+ All Categories
Home > Documents > Module 4: ICT Trends for Government...

Module 4: ICT Trends for Government...

Date post: 18-Feb-2019
Category:
Upload: trinhlien
View: 231 times
Download: 1 times
Share this document with a friend
38
SESSION 4: Internet Applications Internet Organizations Author: Rajnesh D. Singh Module 4: ICT Trends for Government Leaders
Transcript

SESSION 4: Internet Applications Internet Organizations

Author: Rajnesh D. Singh

Module 4: ICT Trends for Government Leaders

Internet Applications

Tendency to define the public face of the Internet — i.e. the World Wide Web (WWW) —as the Internet; this is incorrect

WWW, e-mail, File Transfer Protocol (FTP), Voice over Internet Protocol (VoIP) are perhaps better described as “Internet applications”

“The Internet” is the physical network of networks available globally that allows sharing of resources

WWW and E-mail

World Wide Web - a system of interlinked hypertext (text on a computer that will lead users to other related documents on demand) documents accessed via the Internet. These documents (or pages) may contain text, images, sound, video, and other forms of multimedia.

E-mail - shortened form of “electronic mail”, a method of creating, sending, receiving and storing messages over an electronic communication system, the most common of which is the Internet

SPAM

Large scale misuse of email systems to send unsolicited messages to a large number of recipients

Cheap method for mass advertisingNow being used for fraudulent and criminal

activitiesA large part of Internet email traffic is SPAM,

resulting in wasted bandwidth and higher cost for developing countries (i.e. countries paying for inbound and outbound traffic)

Major issue on a global scale for users, ISPs, and governments

SPAM – The Costs

Wasted bandwidth costs borne by ISP, who ultimately passes this on to the user in terms of slower access speeds and higher prices for access

Computers waste resources processing messages that are basically irrelevant to the user

Employees waste time reading such messages, and sometimes get duped by promises of vast amounts of money, gifts, improvements to their physical anatomy, or 10 years of good luck

SPAM – The Costs

Security issues as well: code can be embedded within messages or on websites linked from the message

Important for governments to consider implementing anti-SPAM legislation

FTP

FTP - File Transfer Protocol provides a method to transfer data between computers using a network. This allows an operating system independent method for file sharing over a TCP/IP (Transmission Control Protocol/Internet Protocol) network, provided both computers are configured to allow FTP access (available through various software applications)

GIS on the Internet

Geographical Information Systems (GIS) used for analyzing, editing, storing, sharing, and displaying geographically referenced data

GIS used in many sectors, including land information systems, emergency services, asset management and tracking, environmental assessments, urban planning, logistics, etc.

Internet now being used to deliver GIS applications and information

GIS on the Internet – Google Maps

VoIP

Voice over Internet ProtocolAllows one to use the Internet to make

telephone callsHas had a profound impact on world

telecommunications systems; a paradigm shift in how we design and use telecommunications systems

VoIP is delivered as an application; a different service provider may deliver the infrastructure

Being rapidly adopted by carriers (“Next Generation Networking - NGN”) and users alike

VoIP Call Flows

3 basic types of call flows: IP device to IP device IP device to PSTN (public switched telephone

network)PSTN to PSTN

VoIP: IP Device to IP Device

One IP device calls another directly

VoIP: IP Device to PSTN

An IP device calls a standard phone

VoIP: PSTN to PSTN

A standard phone calls a standard phone with the call transiting via an IP network

What can IP and VoIP offer?

Presence detection real-time online signaling to indicate whether a person is available to take a call or not

Universal number have the same phone number anywhere in the world, allowing seamless mobility

Smart end points to provide feedback and signaling, instant messaging

Convergence of voice, data, and video over one network across multiple, diverse devices

Upgrades are easier delivered through the network, i.e. firmware updates and upgrades

What can IP and VoIP offer?

Promotes innovation by using an open architecture system rather than a closed proprietary system

Improved equipment lifecycle feature enhancements, updates, and maintenance of these systems can be done electronically, improving performance and lowering maintenance costs over the life of the system

Lower costs less bandwidth as VoIP can be compressed and sent over an IP network, packet switched so potentially better use of network resources

VoIP and Policy Issues

Numbering IP addresses and “nicknames” may be used for call, so need to map these to traditional phone numbers; special range of telephone numbers for VoIP service providers to integrate seamlessly with PSTN; number portability for users changing service providers

Emergency service access existing emergency services infrastructure may not be compatible with VoIP, i.e. caller location issues

VoIP and Policy Issues

Universal access issue of minimum set of services, e.g. PSTN access, emergency services, public access telephones at fixed locations. Can be provided by third party and VoIP service providers contribute to fund

Network security communications services are critical infrastructure and there is the need to safeguard these systems. VoIP may transit through the public Internet so need to protect these systems from Internet-based threats (viruses, worms, Denial of Service attacks)

VoIP and Policy Issues

Law enforcement access authorities may require access for lawful intercept of communications services; appropriate technology needs to be deployed to support this as well as interoperability with connected systems

Internet Organizations

Administration, development, and governance of the Internet is via a loosely organized collaboration of various international and regional bodies

Decisions and policy directions are made through a bottom-up consensus-based approach

A shift from the traditional top-down approach

Internet Organizations

Telecommunications services are now a public policy issue with users demanding choice, service, and fair access/pricing

Need for governments to engage in multi-stakeholder consultative processes to provide balanced, informed policy direction

Internet Society

Promotes open development, evolution, and use of the Internet

Addresses public policy issuesOrganizational home for Internet

infrastructure standards bodies (Internet Engineering Task Force - IETF, Internet Architecture Board - IAB, etc.)

