111
Departme nt of Communicatio ns a nd Networki ng F e asibil it y anal ysis o f new I nte rnet protocol s M ethods a nd case st udies T apio Lev ä DOCTORAL DISSERTATIONS

Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

9HSTFMG*afhjch+

ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto University School of Electrical Engineering Department of Communications and Networking www.aalto.fi

BUSINESS + ECONOMY ART + DESIGN + ARCHITECTURE SCIENCE + TECHNOLOGY CROSSOVER DOCTORAL DISSERTATIONS

Aalto-D

D 113

/2014

The Internet standardization community actively develops new Internet protocols as a response to the challenges with the existing protocols and the requirements of emerging application areas. However, many of these protocols fail to get deployed, because the stakeholders' incentives and the dynamics of protocol deployment are not sufficiently understood and taken into account during the protocol development. This dissertation aims for improving the success rate of new Internet protocols by increasing the understanding of the dynamics of protocol deployment and the techno-economic factors affecting the feasibility of Internet protocols. Additionally, the dissertation develops methods for analyzing the deployment and feasibility of Internet protocols.

Tapio L

evä F

easibility analysis of new Internet protocols

Aalto

Unive

rsity

Department of Communications and Networking

Feasibility analysis of new Internet protocols Methods and case studies

Tapio Levä

DOCTORAL DISSERTATIONS

Page 2: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Aalto University publication series DOCTORAL DISSERTATIONS 113/2014

Feasibility analysis of new Internet protocols

Methods and case studies

Tapio Levä

A doctoral dissertation completed for the degree of Doctor of Science (Technology) to be defended, with the permission of the Aalto University School of Electrical Engineering, at a public examination held at the lecture hall S1 of the school on 12 August 2014 at 13.

Aalto University School of Electrical Engineering Department of Communications and Networking Network Economics

Page 3: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Supervising professor Prof. Heikki Hämmäinen Thesis advisor Prof. Heikki Hämmäinen Preliminary examiners Prof. Jarmo Harju, Tampere University of Technology, Finland Prof. Dimitris Varoutas, University of Athens, Greece Opponent Prof. Kalle Lyytinen, Case Western Reserve University, Cleveland, USA

Aalto University publication series DOCTORAL DISSERTATIONS 113/2014 © Tapio Levä ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 (printed) ISSN 1799-4942 (pdf) http://urn.fi/URN:ISBN:978-952-60-5793-4 Unigrafia Oy Helsinki 2014 Finland Publication orders (printed book): http://comnet.aalto.fi/en/

Page 4: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Abstract Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi

Author Tapio Levä Name of the doctoral dissertation Feasibility analysis of new Internet protocols: Methods and case studies Publisher School of Electrical Engineering Unit Department of Communications and Networking

Series Aalto University publication series DOCTORAL DISSERTATIONS 113/2014

Field of research Network economics

Manuscript submitted 13 February 2014 Date of the defence 12 August 2014

Permission to publish granted (date) 12 June 2014 Language English

Monograph Article dissertation (summary + original articles)

Abstract The Internet standardization community actively develops new Internet protocols as a

response to challenges with the existing protocols and the requirements of new application areas. However, many of these protocols fail to achieve their expectations due to limited deployment. A significant reason for the lack of deployment seems to be that the stakeholders' incentives and the dynamics of protocol deployment are not sufficiently understood and taken into account during the protocol development. Consequently, new protocols end up being techno-economically infeasible and significant development effort is wasted. This dissertation aims for improving the techno-economic feasibility of new Internet protocols by increasing the understanding of the dynamics of protocol deployment and the factors affecting the feasibility of Internet protocols. Additionally, the dissertation develops methods for analyzing the deployment and feasibility of Internet protocols. The research builds on three in-depth case studies that apply multiple research methods to analyze the feasibility of multipath TCP, host identity protocol and constrained application protocol. Then, the results of these case studies are combined with the existing literature on innovation diffusion and network economics to construct frameworks for both measuring the deployment and analyzing the feasibility of Internet protocols. The results show that, due to the protocols' nature as software components embedded in software and hardware products, the technology-push from hardware and software providers affects significantly protocol deployment. The end users may also be unaware that they have acquired, and even started, using protocols. These factors combined result in large gaps between the number of end users possessing a protocol and the number of those using it. The constructed feasibility analysis framework is another key result of the dissertation, as it provides a systematic process description and research method toolbox for identifying the deployment challenges and proposing solutions to them already during the protocol development. Finally, the protocol case studies identify new factors affecting the feasibility of Internet protocols. The results highlight the importance of analyzing the feasibility of new Internet protocols systematically from the beginning of protocol development, spanning throughout the protocol deployment and covering all the relevant stakeholders. Measuring protocol deployment can support the feasibility analysis by identifying the deployment bottlenecks and improving the understanding of the dynamics of protocol deployment. Systematic, techno-economic feasibility analysis can help protocol developers to improve the feasibility of their protocols and the deploying stakeholders to make more informed deployment decisions. Keywords Internet protocols, diffusion, feasibility, techno-economic analysis

ISBN (printed) 978-952-60-5792-7 ISBN (pdf) 978-952-60-5793-4

ISSN-L 1799-4934 ISSN (printed) 1799-4934 ISSN (pdf) 1799-4942

Location of publisher Helsinki Location of printing Helsinki Year 2014

Pages 230 urn http://urn.fi/URN:ISBN:978-952-60-5793-4

Page 5: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto
Page 6: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Tiivistelmä Aalto-yliopisto, PL 11000, 00076 Aalto www.aalto.fi

Tekijä Tapio Levä Väitöskirjan nimi Uusien Internet-protokollien toteutettavuusanalyysi: Menetelmiä ja tapaustutkimuksia Julkaisija Sähkötekniikan korkeakoulu Yksikkö Tietoliikenne- ja tietoverkkotekniikan laitos

Sarja Aalto University publication series DOCTORAL DISSERTATIONS 113/2014

Tutkimusala Tietoverkkotalous

Käsikirjoituksen pvm 13.02.2014 Väitöspäivä 12.08.2014

Julkaisuluvan myöntämispäivä 12.06.2014 Kieli Englanti

Monografia Yhdistelmäväitöskirja (yhteenveto-osa + erillisartikkelit)

Tiivistelmä Internetin standardointiyhteisö kehittää aktiivisesti uusia Internet-protokollia ratkaisemaan

nykyisten protokollien ongelmia ja vastaamaan uusien sovellusalueiden haasteisiin. Moni näistä protokollista ei kuitenkaan pysty saavuttamaan tavoitteitaan rajallisen käyttöönoton takia. Merkittävä syy rajalliselle käyttöönotolle vaikuttaa olevan se, että toimijoiden motiiveja ja protokollien käyttöönoton dynamiikkaa ei ymmärretä eikä oteta riittävästi huomioon protokollakehityksessä. Tämän seurauksena uusista protokollista tulee teknis-taloudellisesti heikosti toteutettavia ja merkittävä kehitystyö menee hukkaan. Tämä väitöskirja pyrkii parantamaan uusien Internet-protokollien toteutettavuutta lisäämällä ymmärrystä protokollien käyttöönoton dynamiikasta ja tekijöistä, jotka vaikuttavat protokollien toteutettavuuteen. Lisäksi väitöskirja kehittää menetelmiä protokollien käyttöönoton ja toteutettavuuden tutkimiseen. Tutkimus perustuu kolmeen perusteelliseen tapaustutkimukseen, jotka soveltavat useita tutkimusmenetelmiä MPTCP-, HIP- ja CoAP-protokollien toteutettavuuden analysoimiseen. Näiden tapaustutkimusten tulosten ja olemassa olevan, innovaatioiden leviämistä ja verkkovaikutuksia koskevan kirjallisuuden perusteella luodaan kehysmallit sekä protokollien käyttöönoton mittaamiseen että toteutettavuuden analysointiin. Tulokset osoittavat, että protokollien luonne ohjelmistokomponentteina, jotka on upotettu ohjelmistoihin ja päätelaitteisiin, vaikuttaa siten, että teknologian tarjoajilla on merkittävä rooli protokollien leviämisessä käyttöön. Samalla loppukäyttäjät eivät välttämättä edes tiedosta omaavansa, ja jopa alkaneensa käyttää protokollia. Näiden tekijöiden yhteisvaikutus johtaa suuriin eroihin protokollan omistajien ja käyttäjien lukumäärissä. Kehysmalli proto-kollien toteutettavuuden analysointiin on toinen tärkeä tulos, koska se tarjoaa systemaattisen prosessikuvauksen ja tutkimusmenetelmiä protokollien käyttöönottohaasteiden tunnistamiseen ja ratkaisemiseen jo protokollien kehitysvaiheessa. Lisäksi protokollien tapaustutkimukset tunnistavat uusia protokollien toteutettavuuteen vaikuttavia tekijöitä. Tulokset korostavat, että on tärkeää analysoida uusien Internet-protokollien toteutettavuutta systemaattisesti protokollakehityksen alusta alkaen koko käyttöönottoprosessin ajan, siten että kaikki käyttöönottoon osallistuvat toimijat huomioidaan. Mittaamalla protokollien käyttöönottoa voidaan tunnistaa käyttöönoton pullonkauloja ja parantaa ymmärrystä protokollien käyttöönoton dynamiikasta, mikä tukee toteutettavuusanalyysia. Systemaattinen, teknis-taloudellinen toteutettavuusanalyysi voi auttaa protokollakehittäjiä parantamaan kehittämiensä protokollien toteutettavuutta. Lisäksi käyttöönottoon osallistuvat toimijat voivat tehdä asiantuntevampia käyttöönottopäätöksiä. Avainsanat Internet-protokollat, leviäminen, toteutettavuus, teknis-taloudellinen analyysi

ISBN (painettu) 978-952-60-5792-7 ISBN (pdf) 978-952-60-5793-4

ISSN-L 1799-4934 ISSN (painettu) 1799-4934 ISSN (pdf) 1799-4942

Julkaisupaikka Helsinki Painopaikka Helsinki Vuosi 2014

Sivumäärä 230 urn http://urn.fi/URN:ISBN:978-952-60-5793-4

Page 7: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto
Page 8: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

i

Preface

“Talent wins games, but teamwork and intelligence wins championships.” – Michael Jordan

Writing this dissertation has been a great learning process that would have not been possible without support and contribution from many brilliant people. Firstly, I am grateful to my supervisor, Prof. Heikki Hämmäinen, for believing in me and providing the necessary resources and guidance in this journey. I appreciate Heikki’s ability to see and communicate the bigger picture, while also leaving space for your own thinking. I also wish to thank the preliminary examiners, Prof. Jarmo Harju and Prof. Dimitris Varoutas, for their valuable comments during the final phases of the dissertation. Moreover, I thank Prof. Kalle Lyytinen for devoting his time to act as my opponent in the defense.

At its best, research is truly a collaborative effort. Personally, I would not be here without the great co-authors I had fortune to work with. First and foremost, I feel gratitude for being able to share the office and pursuit the doctoral degree together with Henna Suomi. Our continuous discussions, sparring, and spurring were the most valuable support that made this journey shorter, less rocky and more pleasant to wander. I owe special thanks to Miika Komu and Oleksiy Mazhelis, who taught me so much about conducting rigorous research and getting things done. The discussions with Antti Riikonen in the last meters of my PhD studies were valuable for clarifying my thinking and wrapping up the dissertation. I also thank all the other co-authors: Alan Ford, Alexandros Kostopoulos, Ari Keränen, Bernd Heinrich, Howard Tripp, Juuso Töyli, Lars Eggert, and Sakari Luukkainen. Moreover, I am thankful for all those people who provided their insights in research interviews.

Department of Communications and Networking has been my home base for more than six years. The people and their professional, yet relaxed

Page 9: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

ii

attitude have made this time enjoyable. In particular, I wish to thank the wonderful current and former members of our Netbizz team that have shared the joys and sorrows of research with me, including Arturo Basaure, Thomas Casey, Benjamin Finley, Mikko Heikkinen, Juuso Karikoski, Michail Katsigiannis, Pekka Kekolahti, Antero Kivi, Timo Smura, Tapio Soikkeli and Nan Zhang. Special thanks go to Docent Kalevi Kilkki, who continuously taught me scientific thinking and curiosity during our inspiring discussions.

The research of this dissertation was conducted in the context of multiple national and international research projects – including Trilogy (EU FP7), Future Internet (TIVIT) and Internet of Things (DIGILE) – that provided me contacts, funding and valuable lessons from working in and managing projects. I had the privilege to have a funded position in the Future Internet Graduate School (FIGS) of the Academy of Finland, which allowed me to follow my own path to this dissertation. I also thank the Nokia Foundation, HPY Research Foundation, the Research and Training Foundation of TeliaSonera Finland Oyj, Foundation of The Finnish Society of Electronics Engineers, and Tekniikan edistämissäätiö for the grants I received.

The project of this size would not be possible without the support from the dearest ones. I am thankful for all my friends and brother Eero for helping me to relax my mind with scouting, basketball and other activities. Special thanks go to Ralf Baumann for designing the cover picture. Finally, I want to thank my parents Marja and Jorma who have always supported and believed in me, and my beloved wife Reetta who continues to encourage me every day. Helsinki, 14th of July 2014, Tapio Levä

Page 10: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

iii

Contents

1. Introduction ......................................................................... 1

1.1 Background and motivation ............................................................... 1

1.2 Research questions and scope ........................................................... 3

1.3 Research process ................................................................................ 5

1.4 Outline of the dissertation ................................................................. 7

2. Theoretical background ........................................................ 9

2.1 Innovation deployment process ......................................................... 9

2.2 Factors affecting innovation diffusion ............................................. 12

2.2.1 Attribute-centric perspective on innovation diffusion ............. 12

2.2.2 Economic perspective on innovation diffusion ........................ 14

2.2.3 Internet as an environment for innovation diffusion ............... 15

2.3 Methods for analyzing the feasibility of innovations ...................... 16

3. Protocol deployment as a measurable process .................... 19

3.1 Deployment steps ............................................................................. 19

3.1.1 Provider side: implementation and commercialization .......... 20

3.1.2 End user side: acquisition and adoption .................................. 21

3.2 Deployment models ......................................................................... 23

3.2.1 Pre-installation .......................................................................... 23

3.2.2 Post-installation ........................................................................ 23

3.2.3 Update installation .................................................................... 23

3.3 Deployment measures and data sources ......................................... 24

3.3.1 Deployment levels ..................................................................... 24

3.3.2 Deployment gaps and delays ..................................................... 25

3.4 Framework for measuring protocol deployment ............................. 27

3.5 Application of the framework to the Finnish mobile market ......... 28

Page 11: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

iv

4. Framework for feasibility analysis ..................................... 33

4.1 Feasibility analysis framework ........................................................ 33

4.1.1 Step 1: Use case analysis ........................................................... 34

4.1.2 Step 2: Technical architecture analysis .................................... 35

4.1.3 Step 3: Value network analysis ................................................. 35

4.1.4 Step 4: Deployment environment analysis ............................... 36

4.1.5 Step 5: Feasibility analysis ........................................................ 36

4.1.6 Step 6: Solution analysis ........................................................... 37

4.2 Analysis tools ................................................................................... 39

5. Case studies on protocol feasibility ..................................... 41

5.1 Multipath TCP .................................................................................. 41

5.1.1 Deployment of MPTCP ............................................................. 42

5.1.2 Feasibility of MPTCP ................................................................. 43

5.1.3 Strategies to foster the deployment of MPTCP ........................ 46

5.2 Host identity protocol ...................................................................... 46

5.2.1 Deployment of HIP ................................................................... 47

5.2.2 Feasibility of HIP ...................................................................... 48

5.2.3 Strategies to foster the deployment of HIP .............................. 50

5.3 Constrained application protocol .................................................... 51

5.3.1 Technical architecture of WoT applications ............................. 52

5.3.2 Total cost of ownership model for WoT applications ............... 53

5.3.3 Cost-efficiency of CoAP in WoT applications ........................... 54

6. Discussion .......................................................................... 59

6.1 Contributions and implications ....................................................... 59

6.1.1 Protocol deployment process .................................................... 60

6.1.2 Feasibility analysis methods ..................................................... 62

6.1.3 Factors affecting the feasibility of Internet protocols .............. 64

6.2 Limitations ....................................................................................... 67

6.3 Future research ................................................................................ 69

Page 12: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

v

List of publications

This dissertation consists of an overview and the following publications, which are referred to in the text by their Roman numerals.

I. Warma, H., Levä, T., Tripp, H., Ford, A., & Kostopoulos, A. (2011).

Dynamics of communication protocol diffusion: The case of multipath TCP. Netnomics, 12(2), 133–159.

II. Levä, T., Riikonen, A., Töyli, J., & Hämmäinen, H. (2014). A framework for measuring the deployment of Internet protocols. International Journal of IT Standards and Standardization Research, 12(1), 38–62.

