SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011



  A Social Welfare Approach in Increasing the Benefits
       from the Internet in Developing Countries
                                              Elly A. Gamukama1, Oliver B. Popov2
                             1,2
                                   Department of Computer and System Sciences, Stockholm University
                                       Forum 100, Isafjordsgatan 39, SE-16440, Kista, Sweden.
                                                Email: {gamukama, popov}@dsv.su.se

Abstract— The paper examines the Internet usage and its                      There are well established findings showing that
market environment in developing countries under the                     protocols insensitive to fair sharing of network resources
perceived assumption that the Internet is one of the most                among users may lead to flow starvation and system
important drivers for development. It gives an insight on
                                                                         imbalances which may further deteriorate QoS delivered. The
processes’ (both unintended and intended) implications and
their effects on achieving real Internet benefits in the
                                                                         later phenomenon causes user dissatisfaction and creates a
environments where network infrastructures are limited such              negative perception of the Internet potential to development.
as the ones found in the developing regions. A welfare based             In regions with limited network infrastructures the usual
approach is proposed in which the Internet providers and end-            solution has been “more money for capacity increase”. As
users identify a set of objective that leads them in achieving           one of the means for profit maximization this has arguably
increased benefits. Analytical model of the main                         denied a large number of low-income earners (and in particular
characteristics in the approach is presented and eventually              those from rural areas) from accessing the Internet and its
shown how the end user bit rate could be regulated based on              benefits. One of the possible ways to remedy the situation is
the utility bounds that lead general satisfaction to all users.
                                                                         the societal approach in which the Internet providers and
User satisfaction signifies delivery of expected QoS and as
well as willing to pay for such services.
                                                                         end-users identify a set of objective that lead to optimal
                                                                         benefits. The discourse reflects the present nature of the
Index Terms—welfare, benefits, fairness, Internet, user                  Internet hierarchical market in developing countries. The
satisfaction, social-economic progress                                   Internet market is viewed as a 3-level hierarchy, whereby the
                                                                         topmost level is the Network Provider (NP), middle is the
                         I. INTRODUCTION                                 Internet Service Provider (ISP) that normally sells the
                                                                         broadband to the third/bottom level who is the end-user. In
    Information and communication technology and                         this context the end-user can be a corporate or a residential
development (ICTD) is a research area that has broadly                   consumer. In view of the liberalization of the telecom sector
captured the attention of the public and the academics in the            in developing countries due to the lack infrastructures, most
last two decades. It deals with the interaction and the relations        private companies have setup their own to provide the
between the humans and the society in general on one side                Internet services. Therefore, our approach combines the roles
and the technology on the other side. The focus is on the                of NP and ISP into one termed as the Network Service Provider
computing and communication technology, including the                    (NSP). Under such a market setup, we conceptualize a societal
Internet, which is seen as one of the enablers for economic              approach based on the concept of fairness and efficiency
and social growth. The benefit of the Internet connectivity              that leads in establishing optimal point in achieving the
and usage in inducing and enhancing positive social changes              benefits from the Internet delivered services that could foster
in basic dimensions1of human life is generally accepted as               development (a hypothetical thought that a higher
one of the most important drivers for development [1, 2].                penetration of Internet can influence many aspects of life: -
Hence the success and the inevitability of the Internet in the           economic productivity, health, education, democracy, etc.).
developed world underline its proliferation and diffusion                We quantify the forethought benefits of NSP from the point
essential in less developed countries. However, sometimes                of profit maximization. While the end-user (or the Internet
these processes are being impaired by unintended and                     consumer) benefits are modelled from utility maximization of
intended consequences created by the social dynamics                     the connectivity paid for in respect of ones preferential needs.
coupled with market environments. This paper attempts to                 A tradeoff analysis among these concepts through both
give an insight in both unintended and intended implications             analytical proofs and simulation experiments establishes a
and their effects in the environments where network                      feasible region that guarantees delivery of selected services
infrastructures are limited such as the ones found in the                considered essential for fostering development. The gist for
developing regions. Examples of the former (unintended) are              the efficiency-fairness tradeoff presented within this
the protocols being used and the applications being preferred,           approach is to control the distortion of fairness concept in IP
while insistences of the later (intended) are the objectives of          based capacity-constrained networks, which is essential in
the network providers for profit maximization.                           developing regions where there is deficiency in network
1 Basic dimensions = economic productivity, health, education,           capacity. Therefore, the goal is to parameterize tradeoff
democracy, quality of life                                               between services equality (sensitivity to service fairness) and
© 2011 ACEEE                                                        29
DOI: 01.IJNS.02.04. 55
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


