SlideShare a Scribd company logo
Socio-Economic Services for  European Research Projects (SESERV)European Seventh Framework  CSA FP7-2010-ICT-258138A SESERV methodology for tussle analysis in Future Internet technologies Introduction and motivationCostas Kalogiros, Costas Courcoubetis, George D. Stamoulis{ckalog, courcou, gstamoul}@aueb.grAthens University of Economics and BusinessSeptember 2011
Internet as a platform for stakeholders’ interactionsStakeholders with varying socio-economic interests…End-usersASPsRegulatorsISPsInternetSocio-Economic layerReal-world socio-economic transactionsTechnology choices(including investments, configurations)Internet Technology layerTechnology outputs (connectivity, QoS, mobility, security, etc.) Internet applicationsmiddleboxesTechnology componentsFirewallsInternet protocolslinksswitchesserversrouters3G towersSocio-Economic layer is governed by laws of socio-economics, while technology layer by laws of physics
Basic socio-economic technology cycleLonger Internet Socio-Economic layerAdopt technologyISPDimension resourcesAdaptation timescaleStakeholders’ strategies / policies with respect to a specific technology (functionality)Configure technologyUse technologyShorter tussle outcomeAt each stage conflicting incentives may exist at the socio-economic layer. The combination of actors’ strategies lead to a tussle outcome, which is characterized by the benefit that stakeholders get.
Tussle evolution (1/2)If the tussle outcome is considered “unfair” by a subset of stakeholders, they can react by:Leaving the systemAdopting another technology/ reconfiguring the selected oneAsking the regulator to intervene by restricting other stakeholders’ policies… hence making the outcome unstableEven though a tussle outcome can be considered “fair” by all stakeholders of that particular functionality, it can destabilize other functionalities (spillover effect to other tussles)Analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology
Tussle evolution (2/2)Functionality AFunctionality AFunctionality ATussle A1Tussle A2Functionality BFunctionality BFunctionality B…Tussle B1Tussle B2Functionality CFunctionality CFunctionality CTussle C2Tussle C1……T0(initial tussle outcomes)T1T2LegendTATime AStable outcomeEvolvesFunctionalityAffectsInitial stateUnstable outcomeTransfers
Purpose of Tussle AnalysisDefines a systematic approach for understanding the impact of introducing new Internet technologies
Why a new technology is needed today?
What are the interests of existing stakeholders today?
What options do existing technologies offer to stakeholders?
What are the properties of existing outcome in terms of performance & stability?
What would be the effect of a new technology to the ecosystem in the future?
How would the interests of existing and new stakeholders be affected?
How would the options of existing and new stakeholders be affected?
Can this technology help reaching a “fairer” outcome regarding this functionality, or increase efficiency in case of an already stable outcome? Tussle analysis case study: bandwidth sharingpeer-to-peer (p2p) usersp2p users get disproportionate bandwidth sharep2p users configureapplications to open multiple TCP connections for thesame session     p2p applicationsconfigured to perform traffic obfuscation?ISPs throttle bandwidth of   p2p applications by   using DPI technology.     Stakeholders’ strategies/policiesfairbandwidthsharingTussle outcomeISP(neutral entity)What if ISPs deploy congestion exposure technologies & congestion pricing schemes?p2p applications motivate multiple TCP connections for the same session     ?interactive users get disproportionate bandwidth shareinteractive usersFunctionality: bandwidth sharingISP’s telephony services get preferential treatmentRegulator announces fines due to VoIP providers’ complaints ISPsStakeholders’ strategies/policiesISPs use DPI technology to degrade quality of rival VoIP servicesRegulatorno discriminationTussle outcomeASP’s VoIP services get preferential treatmentASPsFunctionality: VoIP service delivery