III. Levä, T., & Suomi, H. (2013). Techno-economic feasibility analysis of Internet protocols: Framework and tools. Computer Standards & Interfaces, 36(1), 76–88.

IV. Kostopoulos, A., Warma, H., Levä, T., Heinrich, B., Ford, A., & Eggert, L. (2010). Towards multipath TCP adoption: Challenges and opportunities. In Proceedings of the 6th Euro-NF Conference on Next Generation Internet (pp. 1-8), June 2–4, Paris, France.

V. Levä, T., Komu, M., Keränen, A., & Luukkainen, S. (2013). Adoption barriers of network-layer protocols: The case of host identity protocol. Computer Networks, 57(10), 2218–2232.

VI. Levä, T., Mazhelis, O., & Suomi, H. (2014). Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications. Decision Support Systems, 63(July), 23–38.

Page 13: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

vi

Page 14: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

vii

Author’s contribution

I. The original idea for the article was formed by Warma and Levä. Levä was responsible for identifying the adoption models of Section 3 and he also contributed to the development of the diffusion model of Section 4. Levä wrote Sections 2 and 3 and edited the rest of the sections.

II. The original idea for the article was formed by Levä, Riikonen, and Hämmäinen. Levä and Riikonen together developed the framework and applied it to the case Finland. Levä was responsible for the framework development and the protocol data collection, for which he created a script to fetch the data from online repositories. Levä was the main author of Sections 1, 2, 4 and 6, and he edited the rest of the sections.

III. The original idea for the article came from Levä. Levä and Suomi developed the framework and toolbox together, Levä being responsible for the framework part. Levä was the main author of Sections 1, 3 and 5, and he edited the rest of the sections.

IV. This article was a truly collaborative effort where Levä developed the idea and wrote and edited the article together with the co-authors. Levä contributed in particular to Sections 5 and 6 that contain the key results of the article.

V. The original idea for the article was formed by Levä and Keränen. Levä and Komu planned the interview study. Levä conducted the interviews and analyzed the data. Levä wrote the majority of the article, excluding Sections 3 and 4 that he edited.

VI. The original idea for the article was formed by Mazhelis, Levä and Suomi. Levä was responsible for the TCO model (Section 4) created in collaboration with Mazhelis and Suomi. Levä also created the spreadsheet tool that he used to conduct the numerical cost analysis of Section 5. Levä was the main author of Sections 3-5, and he edited the rest of the sections.

Page 15: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

viii

Page 16: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

ix

List of abbreviations

3GPP The 3rd Generation Partnership Project API Application Programming Interface BGP Border Gateway Protocol CEA Cost-Effectiveness Analysis CoAP Constrained Application Protocol DCF Discounted Cash Flow (analysis) DNS Domain Name System DNSSEC Domain Name System Security Extensions HIP Host Identity Protocol HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure HW Hardware IAB Internet Architecture Board IETF Internet Engineering Task Force IKE Internet Key Exchange IMAP4 Internet Message Access Protocol version 4 IP the Internet Protocol (IPv4 or IPv6) IPsec Internet Protocol Security IPv4 Internet Protocol, version 4 IPv6 Internet Protocol, version 6 ISP Internet Service Provider LISP Locator/Identifier Separation Protocol MIP Mobile IP MPTCP Multipath TCP NPV Net Present Value OS Operating System PC Personal Computer PEST Political, Economic, Social, Technological (analysis) POP3 Post Office Protocol version 3 R&D Research & Development RFC Request For Comments RTP Real-time Transport Protocol

Page 17: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

x

RTSP Real Time Streaming Protocol RVS Rendezvous Server SCTP Stream Control Transport Protocol SSL Secure Sockets Layer SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SSH Secure Shell SW Software SWOT Strengths, Weaknesses, Opportunities and Threats (analysis) TCO Total Cost of Ownership TCP Transmission Control Protocol TLS Transport Layer Security UDP User Datagram Protocol VoIP Voice over IP VPN Virtual Private Network VNC Value Network Configuration (analysis) WebRTC Web Real-Time Communication WG Working Group (of the IETF) WoT Web of Things

Page 18: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xi

List of symbols

A Access point Acquisition cost – HW Acquisition cost – SW

Acquisition cost – Connectivity setup Operational cost – Maintenance Operational cost – Connectivity fee Operational cost – Supplies

n Number of smart objects m Number of access points l Number of web servers O Other costs P CoAP-HTTP proxy S Smart object W Web server

Page 19: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xii

Page 20: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xiii

List of figures

Figure 1. Internet protocol stack. The scope of this dissertation is bolded. 4 Figure 2. Taxonomy of research methods. ................................................... 6 Figure 3. Protocol implementation locations in the software hierarchy. . 20 Figure 4. Deployment levels, gaps, and delays on the end user side. ........ 26 Figure 5. Framework for measuring the deployment of Internet protocols. ...................................................................................................................... 28 Figure 6. Linkages between the deployment measures and the collected datasets. ......................................................................................................... 29 Figure 7. Protocol a) availability levels, b) acquisition rates, c) possession levels, and d) usage levels from 2003 to 2012 in the Finnish mobile market. ...................................................................................................................... 30 Figure 8. End user side measures – possession level and usage level – of HTTP and EMAIL. ........................................................................................ 31 Figure 9. Framework for analyzing the techno-economic feasibility of Internet protocols. ......................................................................................... 34 Figure 10. Technical architecture of MPTCP in client-server communication. ............................................................................................. 42 Figure 11. Substitute technologies positioned against the functionalities of HIP. ................................................................................................................ 47 Figure 12. Deployment actions of HIP generally on all network components (top) and in more detail on the end hosts (bottom). Components that require mandatory modifications are colored, whereas optional modifications and new infrastructure are filled with tilted lines. 48 Figure 13. Technical architecture for all of the cases under comparison. . 52 Figure 14. Impact of different parameters – a) frequency of communications, b) number of smart objects, c) number of smart objects per site, and d) site visit cost – on the cost difference between CoAP and HTTP. ............................................................................................................ 57

Page 21: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xiv

Page 22: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xv

List of tables

Table 1. Summary of the research process. ................................................... 7 Table 2. Adoption models of Internet protocols. ........................................ 22 Table 3. Characteristics of analysis tools. ................................................... 39 Table 4. Articles analyzing the techno-economic feasibility of MPTCP. ... 42 Table 5. SWOT analysis for MPTCP deployment. ...................................... 44 Table 6. Importance of 14 pre-identified reasons for the non-deployment of HIP on scale 1–5 (low–high) with ‘‘No answer’’ (NA) also as an option. Median values are bolded. N = 16. ................................................................ 49 Table 7. Generic TCO model for a WoT application: technical components and related cost components. The sources for potential cost differences between CoAP and HTTP are highlighted with boldface. ............................ 54 Table 8. The descriptive parameters of the baseline scenario. .................. 55 Table 9. TCO comparison between CoAP and HTTP for the baseline scenario. ......................................................................................................... 55 Table 10. Comparison of the flat-rate and volume-based pricing in the baseline scenario. .......................................................................................... 56 Table 11. Summary of contributions .......................................................... 60 Table 12. Solutions to the typical deployment challenges of Internet protocols. ....................................................................................................... 67

Page 23: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

xvi

Page 24: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

1

1. Introduction

1.1 Background and motivation

The importance of the Internet for the society is constantly increasing. In four decades the Internet has grown from a network of computer science researchers to a global backbone of the information society with rapidly growing number of users, hosts, and usages. The Internet and its architecture, however, were designed in the 1970s mostly for purposes that resemble very little the current and foreseen scale and scope.

In order to adapt to the increasing usage and diversifying purposes, the Internet needs to evolve. Substantial interest and research funding guarantees that the Internet research community – led by the Internet Engineering Task Force (IETF) – proposes constantly new protocols to overcome emerging challenges. For example, several attempts have been made towards extending the basic functionality of the Internet to support inter-domain quality of service, IP multicast, IPv6 and DNS security. Although most networking professionals agree that the Internet would benefit from these evolutionary changes, they appear not to be forthcoming. Therefore, the Internet evolution is not threatened by the lack of innovation, but because even the protocols considered beneficial fail to get deployed in their intended scope and scale. As a result, the Internet is often claimed to be ossified (Handley, 2006).

Several reasons have been raised for explaining the lack of protocol deployment. First, Internet is a challenging environment for innovation diffusion due to its global, distributed and loosely regulated nature where the control over resources is spread among a multitude of stakeholders with diverse economic goals (Marcus, 2004); thus complicating the deployment and necessitating costly coordination between stakeholders. Second, Internet protocols are networked innovations exhibiting significant network effects (Katz & Shapiro, 1986), due to which the costs typically exceed the benefits until the critical mass is reached. Third, the middleboxes, such as firewalls and network address translators (NATs), tend to block the traffic of new protocols (Handley, 2006).

Page 25: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

2

All the presented barriers can be overcome by designing the protocols so that they accommodate the conflicting interests of the stakeholders participating in protocol deployment (Clark et al., 2005). However, the poor success rate of new Internet protocols suggests that protocol developers have insufficient understanding of the stakeholders’ economic incentives. Consequently, new protocols end up being techno-economically infeasible. The IETF has addressed the feasibility problem by identifying protocol design principles (Carpenter, 1996; Bush & Meyer, 2002; Clark et al., 2005) and protocol success factors (Thaler & Aboba, 2008) that should facilitate deployment. Even though the weight of economic and value network issues besides technical quality has gradually increased in these generic guidelines, they cannot alone maximize the success rate of Internet protocols, since they neglect the special characteristics and context of each protocol and focus primarily on technical design.

The economic value is taken better into account in a small number of existing case studies on DNSSEC (Ozment & Schecter, 2006) and IPv6 (Hovav et al., 2004; Joseph et al., 2007; Jin et al., 2008) that apply the theories of innovation diffusion and network economics literature for studying the impact of network effects and competition with incumbent technologies on the protocol diffusion. Even though these studies suggest useful deployment strategies, their usefulness remains limited for two reasons. First, these studies have been conducted after the protocol has already been standardized, thus limiting the impact that can be made to improve the feasibility of the protocol under analysis. Second, they focus only on the feasibility for a single group of stakeholders – the potential end users of the protocol – although the success of a protocol depends on its feasibility for all stakeholders in the value network. In addition to these public, retrospective case studies, the companies participating in protocol deployment constantly analyze the business case from their own perspective. These analyses may be conducted already during the protocol development, but their results are typically confidential and the primary goal is to maximize the stakeholders’ profit instead of facilitating protocol deployment.

In conclusion, the case studies and methods for analyzing the feasibility of Internet protocols are infrequent in the existing literature. Moreover, the existing studies tend to focus either on purely technical issues, such as performance analysis, are conducted only after the protocol is standardized, or limit to the end user adoption, even though the success of Internet protocols is defined by what happens during all the steps of protocol deployment. Thus systematic techno-economic research combining the understanding of protocols’ technical design, stakeholders’ incentives and

Page 26: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

3

Internet value networks is inherently important to improve the feasibility and to facilitate the deployment of new Internet protocols.

1.2 Research questions and scope

Motivated by the research gap identified above, the goal of this dissertation is to improve the feasibility of new Internet protocols through the increased understanding of the dynamics of and factors affecting protocol deployment, and the development of methods for analyzing the deployment and feasibility of Internet protocols. Thus, the high-level research question is defined as follows:

How to improve the feasibility of new Internet protocols through techno-economic analysis?

In order to answer to the main question, the following three more detailed

questions are to be answered:

Q1. How to conceptualize protocol deployment as a measurable process? Q2. How to analyze the feasibility of Internet protocols? Q3. Which factors affect the feasibility of three selected Internet

protocols: i) Multipath TCP (MPTCP), ii) Host Identity Protocol (HIP), and iii) Constrained Application Protocol (CoAP)?

The research analyzes the deployment and feasibility of Internet protocols

standardized by the IETF that are located on network, transport and application layer, as illustrated in Figure 1. The focus is on end-to-end protocols that communicate using client-server model and whose deployment involves multiple stakeholders. The results may also be valid for other types of communication protocols, and even for other networked innovations, but these extensions remain a topic for future research. Further, an ecosystem perspective is taken to analyze the market as a whole, meaning that all the relevant stakeholders and the whole protocol deployment process are covered. The focus is on the inter-stakeholder relationships and stakeholders’ deployment decisions, whereas the organization-internal decision-making and diffusion processes are excluded from the analysis.

The research takes the current evolutionary, market-driven protocol development and standardization process as given. This means that the dissertation takes a bottom-up, single protocol perspective, where the analysis focuses on the commercialization and diffusion of suggested

Page 27: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

4

Internet protocols. Moreover, the dissertation does not try to impact the standardization process by limiting the number of suggested Internet protocols upfront, which could be one way for increasing the success rate. Quite the contrary, the increase in the success rate is expected to happen through the improved feasibility of suggested Internet protocols, leading to an increased number of deployed protocols. Still, all the suggested protocols neither will nor even should succeed, which is natural to the market-driven evolution of the Internet producing a large variety of protocols, many of which are at least partly substituting each other.

Figure 1. Internet protocol stack. The scope of this dissertation is bolded.

In order to further position the research, the key terms of the dissertation are defined as follows:

Internet protocol: a communication protocol used in the Internet. The term is used with the indefinite article, in plural or without the word “Internet” to clearly separate it from the Internet protocol (IPv4/IPv6).

Protocol deployment: a process during which a protocol is advanced from the specifications into actual use in the Internet.

Deployment action: an action that needs to be taken in order to deploy a protocol.

Protocol adoption: a deployment action of a protocol’s end users that leads to the usage of the protocol.

Technical architecture: a set of interlinked technical components that are required for deploying a protocol.

Stakeholder: any group or individual who can affect or is affected by the deployment of a protocol.

Value network: a set of interlinked stakeholders that participate in protocol deployment.

(Economic) feasibility: a measure of the economic attractiveness of a technology typically determined by comparing the costs and benefits of a

Services

Application layer Transport layer Network layer Link layer

Physical layer

Transmission media

Page 28: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

5

technology from a perspective of a certain stakeholder. A protocol is said to be feasible for a particular stakeholder if the benefits exceed the costs.

Techno-economic analysis: an approach for evaluating the economic feasibility of a known technical structure.

Successful protocol: a protocol that is used for its original purpose and at the originally intended scale (Thaler & Aboba, 2008).

1.3 Research process

The research process was built around several in-depth case studies that analyzed the deployment and feasibility of MPTCP (Publications I, III, and IV), HIP (Publication V), and CoAP (Publication VI). Since case studies provide detailed insight into the topic (Robson, 2002), they are especially suitable for explanatory studies of emerging technologies, where the goal is to identify the relevant factors affecting the case (Yin, 2009), which is here the deployment and feasibility of particular protocols. The acquired understanding and experience from the case studies were then synthesized with the existing literature on innovation diffusion and network economics to conceptualize the deployment process (Publications I-II) and to develop methods for measuring the deployment (Publication II) and analyzing the feasibility (Publication III) of Internet protocols. This overview, however, takes a top-down approach by introducing first the more general findings concerning a wider range of protocols in Chapters 3 and 4, before introducing the case-specific results in Chapter 5.

The research of this dissertation is multi-disciplinary as it combines theories, models and methods from both engineering and economics. The research is technology-oriented, the main focus being on the economic evaluation of Internet protocols that are technological innovations created by humans. Similarly, the techno-economic models and frameworks built in this dissertation are designed artifacts. According to the taxonomy of Järvinen (2004), these are innovation-evaluating and innovation-building research approaches, which fit to the scope of design science (March & Smith, 1995) studying the (utility of) innovations created to serve human purposes (Simon, 1996). Additionally, the conceptualization of the protocol deployment process and the identification of factors affecting the feasibility of Internet protocols aim to explain the reality by using the theory-based conceptual-analytical and empirical theory-creating approaches. These four research approaches used in this dissertation are highlighted in Figure 2 with gray background.

Page 29: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

6

Figure 2. Taxonomy of research methods (adapted from Järvinen, 2004).

Due to the multi-disciplinary nature of the research and the scarcity of research methods tailored for the techno-economic feasibility analysis of Internet protocols, the multiple method design (Morse, 2010) was selected for this research. The innovation diffusion (Rogers, 2003) and network economics (e.g., Katz & Shapiro, 1986) literature form the theoretical framework for the research. Then, the most suitable research methods were used to tackle each specific research problem. For example, system dynamics (Sterman, 2000) was applied in Publication I to analyze the dynamics of protocol diffusion, whereas the total cost of ownership (TCO) analysis (Ellram, 1995) was used in Publication VI to analyze the cost-efficiency of CoAP.

