Module 4: ICT Trends for Government Leaders

Similar documents
The Global Multistakeholder Forum for Dialogue on Internet Governance Issues

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

RESOLUTION 45 (Rev. Hyderabad, 2010)

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Internet Governance for Operators

Cybersecurity & Spam after WSIS: How MAAWG can help

Internet Governance and the World Summit on the Information Society (WSIS)

INTERNATIONAL TELECOMMUNICATION UNION

RESOLUTION 130 (Rev. Antalya, 2006)

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Internet Management - Past, Present, Future

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]

UNITED NATIONS FUNDS-IN-TRUST PROJECT DOCUMENT

THE INTERNET GOVERNANCE ECOSYSTEM. Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat

Related to the Internet

Internet Governance in April April 2016

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

The Regional Internet Registries

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Internet Governance: Today and Tomorrow

PRESENTATION TO WORKING GROUP 3 ON DEVELOPMENT MANAGEMENT & CITIZEN ENGAGEMENT

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

RESOLUTION 130 (REV. BUSAN, 2014)

ICANN and Internet Governance. Pierre Dandjinou, VP ; Africa. AIS, Lusaka 17 JUNE 2013

Internet Governance The Global Agenda. Peter Major Special adviser Permanent Mission of Hungary to the UN, Geneva

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

GSR-14 Internet Governance: an overview of the situation

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Internet Governance Overview. Judith Hellerstein San Juan, Puerto Rico 7 March 2018

Internet Governance. Mr. Samiran Gupta Head of India, ICANN

Digital Financial Inclusion and Consumer Protection

IPv6 & Internet Governance Developments. CANTO Nate Davis, Chief Operating Officer

Where Now? A Rough Guide to Global Internet Governance Post-WSIS. Don MacLean Oxford Internet Institute May 19, 2006

Concerns on IPv6 as a Public Policy Issue

The History of Internet Governance

Continuing Cooperation. The NRO s role in Internet Governance

Fundamental Principles of the Internet. Open, Distributed and Bottom-up.

Introduction to the work of ITU and its telecom policy research

RESOLUTION 67 (Rev. Buenos Aires, 2017)

The Future of the Internet?

Global Cybersecurity Agenda

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Cybersecurity for ALL

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

INTERNATIONAL INTERNET CONNECTIVITY

World Summit on the Information Society (WSIS) and the Digital Divide

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

INTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015

The Arab ICT Organization

Draft Applicant Guidebook, v3

GENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005

ITU, UNESCO. Comments submitted jointly by ITU and UNESCO on chapters one and four of the operational part of the Tunis Final Documents

The Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008

Promoting Global Cybersecurity

RESOLUTION 140 (REV. BUSAN, 2014)

Regional Development Forum For the Arab States(RDF-ARB) 2018

ITU and IPv6. ARIN October, Los Angeles by Richard Hill

Joint Declaration by G7 ICT Ministers

4 th Generation Regulation Driving Digital Communications Ahead

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Next Generation Networks (NGN): Quality of Service Issues & Consumer Protection. Session No 6 (Day 2)

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Chapter 3: Network Protocols and Communications

Russ Housley 21 June 2015

Continuing Cooperation. The NRO s role in Internet Governance

STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

One possible roadmap for IANA evolution

Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga

PLENIPOTENTIARY CONFERENCE REPORT 3 FINAL CONFERENCE WRAP-UP This is a final wrap-up report on the ITU Plenipotentiary Conference of 2010.

Leading the Digital Transformation from the Centre of Government

ITU Plenipotentiary What to expect ccnso LA

Analysis of Effectiveness of Open Service Architecture for Fixed and Mobile Convergence

The Challenge of Spam An Internet Society Public Policy Briefing

ITU Academia. Smart Partnership for ICT4SDG. Jaroslaw K. PONDER Coordinator for Europe Region

Commonwealth Cyber Declaration

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C

The Number Registry System

IP Interconnection. Calvin S. Monson Vice President. Antigua September 2007

ICANN Report. Presented by: Dr Paul Twomey CEO and President. Reston, Va ARIN XIV 20 October 2004

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

ITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010)

Track 1 // Collaboration & Partnerships

Internet Exchange Points An Internet Society Public Policy Briefing

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

RESOLUTIONS Review and Status of Implementation

SAMENA Regulatory Summit 2013 Kuwait:

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«

Resolution on Software Interoperability and Open Standards

Liberia ICT Policy

ICANN and the IANA. Elsa Saade and Fahd Batayneh MEAC-SIG August 2016

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Transcription:

Module 4: ICT Trends for Government Leaders SESSION 4: Internet Applications Internet Organizations Author: Rajnesh D. Singh

