41 |
Designing and implementing a small scale Internet Service ProviderBrown, Johan, Gustafsson Brokås, Alexander, Hurtig, Niklas, Johansson, Tobias January 2009 (has links)
The objective of this thesis is to design and implement a small scaleInternet Service Provider (ISP) for the NetCenter sub department atMälardalen University. The ISP is intended to give NetCenter a networkseparate from the University’s network, providing them with a moreflexible environment for lab purposes. This will give their students anopportunity to experience a larger backbone with Internet accessibility,which has not been previously available. At the same time it will place theteachers in control of the network in the NetCenter lab premises.The network is designed with a layered approach including an Internetaccess layer, a larger core segment and a distribution layer with aseparated lab network. It also incorporates both a public and a privateserver network, housing servers running e.g. Windows Active Directory,external DNS services, monitoring tools and logging applications. TheInternet access is achieved by peering with SUNET providing a full BGPfeed.This thesis report presents methods, implementations and results involvedin successfully creating the NetCenter ISP as both a lab network and anInternet provider with a few inevitable shortcomings; the most prominentbeing an incomplete Windows Domain setup.
|
42 |
Modernizace páteřní sítě poskytovatele internetových služeb / Modernizing the Internet Service Provider´s BackboneNedbal, Tomáš January 2009 (has links)
The thesis is focused on the technical issues removal on the backbone of internet service provider, MX-NET Telekomunikace Ltd. After marketing research of impacts on client there will be determined the best alternative of solution, ensured the appropriate funding and organized the installation.
|
43 |
Svenska internetoperatörers beslutsprocess kring val av Wi-Fi-Router : En kvalitativ intervjustudie / Swedish internet service providers decision-making process surrounding the choice of Wi-Fi-Routers : A qualitative interview studyLindeberg, Adrian, Laihinen, Patrick January 2023 (has links)
This study investigates how Swedish internet service providers (ISP) choose a Wi-Fi-Router for use by private customers. The study investigates the process of choosing a Wi-Fi-Router and what features the companies prioritize during the process. These features can be aspects such as security, speed, capacity, Wi-Fi standard and price. The study seeks to answer how the decision-making process is carried out in the companies, but also how the Wi-Fi-Routers features are prioritized during the decision-making process. This was investigated using qualitative methods in the form of semi-structured interviews. The interviews were held remotely, which allowed for a larger spread of respondents. After the interviews, the data was coded using thematic analysis to arrive at the results of the study. The study identified several different phases during the decision-making process that ISP’s go through. After identifying the phases, they were placed in a model which seeks to describe the decision-making process for all ISPs. The most important aspect during the decision-making process was the price. The remaining aspects were decided by the Wi-Fi-Router's price and compromises had to be made to lower the price to a reasonable level for both the company and the customer. In addition to the price, the companies aimed to find a balance between the other features, where compromises can be made for features they consider to be less important.
|
44 |
我國ISP業者降低客戶流失率做法之研究楊昭仁 Unknown Date (has links)
本研究所欲探討的主題,為國內 ISP 業者降低客戶流失率所採用的做法。由於目前ISP業競爭十分激烈,各業者為了爭奪市場,常常以低價,乃至於不計成本的做法爭取客戶。然而這些虧本爭取的客戶若不能有效的留住,之前的投資可為白白浪費。因此,如何能夠有效的降低客戶流失率,是ISP業者非常重要的課題。
降低客戶流失的可行手段之一,是提高服務品質,讓客戶滿意於供應商的服務而樂於長期使用。另一種方式則是產品之鎖定機制 (Lock-in) 的運用,使客戶一旦購買某一項服務,因受到產品機制的鎖定而提高轉換成本,而不願轉換 ISP。一旦ISP能夠以適當有效的做法降低客戶流失率,就能以各種即使沒有利潤乃至於虧損的做法先吸引客戶進門,再由後續的服務回收應得的利潤。也唯有如此,ISP業者才能在嚴酷的競爭中存活。
本研究透過瞭解 ISP 產業之特性與類型;對台灣的十一家具有代表性之ISP業者,調查與整理其服務品質,以及所使用的產品鎖定機制;探討服務品質高低與市場佔有率之關係,以及不同類型之 ISP 所採用之做法的差異,並給予不同的改進建議。主要的研究結論如下:
◆ 高品質的服務有助於大型ISP業者維持市場佔有率,同時對於中小型業者的市場佔有率提昇有所助益。反之,低服務品質對於ISP維持市場佔有率有不利的影響。
◆ 同時有助於吸引新客戶與維繫舊客戶的服務要素,以及可直接增加營收,或是減少成本的服務要素,為ISP優先重視之項目。
◆ 服務品質領先之業者與落後者的差異,主要為交易中的服務要素。
◆ 大型與中小型ISP在服務品質有差異之項目上,大型業者具有絕對領先優勢。兼營IDC業務之ISP與純ISP,在服務品質有差異之項目上,兼營IDC之業者具有絕對領先優勢。
◆ 簡單之產品鎖定機制最受到ISP業者的歡迎。
|
45 |
The right to privacy and identity on social network sites : a comparative legal perspectiveSkosana, Milton Themba 12 April 2018 (has links)
This study focuses on the use of Social Network Sites (SNSs) and certain personality rights (specifically the right to privacy and the right to identity) that may be infringed by this use. The study also discusses data protection law as the protection of the rights to privacy and identity are interlinked with data protection in that data protection assumes importance when there is processing of personal information on SNSs.