The immaturity of protocols still under development limited the availability of data and increased its uncertainty. Therefore, all the possible data sources were utilized, including academic and trade literature, expert interviews, own measurements, and market data. A formal, semi-structured interview process was applied in Publication V, whereas in Publications I, IV and VI the interviews were unstructured and the questions varied depending on each interviewee’s expertise. Own measurements were used in Publication VI to analyze the energy consumption of smart objects communicating with CoAP, whereas market data on mobile handset sales, handset base and mobile service usage were used in Publication II to measure the deployment of several protocols in the Finnish mobile market.

Table 1 summarizes the research process and maps the publications to the three research questions formulated in Section 1.2. Each research method and the utilized data are presented in more detail in Chapters 3-5 before the related results.

Research approaches

Approaches studying reality

Mathematical approaches

Research stressing what is reality

Research stressing utility of innovations

Conceptual-analytical approaches

Approaches for empirical studies

Theory-testing approaches

Theory-creating approaches

Innovation-building approaches

Innovation-evaluating approaches

Page 30: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

7

Table 1. Summary of the research process.

Pub. Topic Q1 Q2 Q3 Method Data

I Analysis of adoption models and network effects among and between the different adopter groups of MPTCP

X X System dynamics

Literature, expert interviews

II Development and illustrative application of a framework for measuring the deployment of Internet protocols

X X Data analysis

Literature, protocol data, handset sales and base data, usage survey data

III Development and illustrative application of a framework and toolbox for analyzing the feasibility of Internet protocols

X X Literature study

Literature (including own case studies)

IV Identification of deployment actions, stakeholder incentives, and deployment strategies of MPTCP

X Literature study

Literature, expert interviews

V Identification of deployment actions, adoption barriers and deployment strategies of HIP

X X Interview study

Literature, expert interviews

VI Development of a total cost of ownership model for comparing the cost-efficiency of CoAP and HTTP in WoT applications

X X TCO analysis

Literature, expert interviews, energy measurements

1.4 Outline of the dissertation

This dissertation consists of this overview and six publications. Chapter 2 introduces the theoretical background on innovation diffusion and network economics that form the theoretical framework for the dissertation. Chapters 3-5 present the results of the dissertation. Chapter 3 illustrates the protocol deployment as a measurable process. Chapter 4 develops a framework for analyzing the feasibility of Internet protocols systematically during their development. Then, Chapter 5 applies the developed framework to analyze the feasibility of three protocols cases: MPTCP, HIP, and CoAP. Finally, Section 6 discusses the implications, limitations and future research.

Page 31: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Introduction

8

Page 32: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

9

2. Theoretical background

This section introduces the related work on innovation diffusion and network economics that form the theoretical framework for the dissertation. The presentation is divided into three subsections, each of which proceeding from innovations in general to protocols in particular. First, the processes of technological innovations are explained. Second, the factors affecting the innovation diffusion are presented. Third, the existing methods for analyzing the feasibility of innovations are introduced.

2.1 Innovation deployment process

The innovation diffusion theories tend to define the development and diffusion of innovations as a stepwise process. The focus is on a single innovation and how it advances from an idea to use in an ecosystem of different kinds of organizations. For example, according to Rogers (2003), the innovation-development process consists of all the decisions, activities, and their impacts that occur in the six stages during which 1) a recognized need is transformed through 2) research, 3) development and 4) commercialization into an innovation that 5) diffuses to potential adopters and causes 6) consequences to an individual or a social system. Another closely related process definition has been suggested by Tornazky et al. (1990), who clearly separate the creation and production of new technology from its diffusion and usage. This separation is useful, because, in general, the creation occurs before diffusion and involves a different set of actors. However, as von Hippel (1986) notes, a technical innovation can also be developed by lead users, who then convince manufacturing companies to produce them.

As defined in the introduction, this dissertation focuses on the protocol deployment that covers the commercialization and diffusion steps of Rogers’ (2003) process. The interplay between the providers commercializing and end users adopting the innovation, known as technology-push vs. market-pull (Zmud, 1984), defines the deployment of the technology in the market. Prescott and Van Slyke (1997), who analyze

Page 33: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

10

the diffusion of the Internet as a collection of various hardware and software technologies, and Ende and Dolfsma (2005), who study the evolution and diffusion of various computing technologies, conclude that both technology-push and market-pull are important for diffusion, but their importance varies depending on the market situation. Kivi et al. (2012) show that the impact of supply-side decisions is particularly important when innovations – mobile handset features in their case – diffuse embedded in other products, as protocols typically do (Fomin et al., 2011). In addition to the technology-push from the providers, also governmental mandates may push the technology to the market (Carter et al., 2001).

Existing research concerning the commercialization step focuses largely on provider strategies for competing against other providers. Firstly, providers decide on which standards they invest in. Here it is important to decide, whether to compete within or between standards (Besen & Farrell, 1994). For example, personal computer (PC) vendors compete within the Windows ecosystem, whereas Apple competes against that ecosystem with its own operating system. Secondly, the providers of software have various strategies to attract customers, including versioning (Shapiro & Varian, 1998), bundling (Bakos & Brynjolfsson, 1999), and pricing (Lehmann & Buxmann, 2009). These all affect the market offering provided to the potential adopters.

Despite the interest towards provider strategies, studies on the commercialization process of particular technologies are rare in the existing literature (Adams et al., 2006). The retrospective tracer studies conducted by technology historians (e.g., Isenson, 1969; Achilladetis et al., 1969) represent an exception that tries to reconstruct the sequence of main events in the innovation-development process. These studies have found that transferring an invention into commercialized innovation takes a lengthy period of time, often as much twenty years (Globe et al., 1973). However, as Rogers (2003) notes, the prospective studies on the innovation-development process are needed to overcome the shortcomings of the retrospective tracer studies, such as the bias towards socially significant, successful innovations.

The diffusion of innovation literature (Rogers, 2003) acknowledges that the diffusion is a decision-making process that can be divided on a high level to pre-adoption, adoption decision, and post-adoption phases. In the pre-adoption phase, the potential adopter becomes aware of the innovation through different communication channels, including mass media and interpersonal channels (i.e., viral effect) as simplified by Bass (1969). In the adoption decision phase, the adopter evaluates the innovation and decides

Page 34: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

11

whether to adopt or reject it. In the post-adoption phase, the adopter trials the innovation and decides to continue or discontinue its use.

The studies analyzing the rate of diffusion often focus on the adoption decision traditionally approximated by the number of cumulative purchases. This is reasonable for studying the diffusion of fairly simple consumer goods among individual adopters, where the acquisition typically leads into usage. However, this approach falls short when studying complex IT innovations (Lyytinen & Damsgaard, 2001) with significant network effects (see Section 2.2.2) and knowledge barriers (Fichman & Kemerer, 1999) delaying or even preventing the use of an adopted innovation. This is particularly true in the organizational context with large number of adoption events that involve different decision-makers.

Consequently, the information systems implementation literature (e.g., Cooper & Zmud, 1990; Liker et al., 1992) has identified large differences in the number of employees that have certain products installed and the number of actual users in organizations. Fichman and Kemerer (1999) call this difference as assimilation gap and define it as “the difference between the pattern of cumulative acquisitions and cumulative deployments of an innovation across a population of potential adopters”. Shih and Venkatesh (2004) suggest that assimilation gaps can emerge also on adoption of complex consumer innovations. This is supported by Verkasalo (2008) who identified that, even if there is an intention to use specific mobile services, the intention does not always materialize into actual usage. Since most of the network effects affecting the diffusion rate of networked innovations materialize only during their actual usage, the diffusion studies should include both acquisition and usage of innovation. However, the assimilation gaps have not been previously studied in the case of Internet protocols.

The existing measurement studies on protocol deployment focus on measuring either the possession or the usage of protocols. Eggert (2014) maintains a web site that reports the deployment status of different Internet protocols on the most popular web services and sites. Huston (2014) measures the deployment of IPv6 on the autonomous systems based on the border gateway protocol (BGP) routing tables. Colitti et al. (2010) use server side measurements to analyze the usage of IPv6 by the clients using Google’s services. Internet traffic classification studies (e.g., Thompson et al., 1997; Maier et al., 2009) typically measure the traffic volumes generated by different Internet protocols on an aggregate level. Even though all these studies provide valuable insights into the adoption and usage of Internet protocols, they usually focus on a single deployment event, preventing the analysis of the whole deployment process.

Page 35: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

12

2.2 Factors affecting innovation diffusion

As Hovav et al. (2004) present, the factors affecting innovation diffusion can be divided into two main categories. Diffusion of innovations literature focuses on the attributes of the innovation (for a single adopter), whereas the economic perspective on innovation diffusion focuses on the impact of network effects on the diffusion of innovations among a group of adopters. Additionally, Internet as an environment has some special characteristics that affect the deployment of Internet protocols. The following sections elaborate on these three topics focusing on the deployment of Internet protocols.

2.2.1 Attribute-centric perspective on innovation diffusion

Classical diffusion of innovations theory, developed in the context of individual adopters, elaborates how the attributes of an innovation influence the adoption decision of a potential adopter. Rogers (2003, first published in 1962) identifies five generic characteristics of innovation that impact the adoption decision. Relative advantage is the degree to which the new technology is better than a preceding one, compatibility means the consistency with existing values, past experiences and needs, and complexity is the level of difficulty to understand and use the innovation. Finally, trialability and observability are the degrees of how the innovation can be experimented and how its costs and benefits can be observed before the adoption decision. Other authors have created their own generic attributes that can be mapped back to Rogers’ attributes, including, for example, the technology acceptance model of Davis (1989) and the unified theory of acceptance and use of technology of Venkatesh et al. (2003). In addition to these attributes, Rogers (2003) identifies that the type of innovation decision, communication channels, nature of the social system (see Section 2.2.3) and the extent of promotion efforts affect the rate of innovation diffusion.

Relative advantage, which can be understood as economic profitability compared to substitutes and expressed in terms of costs and benefits, is an especially interesting attribute in a highly commercial environment as the Internet currently is. Rogers (2003) defines relative advantage as the degree to which a new innovation is better than the innovations it supersedes. This is a necessary but not sufficient condition, because an innovation also needs to have relative advantage over the competing solutions being developed at the same time. The battle between VHS and Betamax is a legendary example (Cusumano et al., 1992), but Internet protocols also have their own standard wars (Shapiro & Varian, 1999), such as the competition between SIP and H.323 (and Skype) for the dominant

Page 36: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

13

design (Anderson & Tushman, 1990) in the Voice over IP (VoIP) market (Hettick, 2001).

Compatibility of different implementations, i.e., the interoperability between different systems willing to communicate, is a key requirement for networked innovations, such as Internet protocols. Therefore, Internet protocols are typically openly standardized, even though proprietary protocols, such as Skype, may also emerge as de-facto standards. The specifications of Internet protocols, known as RFCs (Request For Comments), are voluntary standards developed by the IETF through the process based on “rough consensus and running code” (Alvestrand, 2004). This means that the functioning of a protocol needs to be proved by reference implementations before the final version of the standard can be published. The standards play an important role in mediating different interests and motivations among the various stakeholders (Yoo, et al., 2005). Standardization also facilitates the diffusion of protocols by reducing the technological uncertainty and lowering costs (Weitzel et al., 2006). In addition to interoperability, protocols should also be backwards-compatible with the existing technologies or infrastructure, so that a new protocol can be implemented as the old protocol is being phased out (Hovav et al., 2004).

Complexity of Internet protocols is higher than that of simple consumer goods. Protocols are software components that enable applications and services (Jorstad et al., 2005) and are typically embedded in other products, such as mobile phones, personal computers, or operating systems (Fomin et al., 2011). Consequently, protocols are systemic innovations meaning that their benefits can be attained only in conjunction with related, complementary technologies (Chesbrough & Teece, 1996) that form a technology cluster. The diffusion (Vishwanath & Chen, 2006), and also the evolution (Adomavicius, 2007), of technologies belonging to a technology cluster are interdependent. Therefore, the factors affecting the diffusion of mobile phones, PCs and operating systems are of significant interest when studying the diffusion of Internet protocols. For example, the identified main factors affecting the mobile handset choice of a consumer include price and properties, brand, prior experience and size (Karjaluoto et al., 2005; Liu, 2002; Riquelme, 2001).

The Internet architecture board (IAB) has identified similar success factors for Internet protocols by studying several protocol cases (Thaler & Aboba, 2008). The pragmatic analysis finds the positive net value (benefits outweighing costs) and incremental deployability (early adopters gaining some benefit even though other potential adopters would not adopt) as the most critical factors for a protocol’s success. The less critical factors relate

Page 37: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

14

to the IETF philosophy of openness (open code and specification availability, open maintenance process, and freedom from usage restrictions) and good technical design following the proven design principles (Carpenter, 1996; Bush & Meyer, 2002). The IETF has also shown some interest towards deployment questions by establishing a wiki page (IETF, 2014) to analyze the success of the protocols. Additionally, Bottermann (2009; 2010; 2011) has surveyed the potential adopters of IPv6 in the regional Internet registry community for finding the reasons for non-deployment. The most significant barriers identified in these studies include the magnitude of costs to deploy IPv6, negative business case to non-technical decision makers, and poor availability of knowledgeable staff.

2.2.2 Economic perspective on innovation diffusion

Economic perspective on innovation diffusion premises that the utility of an innovation depends on the number of existing or potential adopters (Farrel & Saloner, 1985; Katz & Shapiro, 1985; 1986) and the availability of complementary products (Nair et al., 2004). The former are called as direct network effects, whereas the latter are indirect network effects. In other words, in the presence of network effects each additional adopter increases the value of the innovation. For example, the more people own telephones, the more valuable the telephone is to each owner. The famous Metcalfe’s law suggests that the value of a communications network increases quadratically (n2), meaning that each additional adopter would be equally valuable. Briscoe et al. (2006) claim that this assumption is unrealistic, and therefore much slower logarithmic growth (n log(n)) is a more accurate estimate of the growth rate. In addition to increasing the inherent value of the innovation, the growth in user base typically leads to savings in the production costs, known as the economies of scale (Arrow, 1962), and more efficient dissemination of knowledge about innovation (Rosenberg, 1982), both fostering the innovation diffusion.

When innovations have several, distinct groups of adopters, the direct network effects can be divided into the same-side and cross-side network effects. The theory of two-sided markets (Parker & Van Alstyne, 2005; Rochet & Tirole, 2006) analyzes these kinds of innovations by focusing on the cross-side network effects mediated by the platform between the distinct groups of adopters. Actually, many Internet protocols can be seen as platforms that enable communication between the content consumers on the client-side and content providers on the server-side. The key finding of the theory is that both the number of adopters and the profits of the platform can be maximized with skewed pricing, where either the side that brings more value to the platform or is more price-sensitive is subsidized

Page 38: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

15

(Armstrong, 2006; Eisenmann et al., 2006). This explains why it is reasonable to give a free distribution newspaper or a search engine for free to consumers and collect money from the advertisers.

A typical challenge related to network effects is the bootstrapping problem (Hanseth & Lyytinen, 2010), also known as chicken-egg problem, where the early adopters do not have incentives for adopting the technology, because the costs exceed the benefits until a certain level of adoption, known as the ‘‘critical mass’’ (Rogers, 2003), is reached. Also path-dependency (David, 1985) and lock-in (Arthur, 1989) may prevent the adoption of new innovations, because the investments in already deployed innovations, including both monetary costs and learning effort, discourage switching to new and better innovations. According to Bohlin and Lindmark (2003), these are significant reasons for the slow diffusion of IPv6, the new version of the Internet protocol aimed to replace IPv4.

Due to the significant network effects associated with Internet protocols, many authors have studied the evolution of utility when the number of adopters increases, focusing particularly on solving the bootstrapping problem. Joseph et al. (2007) and Sen et al. (2010) analyze how converters can be used to incentivize adopters to change from an incumbent protocol (IPv4) to a new one (IPv6). Iannone and Levä (2010) conduct a similar analysis for moving from BGP to locator/identified separation protocol (LISP). Ozment and Schechter (2006) describe six different business strategies that can stimulate the adoption of security protocols (DNSSEC, SSH, HTTPS and IPsec) facing the bootstrapping problem. These include (1) global and (2) partial mandates, (3) bundling complements, (4) facilitating subnetwork adoption, (5) coordination, and (6) subsidization.

2.2.3 Internet as an environment for innovation diffusion

The Internet constitutes a special environment for innovation diffusion due to its global, distributed and unregulated nature where control over resources is spread among a multitude of stakeholders with diverse economic goals. Moreover, the IETF operates a bottom-up marketplace for individual protocol standards, which differs from the more authoritarian, release-based approach practiced, for example, by the 3GPP responsible for mobile communications standardization. Therefore, the diffusion of the Internet protocols is a market-based process where the successful alignment of stakeholders’ incentives is a key to success (Clark et al., 2005). However, the deployment of evolutionary changes to the Internet is often stymied by the lack of sufficient economic drivers, difficulty of achieving consensus among a plethora of stakeholders with imperfectly (if at all)

Page 39: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

16

aligned interests, and the inability of government to foster change (Marcus, 2004).

