating P2P to highest priority, for exam- menting QoS at this level, between origin network and ple. This would be disastrous for the victim network. destination network, is complicated by the fact that BGP insecurity is a second barrier to wide-scale QoS the operators of the relevant networks may not have deployment through the Internet core. a business relationship with each other. Consider two networks, A and B, who exchange packets through a common transit network, C. A and B both have busi- While network neutrality advocates fear change in the Internet, ness relationships with C, but not with each other. A and B have no reason to specify QoS with core net- engineers fear the lack of change. work C, for the reasons given. Hence, they have no agreement with each other for QoS. Nevertheless, it is a fact that most home gateways sup- Developing QoS relationships between non-core net- port user-controlled QoS, as do all major operating works would require a number of negotiations to take systems, as well as the Internet routers sold by major place that haven’t been necessary in the past. Core net- firms such as Cisco, Juniper, Huawei, and Alcatel. works – both Tier 1s and Tier 2s – can facilitate this Hence, the barriers to the implementation of end-to- process by adding QoS to the agreements they have end QoS across the Internet can be overcome. Ulti- with other, as some have done according to the cryp- mately, it’s an operational and business case problem tic information that’s publicly available about peering that can be addressed by ISPs when they see the need, agreements.34 What’s needed is a set of transitive35 so long as regulators haven’t foreclosed the option and agreements on core networks that transfer to edge an efficient marketplace exists in which these transac- networks automatically, essentially a marketplace like tions can be made. the stock exchange or eBay that allows the owners of the 30,000 networks within the Internet to make such Why the Internet Works deals. According to Professor Mark Handley of University College, London, the Internet “only just works.”36 It has Another reason that end-to-end QoS isn’t widely im- been architecturally stagnant since 1993 because it’s plemented is that BGP is a fundamentally insecure difficult to make changes in such a large system except protocol. Network operators misconfigure BGP route as they’re motivated by fear: advertisements on a regular basis, and a number of at- tacks are trouble for BGP. …technologies get deployed in the core of the Internet when they solve an immediate problem The best-known example of this was the misconfigu- or when money can be made. Money-making ration of routes to YouTube by a network technician changes to the core of the network are rare in- in Pakistan intended to block access from within that deed — in part this is because changes to the core country. YouTube had a block of IP addresses consist- need to be interoperable with other providers to ing of a 23-bit network number and 9-bit host num- make money, and changes that are interoperable bers. The Pakistani technician set his router to adver- will not differentiate an ISP from its competi- tise two 24-bit network numbers for YouTube, which tors. Thus fear seems to dominate, and changes allowed his equipment to block requests to YouTube have historically been driven by the need to fix (network administrators call this practice “blackhol- an immediate issue. Solutions that have actu- ing.”) ally been deployed in the Internet core seem to The informaTion Technology & innovaTion foundaTion | march 2010 page 16
  • 24. have been developed just in time, perhaps be- …there has been no substantial change at layer cause only then is the incentive strong enough. 3 [IP] for a decade and no substantial change In short, the Internet has at many stages in its at layer 4 [TCP] for nearly two decades. Clearly evolution only just worked. then the Internet is suffering from ossification. The original general-purpose Internet which IP Multicast, Mobile IP, Quality of Service, Explicit could evolve easily to face new challenges has Congestion Notification, secure BGP, and secure DNS been lost, and replaced with one that can only are all significant enhancements to the Internet ar- satisfy applications that resemble those that are chitecture that solve real problems and have not been already successful… widely adopted (although we are finally making prog- ress with DNS.) One of the implications of the Inter- … The number of ways in which [the Internet] net’s end-to-end architecture is that major changes need only just works seems to be increasing with to be implemented among all, or at least most of the time, as non-critical problems build. The main hundreds of millions of end-user computers and net- question is whether it will take failures to cause work routers that comprise the Internet. Greed alone these problems to be addressed, or whether they has never been sufficient to motivate such change, only can start to be addressed before they need to be collapse or near collapse has been a sufficient. The In- fixed in an ill co-ordinated last-minute rush. ternet itself only replaced ARPANET’s NCP protocol because ARPA issued an edict that users had to up- Primarily, the Internet works because network opera- grade to TCP by January 1, 1983 or lose access to the tors spend enormous amounts of money to ensure it network. works as well tomorrow as it did yesterday when the