The study seeks to determine whether South African law provides adequate protection for the interests that form the object of these personality rights, and highlights certain shortcomings, particularly in the context of SNSs. It also suggests solutions where there are shortcomings by learning from other jurisdictions. Related issues investigated are: who should be held responsible for the user-generated content uploaded on SNSs; the role of the Internet Service Provider (ISP); and how to deal with anonymous defendants. / Private Law / LL. M.
|
46 |
Essays on regulatory impact in electricity and internet marketsRoderick, Thomas Edward 26 June 2014 (has links)
This dissertation details regulation's impact in networked markets, notably in deregulated electricity and internet service markets. These markets represent basic infrastructure in the modern economy; their innate networked structures make for rich fields of economic research on regulatory impact. The first chapter models deregulated electricity industries with a focus on the Texas market. Optimal economic benchmarks are considered for markets with regulated delivery and interrelated network costs. Using a model of regulator, consumer, and firm interaction, I determine the efficiency of the current rate formalization compared to Ramsey-Boiteux prices and two-part tariffs. I find within Texas's market increases to generator surplus up to 55% of subsidies could be achieved under Ramsey-Boiteux pricing or two-part tariffs, respectively. The second chapter presents a framework to analyze dynamic processes and long-run outcomes in two-sided markets, specifically dynamic platform and firm investment incentives within the internet-service platform/content provision market. I use the Ericson-Pakes framework applied within a platform that chooses fees on either side of its two-sided market. This chapter determines the impact of network neutrality on platform investment incentives, specifically whether to improve the platform. I use a parameterized calibration from engineering reports and current ISP literature to determine welfare outcomes and industry behavior under network neutral and non-neutral regimes. My final chapter explores retail firm failure within the deregulated Texas retail electricity market. This chapter investigates determinants of retail electric firm failures using duration analysis frameworks. In particular, this chapter investigates the impact of these determinants on firms with extant experience versus unsophisticated entrants. Understanding these determinants is an important component in evaluating whether deregulation achieves the impetus of competitive electricity market restructuring. Knowing which economic events decrease a market's competitiveness helps regulators to effectively evaluate policy implementations. I find that experience does benefit a firm's duration, but generally that benefit assists firm duration in an adverse macroeconomic environment rather than in response to adverse market conditions such as higher wholesale prices or increased transmission congestion. Additionally, I find evidence that within the Texas market entering earlier results in a longer likelihood of duration. / text
|
47 |
Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level / Implementation av datainsamlingsverktyg med NetFlow på ISP-nivå för statistisk analys av datatrafikKarlström, Daniel January 2012 (has links)
Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. This is achievable by monitoring the flows to- and from the target and identifying the attacker's IP addresses, allowing the company or their ISP to block the addresses itself by blackholing them (also known as a null route). Using the IP accounting and monitoring tool “pmacct”, this thesis aims to investigate whether or not the pmacct suite is suited for larger installations when tracking and mitigating DDoS-attacks, such at an Internet Service Provider (ISP). Potential problems are the amount of traffic that need to be analyzed and the computational power required to do it. This thesis also provide information about the pmacct suite at large. The conclusions are positive, indicating it does scale up to handle larger installations when given careful consideration and planning. / Att försvara sig mot DoS-och DDoS-attacker är svårt att åstadkomma; att hitta och filtrera ut illegitim trafik från det legitima flödet är nästan omöjligt. Att vidta åtgärder när en sådan attack upptäcks kan endast göras när IP-adresserna från angriparna är kända. Detta kan uppnås genom att man övervakar trafikflödet mellan målet för attacken och angriparna och ser vilka som sänder mest data och på så sätt identifierar angriparna.. Detta tillåter företaget eller dess ISP att blockera trafiken ifrån dessa IP-adresser genom att sända trafiken vidare till ingenstans. Detta kallas blackhole-routing eller null-routing. Genom att använda redovisnings- och övervakningsprogrammet pmacct syftar denna uppsats på att undersöka hurvida pmacct-sviten är lämpad för större installationer när det gäller att spåra och förhindra DDoS-attacker, såsom hos en Internetleverantör eller dylikt. Potentialla problem som kan uppstå är att mängden trafik som måste analyserar blir för stor och för krävande. Denna avhandling går även igenom pmacct-verktyget i sig. Slutsatserna är lovande, vilket indikerar att den har potential av att kunna hantera sådana stora miljöer med noggrann planering.