More Related Content

PPT
Rainer Zimmermann (European Commission): The role of the European Commission ...
PPT
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
PPTX
A Tale of Open Data Innovations in Five Smart Cities
PDF
FCC Open Internet Transparency - a review by Martin Geddes
PPT
Thesis Defense MBI
PPTX
A tale of open data in five smart cities
PPTX
The Spring 2018 Undergraduate Symposium Poster
PDF
Project etapas ethical technology adoption in public administration service(1)
Rainer Zimmermann (European Commission): The role of the European Commission ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
A Tale of Open Data Innovations in Five Smart Cities
FCC Open Internet Transparency - a review by Martin Geddes
Thesis Defense MBI
A tale of open data in five smart cities
The Spring 2018 Undergraduate Symposium Poster
Project etapas ethical technology adoption in public administration service(1)

Viewers also liked (8)

PPT
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
PPTX
Collective and participative experiences in real-world and online communities
PPT
How Disruptive Technologies Influence the FI Ecosystem
PPT
Business models for dynamic optical infrastructures
PDF
Seserv concertation-01
PPT
Update on Recent SESERV Results and Upcoming Events
PPT
Aims2012
PPT
Cooperative Database Caching within Cloud Environments
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Collective and participative experiences in real-world and online communities
How Disruptive Technologies Influence the FI Ecosystem
Business models for dynamic optical infrastructures
Seserv concertation-01
Update on Recent SESERV Results and Upcoming Events
Aims2012
Cooperative Database Caching within Cloud Environments
Ad

Similar to A SESERV methodology for tussle analysis in Future Internet technologies - Introduction and motivation (20)

PPT
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
PDF
Atva05
PPT
Future Profiles of e-Research
PPT
Seserv dp-workshop
PPT
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
DOCX
chapter 3.docx
PDF
chapter 3.pdf
PDF
Probabilistic Polling System Approach for IoT Secure Routing
PDF
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
PDF
Probabilistic Polling System Approach for IoT Secure Routing
PDF
IRJET- Decentralized E-Voting System
PDF
Analysis and assessment software for multi-user collaborative cognitive radi...
PDF
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
PDF
An Agent Future For Network Control
PPTX
CHARACTERIZING BEHAVIOUR
PPT
Dynamic Semantics for Semantics for Dynamic IoT Environments
PDF
Marta de la Cruz-Informe Final
PDF
1720 1724
PDF
1720 1724
PDF
Chi2011 Case Study: Interactive, Dynamic Sparklines
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Atva05
Future Profiles of e-Research
Seserv dp-workshop
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
chapter 3.docx
chapter 3.pdf
Probabilistic Polling System Approach for IoT Secure Routing
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
Probabilistic Polling System Approach for IoT Secure Routing
IRJET- Decentralized E-Voting System
Analysis and assessment software for multi-user collaborative cognitive radi...
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
An Agent Future For Network Control
CHARACTERIZING BEHAVIOUR
Dynamic Semantics for Semantics for Dynamic IoT Environments
Marta de la Cruz-Informe Final
1720 1724
1720 1724
Chi2011 Case Study: Interactive, Dynamic Sparklines
Ad

More from ictseserv (20)

PPT
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
PDF
Eunice2012
PDF
Burkhard stiller cloiuds-fu-nems-2012
PDF
Fia aalborg-statement-iopapafi-v0.5
PDF
Vesa terava net neutrality in europe - seserv se workshop june 2012
PDF
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
PDF
Sara de freitas the gamification of everyday life - seserv se workshop june...
PDF
Javier salcedo cloud computing - seserv se workshop june 2012
PDF
Falk von bornstaedt networks perspectives and analysis in the future intern...
PDF
Brian pickering introduction to seserv - seserv se workshop june 2012
PDF
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
PDF
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
PDF
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
PPSX
Alan hartman trust measurement and management - seserv se workshop june 2012
PPT
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
PPTX
Fia presentatie
PDF
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
PPTX
Seserv workshop manos dramitinos - tussle analysis from etics project
PPTX
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
PPT
Sending party network pays
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Eunice2012
Burkhard stiller cloiuds-fu-nems-2012
Fia aalborg-statement-iopapafi-v0.5
Vesa terava net neutrality in europe - seserv se workshop june 2012
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
Sara de freitas the gamification of everyday life - seserv se workshop june...
Javier salcedo cloud computing - seserv se workshop june 2012
Falk von bornstaedt networks perspectives and analysis in the future intern...
Brian pickering introduction to seserv - seserv se workshop june 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Alan hartman trust measurement and management - seserv se workshop june 2012
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Fia presentatie
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Seserv workshop manos dramitinos - tussle analysis from etics project
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Sending party network pays