throughput maximization (sensitivity to effort fairness). This           resource. In most of the constrained networks, Internet traffic
address the issue of letting the users to go by there preferences        is predominantly characterized by a so-called best effort
in using different applications, but control the possible                approach. In this approach the end user´s traffic is basically
distortion such that the value “utility” end users get are fairly        handled by the end-to-end mechanism. That is, the chains of
equitable. Similarly, sensitivity to effort fairness addresses           network elements are left to handle the Internet traffic as
the issue of throughput maximization which is the cornerstone            efficiently as possible, but without any form of guarantee.
of NSP concerns. The rest of the paper is organised as follows;          Depending on the structure of the networks and their
Section II gives an insight on the unintended and intended               elements, instantaneous number of traffic flows, their
consequences as a result of the Internet usage vis-à-vis its             characteristics, time of the day, etc., different end users may
market environment from an end user social dynamics and                  experience different network performance. In case a network
NSP profit maximization perspectives. Section III discusses              is congested, then the anticipated network performance leads
the societal approach based on the welfare methodologies                 to disutilities and dissatisfaction of end users. We classify
that would increase the benefits for both parties (end users             origins of such anticipated network performance in the present
and NSP). Section IV, gives a conclusion of the paper and the            Internet architecture into three main domains as consumer
future outlook.                                                          (end user), NSP, and producer (content or service provider).
                                                                         1) In the consumer (end user) domain
II.   CONSEQUENCES OF THE INTERNET SOCIAL DYNAMICS VIS-À- VIS                Customer premise equipment: this is a central component
                     MARKET ENVIROMENTS                                  in the end users environment. It has an influence on the end
                                                                         user’s perception on the quality of the connection as it
A. Unintended and Intended Consequences
                                                                         connects to the NSP equipment. This is mainly due to
     In literature with respect to innovation and diffusion of           hardware, software, power levels of the equipment, and the
technology, the term “consequences” refers to the changes                connection medium. Connection medium: it makes a difference
that occur to an individual or to a social system as a result of         whether the end user is connected via an Ethernet, fiber links,
adoption or rejection of a technological innovation.                     or wireless via a WiFi, WiMAX or Bluetooth. It addition it
Consequences may take either or a combination of the                     matters whether other people are sharing the same home
following forms; desirable or undesirable, direct or indirect,           network and transport their traffic simultaneously over the
and anticipated or unanticipated [3]. Whichever outcome may              same links/channel. User preferences and behaviour usage:
be, the sole goal to introduce innovations to a client system            This is a component that greatly attribute to negative
is always in good faith expecting the desirable, direct, and             perceptions to end users mainly in weak infrastructure
anticipated consequences thought it is not always the case.              networks. An end user may intentionally or unintentionally
In lieu of the liberalization/privatization of the telecom market        start an application to access ones Internet based service.
in most of the developing countries, among others, states                Depending on the application design and its nature of the
anticipated the availability and affordability of the Internet           underlying network transport protocol, the application may
access that provides the end user (citizens) with a global               start multiple flows that results in congesting the network.
access to Internet based services. So that such a global                 2) In the NSP domain
access would open new opportunities that accrue positive                     Offered maximum bandwidth: this is the major factor that
benefits. While the NSP anticipated positive growth and                  determines end-to-end transmission rate. Besides the more
increased income from the Internet access provision                      direct technical factors related to the type of access network
business. Generally it should be noted that unlike in                    used (fixed or mobile), the actual network centric measure
developed countries where the introduction of the Internet               (packet loss, delay and response time) and the instantaneous
was mainly a result of the urge to ease communication                    number of users online sharing the using the same medium
between research groups, in developing countries it was                  (network link or the same frequency space) are also of grate
purely introduced for commercial gains. In this context the              importance. If the NSP is more driven by profit maximization
end user was seen are a consumer. Although over a decade                 and does not offer preferential treatment to end users, then
passed now an end user can be a consumer or a producer of                network performance may lead to different perception among
content or/and online services. Ideally the preferences of an            end users for the same Internet access subscription,
end user are basically driven by several attributes in choosing          depending on time and place. Differentiation between
the NSP. Some of the main attributes can be enumerated as                downstream and upstream: In capacity constrained networks
cost, speed, and reliability. But the sole goal for paying the           that tend to offer flat pricing on shared medium, NSP tend to
price for Internet access is to maximize its utility. In this            offer high download stream capabilities at the expense of the
context, the utility expresses the extent to which one can               upstream capabilities. This phenomenon ends up giving end
achieve the maximum benefit expected from ones’ preferred                users ford of uploading data a different perception of network
services that compensates for the expenditure made. However,             performance from those one that are merely
it is important to note that common end users only afford to             consumers.Network peering and Data routing: local NSP peer
pay for share medium. The resource (i.e. the bandwidth) is               with other networks. The traffic of the end user might be going
shared among the several end users. As each link capacity is             beyond the local/national network provider. Consequently
finite, the end users are essentially competing for the scarce           the NSP has no control on delays in another network domain.
© 2011 ACEEE                                                        30
DOI: 01.IJNS.02.04.55
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


Even if the local NSP offers a higher speed, there will be packet                                    A remedy to this situation, we classify the Internet
drops or delays at the peering router that will result in different                              services by their traffic class. Each traffic class has a network
perception of network performance to the end user.                                               resource demand that is reflected by its utility function. We
Consequently the only alternative the NSP could do is to                                         categorize services as shown in Table 1 below based on their
provider another route if available. But such a route might be                                   network resource demands and respective priori thought of
more expensive hence frustrating the end user too.                                               importance/relevance to low-income earners. The Service
1) In the producer domain                                                                        Relevance (SR) is ranked on the scale of 1 (Highest) to 5
     The perception of the QoS offered over the Internet also                                    (lowest) that indicates the deemed importance of the service
depends strongly on how the servers hosting the Internet                                         to development. Under the assumption that the user utility
page or Internet services are dimensioned, and how they are                                      of each traffic class is determined only by the allocated
connected to the Internet. For example a transcontinental                                        equivalent bandwidth         , we introduce a new parameter
access of a web page or Internet service is likely to deliver
low QoS if not blocked to an end user in developing countries                                                  into the utility function.       gives the weight of
considering the anticipated network influences as discussed                                      a traffic class flow based on its deemed level of importance
in the above two domains. In addition some online services                                       vis-à-vis other traffic classes in the network.
are unavailable or blocked from some users because of license                                    Further we characterize the networks from the point of striving
for use in a certain geographic area. OR the cost of the                                         to deliver services that meets user satisfaction levels while
bandwidth for accompanying adverts turns not to be cost                                          maintaining the tradeoffs within the feasible region. User
effective beyond a given number of hopes in the network or                                       satisfaction is a standard measure of network performance
beyond a targeted region. Although some large content and                                        [4] and user willing to pay for the service received from
service online services providers have sent up their our                                         microeconomics point of view.
backbone network in different regions of the world, end users                                                                  T ABLE 1
still can perceive different QoS depending on ones’ last-mile                                                 TRAFFIC CLASSIFICATION AND THEIR RELEVANCE
link.                                                                                                             (Details of        see annex A)
B. Social Dynamics and Internet Services
    However taking the considerations of the market
environment in the study area and the nature of the commodity
in trading, we note that the Internet is not like other types of
production services where producers are expected to compete
for customers only through their choices of price and types
of services. The Internet market has another force hereby we
refer to as “social dynamics1” of the Internet, which is a
consequence of the rapid technology innovations and user
generation age gap. The social dynamics introduce
applications on the network that have remarkable distinction
of quality of services (QoS) requirements. NSPs face a
challenge of providing such services that “we classify as
secondly in context of development but primary in
maintaining some of the clients demands/preferences despite
the fact that they glossily contribute to congestion over the
weak infrastructure. However, failure to meet such demands
cause looses of clients to the NSP. For example we consider e-
mail or/and VOIP as one of the primary class services in context
of development. While Internet gaming or/and IPTV as in the
secondary class. But to an NSP whose billing system is based                                            III. A SOCIETAL APPROACH FOR INTERNET ACCESS
on usage/volume-billing rather than rate-billing will gain more                                  A. Social goal of equal utility
profits from the secondary class clients. Such an incident                                           The goal of equal utility is that all users should get the
takes the efficiency-fairness tradeoff outside the feasible                                      same level of satisfaction from the network regardless of the
region that carter for all social class of users (haves and have-                                different services in their respective traffic classes. The
nots). Consequently the NSP goals of profit maximization on                                      framework adopts the concept of utility fair as criteria for
weak infrastructure are misaligned with the goals of Internet                                    capacity allocation in networks [6]. A point to observe is that
provision for development.                                                                       allotting equal utilities to all end-users across different types
2 In this context “social dynamics” refer to the currently shift or move from the use
of the traditional mode of services delivery to the Internet or IP based service delivery        of services in their respective traffic classes does not mean
mode. On a close view, we observe that there is an explosion in voice and video                  that they were allocated equal bandwidth across their different
applications that are constantly being used to deliver services to the end users. i.e.
from the traditional telephony systems to VOIP base (e.g. Skype, messenger, etc.).
                                                                                                 traffic classes. Users within the same traffic class have
TVs and Movies are constantly being watches on the Internet.                                     identical utility functions, thus the utility-fair bandwidth
© 2011 ACEEE                                                                                31
DOI: 01.IJNS.02.04. 55
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