Internet Applications Tendency to define the public face of the Internet i.e. the World Wide Web (WWW) as the Internet; this is incorrect WWW, e-mail, File Transfer Protocol (FTP), Voice over Internet Protocol (VoIP) are perhaps better described as Internet applications The Internet is the physical network of networks available globally that allows sharing of resources

WWW and E-mail World Wide Web - a system of interlinked hypertext (text on a computer that will lead users to other related documents on demand) documents accessed via the Internet. These documents (or pages) may contain text, images, sound, video, and other forms of multimedia. E-mail - shortened form of electronic mail, a method of creating, sending, receiving and storing messages over an electronic communication system, the most common of which is the Internet

SPAM Large scale misuse of email systems to send unsolicited messages to a large number of recipients Cheap method for mass advertising Now being used for fraudulent and criminal activities A large part of Internet email traffic is SPAM, resulting in wasted bandwidth and higher cost for developing countries (i.e. countries paying for inbound and outbound traffic) Major issue on a global scale for users, ISPs, and governments

SPAM The Costs Wasted bandwidth costs borne by ISP, who ultimately passes this on to the user in terms of slower access speeds and higher prices for access Computers waste resources processing messages that are basically irrelevant to the user Employees waste time reading such messages, and sometimes get duped by promises of vast amounts of money, gifts, improvements to their physical anatomy, or 10 years of good luck

SPAM The Costs Security issues as well: code can be embedded within messages or on websites linked from the message Important for governments to consider implementing anti-spam legislation

FTP FTP - File Transfer Protocol provides a method to transfer data between computers using a network. This allows an operating system independent method for file sharing over a TCP/IP (Transmission Control Protocol/Internet Protocol) network, provided both computers are configured to allow FTP access (available through various software applications)

GIS on the Internet Geographical Information Systems (GIS) used for analyzing, editing, storing, sharing, and displaying geographically referenced data GIS used in many sectors, including land information systems, emergency services, asset management and tracking, environmental assessments, urban planning, logistics, etc. Internet now being used to deliver GIS applications and information

GIS on the Internet Google Maps

VoIP Voice over Internet Protocol Allows one to use the Internet to make telephone calls Has had a profound impact on world telecommunications systems; a paradigm shift in how we design and use telecommunications systems VoIP is delivered as an application; a different service provider may deliver the infrastructure Being rapidly adopted by carriers ( Next Generation Networking - NGN ) and users alike

VoIP Call Flows 3 basic types of call flows: IP device to IP device IP device to PSTN (public switched telephone network) PSTN to PSTN

VoIP: IP Device to IP Device One IP device calls another directly

VoIP: IP Device to PSTN An IP device calls a standard phone

VoIP: PSTN to PSTN A standard phone calls a standard phone with the call transiting via an IP network

What can IP and VoIP offer? Presence detection real-time online signaling to indicate whether a person is available to take a call or not Universal number have the same phone number anywhere in the world, allowing seamless mobility Smart end points to provide feedback and signaling, instant messaging Convergence of voice, data, and video over one network across multiple, diverse devices Upgrades are easier delivered through the network, i.e. firmware updates and upgrades

What can IP and VoIP offer? Promotes innovation by using an open architecture system rather than a closed proprietary system Improved equipment lifecycle feature enhancements, updates, and maintenance of these systems can be done electronically, improving performance and lowering maintenance costs over the life of the system Lower costs less bandwidth as VoIP can be compressed and sent over an IP network, packet switched so potentially better use of network resources

VoIP and Policy Issues Numbering IP addresses and nicknames may be used for call, so need to map these to traditional phone numbers; special range of telephone numbers for VoIP service providers to integrate seamlessly with PSTN; number portability for users changing service providers Emergency service access existing emergency services infrastructure may not be compatible with VoIP, i.e. caller location issues

VoIP and Policy Issues Universal access issue of minimum set of services, e.g. PSTN access, emergency services, public access telephones at fixed locations. Can be provided by third party and VoIP service providers contribute to fund Network security communications services are critical infrastructure and there is the need to safeguard these systems. VoIP may transit through the public Internet so need to protect these systems from Internet-based threats (viruses, worms, Denial of Service attacks)

VoIP and Policy Issues Law enforcement access authorities may require access for lawful intercept of communications services; appropriate technology needs to be deployed to support this as well as interoperability with connected systems

Internet Organizations Administration, development, and governance of the Internet is via a loosely organized collaboration of various international and regional bodies Decisions and policy directions are made through a bottom-up consensus-based approach A shift from the traditional top-down approach

Internet Organizations Telecommunications services are now a public policy issue with users demanding choice, service, and fair access/pricing Need for governments to engage in multistakeholder consultative processes to provide balanced, informed policy direction