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
 
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
 
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
 
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
 
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm

A SESERV methodology for tussle analysis in Future Internet technologies - Introduction and motivation

  • 1. Socio-Economic Services for European Research Projects (SESERV)European Seventh Framework CSA FP7-2010-ICT-258138A SESERV methodology for tussle analysis in Future Internet technologies Introduction and motivationCostas Kalogiros, Costas Courcoubetis, George D. Stamoulis{ckalog, courcou, gstamoul}@aueb.grAthens University of Economics and BusinessSeptember 2011
  • 2. Internet as a platform for stakeholders’ interactionsStakeholders with varying socio-economic interests…End-usersASPsRegulatorsISPsInternetSocio-Economic layerReal-world socio-economic transactionsTechnology choices(including investments, configurations)Internet Technology layerTechnology outputs (connectivity, QoS, mobility, security, etc.) Internet applicationsmiddleboxesTechnology componentsFirewallsInternet protocolslinksswitchesserversrouters3G towersSocio-Economic layer is governed by laws of socio-economics, while technology layer by laws of physics
  • 3. Basic socio-economic technology cycleLonger Internet Socio-Economic layerAdopt technologyISPDimension resourcesAdaptation timescaleStakeholders’ strategies / policies with respect to a specific technology (functionality)Configure technologyUse technologyShorter tussle outcomeAt each stage conflicting incentives may exist at the socio-economic layer. The combination of actors’ strategies lead to a tussle outcome, which is characterized by the benefit that stakeholders get.
  • 4. Tussle evolution (1/2)If the tussle outcome is considered “unfair” by a subset of stakeholders, they can react by:Leaving the systemAdopting another technology/ reconfiguring the selected oneAsking the regulator to intervene by restricting other stakeholders’ policies… hence making the outcome unstableEven though a tussle outcome can be considered “fair” by all stakeholders of that particular functionality, it can destabilize other functionalities (spillover effect to other tussles)Analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology
  • 5. Tussle evolution (2/2)Functionality AFunctionality AFunctionality ATussle A1Tussle A2Functionality BFunctionality BFunctionality B…Tussle B1Tussle B2Functionality CFunctionality CFunctionality CTussle C2Tussle C1……T0(initial tussle outcomes)T1T2LegendTATime AStable outcomeEvolvesFunctionalityAffectsInitial stateUnstable outcomeTransfers
  • 6. Purpose of Tussle AnalysisDefines a systematic approach for understanding the impact of introducing new Internet technologies
  • 7. Why a new technology is needed today?
  • 8. What are the interests of existing stakeholders today?
  • 9. What options do existing technologies offer to stakeholders?
  • 10. What are the properties of existing outcome in terms of performance & stability?
  • 11. What would be the effect of a new technology to the ecosystem in the future?
  • 12. How would the interests of existing and new stakeholders be affected?
  • 13. How would the options of existing and new stakeholders be affected?
  • 14. Can this technology help reaching a “fairer” outcome regarding this functionality, or increase efficiency in case of an already stable outcome? Tussle analysis case study: bandwidth sharingpeer-to-peer (p2p) usersp2p users get disproportionate bandwidth sharep2p users configureapplications to open multiple TCP connections for thesame session p2p applicationsconfigured to perform traffic obfuscation?ISPs throttle bandwidth of p2p applications by using DPI technology. Stakeholders’ strategies/policiesfairbandwidthsharingTussle outcomeISP(neutral entity)What if ISPs deploy congestion exposure technologies & congestion pricing schemes?p2p applications motivate multiple TCP connections for the same session ?interactive users get disproportionate bandwidth shareinteractive usersFunctionality: bandwidth sharingISP’s telephony services get preferential treatmentRegulator announces fines due to VoIP providers’ complaints ISPsStakeholders’ strategies/policiesISPs use DPI technology to degrade quality of rival VoIP servicesRegulatorno discriminationTussle outcomeASP’s VoIP services get preferential treatmentASPsFunctionality: VoIP service delivery
  • 15. Functionality IFunctionality IIStep 1: Identify all primary stakeholder roles and their characteristics for the functionality under investigation spillovernew iterationStep 2: Identify tussles among identified stakeholderstussle tussle tussle tussle Step 3: For each tussleassess the impact to each stakeholder and potential spilloversA high-level view of the SESERV tussle analysis methodology
  • 16. A guide to applying the SESERV tussle analysis methodology
  • 17. More InformationDon’t hesitate to contact us if your research project is interested in performing a tussle analysis for understanding the existing (and/or future) socio-economic issues related to your proposed Future Internet technologies.http://www.seserv.orggetinvolved@seserv.orghttp://www.linkedin.com/groups?about=&gid=3870856http://www.twitter.com/seserv
  • 19. Design For TussleA tussle-aware Internet protocol shouldlead to a stable outcome by allowing all involved stakeholders to express their interests and affect the outcome (“Design for Choice” Principle)It does not impose one particular outcome because no one can guess itavoid spillovers to other functionalities (“Modularize along the tussle boundaries” Principle)Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005
  • 20. Towards achieving stable outcomesThe “Design for choice” principle provides guidance in designing protocols that allow for variation in outcome. Useful properties are:
  • 21. “Exposure of list of choices” suggesting that the stakeholders involved must be given the opportunity to express multiple alternative choices and which the other party should also consider.
  • 22. “Exchange of valuation” suggesting that the stakeholders involved should communicate their preferences in regard to the available set of choices (for instance by ranking them in descending order).
  • 23. “Exposure of choice’s impact” suggesting that the stakeholders involved should appreciate what the effects of their choices are on others
  • 24. “Visibility of choices made” suggesting that both the agent and the principal of an action must allow the inference of which of the available choices has been selected. Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005
  • 25. Towards avoiding tussle spillovers to other functionalitiesThe “Modularize the design along tussle boundaries” principle helps in identifying whether tussle spillovers can appear. A protocol designer can check any of the following two conditions:“Stakeholder separation”, or whether the choices of one stakeholder group have significant side effects on stakeholders of another functionality (another tussle space), for example creates economic externalities between stakeholders of different tussle spaces.“Functional separation”, or whether different stakeholders use some functionality of the given technology in an unforeseen way to achieve a different goal in some other tussle space, i.e., the functionality of technology A interferes (and possibly cancels) with functionality of technology B. Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005