Provides capacity-building aimed at the developing world

Founded by Internet pioneers in 1991/1992www.isoc.org

IETF

Internet Engineering Task ForceOpen standards organizationDevelops and promotes standards and

protocols covering TCP/IP and other technologies related to the Internet; publishes Requests For Comments (RFCs)

Carries out work through working groups and mailing lists

Meets 3 times a yearNo formal membership requirementswww.ietf.org

IAB and IANA

Internet Architecture Board – looks at the “big picture” of the Internet, i.e. overall technical and engineering development

Internet Assigned Numbers Authority -allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet. These include the DNS root and the global pool of IP addresses that it allocates to Regional Internet Registries.

ICANN

Internet Corporation for Assigned Names and Numbers

Co-ordinates the overall unique identifiers upon which the Internet runs. This includes IP addresses and the Domain Name System (DNS).

Technical functions of ICANN generally handled by IANA, which is funded and operated by ICANN

Rest of ICANN's activities relate to policy with respect to its co-ordination function

www.icann.org

ICANN Organizational Structure

W3C

World Wide Web Consortium International consortium where member

organizations, full-time staff, and the public work together to develop Web standards

Something like IETF, but focused on the Web and associated technologies

Publishes “W3C Recommendations”, which are Web standards and guidelines

Promotes open, non-proprietary standardsTim Berners-Lee serves as Directorwww.w3.org

WSIS

World Summit on the Information SocietyComposed of 2 conferences organized by the

UN – Geneva (2003) and Tunis (2005)One objective was to bridge the digital divide

in the developing worldAdopted Declaration of Principles based on

shared knowledge and an information society that is accessible to all

Geneva meeting announced a Plan of Action that set the goal of 50% of the world online by 2015; did not specify how, as well as funding and Internet Governance issues

WGIG

Working Group on Internet GovernanceCreated after WSIS Geneva 2003 due to a

lack of resolve on Internet Governance issues

Asked to develop a working definition of Internet Governance, and identify relevant public policy issues and the role of stakeholders

Required to report recommendations at WSIS Tunis 2005

IGF

Internet Governance ForumWSIS Tunis 2005 resulted in the “Tunis

Commitment” and the “Tunis Agenda for the Information Society” that invited the UN Secretary-General to “convene a new forum for multi-stakeholder policy dialogue” (paragraph 67)

The Forum was to be convened by the second quarter of 2006 in an open and inclusive process (paragraph 72). The IGF's structure, function and its working are addressed in paragraphs 73 – 79.

IGF

IGF – a multi-stakeholder forum for discussing Internet Governance issues and helping the UN Secretary-General in implementing WSIS outcomes

5-year mandate with annual meetings: Athens, Greece (2006); Rio de Janeiro, Brazil (2007); Hyderabad, India (2008); Sharm El-Sheikh, Egypt (2009); Vilnius, Lithuania (2010)

Meeting themes around Access, Diversity, Openness, Security. Critical Internet Resources introduced in 2007

Not a policy-making body; more a forum for dialogue

Regional Internet Registries (RIRs)

RIRs manage, distribute, and register public, numeric Internet address space (and related resources) within their respective regions

Established under IANA to serve large geographic regions

IANA delegates a range of Internet resources to RIRs who allocate in-region

Five RIRs comprise the Number Resources Organization (NRO), which undertakes joint technical projects, liaison, and policy co-ordination

www.nro.org

Regional Internet Registries (RIRs)

Policy Considerations

Need to have competition in the Internet Service Provision space; and to ensure that there is appropriate “unbundling” of local loop services (i.e. separation of infrastructure from services that run over it)

Need to consider legislative responses to cybersecurity (e.g. SPAM legislation and consumer protection on the Internet)

Maximizing the opportunities offered by Internet technology to deliver services and information

Policy Considerations

Need to provide appropriate regulatory flexibility to ensure the continued evolution of Internet technologies and their use (e.g. liberalization of VoIP and development of broadband Internet from both access and cost perspectives)

Provide an environment conducive to the development of community-based networks, particularly in rural environments where commercial provision of services may not be feasible

Policy Considerations

Engage with regional and international organizations on matters of Internet and ICT policy.

Ensure that the ICT regulatory and policymaking arm of government is proactive in its approach and engages with stakeholders from all sectors, and that it has the capacity to research and assess new technology trends so they could potentially be rapidly adopted where appropriate.

Assignment 1

Come up with strategies to (i) highlight the importance of email systems and threats that exist for abuse and misuse, and (ii) present some strategies to counter abuse of email and Internet systems.

Assignment 2

Answer the following questions:i) Which organization develops the standards for the core technologies that make the Internet run?ii) Which organization is charged with the administration of the numbers and names that make the Internet work?iii) What RIR serves the region you live in?


Recommended