allocation inside each class of user group also leads to the                NSP and traffic class function. Through this normalization
bandwidth-fair allocation that is within [           ,        ] rage        then the actual utility of the end user can be quantified.
for each class. Refer to annex A for details. Every traffic class           B. Utility based network modeling
has a required minimum bandwidth denoted as                 , and a
                                                                                We follow the works of Low and Lapsley [9], in which
maximum threshold bandwidth denoted by                     beyond           social utility was maximized by a bandwidth pricing algorithm.
which any allocation does not benefit the user/application.                 For a single link the optimization problem is as follows:
Based on clear and fair decisions, the NSP normalizes the
traffic taking considerations of the importance of various
traffic classes and user benefits. It is done by getting a product
of the scale        and traffic class utility function. Then actual
utility of the end user can be quantified. We elaborate this
characteristic through an example below. Demonstrating the                  In such a case the maximum total utility is thought as being
concept of social goal of equal utility across users irrespective           the sum of all utilities       that each user associates with
of the class type of service is our starting point. Consider a              ones’ allocated bandwidth               under link capacity
network consisting of a single link with a unity capacity being
                                                                            constraint . The users’ utility is strictly concave and increase
shared by two users s1 and s2. User s1 transfers data according
                                                                            with the allocated bandwidth that is bounded in the rage.
to an elastic application with strictly increasing and concave
                                                                                                     Beyond the utility marginal increase
bandwidth utility µ1(x1). User s2 transfers real-time video
                                                                            is almost zero and below the users’ utility becomes zero. The
data with a non-concave bandwidth utility µ2(x2). As shown
                                                                            centrality of optimization approach above and its solutions
in Figure 1 below, if the link capacity is shared equally using
                                                                            delivered through the Lagrange dual problem decomposition
commonly know max-min bandwidth allocation policy, each
                                                                            methods enable the network system (in this context the NSP)
user gets equal bandwidth of x = 0.5units, with corresponding
                                                                            to establish the aggregate link price      at optimal bandwidth
utility of µ1(x = 0.5) and µ2(x = 0.5) respectively. It is obvious
that for user s2 is not satisfied because the received bandwidth            allocation levels. Then price is passed over to the user who
does not reach the minimum required level for video encoding.               decides on what to purchase in view of what maximizes ones’
                                                                            objectives. The resulting net-utility of the user is normally
                                                                            formulated in the form of                     Really this problem
                                                                            solving is to let the user choose what one can afford to pay
                                                                            for in lieu of ones’ financial possibilities. Unlike the utility
                                                                            optimization form above, we propose a model that guides the
                                                                            user on what to take based on user preferences in lieu of
                                                                            services importance in context of development1. We assume
                                                                            that each service has a particular importance to its user
                                                                            relatively to ones’ preference. In addition the cost of network
                                                                            resource requirements for such a service should be in the
    Figure 1: Utility max-min and bandwidth max-min fairness                rage of users’ capacity to pay. On this basis we introduce the
Likewise, if the utility allocation policy ensures that the two             user preference parameter in the optimization that describes
users get equally utility, i.e. µ1(x1) = µ2(x2) = µ*, then                  the service utility (importance degree) in fostering
accordingly both users are satisfied, hence willing to pay for              development. Flows are differentiated based on the deemed
the services. The latter allocation policy represents the utility           importance degree of the services they deliver in accordance
max-min fair. The utility max-min algorithm was introduced in               to fostering development. We introduce a scalar value           in
[7] by Cao and Zegura and its architecture in [8] by Cho and                the utility function that depicts the traffic class importance
Chong. The social goal of equal utility across users is                     and the required QoS levels according to the user service
irrespective of the class type of service. A point to continue              preferences.
being observed is that equal utilities to the end-users across
different types of services do not mean equal bandwidth to                               IV. CONCLUSIONS AND FUTURE WORK
different classes or even to users within the same class type                   In this paper we have presented a social welfare approach
of service. As indicated in Table 1 above, all the traffic classes          that characterizes what would be the environment of the
have a required minimum capacity/bandwidth other than the                   Internet services in view of in view to raise the benefit of the
“Elastic” that can start from zero upwards. Similarly every                 end users and NSP developing regions. Analytical model of
traffic class has a maximum threshold bandwidth, beyond                     the main characteristics in the approach is presented and
which any allocation does not benefit the user/application.                 eventually shown how the end user bit rate could be regulated
Therefore the NSP, based on clear and fair decisions, has to                based on the utility bounds that lead general satisfaction to
normalize the traffic taking considerations of the importance               all users. At individual level we shall advance our study based
of various traffic classes and user benefits. The normalization             on the established utility levels that deem to deliver user
is done by getting a product of the scale determined by the                 satisfaction for a given traffic class. User satisfaction signifies
© 2011 ACEEE                                                           32
DOI: 01.IJNS.02.04.55
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