Internet architecture is based on two fundamental principles: 1) hourglass-shaped, layered structure with IP as the narrow waist that is collaborated with 2) the end-to-end principle (Saltzer et al., 1984). Even though the layered architecture should allow each layer to evolve independent of each other, the end-to-end principle facilitates innovation only at the application layer, while doing nothing to foster the evolution of the underlying functionality associated with the network layer and below (Marcus, 2004). Actually, as Sandvig (2006) notes, the end-to-end principle seems to assume that the underlying network already provides all the functionality that will ever be necessary or desirable. This is supported by Akhsabi & Dovrolis (2011) in their EvoArch model that concerns the evolution of layered protocol stacks in a competitive environment. The model suggests that challenging protocols close to the waist of the hourglass is almost impossible, because differentiating with quality does not have strong impact there. As a consequence, new network and transport layer protocols should avoid competition with the incumbent protocols on the same layer. Finally, the middleboxes, such as firewalls and NATs, further hinder the deployment of new transport layer protocols by blocking their traffic (Handley, 2006).

2.3 Methods for analyzing the feasibility of innovations

A significant set of analysis methods exists for analyzing the feasibility of innovations. Techno-economic modeling (Smura, 2012) is a pragmatic approach that calculates the business case of an innovation from the perspective of a single company by comparing the real-world costs and benefits. In the context of telecommunications, techno-economic modeling has been applied particularly for analyzing extensive infrastructure investments for next generation access networks [e.g., Ims et al., 1996; Katsianis et al., 2001; Varoutas et al., 2006].

Several approaches exist for conducting techno-economic modeling. Firstly, the most traditional approach is the cost-benefit analysis (Boardman et al., 2006) that uses discounted cash flows (DCF), i.e. monetary values of costs and benefits adjusted for the time value of money, to analyze the net present value (NPV) and payback time of investments (Luerhman, 1997). Warma et al. (2010) use DCF analysis to estimate the profitability of Multipath TCP to a certain group of content providers. Secondly, total cost of ownership (TCO) analysis (Ellram, 1993) focuses on analyzing the costs of the entire lifecycle of a product or service. TCO

Page 40: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

17

analysis is typically applied for supplier selection (e.g., Degraeve & Roodhooft, 1999; Hurkens et al., 2006) when the benefits are equal or their quantification is too challenging. David et al. (2002) identify the typical cost factors of IT and Walker et al. (2009; 2010) use TCO to analyze the buy or lease decision related to cloud computing. As Internet protocols are implemented as software, the field of software economics (Boehm, 1981) provides a multitude of useful approaches and models for software cost estimation (e.g., Boehm et al., 2000; Jorgensen & Shepherd, 2007; Verhoef, 2005). However, to the best of our knowledge, these approaches, or TCO in general, have not been used previously with investments regarding Internet protocols. Thirdly, cost-effectiveness analysis (CEA) (Shepard & Thompson, 1979) compares the costs of an investment to non-monetary outcomes. This approach is useful in situations where it is infeasible to translate the benefits to money. CEA has traditionally been used to aid political decision-making in health care investments, but Sonntag and Suomi (2013) apply it to Internet protocols by studying the feasibility of multipath protocols.

Compared to techno-economic modeling based on real-world costs and benefits, the functional (or mathematical) modeling methods focus on identifying the cost and benefit functions and analyzing their behavior with theoretical values. Essentially, functional modeling methods include utility and game theoretic modeling. In utility modeling, a function typically models the net benefits of an innovation for certain stakeholder as a function of the number of adopters in the network. Joseph et al. (2007) and Jin et al. (2008) follow this approach for modeling the utility of IPv6, whereas Iannone and Levä (2010) use it for analyzing the adoption of LISP. Game theoretic modeling (von Neumann & Morgenstern, 1944) analyzes the strategies of decision-makers in different contexts. The decision-making context can vary, for example, based on the degree of co-operation and timing of the decision-making between stakeholders. For example, Tang et al. (2008) model the profit outcomes of Internet Service Providers (ISP) in a situation where end users can balance their load between two ISPs and ISPs need to decide the amount of bandwidth they offer.

Despite the large number of specific analysis methods for analyzing the business case of an innovation for different stakeholders, much less attention has been given on the comprehensive frameworks for studying the feasibility of innovations. Bond and Houston (2003) create a framework for matching the new technologies developed within a firm to the market opportunities. Basically, the authors provide a list of challenges that managers should consider when new innovations are being developed and how these challenges could be addressed to increase their market potential. Although partly applicable to Internet protocols, the framework is primarily

Page 41: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Theoretical background

18

developed for product innovations that do not require actions from several stakeholders in the market. A white paper of Verbrugge et al. (2009) suggests a methodology for techno-economic analysis of network deployment planning focusing on infrastructure-heavy technologies such as next generation access networks. Consequently, this approach has strong telecom operator focus and it only concentrates on the rollout phase of new network technologies instead of the whole deployment process.

Eardley et al. (2011) provide one protocol-specific process description suggesting that, prior to the wide-scale deployment, initial easily deployable scenarios should be developed to trigger the diffusion process. Kalogiros et al. (2011) utilize the articles of Clark et al. (2005) and Ford et al. (2009) to develop the tussle analysis method for investigating tensions between the stakeholders. Kostopoulos et al. (2012) apply this in practice for analyzing information-centric networking architectures. Despite the effort to identify tussles on the Internet and to view the problem from the perspectives of different stakeholders, the linkage between the protocol development and the tussle analysis is somewhat weak, because the method does not provide any concrete tools for protocol developers with varying expertise on economics. In conclusion, systematic process descriptions for studying the feasibility of Internet protocols during their development do not exist.

Page 42: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

19

3. Protocol deployment as a measurable process

Measuring protocol deployment is essential for understanding the dynamics of protocol deployment and identifying the critical factors affecting the feasibility of Internet protocols. Therefore, this chapter conceptualizes protocol deployment as a measurable process based on the results of Publications I and II. After introducing the special characteristics of protocol deployment in each deployment step, these steps are linked to deployment models, deployment measures and data sources to construct a framework for measuring protocol deployment. Finally the application of the framework is demonstrated by analyzing the deployment of 11 protocols in the Finnish mobile market. The framework builds on the existing literature on innovation diffusion (Chapter 2), previous data collection efforts on the diffusion and usage of mobile device features (e.g., Riikonen et al., 2013; Kivi et al., 2012), and the accumulated understanding of protocol deployment from multiple case studies (Chapter 5). Moreover, the application of the framework to the case Finland further refined the framework.

3.1 Deployment steps

As defined in Section 1.2, protocol deployment is a process, during which a protocol is advanced from the specifications into actual use in the Internet. This covers the commercialization and adoption phases of the Rogers’ (2003) innovation-development process. Publication II divides the deployment process into four steps. During the first two steps – 1) implementation and 2) commercialization – the providers of software (SW) and hardware (HW) implement and make the protocol available for end users. During the last two steps – 3) acquisition and 4) adoption – the end users of the protocol and enabled applications, including both individuals (i.e., consumers) and organizations (e.g., content providers), acquire and start using the protocol.

Page 43: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

20

3.1.1 Provider side: implementation and commercialization

In the implementation step, providers implement the protocol based on its specifications. As illustrated in Figure 3, three protocol implementation locations in the different layers of software can be identified: i) the kernel of an operating system (OS) (e.g., TCP/IP protocols), ii) middleware (e.g., OpenSSL for SSL/TLS), and iii) directly in an application utilizing the protocol (e.g., BitTorrent). A new protocol is often first introduced in the higher layers of software hierarchy, from where it moves to the lower layers in the course of time. For example, Microsoft’s operating systems did not have native support for TCP/IP suite before Windows 95 (Young, 2013). The implementation location tends to follow the protocol stack layering so that typically the more general network and transport layer protocols are implemented in the lower layers, and the more specific application layer protocols in the higher layers of the software hierarchy. However, this pattern neither always holds nor is necessarily optimal for the successful deployment, as explained in Chapter 5.

If the protocol implementation and the application utilizing it are separated, access to the protocol functionality is provided through an application programming interface (API), such as Sockets API for TCP/IP. This allows the same protocol implementation to be used by multiple applications. The separation also means that the implementation of protocols and applications utilizing them can involve different stakeholders, potentially leading to separate deployment.

Figure 3. Protocol implementation locations (P) in the software hierarchy (Publication II).

In the commercialization step, the providers make the protocol available to end users by including it in products that the end users can acquire. These products can be the same SW, where the protocol is implemented in, or operating systems and HW including the higher-level SW. For example, if the protocol is implemented in an application, the commercial product that the end user acquires can either be i) an application, ii) an OS containing the application, or iii) HW containing the OS, which contains the application. This modularity is visualized in Figure

Page 44: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

21

3 with nested boxes. Consequently, a product is defined as being something that end users can acquire (and which contains the protocol), whereas platform is something where the end user installs the product after acquisition.

Typically SW and HW providers introduce a new feature, such as a new protocol, gradually, so that its market potential and functionality can be tested with decreased risk. For example, mobile phone manufacturers, like Samsung, bring new features first to their high-end devices, and application vendors, like Google, put them first in the beta or development versions of their SW. However, commercialization does not need always be led by a commercial entity – developers of free and open source SW can play an equally significant role in this step through their choice to implement new protocols by using community contributions.

3.1.2 End user side: acquisition and adoption

In the acquisition step, end users acquire the capability to use the protocol. Acquisition can be divided into 1) the acquisition of the platform where the product can be installed, and 2) the acquisition of the product that contains the protocol. These acquisitions can occur simultaneously, if the platform and the product are bundled together. For example, smart phones are always bundled with an operating system, whereas operating systems contain many pre-installed applications. After the acquisition step, the end user possesses the necessary components for using the protocol: HW, an OS, an application, and the protocol embedded in one of the above-mentioned locations.

In the adoption step, end users start using the protocol. In practice, they start to generate protocol traffic by using applications enabled by the protocol. The level of activity required for taking the protocol into use varies from one case to another. On the one hand, the protocol may be used by an OS service that is started automatically when the device is turned on. On the other hand, end users may need to enable the protocol manually, as is the case with IPv6 in Windows XP (Colitti et al., 2010).

Due to the protocols’ nature as SW components, acquisition and adoption are not necessarily based on rational decisions concerning the protocol – end users may be unaware that they have acquired and started using protocols. Even when a protocol plays a role in the acquisition and adoption decisions, these decisions may concern directly the protocol, or indirectly an application enabled by and benefiting from it. This leads to three adoption models – unintentional, indirect, and direct adoption – identified in Publication I and summarized in Table 2.

Page 45: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

22

Table 2. Adoption models of Internet protocols (adapted from Publication I).

Unintentional adoption

Indirect adoption (intentional)

Direct adoption (intentional)

Adoption route Device acquisitions and OS updates including the protocol

Acquisition of application including the protocol

Acquisition of the protocol by updating the device or its software

Driver of the adoption

Updating the HW and SW due to other reasons (the protocol does not matter in adoption decision)

Adopter perceives benefits of using a protocol, but may not be aware of the source causing them

Adopter perceives benefits of using the protocol and links these benefits to the protocol

Key decision & decision-maker

Device / OS provider enables the protocol by default in its products

Application service provider starts using the protocol in its service

Adopter itself acquires the protocol support by updating her HW and SW

Adopter’s awareness of the protocol

No awareness (or user is indifferent to the protocol and its benefits)

Partial awareness (user knows the benefits of the protocol)

Full awareness

Direct adoption matches to the Rogers’ (2003) process of intentional

adoption. The adopter becomes aware of the protocol, evaluates its benefits against its costs and then makes a decision to adopt or reject it. The necessary actions are then taken to acquire the protocol, i.e. typically either purchasing a new device or updating the SW of the existing device. The distinctive characteristic of the indirect adoption is that the adopter can link the benefits provided by the protocol to the protocol itself.

Indirect adoption is similar to direct adoption, but now the actual adopted innovation is a product that contains the protocol as an integral part. This indirection means that the adopter may be completely unaware of the protocol’s existence, even though she observes and makes her decision based on the perceived benefits provided by the protocol. It can be argued that this is a more natural model of protocol diffusion than direct adoption, because adopters (especially consumers) are seldom informed about or even interested in Internet protocols.

In unintentional adoption the adopters may be fully unaware of the existence of the protocol, in which case the adoption decision of the product is not based on the protocol. For example, adopters replace their devices every now and then, and the selection of the device is typically based on completely different features than specific Internet protocols. Additionally, many consumers outsource the updating of their OS to the automatic update procedure controlled by the OS vendor, due to which they get protocol support automatically, if the OS vendor decides to include it in the update patch. Therefore, OS and device vendors play a key role in the unintentional adoption. For unintentional adoption to happen, the protocol needs to be enabled by default.

The adoption models also impact the strength of network effects, as demonstrated in Publication I through system dynamics modeling. In case of unintentional adoption, the network effects impact less on the adoption

Page 46: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

23

decision than with intentional adoption. This applies also to the cross-side network effects between unintentional (e.g., consumers) and intentional (e.g., content providers) adopters, so that the consumer adoption affects more on the adoption decisions of content providers, than vice versa.

3.2 Deployment models

The deployment actions and involved stakeholders of each deployment step vary depending on the products in which the protocol is included, resulting in three deployment models identified in Publication II: i) pre-installation, ii) post-installation, and iii) update installation. Identification of the deployment models is relevant, since the dynamics of protocol deployment and the sources for the measurement data differ between them.

3.2.1 Pre-installation

In the pre-installation model, the end user acquires a HW-SW bundle, in which the protocol is pre-installed. This model is used heavily for introducing protocols and applications into mobile phones, all provided by the same stakeholder – the HW provider. When a protocol is deployed along this model, the HW providers’ decisions to include the protocol in their devices significantly affect the diffusion of the protocol into the device base owned by the end users. However, the impact of the protocol on the acquisition decision of device is likely small as it is only one feature among a multitude of features. Additionally, deployment along the pre-installation model is slow due to the long HW replacement cycles (Kivi et al., 2012).

3.2.2 Post-installation

In the post-installation model, the end user acquires the SW including the protocol and the HW separately. SW distribution over the Internet has increased the importance of the post-installation model that is the predominant model for providing applications to smart phones through the app stores. In the post-installation model, the protocol is potentially a more significant part of the product than in the pre-installation model, thus affecting more the acquisition decision. The model also allows the SW providers to bypass the HW providers, which may speed up deployment.

3.2.3 Update installation

In the update installation model, the end user acquires the protocol through a SW update. The update installation model resembles the post-installation model, with the distinction that the end user does not acquire a completely new product. The other key difference is that the updates are often pushed to end users through the update mechanism included in the software, such

Page 47: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

24

as Windows Update. The update installation model enables fast deployment of new protocols for the owners of the required platform, as the swift diffusion of MPTCP (Bonaventure, 2013) along with the Apple’s iOS 7 OS update (Chitika, 2013) demonstrates.

3.3 Deployment measures and data sources

As described in Publication II, the deployment level of a protocol can be measured in each of the deployment steps. These measures are useful in analyzing the success of protocol deployment. What is actually measured in each step depends on the deployment model. On the provider side, the protocol spreads into the different product models, whereas in the end user side the analysis concerns the products owned and used by the end users. In addition to analyzing the deployment levels of each step separately, comparing them by measuring the deployment gaps and delays can help to identify the bottlenecks of protocol deployment.

3.3.1 Deployment levels

Implementation level measures how widely a protocol is implemented for different platforms and supported by applications, i.e., the number of implementations. This can be calculated as the share of certain type of software, such as operating systems, for which a protocol implementation exists. However, more important than measuring the implementation level itself is to discover the protocol implementations, so that this information can be used with other measures. Data sources on implementations include product specifications, device description repositories (e.g., WURFL (ScientiaMobile, 2012)), and source code analysis (Komu et al., 2012).

Availability level measures how widely a protocol is commercialized in the product models the end user can acquire, i.e., the share of available product models containing the protocol. In the pre-installation model, this translates into measuring the share of device models on sale containing the protocol, whereas in the post- and update installation models the measure is the share of available operating systems or some class of applications, such as web browsers, containing the protocol. This information can be found from the product catalogs, such as the web sites of online shops or the application catalog of app stores. Additionally, data on product sales collected by, for example, market research companies can be used to identify the products on sale.

Availability level alone is not a perfect measure for the success of the commercialization step, since it does not take into account the popularity of the products. Acquisition rate provides a linkage between the provider side and the end user side by scaling the availability level with the sales

Page 48: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

25

volumes of product models. It is defined as the share of sold products containing the protocol. The data on product sales is available from market research companies or directly from the stores selling the products. Availability level and acquisition rate are relevant measures to the protocol developers and providers for finding optimal commercialization strategies.

Acquisition step has two measures related to the possession of platform and protocol. Platform possession level measures the share of end users that could acquire the protocol, i.e., the population possessing the platform. Due to the lack of separate platform and protocol acquisitions in the pre-installation model, this measure exists only in the post- and update installation models. Platform possession level is a relevant measure to protocol developers that decide for which platforms they implement their protocols, as they need to estimate the population they can reach with specific implementations. Protocol possession level measures the share of end users that could use a protocol, i.e., the population possessing the protocol. It is a relevant measure to application service providers that decide upon which protocols they build their services. Data on cumulative sales of HW, SW and SW updates provide a limited approximation of the possession levels, since they cannot take the replacement acquisitions and discards into account. Thus, the number of products in use provides more accurate information on the possession levels. In case of mobile devices, mobile operators’ reporting systems are a potential source for these data. Additionally, device models and operating systems can be identified from the network traffic or from the OS vendors’ customer databases.

Usage level is a measure for the adoption step. It measures the share of end users that generate protocol traffic, i.e., the population using the protocol. When measuring the usage, it is important to clearly define the actual measure. Usage can namely be measured both on binary (i.e., use or no use) and continuous scale (i.e., rate or variety of use (Shih & Venkatesh, 2004)). Data sources for measuring the usage include end user surveys, client monitoring systems, network traffic measurements, and server-side measurements (Smura et al., 2009). Usage level is a relevant measure to end users interested in adopting the protocol, ISPs operating networks, and application service providers whose revenues depend on the service usage.

3.3.2 Deployment gaps and delays

In addition to measuring the deployment level separately for each step, these levels can be compared in order to identify the bottlenecks and dynamics of protocol deployment. The deployment gap is defined as the relative or absolute difference between two deployment levels at time t.

Page 49: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

26

Similarly, the deployment delay is defined as the timely difference between two deployment steps reaching a specific deployment level.

On the provider side, the number of implementations and the number of product models that contain the protocol are not commensurable. Nevertheless, qualitative comparison of the implementation and availability levels can still be beneficial in order to analyze the relative efficiency of commercialization in comparison to the implementation effort. For example, despite several implementations for different operating systems, HIP is not included in any commercial OS (Publication V).

Comparison of the availability level to the acquisition rate links the provider side to the end user side through the product models on sale, thus enabling the analysis of technology-push vs. market-pull. This gap reveals the popularity of the products containing the protocol compared to those not containing the protocol over a certain period of time. Comparison of the availability and possession levels, for one, allows analysis of the delay between the availability of the protocol in product models and its possession by the end-users. This delay differs between the deployment models depending on the replacement and update cycles of HW and SW. Additionally, the gap between the availability and possession levels is likely smaller in cases of strong technology-push.

On the end user side, the deployment levels can be calculated as relative shares to the same total population and are, therefore, directly comparable. Figure 4 visualizes the deployment levels, gaps and delays on the end user side with example data.

Figure 4. Deployment levels, gaps, and delays on the end user side (Publication II).

Platform possession gap is calculated as the difference between the total population and the platform possession level. The size of this gap

Page 50: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

27

depends heavily on the provider side decisions, on which platforms the protocol is made available. Protocol possession gap (or delay) is calculated as the difference between the platform possession level and the protocol possession level. The protocol possession gap indicates the difference in the popularity of the platform compared to the popularity of the products. Platform possession gap and protocol possession gap can be added up to describe the total possession gap. This is especially relevant in the pre-installation model, where the bundling of platform and product prohibit the separate analysis of platform and protocol possession gaps.

Usage gap (or delay) is calculated as the difference between the possession level and the usage level, that is, between the end users who have the protocol, but do not use it, and the actual users. The size of this gap depends on the end users’ awareness of and interest towards the protocol and the applications utilizing it. The gap is likely smaller, if the protocol has a significant role in the product the end user acquires. For example, Skype is more likely to be used by an end user who downloads the application from the web compared with the end user who receives it pre-installed in a device. However, the usage level of Skype may still be higher in the pre-installation model, since the pre-installed application may attract end users who would not download the application themselves. This example shows that both deployment levels and the deployment gaps should be included when measuring protocol deployment.

3.4 Framework for measuring protocol deployment

Figure 5 combines the deployment steps, deployment models, deployment measures, and data sources into a framework for measuring protocol deployment introduced in Publication II. The measures mapping directly to the steps define the deployment level, i.e., the success of the protocol, in each step. In addition to the deployment levels visible in the figure, the gaps and delays between them are relevant measures for identifying the bottlenecks of protocol deployment. The selection of the data source for each measure depends on the deployment model under analysis. The deployment models are also relevant since they represent alternative deployment strategies with differing characteristics. The transparent boxes in the post- and update installation models indicate the platform acquisition steps that do not involve protocol, but need to occur in order to enable protocol acquisition.

A few practical issues should be taken into account when conducting measurements according to the framework. For each measure, it is important to identify the population, into which the protocol is diffusing. In

Page 51: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

28

order to allow direct comparison, the measures of different steps should be commensurable, i.e., the population should be the same. The population can consist either of i) the products in which the protocol is implemented, installed, and used, or ii) the stakeholders that take these actions. On the provider side, the product models are more relevant than their providers, since they link the two sides together through product sales. On the end user side, however, both the end user population and the device population can be selected. These populations may differ from each other, since an end user may use multiple devices or multiple end users can use single device. This needs to be taken into account when combining and comparing the datasets with different populations, such as the possession level based on the number of devices and the usage level based on the number of end users. Variation is also possible within each measure, since the deployment levels can be measured both on binary and continuous scales (e.g., use or no use vs. rate of use).

Figure 5. Framework for measuring the deployment of Internet protocols (Publication II).

3.5 Application of the framework to the Finnish mobile market

In addition to constructing the measurement framework, Publication II applies it for measuring the deployment of 11 protocols along the pre-installation model in the Finnish mobile market. The studied protocols cover the basic network and transport layer protocols IPv4, TCP, and UDP, widely used security protocol TLS, and the key application layer protocols for email (SMTP, IMAP4, POP3), web browsing (HTTP), video streaming (RTSP, RTP), and voice over IP (SIP). Email protocols are handled as a single protocol (EMAIL), because they typically co-exist.

Page 52: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

29

Figure 6 describes the linkages between the utilized data and the measures of the framework. The protocol data, including the information about the pre-installed protocols of different handset models, were collected from several sources and mapped to the handset sales and base data to enable calculation of the availability level, acquisition rate, and possession level over time. The usage levels were received from public usage surveys that only included web browsing (HTTP) and email (EMAIL), thus limiting the analysis of usage levels on those two protocols. More detailed description of the data can be found from Publication II.

Figure 6. Linkages between the deployment measures and the collected datasets (Publication II).

Figure 7 presents a) the availability levels, b) acquisition rates, c) possession levels, and d) usage levels of the selected protocols in Finland from 2003 to 2012. On a general level, four groups of protocols can be identified with internally similar diffusion patterns: 1) IPv4 and UDP, 2) TCP and HTTP, 3) TLS and EMAIL, and 4) RTP, RTSP, and SIP. The diffusion patterns of these groups are related to the deployment of the following mobile services: WAP browsing (1), HTML browsing (2), email (3), and real time communications (4). Even though TLS is important also in securing HTTP browsing, the results indicate that its deployment has been primarily driven by EMAIL.

Based on the provider side measures, all protocols from groups 1, 2, and 3 can be argued to be successful in terms of their provider side deployment in the Finnish mobile handset market. These protocols reached availability levels (Figure 7a) and acquisition rates (Figure 7b) close to 80-90% by 2012, meaning that they were included in most of the handset models provided by device vendors, and these models included the most popular models in sales. The group 4, and RTSP and SIP in particular, are an exception. The acquisition rate of RTSP stayed below the availability level

Page 53: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

30

for long periods until 2012, and the acquisition rate of SIP experienced a large drop in 2009, which was likely caused by the replacement of Nokia’s Symbian S60 devices with pre-installed SIP with Apple iPhone and Google Android devices that did not include SIP at that point. A reason for the limited success of RTSP and SIP could be that both are advanced application layer protocols that were mainly included in the high-end models. These protocols also have more competition than most of the other protocols, which have already reached a dominant position. For example, proprietary protocols, such as Skype, provide competing services to what SIP enables, and thus, substitution between these protocols might exist.

Figure 7. Protocol a) availability levels, b) acquisition rates, c) possession levels, and d) usage levels from 2003 to 2012 in the Finnish mobile market (Publication II).

The comparison of Figure 7a and Figure 7b also shows that the availability levels of several protocols were higher than the capability acquisition rates during the initial stages of protocol diffusion. For most of the protocols this changed later, meaning that the popularity of the models equipped with the protocols increased. This could be explained by several factors. For example, the popularity of smartphones and handsets with advanced features increased generally during the measurement period and several of the selected protocols became basic features also for many feature phone models. Moreover, new features and protocols are often first introduced in high-end or other experimental models, which might explain the lower acquisition rates in the beginning of the measurement period.

Page 54: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

31

In general, the provider side success in protocol commercialization is also visible on the end user side, where the strong technology-push by the handset providers resulted in the increase in the possession levels during the measurement period (Figure 7c). However, the typical slowness of the pre-installation model, caused by the slow replacement rate of mobile handsets, is visible in the data. For example, the delay for EMAIL from reaching 80% availability level to reaching the same possession level was about three years.

The technology-push did not have as strong impact on the usage levels of EMAIL and HTTP (Figure 7d), as large usage gaps (and delays) were identified for both. These usage gaps are better visible in Figure 8 that presents the possession levels and usage levels of HTTP and EMAIL in the same figure. These usage gaps demonstrate adoption as the one deployment step, where HTTP and EMAIL protocols have not been very successful. Even though the providers introduced EMAIL and HTTP in popular models, the popularity of these models was caused by other factors, as the users did not take the protocol in use. The large usage gaps also indicate that web browsing and email were not important services to the users of mobile handsets especially before 2010. This observation is supported by the Ficora (2012) survey data showing that the interest towards new mobile services has had only small impact on the decision to acquire a 3G handset.

Figure 8. End user side measures – possession level and usage level – of HTTP and EMAIL (Publication II).

Other complementary explanations for the usage gaps could be that the handsets including EMAIL and HTTP did not provide good usability or that the pricing of mobile data connectivity prohibited people from using mobile data services. A major improvement in usability occurred when the modern, touch screen oriented smartphone operating systems were introduced first with the Apple iPhone 3G in 2008. Since the combined share of iOS, Android, and Windows Phone operating systems was still only

Page 55: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Protocol deployment as a measurable process

32

21% in September 2012 (Riikonen & Smura, 2013), the limited usability of handsets might explain the slow growth in usage levels to some extent. The pricing is not as plausible explanation, because the mobile data prices have been low in Finland after the strong price competition started in the end of 2007. Age is also a factor affecting the usage of mobile services. For instance, according to Ficora (2012), the usage of mobile phones with older age groups focused on a smaller range of basic services in 2012. If, however, older users own devices with advanced functionalities, the usage gap will not fully close unless the usage habits of these users change in the future. Since the analysis in Publication II focuses on identifying the deployment patterns, a separate study is needed for validating the suggested explanations for the observed behavior.

Page 56: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

33

4. Framework for feasibility analysis

In order for protocols to get deployed, they need to be feasible for each stakeholder in the value network. This chapter presents a framework for analyzing the feasibility of emerging Internet protocols that was developed in Publication III. The framework builds on an extensive literature review on innovation diffusion on the Internet (Chapter 2), the developed understanding of the protocol deployment process (Chapter 3), and the experiences collected during several protocol case studies (Chapter 5). The chapter is divided into two subsections: the first describes the framework itself, whereas the second introduces a set of supporting analysis tools.

4.1 Feasibility analysis framework

Studying the techno-economic feasibility of emerging Internet protocols is a challenging task, which culminates in understanding whether the relevant stakeholders – including both the actual end users and other stakeholders in the value network – have incentives for participating in protocol deployment. In order to answer this question, Figure 9 illustrates a framework consisting of six analysis steps. Each step comprises a set of questions, the answers of which form the input for the next step.

Protocol specification works as the starting point for the framework. It describes the technical design of the protocol that has been produced in the protocol design process as a solution to an envisioned problem or need. The specification does not have to be finalized; already a draft version is enough for conducting useful analysis. Steps 1-4 scope the techno-economic feasibility analysis by defining the use case, technical architecture, value network and deployment environment, respectively. Then, step 5 studies the feasibility of the protocol from the perspectives of all relevant stakeholders in order to identify the deployment challenges of the protocol. Finally, step 6 suggests solutions to the identified challenges. The steps are introduced in more detail in the following subsections.

Page 57: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

34

Figure 9. Framework for analyzing the techno-economic feasibility of Internet protocols(adapted from Publication III).

The framework is iterative which supports its usage as a continuous tool alongside protocol development and deployment. The framework should be used multiple times to accommodate the changes made to the protocol based on the solution analysis. Because the maturity and knowledge of the protocol affect the results, the framework could also be used in different phases of protocol deployment. In addition, short and long-term analysis made at the same time may yield different results as the protocol and market are constantly evolving.

4.1.1 Step 1: Use case analysis

The use case analysis describes the purpose and functionalities of the protocol and translates them into potential use cases. Since the protocol may enable multiple use cases that differ significantly from each other in their technical architecture, value network and deployment environment, explicit specification of the use case is required. The description of a use case should include the selected functionalities of the protocol, which are supposed to turn into the benefits for different stakeholders in the later steps.

If the protocol enables multiple use cases, the complete techno-economic feasibility analysis requires a separate analysis for each use case. Therefore, use cases should be prioritized according to their attractiveness. The most attractive use case may have the highest expected demand or least competition from other solutions. When multiple use cases are analyzed, the framework can help to separate the more promising use cases from the less promising ones. This approach was taken in Publication VI for identifying the most attractive use cases of CoAP (see Section 5.3). Key questions:

What are the purpose and the functionalities of the protocol?

What is the use case to be studied?

TECHNICAL ARCHITECTURE

ANALYSIS

VALUE NETWORK ANALYSIS

FEASIBILITYANALYSIS

Technical architecture

& deployment actions

DEPLOYMENTENVIRONMENT

ANALYSIS

Stakeholder roles & value network

Deploymentchallenges

Change value network

Change technical architecture

Substitutes &external factors

affecting deployment

Change protocol design

Protocol specification

PROTOCOL DESIGN

PROCESS

SOLUTIONANALYSIS

USE CASE ANALYSIS

Change use case

Affect deployment environment

Use case &functionalities

1 2

3

4

5 6

Page 58: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

35

4.1.2 Step 2: Technical architecture analysis

Technical architecture analysis describes the technical architecture and deployment actions of the use case. Deployment actions refer to all the actions that need to be taken in order to advance a protocol from the specifications into actual use on the Internet. They can relate, e.g., to implementing, installing, operating, or adopting the protocol and the related technical components. Identifying these actions serves the feasibility analysis as they incur costs that the involved stakeholders have to bear if they decide to participate in the protocol deployment.

Often the technical design and the chosen use case allow multiple technical architectures with different deployment actions. A typical example with Internet protocols is an alternative to deploy a protocol either in end-hosts or in a proxy in the middle of the communication path. Similarly, a protocol can be implemented in the OS kernel, as application layer middleware, or directly in applications. The framework does not mandate the choice of a single deployment scenario, which allows a comparative analysis of multiple technical architectures. Key questions:

What is the technical architecture to be studied?

What are the required deployment actions in the chosen technical architecture?

4.1.3 Step 3: Value network analysis

Value network analysis maps the deployment actions to the stakeholders responsible for taking them. This translates into identifying the relevant stakeholders and their roles in protocol deployment. Adapting the definition of Freeman (1984) to the context of protocol deployment, a stakeholder is defined as any group or individual who can affect or is affected by the deployment of the protocol. This covers both the stakeholders directly participating on protocol deployment, and stakeholders, such as regulators, that can indirectly affect the success of the protocol by either facilitating or hindering deployment.

In addition to mapping the deployment actions to the stakeholders, the value network analysis defines, how the service enabled by the protocol is provided. In practice, this means identifying how the goods and services, money or intangible benefits are exchanged between the stakeholders. This information is used in step 5 to compare the costs and benefits and to analyze the incentives of each stakeholder to participate in protocol deployment. Similarly to technical architectures, multiple value networks are typically possible. For example, a vertically integrated stakeholder might take the responsibility of all the deployment actions, or the actions could be divided horizontally among multiple stakeholders.

Page 59: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

36

Key questions:

Which are the relevant stakeholders in the chosen use case?

How are the deployment actions allocated to the stakeholders?

What is the value network of the service provided in the chosen use case?

