Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Congestion management (2)
- FCC (2)
- Absence of per-flow state (1)
- Air gaps (1)
- Attribution (1)
-
- Bandwidth (1)
- Bandwidth constraints (1)
- Broadband technology (1)
- Cloud computing (1)
- Communications law (1)
- Competition (1)
- Critical infrastructure (1)
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Digital warfare (1)
- Error correction (1)
- Federal Communications Commission (1)
- Gatekeeper (1)
- Geneva Convention (1)
- IPTV (1)
- Independent Group of Experts (IGE) (1)
- Intercarrier compensation (1)
- Interconnection (1)
- International humanitarian law (1)
- Internet access (1)
- Internet protocol video (1)
- Jus ad bellum (1)
- Jus in bello (1)
- Kill switches (1)
Articles 1 - 6 of 6
Full-Text Articles in Systems and Communications
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
All Faculty Scholarship
Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.
Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
All Faculty Scholarship
Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …