Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1159913.1159935acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Network monitors and contracting systems: competition and innovation

Published: 11 August 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization. It is apparent that the network's primitive system of contracts does not align incentives properly. In this study, we identify the network's lack of accountability as a fundamental obstacle to correcting this problem: Employing an economic model, we argue that optimal routes and innovation are impossible unless new monitoring capability is introduced and incorporated with the contracting system. Furthermore, we derive the minimum requirements a monitoring system must meet to support first-best routing and innovation characteristics. Our work does not constitute a new protocol; rather, we provide practical and specific guidance for the design of monitoring systems, as well as a theoretical framework to explore the factors that influence innovation.

    References

    [1]
    Afergan, M. Using Repeated Games to Design Incentive-Based Routing Systems. In Proceedings of IEEE INFOCOM (April 2006).
    [2]
    Afergan, M. and Wroclawski, J. On the Benefits and Feasibility of Incentive Based Routing Infrastructure. In ACM SIGCOMM'04 Workshop on Practice and Theory of Incentives in Networked Systems (PINS) (August 2004).
    [3]
    Argyraki, K., Maniatis, P., Cheriton, D., and Shenker, S. Providing Packet Obituaries. In Third Workshop on Hot Topics in Networks (HotNets) (November 2004).
    [4]
    Clark, D. D. The Design Philosophy of the DARPA Internet Protocols. In Proceedings of ACM SIGCOMM (1988).
    [5]
    Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R. Tussle in cyberspace: Defining tomorrow's internet. In Proceedings of ACM SIGCOMM (August 2002).
    [6]
    Dang-Nguyen, G. and Pénard, T. Interconnection Agreements: Strategic Behaviour and Property Rights. In Brousseau, E. and Glachant, J. M. Eds. The Economics of Contracts: Theories and Applications, Cambridge University Press, 2002.
    [7]
    Feigenbaum, J., Papadimitriou, C., Sami, R., and Shenker, S. A BGP-based Mechanism for Lowest-Cost Routing. Distributed Computing 18 (2005), pp. 61--72.
    [8]
    Huston, G. Interconnection, Peering, and Settlements. Telstra, Australia.
    [9]
    Liu, Y., Zhang, H., Gong, W., and Towsley, D. On the Interaction Between Overlay Routing and Traffic Engineering. In Proceedings of IEEE INFOCOM (2005).
    [10]
    MacKie-Mason, J. and Varian, H. Pricing the Internet. In Kahin, B. and Keller, J. Eds. Public access to the Internet. Englewood Cliffs, NJ; Prentice-Hall, 1995.
    [11]
    Ratnasamy, S., Shenker, S., and McCanne, S. Towards an Evolvable Internet Architecture. In Proceeding of ACM SIGCOMM (2005).
    [12]
    Shakkottai, S., and Srikant, R. Economics of Network Pricing with Multiple ISPs. In Proceedings of IEEE INFOCOM (2005).

    Cited By

    View all
    • (2019)Stable and practical AS relationship inference with problinkProceedings of the 16th USENIX Conference on Networked Systems Design and Implementation10.5555/3323234.3323282(581-597)Online publication date: 26-Feb-2019
    • (2016)Subsidization CompetitionIEEE/ACM Transactions on Networking10.1109/TNET.2015.246660324:4(2563-2576)Online publication date: 1-Aug-2016
    • (2014)Subsidization CompetitionProceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies10.1145/2674005.2674987(283-294)Online publication date: 2-Dec-2014
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
    September 2006
    458 pages
    ISBN:1595933085
    DOI:10.1145/1159913
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
      Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2006
      445 pages
      ISSN:0146-4833
      DOI:10.1145/1151659
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. commoditization
    2. contracts
    3. incentives
    4. innovation
    5. monitoring

    Qualifiers

    • Article

    Conference

    SIGCOMM06
    Sponsor:
    SIGCOMM06: ACM SIGCOMM 2006 Conference
    September 11 - 15, 2006
    Pisa, Italy

    Acceptance Rates

    Overall Acceptance Rate 554 of 3,547 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Stable and practical AS relationship inference with problinkProceedings of the 16th USENIX Conference on Networked Systems Design and Implementation10.5555/3323234.3323282(581-597)Online publication date: 26-Feb-2019
    • (2016)Subsidization CompetitionIEEE/ACM Transactions on Networking10.1109/TNET.2015.246660324:4(2563-2576)Online publication date: 1-Aug-2016
    • (2014)Subsidization CompetitionProceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies10.1145/2674005.2674987(283-294)Online publication date: 2-Dec-2014
    • (2013)Declarative secure distributed information systemsComputer Languages, Systems and Structures10.1016/j.cl.2012.09.00239:1(1-24)Online publication date: 1-Apr-2013
    • (2013)Privacy-Preserving Accountable ComputationComputer Security – ESORICS 201310.1007/978-3-642-40203-6_3(38-56)Online publication date: 2013
    • (2012)Pricing, competition and innovationProceedings of the 2012 IEEE 20th International Workshop on Quality of Service10.5555/2330748.2330781(1-9)Online publication date: 4-Jun-2012
    • (2010)Accountable virtual machinesProceedings of the 9th USENIX conference on Operating systems design and implementation10.5555/1924943.1924952(119-134)Online publication date: 4-Oct-2010
    • (2010)Verifiable network-performance measurementsProceedings of the 6th International COnference10.1145/1921168.1921170(1-12)Online publication date: 30-Nov-2010
    • (2010)Innovations and upgrades in virtualized network architecturesProceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation10.1145/1879082.1879091(1-11)Online publication date: 3-Oct-2010
    • (2010)Efficient querying and maintenance of network provenance at internet-scaleProceedings of the 2010 ACM SIGMOD International Conference on Management of data10.1145/1807167.1807234(615-626)Online publication date: 6-Jun-2010
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media