4.1.4 Step 4: Deployment environment analysis

As protocols are rarely deployed in a void, understanding the environment where the protocol is to be deployed is essential. Deployment environment analysis can be divided into the analysis of the substitutes of the protocol, and the wider environmental analysis. In this step the analysis is technology-centric, as against the stakeholder-centric analysis of steps 3 and 5.

The analysis of the substitutes starts with their identification. Substitutes include both the incumbent solutions and the other new solutions under development. In addition to other protocols at the same or different layer of the protocol stack, substitutes can be, for example application-specific solutions. The use case definition helps in deciding, which solutions truly solve the same problem, i.e., can substitute the protocol under study. After the identification, performance and deployment status of the substitutes should be compared against the protocol under study. This helps in deciding which substitutes are included, when the relative advantage of the protocol is analyzed from the stakeholder-centric perspective in step 5.

The wider environmental analysis incorporating the political, economic, social, and technological domains helps in identifying the external factors affecting the feasibility of the protocol. Additionally, this step can include exploring the possible evolution paths of the deployment environment in order to understand the trends that are favorable and non-favorable for the protocol deployment. This is especially important in the early phases of the protocol development when the deployment is expected to happen only in the distant future. Key questions:

What are the relevant substitutes of the protocol in the use case and how do they compare against it?

What are the relevant external factors affecting feasibility of the protocol and how can the deployment environment evolve in the future?

4.1.5 Step 5: Feasibility analysis

After steps 1-4 have scoped the study, step 5 analyses the feasibility of the protocol by evaluating if the relevant stakeholders are willing to participate in protocol deployment. In practice, this translates into comparing the costs and benefits of the protocol for each relevant stakeholder. Therefore, the

Page 60: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

37

analysis needs to take into account all the stakeholders identified in step 3 and the substitutes and other external factors identified in step 4.

The fundamental question in protocol feasibility is whether a real need for the protocol exists in the market. This is an important point of analysis since the problem that the protocol solves may not correspond to the demand of the stakeholders. Therefore, the potential adopters may not see any value in the protocol if they are happy with their current solutions, and the perceived benefit, translating to the willingness to pay, is close to zero.

Assuming that the demand for the protocol exists, the minimum condition for the feasibility of the protocol is that its benefits cover its costs, or, in other words, its utility is positive for all the relevant stakeholders. Although the protocol would introduce a positive utility for each stakeholder, it should also have relative advantage over its substitutes. The separation of studying the feasibility of a protocol, first independently of, and then in relation to its substitutes may be challenging. Therefore, the utility of the protocol is often studied immediately in comparison to its substitutes.

The static, separate analysis of each stakeholder is not sufficient, because the costs and benefits of the protocol often depend dynamically on the number of adopters. Therefore, studying the impact of network effects, both between the similar and different types of adopters, is essential. Typical questions to ask are do the early adopters have incentives to adopt and what is the critical adopter mass after which the benefits exceed the costs.

Estimating the values of the cost and the benefit components may be challenging, especially during the early phases of the protocol development when the level of uncertainty is high. This presents a challenge to the feasibility analysis but does not prevent it. The main objective of feasibility analysis is namely the identification of the deployment challenges of the protocol, which can often be done already based on the qualitative analysis. The challenges typically result from the relevant stakeholders’ lack of incentives to participate in protocol deployment. Key questions:

Does the protocol demonstrate positive net benefits for all the relevant stakeholders?

How do network effects impact on the formation of costs and benefits?

What are the deployment challenges of the protocol?

4.1.6 Step 6: Solution analysis

After the potential deployment challenges of the protocol have been identified, the protocol developers or other advocates should consider how the challenges could be solved. Basically, five high-level solutions exist: 1) changing protocol design, 2) changing use case, 3) changing technical architecture, 4) changing value network, and 5) affecting deployment

Page 61: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

38

environment. The choice of the solution depends on the problem at hand, the maturity of the protocol, and the power of the protocol’s advocates to impact the aforementioned matters.

Firstly, a fundamental problem in the protocol design – such as the lack of backwards compatibility, performance issues, or problems with middlebox traversal – may require changes to the protocol design. These kinds of issues should be identified as early as possible because the protocol design can be easily changed only prior to the final standard is accepted.

Secondly, a protocol may not be sufficiently feasible in the selected use case due to, for example, too hard competition from substitutes or disinterest of an essential stakeholder. In this case, the protocol may need to be scoped again for other use cases. As a result, the framework can help to separate the promising use cases from the non-promising ones.

Thirdly, technical architecture can often be changed without changing the protocol design itself. As a result, some of the problematic deployment actions can possibly be eliminated or replaced with easier actions. For example, a functionality originally implemented in a central server could be distributed to multiple locations to improve the performance of the service.

Fourthly, a typical challenge with Internet protocols is the misalignment of costs and benefits, which can possibly be solved by payments or other business agreements between the participating stakeholders. Incentive mechanisms, such as bundling of complementary products and monetary subsidies, or reallocation of the value network roles could also be used to facilitate protocol deployment in cases where the business case is not sufficiently attractive to some stakeholders. The fewer stakeholders are involved, the less expensive coordination is required.

Finally, affecting the deployment environment may be used to improve the feasibility of the protocol. This may include actions like lobbying the politicians responsible for legal decisions in favor of the emerging protocol or creation of alliances supporting the protocol. However, affecting the deployment environment is a challenging strategy for facilitating the protocol deployment and the other solutions introduced above are presumably more effective.

Before implementing the solutions, their impact should be analyzed by going through the framework again. In general, the framework should be used iteratively as long as all the potential feasibility challenges have been solved or they are deemed to be unsolvable. Key questions:

What are the potential solutions to the identified deployment challenges?

How would the implementation of the potential solutions affect the feasibility of the protocol?

Page 62: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

39

4.2 Analysis tools

The developed framework provides the high level guidelines for the techno-economic feasibility analysis. Table 3 lists a multitude of analysis tools that can be used to answer the key questions posed by the framework. The tools are grouped based on the steps of the framework. No tools are introduced for steps 1 and 6 due to their straightforward nature and lack of suitable tools. In order to facilitate the choice of the most suitable tool depending on the available resources and the applier’s techno-economic knowledge, the table identifies the potential data sources and laboriousness of each tool. In addition, the examples of protocol studies using a specific tool have been listed. More detailed introduction to the tools is available in Publication III, whereas the application of many of them is demonstrated in the case studies of Chapter 5.

Table 3. Characteristics of analysis tools (adapted from Publication III).

Tool Potential data sources Laboriousness Examples

Step 2 – Technical architecture analysis

Technical architecture modeling

Technical specifications, interviews

Low MPTCP (Ford et al., 2011)

Protocol stack figure Technical specifications Low HIP (Publication V)

Flow diagram Technical specifications Low MIP (Wu et al., 2002)

Step 3 – Value network analysis

Stakeholder analysis Interviews Low MPTCP (Levä et al., 2010)

VNC analysis Interviews, brainstorming Medium ICN (Kostopoulos et al., 2012)

Value network analysis Interviews Medium ICN (Zhang et al., 2014)

Step 4 – Deployment environment analysis

Venn diagram Technical specifications, interviews

Low HIP (Publication V)

Comparison table Simulations, performance measurements

Medium IP mobility (Campbell et al., 2002)

PEST, SWOT analysis, scenario planning

Interviews, brainstorming, questionnaires

Medium P2PSIP (Heikkinen et al., 2008)

Step 5 – Feasibility analysis

Qualitative cost-benefit analysis

Interviews, questionnaires, market reports

Low MPTCP (Levä et al., 2010)

Functional modeling Interviews, market data, traffic and performance measurements

High IPv6 (Joseph et al., 2007; Jin et al., 2008), LISP (Iannode et al., 2010)

Techno-economic modeling

Interviews, questionnaires, market reports, simulations, performance measurements

Medium/High MPTCP (Warma et al., 2010), CoAP (Publication VI)

System dynamics Interviews, market data, traffic and performance measurements

High MPTCP (Publication I)

A logical approach for conducting the analysis is to start with the less

laborious qualitative tools and gradually move towards more sophisticated

Page 63: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Framework for feasibility analysis

40

quantitative tools. Basically, all tools prior to the feasibility analysis step are qualitative. The qualitative tools are aimed for summarizing and visualizing the findings in concise format. Visualization facilitates the communication of the findings, which is an integral part of the framework application. Also in the feasibility analysis step, qualitative analysis of the costs and benefits for each stakeholder is an efficient way for identifying the potential deployment challenges, which can then be analyzed in more detail with the more laborious quantitative modeling tools.

Data collection presents a challenge when analyzing the emerging technologies due to the uncertainty related to the costs and benefits, the deployment environment, and the stakeholders’ incentives. Simulations and measurements of network performance and traffic can provide objective data for analyzing the relative advantage of the protocol in comparison with its substitutes. To get a comprehensive view on the stakeholders’ incentives and disincentives concerning the emerging protocols, also the opinions of different stakeholders are crucial from early on. For example, surveys, interviews and brainstorming can provide rich data. For an example of the interview study, please refer to Publication V introduced in Section 5.2.

Page 64: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

41

5. Case studies on protocol feasibility

This chapter summarizes the results of three case studies on protocol feasibility concerning MPTCP, HIP, and CoAP. At the same time, these case studies demonstrate the application of the feasibility analysis framework in general, and the specific analysis tools in particular.

5.1 Multipath TCP

Multipath TCP (MPTCP) is a backwards-compatible extension to normal TCP developed by the MPTCP WG of the IETF. MPTCP exploits multiple paths between hosts and aims for better utilization of network resources (Ford et al., 2013). MPTCP enables seamless mobility between different access networks to improve resiliency and simultaneous usage of multiple paths to improve throughput. These are potentially useful in multiple use cases, but this analysis focuses on the use case where MPTCP is used to improve the performance and the end user experience of client-server based content services, such as YouTube.

During the techno-economic feasibility analysis of MPTCP, the framework was first applied qualitatively to identify the potential deployment challenges and solutions, which were later analyzed in more detail with the quantitate analysis tools. Discussions with the developers of MPTCP and other networking technology experts represent the main data source for these analyses. The findings concerning the feasibility of MPTCP have been reported in multiple articles covering different steps of the framework, including Publications I and IV. This section is based on Publication III that summarizes the findings of other articles in order to demonstrate the application of the feasibility analysis framework. For more detailed analysis on the feasibility of MPTCP, and the multipath protocols in general, please refer to the articles listed in Table 4 and the dissertation of Suomi (2014).

Page 65: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

42

Table 4. Articles analyzing the techno-economic feasibility of MPTCP.

Article Covered topics

Business aspects of multipath TCP adoption (Levä et al., 2010)

Stakeholder analysis and comparison of technical architecture and value network alternatives

Towards multipath TCP adoption: Challenges and opportunities (Publication IV)

Identification of deployment actions, stakeholder incentives, and deployment strategies

Mobile Internet in stereo: An end-to-end scenario (Warma et al., 2010)

Quantitative feasibility analysis of a specific use case where content provider controls both clients and servers

Dynamics of communication protocol diffusion: The case of multipath TCP (Publication I)

Analysis of adoption models and network effects among and between different adopter groups

Modeling the value of end-to-end multipath protocols (Suomi et al., 2012)

Functional modeling of the inherent value of multipath communications for consumers

Techno-economic feasibility of multipath protocols in mobile Internet of Things applications (Sonntag & Suomi, 2013)

Quantitative feasibility analysis of a specific use case from the end-user perspective, including deployment environment analysis

Techno-economic feasibility analysis of Internet protocols: Framework and tools (Publication III)

Summary of other articles and demonstration of the framework application

5.1.1 Deployment of MPTCP

The technical architecture of MPTCP in the client-server communication is illustrated in Figure 10. In order for MPTCP to be used, both client and server need to be MPTCP-capable. As MPTCP is designed to be transparent to applications, mandatory modifications are needed only in the transport layer of the hosts indicated with the gray background color. Additionally, at least one of the end hosts needs to have multiple access connections towards separate ISPs, even though the full benefits realize only when both are multihomed. The routers and middleboxes in the network forward packets based on the IP address of each interface, which deviates the paths between the client and the server. These network devices do not require any changes, but, depending on their configuration, they may block the MPTCP traffic (Honda et al., 2011). In case the MPTCP communication fails, the communication falls back to regular TCP.

Figure 10. Technical architecture of MPTCP in client-server communication (Publication III).

ISP 1ISP

Application layer

Transport layer

Network layer Network layer Network layer

Application layer

Transport layer

Network layer

Client ServerRouter Router

Fixed/RadioFixed

Page 66: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

43

The deployment of MPTCP involves multiple stakeholders, who need to take actions during the deployment process. Below these deployment actions are mapped to the relevant stakeholders in the value network:

• OS vendors implement MPTCP in operating systems for use on end systems and decide if MPTCP is enabled by default in the shipping configuration.

• Device vendors decide which OS version is pre-installed in the devices. Their significance depends on the importance of pre-installation model for the diffusion of operating systems and the level of device vendors’ selectivity for the OS version. Since device vendors typically use the newest available OS version, they are not a very critical stakeholder for MPTCP deployment and are not analyzed further.

• Content providers are end users of MPTCP that provide content services to consumers. They acquire multihoming capability, control the content servers, and install MPTCP into them.

• Consumers are end users of MPTCP that use content services provided by content providers. They own mobile devices, acquire multihoming capability, and (install and) take MPTCP into use.

• Internet service providers provide connectivity for multihoming. Active participation in deployment is not required from ISPs, because end users can acquire multihoming support by making separate agreements with multiple ISPs. However, ISPs may support or hinder deployment by promoting multihoming or blocking MPTCP traffic, respectively.

5.1.2 Feasibility of MPTCP

Table 5 summarizes the strengths, weaknesses, opportunities and threats (SWOT) (Pickton & Wright, 1998) of MPTCP from the technology-centric perspective of successful deployment. On the one hand, the protocol design and the changes in the technical environment facilitate its deployment. On the other hand, the changes to the OS kernels are burdensome (Barre et al., 2011; Raiciu et al., 2012) and the level of market demand is uncertain.

From the stakeholder-centric perspective, the feasibility analysis builds on analyzing the costs and benefits of MPTCP deployment for each relevant stakeholder. Here the analysis is conducted in comparison with the current situation, meaning that the costs and benefits are presented relative to the regular TCP. The other relevant substitutes of MPTCP – SCTP and MIP – are not included in the analysis due to their own deployment challenges.

Page 67: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

44

Table 5. SWOT analysis for MPTCP deployment (adapted from Publication III).

Strengths Weaknesses • Backwards-compatibility with TCP • NAT traversal capability • As a transport layer solution, MPTCP is applicable

to a wide range of applications

• Changes to the TCP/IP stack require OS kernel changes

• Intended RFC status is experimental instead of standards track

• Multipath communication may drain the battery of mobile devices

Opportunities Threats • Number of multihoming capable devices is

increasing • Emerging applications have higher availability

requirements • Battery life-times are increasing

• Single-path bandwidth suffices • Substitutes are earlier on the market • Internet connectivity prices remain high • Router vendors resist MPTCP due to its impact to

traffic engineering

Costs and benefits for OS vendors The costs for OS vendors incur from implementing and maintaining MPTCP in their operating systems, and providing support for end users in case they face problems with MPTCP. In addition to the monetary costs for implementing MPTCP, modifying the TCP/IP stack – a critical component of operating systems – may also be perceived too risky. The maintenance and support costs during the lifetime of an OS, which are often larger than the implementation costs, create another concern that may limit the implementation of new protocols.

Consequently, OS vendors need to perceive substantial benefits from MPTCP deployment. On the one hand, demand for MPTCP from end users or application developers could help to sell the new OS version directly or through increased supply of interesting applications for the OS. On the other hand, MPTCP could create new business opportunities by enhancing existing or enabling new OS vendor provided services.

Costs and benefits for end users (consumers and content providers) End users face costs both from acquiring multihoming support and from acquiring and installing MPTCP software to their devices. Fulfilling the multihoming prerequisite is likely to be motivated mainly by other reasons than MPTCP, such as the consumers’ need for ubiquitous Internet access or the content providers’ desire for load-balancing and backup connections. Actually, many content providers and mobile end users are already multihomed. The cost involved with the adoption of MPTCP is measured partly in terms of money and partly in terms of time and effort, and depend heavily on the adoption model. Content providers typically make a conscious adoption decision with clearly defined costs for acquiring and installing MPTCP. Consumers, for one, often adopt MPTCP unintentionally alongside a new OS version, the cost of which is not associated with MPTCP adoption. Even though the perceived cost is low in unintentional adoption, the penetration of MPTCP among consumers increases slowly with long OS update cycles.