delivery of expected QoS and as well as willing to pay for                   [2] M. Warschauer and T. Matuchniak, “New Technology and
such services. Hence the focus remains on testing the actual                 Digital Worlds: Analyzing Evidence of Equity in Access, Use, and
benefits that foster a positive social change in one’s basic                 Outcomes,” Review of Research in Education, vol. 34, pp. 179-
dimensions of life from those traffic classes with high SR. We               225, March 2010.
                                                                             [3] E. M. Rogers, Diffusion of Innovation, 5th ed.: Free Press,
adopting the benefit function in [10], where individual benefits
                                                                             2003.
are computed and their aggregation lead us in achieving the                  [4] S. Shenker, “Fundamental Design Issues for the Future
group benefit. Here-forth referred to as the society’s welfare.              Internet,” IEEE Journal on selected area in Communications, vol.
                                                                             13, pp. 1176-1188, 1995.
                      ACKNOWLEDGMENT                                         [5] L. Shi, C. Liu, and B. Liu, “Network Utility Maximization for
                                                                             Triple-play Services,” Computer communications, vol. 31, pp. 2257
    This work is supported by the Swedish International                      - 2269, 2008.
Development Agency through her Department for Research                       [6] T. Harks, “Utility Proportional Fair Bandwidth Allocation -
Cooperation (Sida/SAREC) under the framework for                             An optimization Oriented Approach,” August 2004 2004.
strengthening national research capacity in developing                       [7] Z. Cao and E. W. Zegura, “Utility Max-Min: An Application-
countries. We gratefully acknowledge Sida/SAREC.                             Oriented Bandwidth Allocation Scheme,” 1999, pp. 793-801.
                                                                             [8] J. Cho and S. Chong, “Utility Max-Min Flow Control Using
                          REFERENCES                                         Slope-Restricted Utility Functions,” Communications, IEEE
                                                                             Transactions on, vol. 55, pp. 963-972, 2007.
[1] R. Gregory, S. Scott, and W. Donald, “Household demand for               [9] S. H. Low and D. E. Lapsley, “Optimization flow control I:
broadband internet service,” Communications of the ACM, vol. 54,             Basic Algorithm and Convergence,” IEEE/ACM Transactions on
pp. 29-31, Febuary 2011.                                                     networking, vol. 7, pp. 861-874, 1999.
                                                                             [10] D. G. Luenberger, “Benefit functions and duality,” Journal of
                                                                             Mathematical Economics, vol. 21, pp. 461-481, 1992.

                                           ANNEX A ( THE   PROOFS OF THE EQUATIONS REFER TO   [4])




3 Implication: the higher the importance of a service is deemed to
foster development, the lower the price for the capacity/bandwidth
to deliver it to the user.
© 2011 ACEEE                                                            33
DOI: 01.IJNS.02.04. 55

More Related Content

What's hot

1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-mainRizky Andawasatya
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
 
The Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkThe Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkCisco Service Provider Mobility
 
Heterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionHeterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
 
Big Broadband: Public Infrastructure or Private Monopolies
Big Broadband: Public Infrastructure or Private MonopoliesBig Broadband: Public Infrastructure or Private Monopolies
Big Broadband: Public Infrastructure or Private MonopoliesWayne Caswell
 
The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
 
Broadband Around the World final
Broadband Around the World finalBroadband Around the World final
Broadband Around the World finalJennifer Terry
 
Digital Service: Technological Agency in Service Systems, HICSS-52
Digital Service: Technological Agency in Service Systems, HICSS-52Digital Service: Technological Agency in Service Systems, HICSS-52
Digital Service: Technological Agency in Service Systems, HICSS-52Daniel Pakkala
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
 
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
 
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
 
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Kartik Mehta
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Siemens VoIP & Crisis Communications
Siemens VoIP & Crisis CommunicationsSiemens VoIP & Crisis Communications
Siemens VoIP & Crisis CommunicationsAlok Vasudeva
 

What's hot (18)

Chi2009 medhi toyama_2
Chi2009 medhi toyama_2Chi2009 medhi toyama_2
Chi2009 medhi toyama_2
 
2012 Minnesota Internet Survey: The Digital Divide 2.0 and Beyond
2012 Minnesota Internet Survey: The Digital Divide 2.0 and Beyond2012 Minnesota Internet Survey: The Digital Divide 2.0 and Beyond
2012 Minnesota Internet Survey: The Digital Divide 2.0 and Beyond
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
 
A0440113
A0440113A0440113
A0440113
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
The Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkThe Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality Framework
 
Heterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionHeterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology Adoption
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
 
Big Broadband: Public Infrastructure or Private Monopolies
Big Broadband: Public Infrastructure or Private MonopoliesBig Broadband: Public Infrastructure or Private Monopolies
Big Broadband: Public Infrastructure or Private Monopolies
 
The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)
 
Broadband Around the World final
Broadband Around the World finalBroadband Around the World final
Broadband Around the World final
 
Digital Service: Technological Agency in Service Systems, HICSS-52
Digital Service: Technological Agency in Service Systems, HICSS-52Digital Service: Technological Agency in Service Systems, HICSS-52
Digital Service: Technological Agency in Service Systems, HICSS-52
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
 
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...
 
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Siemens VoIP & Crisis Communications
Siemens VoIP & Crisis CommunicationsSiemens VoIP & Crisis Communications
Siemens VoIP & Crisis Communications
 

Viewers also liked

Integrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationIntegrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationFrancesco Flammini
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideIDES Editor
 
Mutual Information for Registration of Monomodal Brain Images using Modified ...
Mutual Information for Registration of Monomodal Brain Images using Modified ...Mutual Information for Registration of Monomodal Brain Images using Modified ...
Mutual Information for Registration of Monomodal Brain Images using Modified ...IDES Editor
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StoreIDES Editor
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIDES Editor
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...IDES Editor
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksIDES Editor
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeIDES Editor
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIDES Editor
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...IDES Editor
 
Shunt Compensation for Power Quality Improvement using a STATCOM Controller
Shunt Compensation for Power Quality Improvement using a STATCOM ControllerShunt Compensation for Power Quality Improvement using a STATCOM Controller
Shunt Compensation for Power Quality Improvement using a STATCOM ControllerIDES Editor
 
Analysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionAnalysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionIDES Editor
 
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...IDES Editor
 
Harmonic Minimization In Multilevel Inverters By Using PSO
Harmonic Minimization In Multilevel Inverters By Using PSOHarmonic Minimization In Multilevel Inverters By Using PSO
Harmonic Minimization In Multilevel Inverters By Using PSOIDES Editor
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Economic/Emission Load Dispatch Using Artificial Bee Colony Algorithm
Economic/Emission Load Dispatch Using Artificial Bee Colony AlgorithmEconomic/Emission Load Dispatch Using Artificial Bee Colony Algorithm
Economic/Emission Load Dispatch Using Artificial Bee Colony AlgorithmIDES Editor
 
Multilabel Classification by BCH Code and Random Forests
Multilabel Classification by BCH Code and Random ForestsMultilabel Classification by BCH Code and Random Forests
Multilabel Classification by BCH Code and Random ForestsIDES Editor
 
Income And Substitution Effect
Income And Substitution EffectIncome And Substitution Effect
Income And Substitution Effectnight seem
 

Viewers also liked (20)

Integrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationIntegrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportation
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
Mutual Information for Registration of Monomodal Brain Images using Modified ...
Mutual Information for Registration of Monomodal Brain Images using Modified ...Mutual Information for Registration of Monomodal Brain Images using Modified ...
Mutual Information for Registration of Monomodal Brain Images using Modified ...
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-Store
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for Engineers
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
 
Shunt Compensation for Power Quality Improvement using a STATCOM Controller
Shunt Compensation for Power Quality Improvement using a STATCOM ControllerShunt Compensation for Power Quality Improvement using a STATCOM Controller
Shunt Compensation for Power Quality Improvement using a STATCOM Controller
 
Analysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionAnalysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String Recognition
 
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...
Pentacene-Based Organic Field-Effect Transistors: Analytical Model and Simula...
 
Harmonic Minimization In Multilevel Inverters By Using PSO
Harmonic Minimization In Multilevel Inverters By Using PSOHarmonic Minimization In Multilevel Inverters By Using PSO
Harmonic Minimization In Multilevel Inverters By Using PSO
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Economic/Emission Load Dispatch Using Artificial Bee Colony Algorithm
Economic/Emission Load Dispatch Using Artificial Bee Colony AlgorithmEconomic/Emission Load Dispatch Using Artificial Bee Colony Algorithm
Economic/Emission Load Dispatch Using Artificial Bee Colony Algorithm
 
Multilabel Classification by BCH Code and Random Forests
Multilabel Classification by BCH Code and Random ForestsMultilabel Classification by BCH Code and Random Forests
Multilabel Classification by BCH Code and Random Forests
 
Income And Substitution Effect
Income And Substitution EffectIncome And Substitution Effect
Income And Substitution Effect
 

Similar to A Social Welfare Approach in Increasing the Benefits from the Internet in Developing Countries

ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
 
Interoperability issues for the Deployment of Unified Communications and Inte...
Interoperability issues for the Deployment of Unified Communications and Inte...Interoperability issues for the Deployment of Unified Communications and Inte...
Interoperability issues for the Deployment of Unified Communications and Inte...idescitation
 
A SESERV methodology for tussle analysis in Future Internet technologies - In...
A SESERV methodology for tussle analysis in Future Internet technologies - In...A SESERV methodology for tussle analysis in Future Internet technologies - In...
A SESERV methodology for tussle analysis in Future Internet technologies - In...ictseserv
 
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...IJNSA Journal
 
An overview of internet of things
An overview of internet of thingsAn overview of internet of things
An overview of internet of thingsTELKOMNIKA JOURNAL
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...CSEIJJournal
 
Telescript White Paper #4
Telescript White Paper #4Telescript White Paper #4
Telescript White Paper #4Jim White
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
 
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...IJCSIS Research Publications
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
B.Tech. Summer Training Report
B.Tech. Summer Training ReportB.Tech. Summer Training Report
B.Tech. Summer Training ReportShashank Narayan
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
 
Programmable networks
Programmable networksProgrammable networks
Programmable networksEricsson
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloadingMuthu Samy
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloadingMuthu Samy
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksIOSR Journals
 

Similar to A Social Welfare Approach in Increasing the Benefits from the Internet in Developing Countries (20)

ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
 
Interoperability issues for the Deployment of Unified Communications and Inte...
Interoperability issues for the Deployment of Unified Communications and Inte...Interoperability issues for the Deployment of Unified Communications and Inte...
Interoperability issues for the Deployment of Unified Communications and Inte...
 
A SESERV methodology for tussle analysis in Future Internet technologies - In...
A SESERV methodology for tussle analysis in Future Internet technologies - In...A SESERV methodology for tussle analysis in Future Internet technologies - In...
A SESERV methodology for tussle analysis in Future Internet technologies - In...
 
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
 
An overview of internet of things
An overview of internet of thingsAn overview of internet of things
An overview of internet of things
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
 
Telescript White Paper #4
Telescript White Paper #4Telescript White Paper #4
Telescript White Paper #4
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
 
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
B.Tech. Summer Training Report
B.Tech. Summer Training ReportB.Tech. Summer Training Report
B.Tech. Summer Training Report
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
 
Programmable networks
Programmable networksProgrammable networks
Programmable networks
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
C010130917
C010130917C010130917
C010130917
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of ThingsTowards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

A Social Welfare Approach in Increasing the Benefits from the Internet in Developing Countries