|
48 |
論網路匿名言論之保障-以身分揭露程序為中心 / A Study on the Protection of Anonymous Online Speech: Focusing on the Procedure for Disclosing the Identity of Anonymous Speakers鍾安, Chung, An Unknown Date (has links)
在網路世界中,人們以匿名表達意見遠比現實生活中更為容易,這件事已劇烈地改變了匿名言論的量與質。從好的面向看,匿名帶來自主,讓異議者可以透過網路匿名,表達可能永遠都不敢在眾人面前說出來的真正想法,讓觀念市場變得多元豐富;另一方面,匿名提高了追究責任的困難。相較於現實世界的言論,損害他人或構成犯罪的惡質網路匿名言論,將造成影響更深遠且永久的傷害。
目前,關於網路匿名言論的管制方式,世界各國政府都是仰賴「事後追懲模式」和「實名認證模式」的其中一種。前者是網路使用者原則上可以匿名地發表言論,但如果發表不當言論並造成傷害,受害者或國家可以揭露其身份以對其展開司法追訴;後者是網路使用者在張貼言論前,必須先向國家機關指定的網路業者交出個人真實身份資料以進行驗證後,才能匿名發言,或甚至完全禁止以匿名方式發言,讓網路使用者感受到被眾人監督的壓力,不敢發表不當內容。
本文主張,網路匿名言論是受到憲法所保障的權利,而「事後追懲模式」相較於「實名認證模式」,較能調和不同權利間的衝突。不過,儘管我國政府採取此模式,卻在設計民刑事訴訟制度時,漏未導入匿名言論權利的思考,導致網路匿名表意者一經策略性訴訟攻擊,真實身份就會立即暴露,使得匿名表意自由不過徒有虛幻表象。因此,本文建議,為落實對匿名言論自由的保護,立法者宜參考美國法,修改部分訴訟法來處理此問題。 / On the internet, people can express themselves anonymously far easier than in the physical world. This fact has dramatically changed both the quantities and qualities of anonymous speech. On the bright side, anonymity brings more autonomy. Dissenters can express their real opinions, which they might never have the courage to speak out in public. It, in turn will promote the diversity and integrity of the marketplace of ideas. Yet, anonymity also makes it more difficult to hold the speakers accountable. In addition, compared to speech in the real physical world, malicious online anonymous speech will cause more serious permanent harms.
Today, governments around the world are either relying on the “Ex Post Compensation and Punishment” approach or the “Real-Name Verification System” to regulate online anonymous speech. Under the former approach, internet users can express their opinions anonymously, but if the content of their speech is malicious and causes damages to other people, the victim can seek disclosure of the speaker’s identity in order to take legal actions against the speaker. In contrast, under the latter system, internet users have to provide their personal information (real identities) to the ISPs or ICPs appointed by governments and complete the verification process before they can post their words. Some real name systems go even further by banning anonymous speech completely. By making users feel like they are being supervised by the public, the real name system wishes to deter indecent contents
This thesis argues that online anonymous speech is protected by the Constitution, and the ‘Ex Post Compensation and Punishment’ is a preferred approach because it can better balance the conflicting rights. In Taiwan, although the government has chosen the ‘Ex Post Compensation and Punishment’ approach, current civil/criminal procedural laws and practices afford little protection to online anonymous speakers. The plaintiff, who is allegedly harmed by the anonymous speech, can easily bring a “Strategic Lawsuit,” with the sole purpose of obtaining the identity of the online anonymous speaker. Consequently, this thesis suggests that, in order to better protect the freedom of anonymous speech, the legislators of Taiwan should refer to U.S. laws and practices and revise several provisions of Taiwan’s Code of Civil Procedure and Code of Criminal Procedure.
|
Page generated in 0.0926 seconds