Nettest. An implementation of BEREC s recommendations

Similar documents
QoS. Website Rendering UDP 1/1 4/6. HTTP Proxy TCP 14/16 5/5. Non Transparent Proxy 4/5. Traceroute 4/6 DNS. Voice Over IP 36/38 1/1.

Before the Telecom Regulatory Authority of India In response to the Consultation Paper on Net Neutrality

Regulatory perspective and technical tools and platforms to measure QoS - COUNTRY EXPERIENCES

Net Neutrality and Quality of Access

Market - Technology - Policy Regulatory Policy Developments

Vendor input draft BEREC Net Neutrality guidelines

Net Neutrality A solution in search of a problem?

BEREC Public debriefing

5 th July BoR PC03 (17) 15

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

REGULATION IN THE NEW DIGITAL ECOSYSTEM

The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

RATEL Benchmarking mobile network operators 2017 VESNA KRZMAN

Net Neutrality intersection between regulation and technology

RID IETF Draft Update

Background Brief. The need to foster the IXPs ecosystem in the Arab region

IDEAL MODALITY OF NEGOTIATIONS ON SEP LICENSING

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Network Transparency Statement

Data Processing Agreement

BoR PC 01 (16) 087. [17] BEREC understands a subinternet

Saba Hosted Customer Privacy Policy

Protecting your data. EY s approach to data privacy and information security

Please let us know if you have any questions regarding this Policy either by to or by telephone

TERMS OF REFERENCE FOR AUDITS WASTE ELECTRICAL AND ELECTRONIC EQUIPMENT COMPLIANCE SCHEME [UPDATED 11 APRIL 2016]

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Network Neutrality: Challenges and responses in the EU and in the U.S.

Proposal for a model to address the General Data Protection Regulation (GDPR)

Hart telephone company. Network TRANSPARENCY statement

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

Embedding GDPR into the SDLC

Lao PDR Practice for Information Security

Draft Applicant Guidebook, v3

High-Level Testing Principles. Annex 5 to the Voluntary Codes of Practice on Residential and Business Broadband Speeds

Telecom Italia response. to the BEREC public consultation on

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Eco Web Hosting Security and Data Processing Agreement

Priv ac y Policy. Last upda ted:

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

Shaw Privacy Policy. 1- Our commitment to you

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

ACM Policy rule on the provision of information concerning internet speeds

Ardmore Telephone Network TRANSPARENCY statement

GC0102 Mod Title: EU Connection Codes GB Implementation Mod 3

CHAPTER 13 ELECTRONIC COMMERCE

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

Pilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia

The future role of DSOs in the context of the Clean Energy for All Europeans package

South Hams Motor Club Our Privacy Policy. How do we collect information from you? What type of information is collected from you?

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Our Privacy Policy gives you detailed information on when and why we collect your personal information, how we use it and how we keep it secure.

Livingston Communications. Network TRANSPARENCY statement

INFORMATION ASSURANCE DIRECTORATE

ELECTRONIC COPY SAMKNOWS ANALYSIS OF ROGERS BROADBAND PERFORMANCE IN FEBRUARY 2015 ELECTRONIC COPY. Delivered by to: Shane Jansen.

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

IDENTITY ASSURANCE PRINCIPLES

Draft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011

SOC for cybersecurity

Emsi Privacy Shield Policy

CYBER INSURANCE: MANAGING THE RISK

Union Springs Telephone Company, Inc. Network TRANSPARENCY statement

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Plains Internet Open Internet Policy Statement (as of June 2018)

GDPR: A QUICK OVERVIEW

DisLedger - Distributed Concurrence Ledgers 12 August, 2017

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

EY s data privacy service offering

Trust Services for Electronic Transactions

Sarri Gilman Privacy Policy

Data Processing Agreement

Network TRANSPARENCY statement

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

UWC International Data Protection Policy

Network Management Practices Policy

Continuous auditing certification

Reference Offer for Wholesale Roaming Access

Canada s Anti-Spam Legislation (CASL) Compliance Primer & Checklist. April 2014

Risk-based security in practice Turning information into smart screening. October 2014

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Business microdata dissemination at Istat