Internet Society Promotes open development, evolution, and use of the Internet Addresses public policy issues Organizational home for Internet infrastructure standards bodies (Internet Engineering Task Force - IETF, Internet Architecture Board - IAB, etc.) Provides capacity-building aimed at the developing world Founded by Internet pioneers in 1991/1992 www.isoc.org

IETF Internet Engineering Task Force Open standards organization Develops and promotes standards and protocols covering TCP/IP and other technologies related to the Internet; publishes Requests For Comments (RFCs) Carries out work through working groups and mailing lists Meets 3 times a year No formal membership requirements www.ietf.org

IAB and IANA Internet Architecture Board looks at the big picture of the Internet, i.e. overall technical and engineering development Internet Assigned Numbers Authority - allocates and maintains unique codes and numbering systems that are used in the technical standards ( protocols ) that drive the Internet. These include the DNS root and the global pool of IP addresses that it allocates to Regional Internet Registries.

ICANN Internet Corporation for Assigned Names and Numbers Co-ordinates the overall unique identifiers upon which the Internet runs. This includes IP addresses and the Domain Name System (DNS). Technical functions of ICANN generally handled by IANA, which is funded and operated by ICANN Rest of ICANN's activities relate to policy with respect to its co-ordination function www.icann.org

ICANN Organizational Structure

W3C World Wide Web Consortium International consortium where member organizations, full-time staff, and the public work together to develop Web standards Something like IETF, but focused on the Web and associated technologies Publishes W3C Recommendations, which are Web standards and guidelines Promotes open, non-proprietary standards Tim Berners-Lee serves as Director www.w3.org

WSIS World Summit on the Information Society Composed of 2 conferences organized by the UN Geneva (2003) and Tunis (2005) One objective was to bridge the digital divide in the developing world Adopted Declaration of Principles based on shared knowledge and an information society that is accessible to all Geneva meeting announced a Plan of Action that set the goal of 50% of the world online by 2015; did not specify how, as well as funding and Internet Governance issues

WGIG Working Group on Internet Governance Created after WSIS Geneva 2003 due to a lack of resolve on Internet Governance issues Asked to develop a working definition of Internet Governance, and identify relevant public policy issues and the role of stakeholders Required to report recommendations at WSIS Tunis 2005

IGF Internet Governance Forum WSIS Tunis 2005 resulted in the Tunis Commitment and the Tunis Agenda for the Information Society that invited the UN Secretary-General to convene a new forum for multi-stakeholder policy dialogue (paragraph 67) The Forum was to be convened by the second quarter of 2006 in an open and inclusive process (paragraph 72). The IGF's structure, function and its working are addressed in paragraphs 73 79.

IGF IGF a multi-stakeholder forum for discussing Internet Governance issues and helping the UN Secretary-General in implementing WSIS outcomes 5-year mandate with annual meetings: Athens, Greece (2006); Rio de Janeiro, Brazil (2007); Hyderabad, India (2008); Sharm El- Sheikh, Egypt (2009); Vilnius, Lithuania (2010) Meeting themes around Access, Diversity, Openness, Security. Critical Internet Resources introduced in 2007 Not a policy-making body; more a forum for dialogue

Regional Internet Registries (RIRs) RIRs manage, distribute, and register public, numeric Internet address space (and related resources) within their respective regions Established under IANA to serve large geographic regions IANA delegates a range of Internet resources to RIRs who allocate in-region Five RIRs comprise the Number Resources Organization (NRO), which undertakes joint technical projects, liaison, and policy coordination www.nro.org

Regional Internet Registries (RIRs)

Policy Considerations Need to have competition in the Internet Service Provision space; and to ensure that there is appropriate unbundling of local loop services (i.e. separation of infrastructure from services that run over it) Need to consider legislative responses to cybersecurity (e.g. SPAM legislation and consumer protection on the Internet) Maximizing the opportunities offered by Internet technology to deliver services and information

Policy Considerations Need to provide appropriate regulatory flexibility to ensure the continued evolution of Internet technologies and their use (e.g. liberalization of VoIP and development of broadband Internet from both access and cost perspectives) Provide an environment conducive to the development of community-based networks, particularly in rural environments where commercial provision of services may not be feasible

Policy Considerations Engage with regional and international organizations on matters of Internet and ICT policy. Ensure that the ICT regulatory and policymaking arm of government is proactive in its approach and engages with stakeholders from all sectors, and that it has the capacity to research and assess new technology trends so they could potentially be rapidly adopted where appropriate.

Assignment 1 Come up with strategies to (i) highlight the importance of email systems and threats that exist for abuse and misuse, and (ii) present some strategies to counter abuse of email and Internet systems.

Assignment 2 Answer the following questions: i) Which organization develops the standards for the core technologies that make the Internet run? ii) Which organization is charged with the administration of the numbers and names that make the Internet work? iii) What RIR serves the region you live in?