workload was less. It doesn’t solve any problem – other While network neutrality advocates fear change in the than file transfer – especially well, but it solves many Internet, engineers fear the lack of change:37 problems just well enough for general utility. The backlog of non-deployed enhancements and upgrades Figure 3: Mobile Technology Summary39 Channel Peak Typical 3GPP Efficiency Delay Year Coding Modulation MIMO Width in D/L D/L version bits/Hz ms. MHz Mbps Mbps EDGE 1997 TDMA QPSK 5 0.5 500 WCDMA Rel 99 1999 WCDMA 1.8 150 HSDPA Rel 5 2002 3.6 100 HSUPA Rel 6 2004 7.2 0.7 - 1.7 75 7.2 HSPA 16 QAM 14.4 14.4 HSPA+21 Rel 7 2007 64 QAM 21.6 1.5 - 7 HSPA+28 Rel 7 2x2 28 HSPA+42 2009 10 42.2 HSPA+84 2010 2x2 10 84 DFTS/ LTE Rel 8 2009 2x2 1.4 - 20 150 4 -24 1.69 25 OFDM LTE OFDMA/ 4x4 300 2.67 Rel 10+ 2011 10 - 100 100 <25 Advanced SCDMA 8x4 1000 3.7 The informaTion Technology & innovaTion foundaTion | march 2010 page 17
  • 25. is growing, as is the friction between new devices, new Data services on mobile networks were initially enabled applications, and new users and the installed base. by the Cellular Digital Packet Data (CDPD) standard developed in the early 1990s. CDPD provided data The most immediate stimulus for a wholesale upgrade transfer rates of 9.6 to 19.2 Kbps, roughly comparable of the Internet architecture – the only thing that might to PSTN modems; it was adopted by AT&T, Cingular motivate a major improvement in the design of TCP and Palm. Primarily noteworthy for providing digital and IP – is address depletion, using up all possible service over the analog cell phone networks of the day, IPv4 addresses. Unfortunately, the large-address re- CDPD demonstrated the utility of data over mobile placement for IPv4, IPv6, does not sufficiently address networks. It was subsequently replaced by faster, all the myriad of small but growing problems that hold digital systems such as EDGE, WCDMA, HSPA and convergence back. IPv6 deployment will cause a crisis HSPA+; the next big phases of mobile networking are in edge router design because it will cause a massive LTE and LTE Advanced, data-oriented architectures. increase in the number of routes each edge router must When mobile networks convert to LTE, the transition hold in its specialized memory, however, and the reso- from a voice-centric to a data-centric network will be lution to that problem may enable necessary changes complete. to be made.38 Opportunities to upgrade the Internet’s major protocols – BGP, IP, and DNS – are few and far The data rates of these systems have doubled roughly between, so they can’t be squandered. every 30 months, as predicted by Cooper’s Law.40 By It would be unfortunate if well-meaning regulators way of contrast, Butter’s Law predicts that the data rate added to the Internet’s general ossification by forbid- of optical fiber doubles every nine months; these rates ding necessary and constructive changes while the of improvement are different because they reflect the question of the Internet’s future architecture remains differential effects that Moore’s Law has on different unresolved. semiconductor processes. Moore’s Law affects mass- market chips built in the newest fabs, but many radio parts are analog components whose manufacturing ISSUeS IN MOBILe NeTWORk DeSIgN aND Op- process progresses more slowly. It’s also the case that eRaTION air is a more challenging medium for data communica- While the Internet was designed to support a simple tion than copper or optical fiber; some have said that group of low duty cycle applications (remote login, wireless is a generation behind wired systems and al- e-mail and occasional file transfer) for locked-down ways will be. computers shared by a modest number of highly- skilled, trustworthy users in a non-commercial set- This is important because the rate of progress for In- ting, mobile telephony’s heritage is one of real-time ternet applications is largely driven by price/capacity communication-oriented applications, large numbers improvements in physical networking since the virtual of mobile users, and personal devices competing for network – the Internet protocols – has been stagnant market share. It’s not surprising that there’s friction since 1993. As Internet use shifts to wireless networks between Internet culture and mobile culture. with slower intrinsic rates of advance, we might ex- pect a slower overall rate of innovation, assuming all Brief History other factors remain constant. We should also expect The mobile network was originally designed to serve increased fracture between mobile applications and as an extension of the telephone network that added stationary ones, in part because the bandwidth gap be- mobility at the network edge without altering the tele- tween the two can only grow larger but also because of phone network’s fundamentals. Initially, it used ana- intrinsic differences between fixed and mobile applica- log technology, and converted to digital in the 1990s. tions. Such factors are among the causes of application Data services were a special feature added on to the diversity. These factors combine in such a way as to mobile network roughly during the period of its transi- suggest that innovation will actually accelerate. tion from analog to digital. As presently operated, the mobile network is still more efficient at providing tele- phone service than data service. The informaTion Technology & innovaTion foundaTion | march 2010 page 18