Page 68: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

45

Consumers and content providers see the benefits of MPTCP differently. For consumers, MPTCP improves the perceived service quality. Support for mobility allows session continuity and higher throughput translates into savings in time. However, MPTCP may be more appealing when used over one access link at a time compared to running several access connections in parallel, because the additional energy consumption due to simultaneous use of multiple radio interfaces may exceed the increase in throughput. For content providers, the benefits are indirect and translate into revenue in case the better service quality increases end users’ willingness to pay. The higher resiliency enabled by session continuity hides the connection problems from end users and the higher throughput means potential for more sales. Finally, realization of the benefits of MPTCP depends heavily on the availability of communication partners with MPTCP support. This means that the deployment of MPTCP may stagnate if both consumers and content providers wait the other side to move first. The support for fail-over to the regular TCP alleviates this problem, though.

Costs and benefits for ISPs ISPs do not face direct deployment costs in the analyzed use case. However, the increased competition among ISPs due to the higher visibility of throughput and network performance enabled by MPTCP, and the reduction in provider lock-in due to increased multihoming (Suomi et al., 2013), may be seen as costs by ISPs. However, innovative ISPs should see this as an opportunity to answer to the increased demand for connectivity and to attract more customers. MPTCP may also allow ISPs to run closer to capacity, since spikes on load can be spread across links more effectively. The behavior of ISPs is hard to predict and becomes visible only after the MPTCP traffic starts to flow on the Internet. The biggest threat caused by ISPs is that their middleboxes would block MPTCP traffic either purposely or accidentally. Based on the feasibility analysis, three deployment challenges emerge:

#1. No demand: Network performance is sufficient for the end users even without the deployment of MPTCP.

#2. Lack of OS support: OS vendors perceive the costs to implement and maintain MPTCP code and provide support for end users larger than the revenue it brings as an additional OS feature.

#3. Chicken-egg problem: Content providers do not start providing MPTCP services since there are no consumers with MPTCP, while consumers do not adopt MPTCP due to lack of services using it.

Page 69: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

46

5.1.3 Strategies to foster the deployment of MPTCP

Potential solutions for the identified deployment challenges can be identified as follows. The numbers in parentheses refer to the challenges.

Application implementation (#1, #2) The participation of the OS vendors would not be required if the functionalities of MPTCP would be implemented directly into applications or as middleware. Attractive applications benefiting from MPTCP could also accelerate consumer adoption by increasing the intentional adoption.

Lobbying (#2) Since incentivizing the OS vendors to implement MPTCP is crucial, lobbying could be one solution to increase the knowledge of MPTCP and its benefits among OS vendors.

Open source implementation of MPTCP (#2) Implementing MPTCP in an open source OS, such as Linux, could be used to create competitive pressure and demonstrate the benefits and feasibility of MPTCP for the vendors of commercial operating systems. The developers of MPTCP have utilized this strategy (Barre et al., 2011).

Both ends in one hand (#3) A simple way to solve the chicken-egg problem is to change the value network so that a single stakeholder controls both the mobile devices and the content servers. Apple has followed this strategy by pushing MPTCP to iPhones along with the iOS 7 update (Bonaventure, 2013).

Proxy implementation (#3) If the diffusion of MPTCP to consumers is slow or acquiring multihoming infeasible for them, MPTCP could be implemented in an ISP-provided proxy. This change in both technical architecture and value network would increase the role of ISPs and introduce new incentives to them.

5.2 Host identity protocol

Host Identity Protocol (HIP) is a network layer protocol developed by the HIP WG of the IETF, which proposes a persistent identity for a networking device to identify it independently of its location (Moskowitz et al., 2008). The core purposes of HIP can be generalized around five functionalities. In brief, HIP 1) secures network data flows of applications, 2) improves IPv4-IPv6 interoperability, 3) supports NAT traversal, and enables 4) mobility and 5) multihoming. As illustrated in Figure 11, the same functionalities are also available in other protocols, but HIP provides all of them within a single protocol. The technical details of HIP are described, for example, by Nikander et al. (2010).

Page 70: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

47

Figure 11. Substitute technologies positioned against the functionalities of HIP (Publication V).

Despite significant R&D efforts and publication of the experimental standard already in 2008, the deployment of HIP is minimal. Therefore, the feasibility analysis framework was applied in Publication V for studying the feasibility of HIP with an extensive interview study. Contrary to the forward-looking MPTCP case identifying the potential deployment challenges of a protocol under development, the HIP case demonstrates the application of the framework on analyzing the actual reasons for non-deployment of a recently standardized protocol that is still developed further.

5.2.1 Deployment of HIP

Before conducting the interview study, the deployment actions of HIP were identified. Deployment of HIP requires changes both at the end hosts and at the network infrastructure, as visualized in Figure 12. The network components that require mandatory modifications are colored and optional new components for HIP are filled with tilted lines.

As an end-to-end protocol, the largest changes are required to the networking stacks of the client and server devices. These deployment actions include the installation of the HIP and IPsec software modules and updating the DNS resolver to support the new DNS records for HIP. Extensions to the Sockets API and the modifications to the existing applications are optional. Depending on the configuration, the existing firewalls, virtual private networks (VPN) and other mechanisms to control access at the client and server sides may require some extra rules to allow HIP traffic to pass through. The only mandatory action in other networking components is to update the DNS servers to support HIP records. Additionally, HIP rendezvous servers (RVS) or relays can be deployed, if the network environment or the application requires them.

Page 71: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

48

Figure 12. Deployment actions of HIP generally on all network components (top) and in more detail on the end hosts (bottom). Components that require mandatory modifications are colored, whereas optional modifications and new infrastructure are filled with tilted lines (adapted from Publication V).

5.2.2 Feasibility of HIP

The feasibility of HIP was studied based on an extensive interview study involving 19 networking technology and business experts representing different stakeholders. A formal, structured interview process with a predefined set of questions was created based on the feasibility analysis framework and the understanding of the deployment process of HIP. Each interview lasted 45–100 minutes and covered the following main categories: (1) background questions about the interviewee, (2) reasoning why HIP has not been widely deployed, and (3) discussion of deployment strategies and use cases for HIP. Since the more detailed question list is not available in the original publication, but is believed to be valuable for the future appliers of the feasibility analysis framework, it is included as Appendix 1 of this dissertation.

The main goal of the interviews was to identify and prioritize the reasons for the lack of success in HIP deployment. First, each interviewee was asked to elaborate freely, why HIP has not been widely deployed yet. A set of high-level, open-ended questions was used to make sure that all the possibly relevant factor categories were covered. Second, the interviewees were asked to evaluate the importance of 14 pre-identified reason candidates collected from the literature and discussions with HIP developers (Table 6).

Ethernet

IPv6

Socket

Application

TransportLayer

Layer

Layer

HIPLayer

NetworkLayer

LinkLayer

IPv4

802.11 ..

TCP UDP

IPsecHIP

IPv4 API IPv6 API DNS

Application

HIP API

Page 72: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

49

Table 6. Importance of 14 pre-identified reasons for the non-deployment of HIP on scale 1–5 (low–high) with ‘‘No answer’’ (NA) also as an option. Median values are bolded. N = 16. (Publication V)

# Reason for non-deployment 1 2 3 4 5 NA 1 HIP is missing a killer application. 0 0 4 7 5 0 2 Substitute technologies (possibly already been deployed) are favored. 1 1 3 9 2 0 3 Chicken-egg problem (i.e., no one adopts HIP because early adopters do

not gain immediate benefit) 2 2 4 4 3 1

4 HIP is a too big change and people favor point solutions solving a single problem

1 5 3 3 4 0

5 Lack of stable mainstream implementation discourages adoption 2 3 3 4 3 1 6 Real-world deployability not taken into account from the first day on due

to research-mindedness 4 1 4 6 0 1

7 There is no real demand for HIP 5 2 2 4 3 0 8 Decision-makers are not aware of HIP or they have misinformation 5 2 4 1 3 1 9 Company policies or personal frictions in the IETF hinder deployment 6 2 4 2 2 0

10 Experimental track status discourages adoption 7 2 4 2 1 0 11 Managing identities is too problematic 7 2 1 3 0 3 12 HIP is too late 7 3 0 3 0 3 14 ISPs (or other stakeholders) do not like encrypted traffic 9 4 1 1 1 0 15 HIP is on the wrong layer of the protocol stack 10 2 1 1 1 1 Taking both the answers to the open questions and the ranked list of the

pre-identified reasons into account, the reasons for the non-deployment of HIP can be grouped under six high-level findings:

Reason #1: Demand for the functionalities of HIP has been low. The fundamental problem of HIP is that the business demand for mobility and security protocols in general, and HIP in particular, is lower than anticipated by its developers. As HIP solves multiple interrelated problems, only few use cases share the entire problem space. Moreover, HIP is lacking a killer application that could not be implemented with other solutions.

Reason #2: Substitutes were earlier on the market. The demand problem is aggravated because HIP was introduced and standardized considerably later than its main substitutes Internet Key Exchange (IKE), Mobile IP (MIP), and Transport Layer Security (TLS). These substitutes had reached the acceptance of the standardization bodies and the industry before HIP development even started, thus decreasing the general public’s interested towards HIP.

Reason #3: Substitutes have (perceived) relative advantage due to some design choices of HIP. The design of HIP is suboptimal from the perspective of deployment. For example, HIP suffers from being a general solution, because often a point solution to a single problem provided by its substitutes suffices, performs better, and is easier to deploy. Transparency to applications is another design problem of HIP, because it may cause problems, if applications pass host identifiers to HIP-incapable hosts, known as the referral problem (Henderson et al., 2008). More importantly, applications often want to

Page 73: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

50

control or at least be aware of their traffic since they have better knowledge of transport and application state, and user requirements, than network layer protocols have.

Reason #4: Lack of early adopter benefits requires costly coordination. As a host-to-host protocol requiring adoption on both ends, HIP suffers from the bootstrapping problem typical to networked innovations – the benefits realize only after the critical mass has adopted it. Reaching the critical mass requires costly coordination among its early adopters to reduce the uncertainty related to other stakeholders’ deployment. Additionally, HIP was seen to require too many changes and to involve too many stakeholders if deployed in the public Internet.

Reasons #5: People have misconceptions about the deployability of HIP. HIP suffers from several myths related to its deployability, partly caused by the poor real-life deployability in the beginning of HIP development, which made the people to abandon it as unrealistic. The myth that has perhaps most severely hindered the deployment is that HIP would require changes to the OS kernels, which have high inertia for change due to long OS update cycles and OS vendors’ conservativeness on what to include in their operating systems. Even though the conceptual location of HIP between transport and network layers implies kernel implementation, as the TCP/IP stack is typically implemented in the kernel, HIP can actually be implemented in the userspace, as all HIP implementations demonstrate.

Reason#6: Research-mindedness of HIP developers has lead to strategic mistakes and non-optimal design choices. The focus of many HIP developers has been to develop an architecturally elegant and academically interesting solution instead of solving a pressing business need. This has lead to suboptimal design choices from the perspective of deployment and prolonged the standardization process. Additionally, the commercialization efforts have been insufficient due to the research focus of HIP developers and the lack of involvement of OS vendors – a key stakeholder group – in HIP development.

5.2.3 Strategies to foster the deployment of HIP

After discussing the reasons for non-deployment, the interviewees were asked what could help to overcome the identified deployment barriers. The strategies to foster the deployment of HIP are listed below with mapping to the reasons for non-deployment in parentheses.

Focus on the most promising use cases (#1, #3) Instead of applying HIP to every possible purpose, the developers should focus on the problems and use cases with the highest demand. In other

Page 74: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

51

words, depth-first should be preferred over breadth-first. The most promising use cases were seen to be found from the private deployment scenarios, such as military, public safety and industrial control systems, in which the deployment can be controlled by a single stakeholder and the communications remain in the private network.

Co-deployment within applications (#3, #4) Co-deployment of HIP within an application (e.g., integrated into a web browser) or as application-layer middleware would allow bypassing the OS vendors that are not currently interested in implementing HIP, and enable partial deployment for applications. This suggestion actually led to a library implementation of HIP (Gu, 2012). A related action would be to enable better control to applications by improving the APIs between HIP and applications.

(Company-driven) education, marketing and deployment (#5, #6) Education is needed to bust the myths concerning the poor real-life deployability of HIP. The ongoing transformation of HIP RFCs from experimental to standards track is one effort in this path. The deployment issues are taken into account in the updated RFCs, since the results of Publication V are summarized in the Section 11.3 of the RFC4423-bis (Moskowitz & Komu, 2014). A successful, company-driven real life deployment on the public Internet could be even a better way to spread the information and increase the credibility of HIP.

5.3 Constrained application protocol

Constrained Application Protocol (CoAP) is a web transfer protocol developed by the CORE working group of the IETF (Shelby et al., 2014). CoAP provides a simpler alternative to the widely used HyperText Transfer Protocol (HTTP) for connecting resource-constrained smart objects to the Web (Bormann et al., 2012). Compared to HTTP, CoAP offers numerous potentially beneficial features when implementing Web of Things (WoT) applications, among which are a compact binary header, UDP-based transport with simple reliability provisions, built-in resource discovery, and a push mechanism with subscriptions to information (Shelby, 2010; Colitti, et al. 2011). The standardization of CoAP is being finalized and the use of the protocol in commercial products is still due.

The forthcoming competition between CoAP and HTTP for the position of the dominant design in future WoT applications motivated a comparative techno-economic analysis of CoAP and HTTP in Publication VI. Since the functionality of CoAP and HTTP is very similar and minimizing the total cost of a connected smart object is one of the main objectives of CoAP, the

Page 75: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

52

feasibility analysis focused on the cost-efficiency. The goal was to first identify the cost components and sources for potential cost differences between CoAP and HTTP, and then investigate application scenarios in which the use of CoAP is cost-advantageous as compared with HTTP. Consequently, this case demonstrates how the feasibility analysis framework can be used for separating the more attractive use cases from the less attractive ones.

5.3.1 Technical architecture of WoT applications

The cost analysis started with describing the technical architecture of a typical WoT application, where the resource-constrained smart objects communicate through access points with web servers residing in the public Internet. A CoAP-HTTP proxy is an optional software component in the architecture, which can be used to translate between CoAP and HTTP if the smart objects speak CoAP, but the server understands only HTTP. This architecture enables three deployment alternatives depicted in Figure 13:

1) CoAP end-to-end (CoAP), 2) HTTP end-to-end (HTTP), and 3) CoAP between smart objects and the proxy, and HTTP between the

proxy and web servers (CoAP-proxy).

Figure 13. Technical architecture for all of the cases under comparison (Publication VI).

As illustrated in the figure, the protocol stacks differ between the deployment alternatives. CoAP uses UDP as the transport layer protocol, whereas HTTP uses TCP. This has implications for the CoAP-proxy case as well, since the protocol translation is required both at the transport and application layers.

Web servers

CoAP-HTTP proxy software

(Optional)

Smart objects

Access points

Site 1

Site N Site 2

Local area radio Wide area radio / Fixed

CoAP

UDP

IPv6 IPv6

IEEE 802.15.4 Cellular radio / Ethernet

CoAP / HTTP

UDP / TCP

IPv6 IPv6

CoAP / HTTP

UDP / TCP

IPv6

IEEE 802.15.4 Cellular radio / Ethernet

CoAP

UDP

IPv6

HTTP

TCP

1 & 2

3

Proxy in web server

Page 76: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

53

Additionally, the communication between smart objects and web servers can use two modes of communication. In the pull mode, the smart object acts as a server awaiting the requests from a remote node, and responds to the requests with the information required, e.g., by delivering the instant sensor reading. The smart object is non-sleeping as it shall always be ready to promptly respond to an incoming request. In the push mode, the smart object acts as a client and periodically sends the information to a remote web server. The smart object is mainly sleeping and awakes only when it needs to communicate the information.

5.3.2 Total cost of ownership model for WoT applications

The identified technical architecture was used for creating a total cost of ownership (TCO) model. TCO analysis represents a systematic analytical tool for understanding the total lifetime costs of goods or services (Ellram, 1993). As opposite to a simplistic cost analysis limited to the acquisition price, the TCO analysis covers the key cost constituents of pre-acquisition, acquisition, possession, use, and disposal (Ellram, 1995; Ferrin, 2002). Covering the total lifetime costs was seen particularly important in this case, since the cost-efficiency improvements of CoAP relate mostly to the operational costs. TCO was selected as the cost analysis framework also because the general cost categories of IT investments are available in the existing literature and because TCO enforces detailed inspection of the technical architecture, both improving the probability that all the important cost factors are included in the analysis.

In the constructed TCO model, the costs are calculated separately for each group of technical components: smart objects (S), access points (A), web servers (W), and the optional proxy component (P). System level costs that cannot be naturally assigned to technical components are listed as other costs (O). The total cost of ownership can be expressed as the sum of the costs for the separate cost components:

, (1) where n, m and l denote the number of smart objects, access points and web servers in the installation.