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 A Social Welfare Approach in Increasing the Benefits from the Internet in Developing Countries Elly A. Gamukama1, Oliver B. Popov2 1,2 Department of Computer and System Sciences, Stockholm University Forum 100, Isafjordsgatan 39, SE-16440, Kista, Sweden. Email: {gamukama, popov}@dsv.su.se Abstract— The paper examines the Internet usage and its There are well established findings showing that market environment in developing countries under the protocols insensitive to fair sharing of network resources perceived assumption that the Internet is one of the most among users may lead to flow starvation and system important drivers for development. It gives an insight on imbalances which may further deteriorate QoS delivered. The processes’ (both unintended and intended) implications and their effects on achieving real Internet benefits in the later phenomenon causes user dissatisfaction and creates a environments where network infrastructures are limited such negative perception of the Internet potential to development. as the ones found in the developing regions. A welfare based In regions with limited network infrastructures the usual approach is proposed in which the Internet providers and end- solution has been “more money for capacity increase”. As users identify a set of objective that leads them in achieving one of the means for profit maximization this has arguably increased benefits. Analytical model of the main denied a large number of low-income earners (and in particular characteristics in the approach is presented and eventually those from rural areas) from accessing the Internet and its shown how the end user bit rate could be regulated based on benefits. One of the possible ways to remedy the situation is the utility bounds that lead general satisfaction to all users. the societal approach in which the Internet providers and User satisfaction signifies delivery of expected QoS and as well as willing to pay for such services. end-users identify a set of objective that lead to optimal benefits. The discourse reflects the present nature of the Index Terms—welfare, benefits, fairness, Internet, user Internet hierarchical market in developing countries. The satisfaction, social-economic progress Internet market is viewed as a 3-level hierarchy, whereby the topmost level is the Network Provider (NP), middle is the I. INTRODUCTION Internet Service Provider (ISP) that normally sells the broadband to the third/bottom level who is the end-user. In Information and communication technology and this context the end-user can be a corporate or a residential development (ICTD) is a research area that has broadly consumer. In view of the liberalization of the telecom sector captured the attention of the public and the academics in the in developing countries due to the lack infrastructures, most last two decades. It deals with the interaction and the relations private companies have setup their own to provide the between the humans and the society in general on one side Internet services. Therefore, our approach combines the roles and the technology on the other side. The focus is on the of NP and ISP into one termed as the Network Service Provider computing and communication technology, including the (NSP). Under such a market setup, we conceptualize a societal Internet, which is seen as one of the enablers for economic approach based on the concept of fairness and efficiency and social growth. The benefit of the Internet connectivity that leads in establishing optimal point in achieving the and usage in inducing and enhancing positive social changes benefits from the Internet delivered services that could foster in basic dimensions1of human life is generally accepted as development (a hypothetical thought that a higher one of the most important drivers for development [1, 2]. penetration of Internet can influence many aspects of life: - Hence the success and the inevitability of the Internet in the economic productivity, health, education, democracy, etc.). developed world underline its proliferation and diffusion We quantify the forethought benefits of NSP from the point essential in less developed countries. However, sometimes of profit maximization. While the end-user (or the Internet these processes are being impaired by unintended and consumer) benefits are modelled from utility maximization of intended consequences created by the social dynamics the connectivity paid for in respect of ones preferential needs. coupled with market environments. This paper attempts to A tradeoff analysis among these concepts through both give an insight in both unintended and intended implications analytical proofs and simulation experiments establishes a and their effects in the environments where network feasible region that guarantees delivery of selected services infrastructures are limited such as the ones found in the considered essential for fostering development. The gist for developing regions. Examples of the former (unintended) are the efficiency-fairness tradeoff presented within this the protocols being used and the applications being preferred, approach is to control the distortion of fairness concept in IP while insistences of the later (intended) are the objectives of based capacity-constrained networks, which is essential in the network providers for profit maximization. developing regions where there is deficiency in network 1 Basic dimensions = economic productivity, health, education, capacity. Therefore, the goal is to parameterize tradeoff democracy, quality of life between services equality (sensitivity to service fairness) and © 2011 ACEEE 29 DOI: 01.IJNS.02.04. 55
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 throughput maximization (sensitivity to effort fairness). This resource. In most of the constrained networks, Internet traffic address the issue of letting the users to go by there preferences is predominantly characterized by a so-called best effort in using different applications, but control the possible approach. In this approach the end user´s traffic is basically distortion such that the value “utility” end users get are fairly handled by the end-to-end mechanism. That is, the chains of equitable. Similarly, sensitivity to effort fairness addresses network elements are left to handle the Internet traffic as the issue of throughput maximization which is the cornerstone efficiently as possible, but without any form of guarantee. of NSP concerns. The rest of the paper is organised as follows; Depending on the structure of the networks and their Section II gives an insight on the unintended and intended elements, instantaneous number of traffic flows, their consequences as a result of the Internet usage vis-à-vis its characteristics, time of the day, etc., different end users may market environment from an end user social dynamics and experience different network performance. In case a network NSP profit maximization perspectives. Section III discusses is congested, then the anticipated network performance leads the societal approach based on the welfare methodologies to disutilities and dissatisfaction of end users. We classify that would increase the benefits for both parties (end users origins of such anticipated network performance in the present and NSP). Section IV, gives a conclusion of the paper and the Internet architecture into three main domains as consumer future outlook. (end user), NSP, and producer (content or service provider). 