Editor's Notes

  • #3: Internet is a platform which can be studied as a system composed of multiple technologies and an environment where multiple stakeholders interact in multiple ways (either by using or not technologies). At the socio-economic layer stakeholders have interests and incentives, expressed by making choices governed by laws of economics (e.g. supply and demand), politics, sociology, etc. that affect the technology layer.Such choices refer to what specific technologies will be introduced, how these will be dimensioned, configured, and finally, used. These collective decisions, together with the laws of physics, will determine how technology components will operate and produce outputs.For example the DNS (Domain Name System) associates domain names to network addresses in a distributed way, based on each administrator’s configuration of a local DNS server’s entries. These entries can affect the level of caching achieved and be used for other purposes, such as load balancing and optimized delivery of services and content to end-users. Technology outputs are assessed by each stakeholder individually and can affect existing real-world interactions or trigger new ones (payments, friendship, price competition, price regulation, etc.)
  • #4: When adding a new functionality in the Internet, it is natural that some stakeholders have conflicting interests when making technology decisions.The long-term goals of each stakeholder with respect to a specific Internet functionality define its strategy which is, finally, implemented by policies.Policies take into account the technology restrictions and other stakeholders’ socio-economic aspects.The decisions contained in these policies can be mostly grouped into the following categories (in practice):Adopt a suitable technology from the set of available ones for the functionality in questionDimension dedicated resources to support the goals of the stakeholderConfigure parameters of the technology that affect how functionality in general is providedConfigure parameters that affect how functionality for a specific instance is provided This process defines a “tussle” between the stakeholders, since they have in general conflicting goals.For example, end-users may:a) choose to use a specific application for content distribution based on its ability (or not) to download from multiple sources simultaneously. b) select the upper and lower limits of the upload/download capacity for that application (based on its connectivity profile)c) configure maximum number of TCP connections per downloaded filed) set priority for queued files based on popularityISPs may: measure the performance of web-browsing connections and observe that these obtain a small bandwidth shareadd capacity to alleviate the problemIn general, policies are applied in a sequence similar to the one presented above and may adapt using feedback from the evolution of the system. The timescales that such relatively minor adaptations (they don’t affect the basic technology and socio-economic context of the tussle) take place depend on the social and technical “inertia” of the system and the given technologies. Eventually we expect this to lead to a tussle outcome, which is characterized by the benefit that each stakeholder gets (defined by appropriate utility functions at the socio-economic layer). These benefits can vary substantially between stakeholders and different concepts of fairness may apply depending on the social context.What we defined so far is the structure of the basic cycle. As we will see next, if the given outcome is not stable, we expect it to trigger a new tussle cycle to take place, where some more radical changes take place in the space of the adopted technologies. We must emphasize to the reader that sometimes this separation of the socio-economic technology evolution into distinct cycles is not so clear, since cycles themselves may include some degree of technology adaptation. Many times it is a matter of judgment to define the boundaries between cycles and the corresponding tussle outcome for each cycle. Nevertheless we believe that such a process helps the analyst understand the complexity of the underlying system and predict its evolution.
  • #5: According to our previous discussion, tussle can be described as a process determined by the strategies of involved stakeholders to resolve their conflicts of interest in a particular technology context. We assumed that a tussle, after some adaptation from the stakeholders involved, leads to some outcome. In analogy to game theory, a tussle corresponds to a game where agents are the stakeholders in the given context. The outcome of the tussle may be a Nash equilibrium of the game. Our model of the Internet ecosystem assumes that tussles may evolve over time. Evolution occurs either because of instability or because of externalities.If the tussle outcome is considered “unfair” by a subset of stakeholders, it can evolve into a new tussle based on: socio-economic decisions alone (e.g. stop using that functionality, stop doing business, etc.), out-of-band actions (asking a regulator to intervene) or new socio-techno-economic decisions following the basic socio-economic technology cycle (introduce a radically different technology, new stakeholders enter the stage, etc.)All these reactions characterize an unstable tussle outcome.It is likely that unstable outcomes will lead to a new tussle and possibly destabilize other functionality spaces as well (called a “spillover effect”). It should be noted that stable tussle outcomes can also create spillovers to other functionalities, in case some users of the established functionality find some new uses of it, not anticipated before, which interfere with other functions of the ecosystem.We believe that analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology.
  • #6: This slide illustrates how tussles can evolve inside a single functionality space or affect another functionality. Let us assume a discrete-time model and that initially only Functionality B is observed to be in a stable state. At some time T1 both tussles A1 and C1 (for Functionalities A and C respectively) reach equilibrium, but only the latter is a stable one. Furthermore, the unstable outcome of tussle A1 has a spillover effect and triggers a new tussle B1 in functionality B. At some later time T2 both tussles A2 and B1 have reached equilibrium. Even though Functionality A has now reached a new and stable outcome, it has a spillover to functionality C and makes the previously stable outcome of C1 unstable. Thus, the tussles of functionalities B and C evolve further in time (not shown).
