Visualizing and Simulating Africa’s Internet Topology Sample Clauses

Visualizing and Simulating Africa’s Internet Topology. This research component will explore visualisation strategies for Africa’s Internet topology and metrics and implement a simulation platform for internet interconnection and performance. This research will include designing and evaluating appropriate interfaces and underlying toolkits that could allow stakeholders to interact with the interconnection data. The front-end platform will include an underlying simulator specifically for the African internet topology that will enable experimentation with different internetwork and interconnection strategies. We will disseminate our results through regional industry conferences on Internet development, such as the Africa Peering Forum (AfPIF), the Africa Internet Summit (AIS), and Africa’s Internet Governance Forum (IGF), as well as other public media and engagements with key national regulators and policy makers. We will also produce academic publications at regional and international conferences and journals, including IEEE/ACM Transactions on Networking, ACM IMC, IEEE INFOCOM, Information Systems Research, ITID, and Telecommunications Policy. Budget and Resources: Principal Investigator: Xx Xxxxxx Xxxxxxx, University of Cape Town Total (USD) Year1 Year2 Year3 STAFF COSTS 5 220 1 624 1 737 1 859 Bursaries & Scholarships 61 308 25 886 23 161 12 262 Research Assistants 10 218 3 406 3 406 3 406 Conference 6 131 2 044 2 725 1 362 TOTAL DIRECT COST 86 964 37 046 31 029 18 889 Indirect Cost 7 184 3 125 2 203 1 856 FULL COST + MARK UP 94 148 40 171 33 232 20 745 References [1] Xxxxxxx, A., Xxxxxxx, J., Xxxxxxx, A., Xxxxxxxxxxxx, A. and Xxxxx, G., 2018, April. Deep diving into Africa's inter-country latencies. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications (pp. 2231-2239). IEEE. [2] Fanou, R., Xxxxxxx‐Xxxxxx, V., Xxxxxx, X., Xxxxxx, X., & Xxxxxx, J. (2019). A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier. International Journal of Network Management, 29(2), e2056. [3] X. Xxxxxx, X. Xxxxxxxxxx, X. Xxxxxxxx, X. Xxxxxxxx and X. Xxxxxxxx, “Measuring broadband performance in South Africa,” in Proceedings of the 4th Annual Symposium on Computing for Development, 2014. [4] X. Xxxxx, X. Xxxxxx, X. Xxxxxxxx, X. Xxxxxx, X. Xxxxxxxx and X. Xxxx-Xxxxxxx, “Peering at the internet’s frontier: A first look at isp interconnectivity in africa,” in International Conference on Passive and Active Network Measurement, 2014. [5] X. Xxxxx, X. Xxxxxxxx, X. Xxxx, X. Xx...
AutoNDA by SimpleDocs

Related to Visualizing and Simulating Africa’s Internet Topology

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • Diagnostic procedures to aid the Provider in determining required dental treatment.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

Time is Money Join Law Insider Premium to draft better contracts faster.