1) In the consumer (end user) domain II. CONSEQUENCES OF THE INTERNET SOCIAL DYNAMICS VIS-À- VIS Customer premise equipment: this is a central component MARKET ENVIROMENTS in the end users environment. It has an influence on the end user’s perception on the quality of the connection as it A. Unintended and Intended Consequences connects to the NSP equipment. This is mainly due to In literature with respect to innovation and diffusion of hardware, software, power levels of the equipment, and the technology, the term “consequences” refers to the changes connection medium. Connection medium: it makes a difference that occur to an individual or to a social system as a result of whether the end user is connected via an Ethernet, fiber links, adoption or rejection of a technological innovation. or wireless via a WiFi, WiMAX or Bluetooth. It addition it Consequences may take either or a combination of the matters whether other people are sharing the same home following forms; desirable or undesirable, direct or indirect, network and transport their traffic simultaneously over the and anticipated or unanticipated [3]. Whichever outcome may same links/channel. User preferences and behaviour usage: be, the sole goal to introduce innovations to a client system This is a component that greatly attribute to negative is always in good faith expecting the desirable, direct, and perceptions to end users mainly in weak infrastructure anticipated consequences thought it is not always the case. networks. An end user may intentionally or unintentionally In lieu of the liberalization/privatization of the telecom market start an application to access ones Internet based service. in most of the developing countries, among others, states Depending on the application design and its nature of the anticipated the availability and affordability of the Internet underlying network transport protocol, the application may access that provides the end user (citizens) with a global start multiple flows that results in congesting the network. access to Internet based services. So that such a global 2) In the NSP domain access would open new opportunities that accrue positive Offered maximum bandwidth: this is the major factor that benefits. While the NSP anticipated positive growth and determines end-to-end transmission rate. Besides the more increased income from the Internet access provision direct technical factors related to the type of access network business. Generally it should be noted that unlike in used (fixed or mobile), the actual network centric measure developed countries where the introduction of the Internet (packet loss, delay and response time) and the instantaneous was mainly a result of the urge to ease communication number of users online sharing the using the same medium between research groups, in developing countries it was (network link or the same frequency space) are also of grate purely introduced for commercial gains. In this context the importance. If the NSP is more driven by profit maximization end user was seen are a consumer. Although over a decade and does not offer preferential treatment to end users, then passed now an end user can be a consumer or a producer of network performance may lead to different perception among content or/and online services. Ideally the preferences of an end users for the same Internet access subscription, end user are basically driven by several attributes in choosing depending on time and place. Differentiation between the NSP. Some of the main attributes can be enumerated as downstream and upstream: In capacity constrained networks cost, speed, and reliability. But the sole goal for paying the that tend to offer flat pricing on shared medium, NSP tend to price for Internet access is to maximize its utility. In this offer high download stream capabilities at the expense of the context, the utility expresses the extent to which one can upstream capabilities. This phenomenon ends up giving end achieve the maximum benefit expected from ones’ preferred users ford of uploading data a different perception of network services that compensates for the expenditure made. However, performance from those one that are merely it is important to note that common end users only afford to consumers.Network peering and Data routing: local NSP peer pay for share medium. The resource (i.e. the bandwidth) is with other networks. The traffic of the end user might be going shared among the several end users. As each link capacity is beyond the local/national network provider. Consequently finite, the end users are essentially competing for the scarce the NSP has no control on delays in another network domain. © 2011 ACEEE 30 DOI: 01.IJNS.02.04.55
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 Even if the local NSP offers a higher speed, there will be packet A remedy to this situation, we classify the Internet drops or delays at the peering router that will result in different services by their traffic class. Each traffic class has a network perception of network performance to the end user. resource demand that is reflected by its utility function. We Consequently the only alternative the NSP could do is to categorize services as shown in Table 1 below based on their provider another route if available. But such a route might be network resource demands and respective priori thought of more expensive hence frustrating the end user too. importance/relevance to low-income earners. The Service 1) In the producer domain Relevance (SR) is ranked on the scale of 1 (Highest) to 5 The perception of the QoS offered over the Internet also (lowest) that indicates the deemed importance of the service depends strongly on how the servers hosting the Internet to development. Under the assumption that the user utility page or Internet services are dimensioned, and how they are of each traffic class is determined only by the allocated connected to the Internet. For example a transcontinental equivalent bandwidth , we introduce a new parameter access of a web page or Internet service is likely to deliver low QoS if not blocked to an end user in developing countries into the utility function. gives the weight of considering the anticipated network influences as discussed a traffic class flow based on its deemed level of importance in the above two domains. In addition some online services vis-à-vis other traffic classes in the network. are unavailable or blocked from some users because of license Further we characterize the networks from the point of striving for use in a certain geographic area. OR the cost of the to deliver services that meets user satisfaction levels while bandwidth for accompanying adverts turns not to be cost maintaining the tradeoffs within the feasible region. User effective beyond a given number of hopes in the network or satisfaction is a standard measure of network performance beyond a targeted region. Although some large content and [4] and user willing to pay for the service received from service online services providers have sent up their our microeconomics point of view. backbone network in different regions of the world, end users T ABLE 1 still can perceive different QoS depending on ones’ last-mile TRAFFIC CLASSIFICATION AND THEIR RELEVANCE link. (Details of see annex A) B. Social Dynamics and Internet Services However taking the considerations of the market environment in the study area and the nature of the commodity in trading, we note that the Internet is not like other types of production services where producers are expected to compete for customers only through their choices of price and types of services. The Internet market has another force hereby we refer to as “social dynamics1” of the Internet, which is a consequence of the rapid technology innovations and user generation age gap. The social dynamics introduce applications on the network that have remarkable distinction of quality of services (QoS) requirements. NSPs face a challenge of providing such services that “we classify as secondly in context of development but primary in maintaining some of the clients demands/preferences despite the fact that they glossily contribute to congestion over the weak infrastructure. However, failure to meet such demands cause looses of clients to the NSP. For example we consider e- mail or/and VOIP as one of the primary class services in context of development. While Internet gaming or/and IPTV as in the secondary class. But to an NSP whose billing system is based III. A SOCIETAL APPROACH FOR INTERNET ACCESS on usage/volume-billing rather than rate-billing will gain more A. Social goal of equal utility profits from the secondary class clients. Such an incident The goal of equal utility is that all users should get the takes the efficiency-fairness tradeoff outside the feasible same level of satisfaction from the network regardless of the region that carter for all social class of users (haves and have- different services in their respective traffic classes. The nots). Consequently the NSP goals of profit maximization on framework adopts the concept of utility fair as criteria for weak infrastructure are misaligned with the goals of Internet capacity allocation in networks [6]. A point to observe is that provision for development. allotting equal utilities to all end-users across different types 2 In this context “social dynamics” refer to the currently shift or move from the use of the traditional mode of services delivery to the Internet or IP based service delivery of services in their respective traffic classes does not mean mode. On a close view, we observe that there is an explosion in voice and video that they were allocated equal bandwidth across their different applications that are constantly being used to deliver services to the end users. i.e. from the traditional telephony systems to VOIP base (e.g. Skype, messenger, etc.). traffic classes. Users within the same traffic class have TVs and Movies are constantly being watches on the Internet. identical utility functions, thus the utility-fair bandwidth © 2011 ACEEE 31 DOI: 01.IJNS.02.04. 55