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

Syed Ismail Shah, PhD Chairman, PTA,

(Non-legislative acts) REGULATIONS

HAKOM NEXT GENERATION NETWORK AND REGULATORY CHALLENGES. Prof. Ignac Lovrek, Ph.D. Dražen Lučić, Ph.D. Gašper Gaćina

RiverStreet Networks Network TRANSPARENCY Statement

Security Aspects of Trust Services Providers

The Center for Internet Security

Privacy Challenges in Big Data and Industry 4.0

Audit Report. The Prince s Trust. 27 September 2017

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Wilkes Communications, Inc. Network TRANSPARENCY Statement

Transcription:

Nettest An implementation of BEREC s recommendations Andreas Gaber September 26th, 2016

In order to provide robust quality measurement results, the crowd-sourced approach must aim to collect a large number of participants. BEREC 25.09.2014

~3 Million complete measurements in all 28 EU countries In total out of 191 countries

The success of the crowd-sourced approach relies on a low threshold for participation. BEREC 25.09.2014

Statistical analysis, historical measurements, heatmaps, social media integration, gaming... In best case Open Data.

Details about the measurement methodology should be made available, and open source code should be considered as an option. Furthermore, transparency of collected data ( open data ) should also be sought. BEREC 25.09.2014

Comparability of individual sample measurements, comparability at higher levels such as comparability between IASes, and between countries so that degradation of certain offers, or degradation caused by specialised services, can be identified BEREC 25.09.2014

An important quality indicator for net neutrality is achieved by monitoring the effects of congestion in the network. BEREC 25.09.2014

Blocking of traffic Availability of specific services (VoIp,..) Changing of content DNS spoofing Traffic management detection

Thank you for your attention! Andreas Gaber Alladin-IT GMBH Kaiserstrasse 8, 1070 Wien, Austria +43 1 890 08 47 https://nettest.specure.com/ andreas.gaber@alladin.at

Legend: Operator provided Under negotiation Third party provided Already provided Ongoing

BEREC recommendations 1/3 According to report published on 25.09.2014, Body of European Regulators recommends following parameters of IAS quality monitoring system: Parameter Recommendation NetTest compliance IP layer measurements Measuring at least following IP layer parameters: upload and download speed, delay, jitter, and packet loss ratio. Including all types of IAS The recommended IP layer metrics are applicable for fixed as well as wireless/mobile Internet access services. Monitoring degradation of service When evaluating potential degradation of IAS as a whole, BEREC recommends that such measurements are conducted over time to allow trend analysis. Crowd-sourcing Regarding aggregated results, BEREC recommends - for reasons of cost-effectiveness and user-friendliness - that averaging (based on data gathered from all participating users) should be done based on crowd-sourcing. Software-based agent Implement end user transparency measurements in a userfriendly manner (a software-based measurement agent downloaded to end user equipment).

BEREC recommendations 2/3 Parameter Recommendation (as stated in BEREC report) NetTest compliance Accuracy Accuracy requires that results are obtained from a clearly defined population and their statistical treatment is well documented, so that results can be interpreted without bias. Comparability This includes plain comparability of individual sample measurements, but also comparability at higher levels, such as comparability between IASes, and between countries when possible, so that degradation can be identified with a sufficient level of confidence. Security The system components must be robust and protected against security attacks, and availability, integrity and confidentiality of the measurement data must be secured during storage and transmission. Privacy This implies that the user must be informed which data are collected, for what purpose and what information shall be included, how data will be used, and specifically that some information may be made available to the public. Legal value The system governance must be designed in a way which mitigates conflicts of interest and ensures credible results.

BEREC recommendations 3/3 Parameter End user enablement Future-proof Open source code Open data principle Recommendation (as stated in BEREC report) For regulators to set up a measurement system with the overall aim of being objective and provider-independent and enabling users to undertake measurements implies and maybe even intends that an end user will rely on and make further use of the measurement results. The system design should ensure flexibility, extensibility, scalability and adaptability. Details about the measurement methodology should be made available, and open source code should be considered as an option to achieve this requirement. Knowledge of source code is therefore the ultimate tool to make the measurement methodology transparent. Furthermore, transparency of collected data ( open data ) should also be sought, with due respect for the limitations of national legislation. NetTest compliance