  • #8: When TCP (Transmission Control Protocol) was proposed in the early 80s, it was assumed that hosts would initiate a single connection for each session.The algorithm suggested for controlling how bandwidth is being shared can be considered fair in the sense that if k connections are instantaneously active in a bottleneck link, then each of them would take 1/k of the bandwidth .But this outcome cannot be considered stable, after the introduction of peer-to-peer applications for file sharing.Users of such applications (called Heavy users) can open multiple TCP connections for the same file and get disproportionate bandwidth share in relation to traditional users (called interactive).This new outcome cannot be considered stable since the ISPs’ ability to offer other services was threatened by the greatly increased traffic.ISPs introduced middleboxes (dedicated machines that Deep Packet Inspection techniques for inspecting data packets) in order to identify and throttle peer-to-peer traffic.Even though this new bandwidth allocation outcome can be considered fair, it is not stable either.Peer-to-peer applications started performing traffic obfuscation (e.g. by encryption) in order to decrease downloading time.At the same time, DPI technology allowed ISPs to identify traffic that directly competes with complementary services they offer.A famous example has been an ISP’s attempt to degrade quality of third-party VoIP services that threatened its traditional telephony services.This is an example of a spillover to another functionality, which was solved by asking the Regulator to intervene.Tussle analysis would try to understand the impact that a newly deployed technology (or set of technologies) would have on the stability of the tussle outcome for that particular functionality, on the stability of outcomes for other functionalities (spillovers to existing or new tussles) For example, what would happen if ISPs deployed congestion exposure technologies and congestion pricing schemes?The former technology (for example CONEX) would inform all parties along the path about the congestion that a packet would experience/cause.The latter technology would charge users based on the congestion they cause.Would the deployment of this technology set:a) lead to a stable outcome?b) create spillovers to other functionalities (e.g. routing)?
  • #9: This slide gives a high-level view of tussle analysis methodology. Each step is shown as a horizontal rectangle with arrows denoting transitions. All steps are applied in the context of one, or more, functionalities (rounded vertical rectangles). The first step suggests composing the socio-economic and technology layers of Slide2 for each particular functionality. Starting from the top of that figure identifying and studying the properties of the most important stakeholder roles is necessary. Besides recognizing the set of stakeholder roles their characteristics must be understood. The most important attribute of a role is the incentive to use this functionality. Finally technologies (complementary or substitute ones) that can be used for a service or application instance related to that functionality must be specified. These technologies, or technology sets, usually follow a different logic or may not even be designed for implementing this functionality.Identifying such alternative technology schemes will be useful in performing the second step, which refers to identifying tussles among the set of stakeholders. More specifically when a conflict of interest is found to exist between some stakeholders, we should seek for policies – enabled by thetechnologies – that these rational entities would select in order to meet their goals. Thus, this step is about instantiating Slide3 in the specific context of this functionality.The third step of the methodology aims to evaluate each tussle outcome from the perspective of each stakeholder (in order to infer the stability properties of the functionality under investigation) and understand its effects on the stability of other functionalities. It thus can be depicted using a diagram like the one in Slide5. In the ideal scenario of a tussle outcome is an equilibrium point, where: a) all stakeholders of this functionality derive a fair payoff (thus no one will select another policy) and; b) no stakeholder of another functionality, who was receiving a fair payoff before, gets an unfair payoff after this tussle equilibrium has been reached.If both conditions hold then the analysis of this particular tussle is completed and we can move on to the remaining tussles identified in Step2. In case condition (a) is not met, a new iteration of the methodology must be performed by making assumptions on the most probable policies adopted by unhappy stakeholders. Similarly, a new iteration must be performed for each spillover to other functionalities when condition (b) is not met.
  • #10: The following questionscan act as a guide in performing the tussle analysis:[Q1] Understand stakeholders’ interests in current ecosystem: Translating Slide2 into your context, which functionality/functionalities does your proposed technology performs and what are the interests of the main stakeholders?[Q2] Understand stakeholders’ interests in new ecosystem: Repeat all steps of Q1, if your technology is deployed.[Q3] Identify policies in current ecosystem: Using Slide3 for the desired functionality, can you identify the most probable policies of each main stakeholder enabled by existingtechnologies (if your technology is not deployed)?[Q4] Identify policies in new ecosystem: Repeat all steps of Q3, if yourtechnology is deployed.[Q5] Assess current ecosystem: Translating Slide5 into your context, can you foresee the stability of existingtussle outcome and potential spillovers to other functionalities, if your technology is not deployed? What about expected efficiency?[Q6] Assess new ecosystem: Repeat all steps of Q5, if yourtechnology is deployed.The SESERV project performs a survey about the technologies proposed by FP7 projects and the associated socio-economic issues that already exist or would appear after the deployment of those technologies.We would be happy to receive your project’s response on the questionnaire.These answers can be qualitative.If you are interested we could organize a 30 min. audio-conference
  • #15: Provide examples