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 allocation inside each class of user group also leads to the NSP and traffic class function. Through this normalization bandwidth-fair allocation that is within [ , ] rage then the actual utility of the end user can be quantified. for each class. Refer to annex A for details. Every traffic class B. Utility based network modeling has a required minimum bandwidth denoted as , and a We follow the works of Low and Lapsley [9], in which maximum threshold bandwidth denoted by beyond social utility was maximized by a bandwidth pricing algorithm. which any allocation does not benefit the user/application. For a single link the optimization problem is as follows: Based on clear and fair decisions, the NSP normalizes the traffic taking considerations of the importance of various traffic classes and user benefits. It is done by getting a product of the scale and traffic class utility function. Then actual utility of the end user can be quantified. We elaborate this characteristic through an example below. Demonstrating the In such a case the maximum total utility is thought as being concept of social goal of equal utility across users irrespective the sum of all utilities that each user associates with of the class type of service is our starting point. Consider a ones’ allocated bandwidth under link capacity network consisting of a single link with a unity capacity being constraint . The users’ utility is strictly concave and increase shared by two users s1 and s2. User s1 transfers data according with the allocated bandwidth that is bounded in the rage. to an elastic application with strictly increasing and concave Beyond the utility marginal increase bandwidth utility µ1(x1). User s2 transfers real-time video is almost zero and below the users’ utility becomes zero. The data with a non-concave bandwidth utility µ2(x2). As shown centrality of optimization approach above and its solutions in Figure 1 below, if the link capacity is shared equally using delivered through the Lagrange dual problem decomposition commonly know max-min bandwidth allocation policy, each methods enable the network system (in this context the NSP) user gets equal bandwidth of x = 0.5units, with corresponding to establish the aggregate link price at optimal bandwidth utility of µ1(x = 0.5) and µ2(x = 0.5) respectively. It is obvious that for user s2 is not satisfied because the received bandwidth allocation levels. Then price is passed over to the user who does not reach the minimum required level for video encoding. decides on what to purchase in view of what maximizes ones’ objectives. The resulting net-utility of the user is normally formulated in the form of Really this problem solving is to let the user choose what one can afford to pay for in lieu of ones’ financial possibilities. Unlike the utility optimization form above, we propose a model that guides the user on what to take based on user preferences in lieu of services importance in context of development1. We assume that each service has a particular importance to its user relatively to ones’ preference. In addition the cost of network resource requirements for such a service should be in the Figure 1: Utility max-min and bandwidth max-min fairness rage of users’ capacity to pay. On this basis we introduce the Likewise, if the utility allocation policy ensures that the two user preference parameter in the optimization that describes users get equally utility, i.e. µ1(x1) = µ2(x2) = µ*, then the service utility (importance degree) in fostering accordingly both users are satisfied, hence willing to pay for development. Flows are differentiated based on the deemed the services. The latter allocation policy represents the utility importance degree of the services they deliver in accordance max-min fair. The utility max-min algorithm was introduced in to fostering development. We introduce a scalar value in [7] by Cao and Zegura and its architecture in [8] by Cho and the utility function that depicts the traffic class importance Chong. The social goal of equal utility across users is and the required QoS levels according to the user service irrespective of the class type of service. A point to continue preferences. being observed is that equal utilities to the end-users across different types of services do not mean equal bandwidth to IV. CONCLUSIONS AND FUTURE WORK different classes or even to users within the same class type In this paper we have presented a social welfare approach of service. As indicated in Table 1 above, all the traffic classes that characterizes what would be the environment of the have a required minimum capacity/bandwidth other than the Internet services in view of in view to raise the benefit of the “Elastic” that can start from zero upwards. Similarly every end users and NSP developing regions. Analytical model of traffic class has a maximum threshold bandwidth, beyond the main characteristics in the approach is presented and which any allocation does not benefit the user/application. eventually shown how the end user bit rate could be regulated Therefore the NSP, based on clear and fair decisions, has to based on the utility bounds that lead general satisfaction to normalize the traffic taking considerations of the importance all users. At individual level we shall advance our study based of various traffic classes and user benefits. The normalization on the established utility levels that deem to deliver user is done by getting a product of the scale determined by the satisfaction for a given traffic class. User satisfaction signifies © 2011 ACEEE 32 DOI: 01.IJNS.02.04.55
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 delivery of expected QoS and as well as willing to pay for [2] M. Warschauer and T. Matuchniak, “New Technology and such services. Hence the focus remains on testing the actual Digital Worlds: Analyzing Evidence of Equity in Access, Use, and benefits that foster a positive social change in one’s basic Outcomes,” Review of Research in Education, vol. 34, pp. 179- dimensions of life from those traffic classes with high SR. We 225, March 2010. [3] E. M. Rogers, Diffusion of Innovation, 5th ed.: Free Press, adopting the benefit function in [10], where individual benefits 2003. are computed and their aggregation lead us in achieving the [4] S. Shenker, “Fundamental Design Issues for the Future group benefit. Here-forth referred to as the society’s welfare. Internet,” IEEE Journal on selected area in Communications, vol. 13, pp. 1176-1188, 1995. ACKNOWLEDGMENT [5] L. Shi, C. Liu, and B. Liu, “Network Utility Maximization for Triple-play Services,” Computer communications, vol. 31, pp. 2257 This work is supported by the Swedish International - 2269, 2008. Development Agency through her Department for Research [6] T. Harks, “Utility Proportional Fair Bandwidth Allocation - Cooperation (Sida/SAREC) under the framework for An optimization Oriented Approach,” August 2004 2004. strengthening national research capacity in developing [7] Z. Cao and E. W. Zegura, “Utility Max-Min: An Application- countries. We gratefully acknowledge Sida/SAREC. Oriented Bandwidth Allocation Scheme,” 1999, pp. 793-801. [8] J. Cho and S. Chong, “Utility Max-Min Flow Control Using REFERENCES Slope-Restricted Utility Functions,” Communications, IEEE Transactions on, vol. 55, pp. 963-972, 2007. [1] R. Gregory, S. Scott, and W. Donald, “Household demand for [9] S. H. Low and D. E. Lapsley, “Optimization flow control I: broadband internet service,” Communications of the ACM, vol. 54, Basic Algorithm and Convergence,” IEEE/ACM Transactions on pp. 29-31, Febuary 2011. networking, vol. 7, pp. 861-874, 1999. [10] D. G. Luenberger, “Benefit functions and duality,” Journal of Mathematical Economics, vol. 21, pp. 461-481, 1992. ANNEX A ( THE PROOFS OF THE EQUATIONS REFER TO [4]) 3 Implication: the higher the importance of a service is deemed to foster development, the lower the price for the capacity/bandwidth to deliver it to the user. © 2011 ACEEE 33 DOI: 01.IJNS.02.04. 55