scholarly journals Pricing and Efficiency in the Market for IP Addresses

2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)

2019 ◽  
Vol 4 (2) ◽  
pp. 137 ◽  
Author(s):  
Nfn Sarip ◽  
Arief Setyanto

The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.


2009 ◽  
Vol 2009 ◽  
pp. 1-6
Author(s):  
Maher Ben Jemaa ◽  
Nahla Abid ◽  
Maryline Laurent-Maknavicius ◽  
Hakima Chaouchi

The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4975
Author(s):  
Dan Komosny

The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.


2011 ◽  
Vol 12 (04) ◽  
pp. 299-318
Author(s):  
ANGELO FANELLI ◽  
MICHELE FLAMMINI ◽  
DOMENICO MANGO ◽  
GIOVANNA MELIDEO ◽  
LUCA MOSCARDELLI

Reducing the size of IP routing tables is one of the most compelling scaling problems affecting the Internet because of massive growth of routing table entries, increased traffic, and the migration to 128 bit IPv6 addresses. Various algorithms for IP table minimization have been proposed in the literature both for a single and for multiple tables, also with the possibility of performing address reassignments. In this paper we first introduce two new compression heuristics, the BFM and its evolution called BFM-Cluster, that exploit address reassignments for the minimization of multiple routing tables, and then we experimentally evaluate their performances together with the already existing techniques. Since a main problem posed by the growth of the routing tables sizes is the consequent general increase of the table lookup time during the routing of the IP packets, the aim is twofold: to measure and compare the compression ratios of the different algorithms, and to estimate the effects of the compression on the lookup times by measuring the induced improvement on the time of the main algorithms and data structures for the fast IP address lookup from the original tables to the compressed ones. Our point is that the existing techniques are efficient in different situations, with BFM-Cluster heuristic outperforming all other ones.


2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.


Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Bambang Widagdo ◽  
Mochamad Rofik

The economic diversification concept gives hope for a country with rich natural resources to strengthen its economic basis. Thus industrial revolution era of 4.0 provides great opportunity to fasten the process. A study by McKensey in 2011 proved that the internet in the developing country contributes around 3.4% towards its GDP which means that the internet has become a new hope for the economy in the future. Indonesia is one of the countries that is attempting to maximize the role of the Internet of Things (IoT) for its economic growth.� The attempt has made the retail and tourism industries as the two main sectors to experience the significant effect of IoT. In the process of optimizing the IoT to support the economic growth, Indonesia faces several issues especially in the term of the internet network quality and its distribution, the inclusive access of financial access and the infrastructure


2017 ◽  
Author(s):  
Sean Chandler Rife ◽  
Kelly L. Cate ◽  
Michal Kosinski ◽  
David Stillwell

As participant recruitment and data collection over the Internet have become more common, numerous observers have expressed concern regarding the validity of research conducted in this fashion. One growing method of conducting research over the Internet involves recruiting participants and administering questionnaires over Facebook, the world’s largest social networking service. If Facebook is to be considered a viable platform for social research, it is necessary to demonstrate that Facebook users are sufficiently heterogeneous and that research conducted through Facebook is likely to produce results that can be generalized to a larger population. The present study examines these questions by comparing demographic and personality data collected over Facebook with data collected through a standalone website, and data collected from college undergraduates at two universities. Results indicate that statistically significant differences exist between Facebook data and the comparison data-sets, but since 80% of analyses exhibited partial η2 < .05, such differences are small or practically nonsignificant in magnitude. We conclude that Facebook is a viable research platform, and that recruiting Facebook users for research purposes is a promising avenue that offers numerous advantages over traditional samples.


Sign in / Sign up

Export Citation Format

Share Document