Following David et al. (2002), the costs of each main cost category are divided into acquisition ( ) and operating costs ( ). The acquisition costs covering the purchase and installation of the technical components are further divided into hardware ( ), software ( ) and connectivity setup ( ) costs. The operational costs include hardware and software maintenance ( ), connectivity ( ) and supply ( ) costs. As a result, the cost function for each of the cost categories can be expressed as:

(2)

Page 77: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

54

where C is replaced with S, A, W, P, and O. The detailed mathematical formulation of each cost component is presented in Publication VI.

Table 7 summarizes the cost components and the notation of the TCO model. N/A denotes that the cost component is non-applicable (i.e., the cost is zero). The potential sources for cost differences between CoAP and HTTP are highlighted with boldface and introduced in more detail in Section 5.3.3. The TCO model can be applied to assess the costs of various WoT solutions, as well as to compare the cost implications of using different communication protocols, software interfaces, and other technical alternatives of WoT solutions. The model is sufficiently generic to be used also outside of WoT applications, since the technical architecture of IT systems typically consists of clients (S), middleboxes (A and P), and servers (W), which are the key components of the model.

Table 7. Generic TCO model for a WoT application: technical components and related cost components. The sources for potential cost differences between CoAP and HTTP are highlighted with boldface. (Publication VI)

Cost component

Smart object ( )

Access point (A)

Web server ( )

CoAP-HTTP proxy ( ) Other ( )

Acquisition cost – HW ( )

Purchase, install

Purchase, install

Purchase, install Purchase

Transaction costs

Acquisition cost – SW ( )

Develop, install

Develop, install

Develop, install Develop

Acquisition cost – Connectivity setup ( )

N/A Subscription setup fee

Subscription setup fee N/A

Operational cost –Maintenance ( )

Battery, HW, SW HW, SW HW, SW HW, SW

Admin, Training, Support

Operational cost –Connectivity fee ( )

N/A Monthly fee Monthly fee N/A

Operational cost –Supplies ( ) N/A Electricity,

Premises Electricity, Premises N/A

5.3.3 Cost-efficiency of CoAP in WoT applications

The created TCO model was used for comparing the cost-efficiency of CoAP and HTTP in the context of an exemplary environment monitoring application scenario. This scenario considers the deployment of autonomous stations for environment monitoring (e.g., Adcon (2013)) that regularly transmit the measurements of temperature, humidity, solar radiation, wind and precipitation, and air quality to the web server.

Table 8 lists the descriptive parameters for the baseline scenario. The values for the individual cost components and the parameters affecting them were estimated using multiple sources of information, including academic and trade literature, own power consumption measurements, and expert interviews. These values are introduced in Publication VI.

Page 78: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

55

Table 8. The descriptive parameters of the baseline scenario (adapted from Publication VI).

Parameter Value Mode of communications Push Connectivity pricing scheme Flat-rate Number of smart objects in one installation 10 000 Number of smart objects per site 50 Lifetime of the application 20 years Frequency of communication 1/min Site visit cost €129

The TCO comparison calculation for the baseline scenario is presented in

Table 9. With the chosen values, the CoAP-based solution is 6.5% less expensive than the HTTP-based. This is explained by three reasons:

i. The acquisition costs of smart objects are smaller with CoAP due to the more modest memory and processor requirements allowing the use of cheaper HW. This also reduces the HW maintenance costs.

ii. The lower energy consumption of CoAP smart objects, due to the smaller number of bits transferred, translates into smaller number of battery replacements (2 vs. 7) during the lifetime of the application, thus reducing the HW maintenance costs significantly.

iii. The notably smaller traffic volume of CoAP (1:7) allows the use of a cheaper hosting service, even though the absolute difference in the web server costs is small. The higher development costs of the CoAP stack, due to the better availability of SW implementations, documentation and developers for HTTP, reduce this difference.

Table 9. TCO comparison between CoAP and HTTP for the baseline scenario (adapted from Publication VI).

Cost component CoAP (€) HTTP (€) Diff. (€) Diff. (%) Smart object costs Acquisition 540 000 590 000 -50 000 -8.5% Maintenance, battery 123 600 432 600 -309 000 -71.4% Maintenance, hardware 3 580 000 3 680 000 -100 000 -2.7% Maintenance, software 100 000 100 000 - - Total smart object costs 4 343 600 4 802 600 -459 000 -9.6% Access point costs Acquisition 152 600 152 600 - - Maintenance, hardware 251 600 251 600 - - Maintenance, software - - - - Connectivity (flat-rate) 720 000 720 000 - - Supply 161 959 161 959 - - Total access point costs 1 286 159 1 286 159 - - Web server costs Total web server costs 317 600 354 400 -36 800 -10.4% Other costs Total other costs 1 220 000 1 220 000 - -

Total cost of ownership 7 167 359 7 663 159 -495 800 -6.5%

Access point costs account for a significant share of the TCO in the

baseline scenario, but there is no difference between CoAP and HTTP, since

Page 79: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

56

the connectivity is flat-rated (and since single access point per site suffices). This changes, if the connectivity pricing is volume-based. Together, 10 000 smart objects require 62 GB and 434 GB of data to be transferred monthly with CoAP and HTTP, respectively. By applying the tiered M2M pricing scheme of Sprint (2013), the communication costs become the most influential cost differentiator between the protocols, as shown in Table 10. Thus, a fourth reason for choosing CoAP over HTTP emerges:

iv. The notably smaller traffic volume (1:7) enabled by CoAP translates into significant savings in connectivity costs in the case of volume-based pricing.

Table 10. Comparison of the flat-rate and volume-based pricing in the baseline scenario (Publication VI).

CoAP (€) HTTP (€) Diff. (€) Diff. (%)

Connectivity costs Flat-rate 720 000 720 000 - 0,0% Volume-based, tiered pricing of Sprint 225 271 1 576 898 -1 351 626 - 85.7%

Total Cost of Ownership Flat-rate 7 167 359 7 663 159 -495 800 -6.5% Volume-based, tiered pricing of Sprint 6 672 630 8 520 057 -1 847 426 -21.7% After analyzing the baseline scenario, a sensitivity analysis was performed

to mitigate possible inaccuracies of individual estimates and to identify the characteristics of the more attractive application scenarios for CoAP. The descriptive parameters of the baseline scenario listed in Table 8 were varied one at a time to analyze, how the relative difference (%) in TCO between the CoAP and HTTP behaves. The relative difference is calculated by dividing the absolute difference (€) in the TCO by the TCO of HTTP.

The findings of the sensitivity analysis are illustrated in Figure 14. The relative cost-difference between CoAP and HTTP increases along with the increasing volume of communications, controlled by the communications frequency (a) and the number of smart objects (b). This is particularly true with volume-based pricing. The distribution of smart objects across the sites (c) affects the relative cost difference due to the differences in the scalability of access points. Because every bit of traffic makes a difference in the 802.15.4 networks that are limited in channel capacity, the larger overhead due to HTTP and the larger number of packets due to TCP impede the network scalability as compared with CoAP+UDP. However, the impact on relative cost is rather small and starts to matter only when the number of smart objects per site is higher than an HTTP access point can support (100). Finally, the impact of the site visit cost (d) – approximating the distance between the sites and the headquarters – depends on the number of sites, controlled by the number of objects per site in the model. With a

Page 80: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

57

large number of sites, the relative cost difference between CoAP and HTTP increases along with the site visit cost, whereas with a small number of sites the impact is opposite.

Figure 14. Impact of different parameters – a) frequency of communications, b) number of smart objects, c) number of smart objects per site, and d) site visit cost – on the cost difference between CoAP and HTTP (adapted from Publication VI).

To summarize, the results of the TCO analysis suggest that: i. CoAP is more cost-efficient in applications with a high number of

smart objects, each engaged in frequent communications sessions. ii. CoAP is more cost-efficient in case the smart objects are deployed in

the field, thereby incurring significant costs of battery replacements. iii. The use of CoAP allows the cost of the applications to be decreased

dramatically if the charging for the data communications is volume-based.

iv. The use of CoAP is more beneficial in case the smart objects are awake only occasionally for initiating the communication sessions (push mode), as opposite to the case where the smart objects are awake waiting for incoming communication requests (pull mode).

Page 81: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Case studies on protocol feasibility

58

Page 82: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

59

6. Discussion

This chapter builds on the results presented in Chapters 3-5. First, the contributions of this dissertation are summarized and their implications are discussed. Then, the reliability and validity of the results are estimated by considering the limitations of the research. Finally, the topics for future research are suggested.

6.1 Contributions and implications

On a general level, the contribution of this dissertation can be summarized in the following thesis that answers to the high-level research question on how to improve the feasibility of Internet protocols:

Successful deployment of Internet protocols depends on their feasibility for all the stakeholders participating in protocol deployment. Therefore, in order to improve the success rate of the protocol deployment, the techno-economic feasibility analysis of Internet protocols should be practiced systematically from the beginning of the protocol development, span throughout the different steps of protocol deployment, and cover all the relevant stakeholders.

On a more detailed level, this dissertation contributes by increasing the

understanding of the dynamics of protocol deployment and the factors affecting the feasibility of Internet protocols. Additionally, the dissertation develops methods for analyzing the deployment and feasibility of Internet protocols. These can be summarized in three core contributions that correspond the three research questions posed in Section 1.2:

1. Conceptualization of protocol deployment as a measurable process. 2. Development of methods for analyzing the feasibility of Internet

protocols. 3. Identification of factors affecting the feasibility of three protocol

cases: MPTCP, HIP, and CoAP.

Page 83: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

60

These contributions and their implications are described in more detail in the following subsections and summarized in Table 11.

Table 11. Summary of contributions.

Research topic

Substance area specific contributions

Theory and method contributions

Managerial and practical implications

Protocol deployment process

Identification of different deployment models for Internet protocols: • pre-installation, • post-installation, and • update installation. Analysis of the deployment of 11 protocols in the Finnish mobile market from 2003 to 2012. Identification of large gaps between the possession and usage levels of protocols.

Identification of unintentional adoption as a new adoption model that reduces the impact of network effects. Confirmation of the significant role of supply-driven dissemination on the diffusion of technological components. Development of a framework for measuring the deployment of Internet protocols.

Protocol adoption should be studied by measuring the actual usage of a protocol instead of using the acquisition of protocol-containing hardware and software products as a proxy for adoption. Understanding the pros and cons of each deployment model helps in choosing the optimal deployment strategies.

Feasibility analysis methods

Demonstrating the application of the feasibility analysis framework with MPTCP case. Demonstrating the application of expert interviews, system dynamics and TCO analysis to Internet protocols.

Development of a framework for analyzing the feasibility of Internet protocols. Formation of a research method toolbox applicable with the framework.

Systematic feasibility analysis facilitates protocol deployment and allows more optimal allocation of the R&D resources. Importance of multi-disciplinary teams both in protocol development and feasibility analysis.

Case studies on protocol feasibility

Analysis of the feasibility of MPTCP, CoAP, and HIP. Identification of new factors affecting the feasibility of Internet protocols: • Protocol’s transparency to

applications • Implementation location

of a protocol and the related trade-off between generality & deployability.

• Stakeholders’ subjective perceptions and misconceptions.

Classification of potential strategies to improve the feasibility of protocols.

Confirmation that several earlier identified factors affecting innovation diffusion are also relevant with Internet protocols. Applying several analysis methods first time to Internet protocols.

The results led to a library implementation of HIP and were also included in its updated specification. Importance of taking the potentially misaligned interests of different stakeholders into account. Focus first on the problems and use cases with highest demand and net benefit, still keeping in mind the protocol’s extensibility. Involving all the relevant stakeholders already during the protocol development is vital for the success of a protocol.

6.1.1 Protocol deployment process

Deployment of Internet protocols is a complex process that consists of several successive steps, involves multiple stakeholders, and varies depending on the deployment environment and the protocol in question. The nature of Internet protocols as software components embedded in applications, operating systems, or devices further complicates the deployment. Contrary to the adoption of simple consumer goods typically analyzed by the innovation diffusion literature (Rogers, 2003), the protocol adoption is not necessarily based on a conscious decision-making process

Page 84: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

61

concerning the protocol itself. The identification of the importance of unintentional adoption alongside device acquisitions or software updates adds a new dimension to the diffusion of innovations theory. In case of strong unintentional adoption typical among consumer end users, the protocol diffusion rate is largely defined by the provider decisions to include the protocol in products. This supports the finding of Kivi (2011) that the supply-driven dissemination plays a significant role on the diffusion of technological components. Moreover, the unintentional adoption decreases the impact of network effects on the protocol diffusion among unintentional adopters (e.g., consumers), which also has an impact on the adoption by intentional adopters (e.g., content providers) through the cross-side network effects.

Measuring deployment is important for analyzing the dynamics and identifying the bottlenecks of protocol deployment. Therefore, this dissertation developed a framework for measuring protocol deployment by dividing the deployment to the provider side steps of i) implementation and ii) commercialization and the end user sides steps of iii) acquisition and iv) adoption, and identifying deployment measures and data sources for each step. The deployment measures include both the deployment levels, such as availability level, possession level and usage level, and the gaps and delays between the different deployment levels, known as deployment gaps. Because the deployment levels define the success of a protocol in each step and the gaps help identifying the bottlenecks of protocol deployment, a complete analysis of the success of protocol deployment should involve both deployment levels and gaps.

Since the dynamics of protocol deployment and the sources for the measurement data differ depending on in which product the protocol is implemented and included, the framework identifies three different deployment models – pre-installation model, post-installation model, and update installation model. The interplay of technology-push and market-pull, the protocol’s role in the product acquisition decision, and the product replacement and update cycles may vary between the deployment models, affecting the dynamics of protocol deployment.

The application of the measurement framework to analyze the deployment of 11 pre-installed protocols in the Finnish mobile market from 2003 to 2012 confirms some of the earlier findings and provides understanding of the dynamics of protocol deployment along the pre-installation model. The protocol deployment is generally driven by applications, such as web browsing, email or video streaming. The results illustrate the slowness of the deployment along the pre-installation model and the differences in the gaps and delays on both the provider and end

Page 85: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

62

user sides. For example, the delay from the high provider-driven availability level to the similar possession level of the end users was years in the case of email protocols. In addition, a high possession level does not necessarily translate into actual use, as the identified large gaps between the protocol possession and usage levels of email protocols and HTTP show. This result extends the assimilation gap concept proposed by Fichman and Kemerer (1999) from organizational innovation adoption to consumer adoption. It also supports the notion of this dissertation that the protocols are often acquired unintentionally alongside handset acquisitions motivated by other reasons than the protocols. Consequently, protocol adoption should be studied by measuring the actual usage of a protocol instead of using the acquisition of protocol-containing hardware and software products as a proxy for adoption.

6.1.2 Feasibility analysis methods

As stated in the thesis of this dissertation, techno-economic feasibility analysis should be practiced systematically from the beginning of the protocol development, span throughout the different steps of protocol deployment and cover all the relevant stakeholders. Thus, one of the main contributions of this dissertation is the development of a framework for analyzing the feasibility of Internet protocols by combining the findings of existing literature with the cumulated experience from the protocol case studies. The cornerstone of the feasibility analysis along the framework is the proper understanding of the protocols’ technical design, features, and performance, which are then translated into the stakeholders’ costs and benefits in order to analyze the incentives of all the relevant stakeholders for participating in protocol deployment. Also the constantly changing deployment environment including the substitute solutions and other external factors need to be taken into account due to their large impact on the feasibility of the protocols. This kind of systematic and iterative feasibility analysis allows the early identification of the deployment challenges and related solutions, which facilitates protocol deployment. If applied widely to the new Internet protocols, the feasibility analysis could also allocate the R&D resources more optimally by separating the more promising protocols from the less promising ones in the early phase of protocol development.

In addition to suggesting the high-level process description for the techno-economic feasibility analysis and demonstrating its application to protocol cases, the dissertation constructs a toolbox providing practical tools for conducting the analysis along the framework. Several of these analysis methods were applied in the case studies of MPTCP, HIP and CoAP

Page 86: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

63

first time for analyzing the feasibility of Internet protocols. System dynamics applied for analyzing the diffusion of MPTCP to consumers and content providers turned out to be a very useful tool for simulating the impact network effects on the protocol adoption. The extensive interview study conducted for HIP provides a template that could be followed when studying the feasibility of other protocols. The interviews were also used with other cases as they proved to be particularly useful for investigating the stakeholders’ incentives that are difficult to find from other sources, especially before the deployment has occurred. Finally, the TCO analysis typically used in supplier selection was applied to a new context of technology selection for analyzing the cost-efficiency of CoAP. The constructed TCO model can be used to analyze the TCO of various WoT application scenarios and technological options not limited to CoAP. Arguably, the model is sufficiently generic to be used also outside of WoT applications, as the architectural elements considered in the model can be identified in a variety of IT systems.

Two target groups should be interested in analyzing the feasibility of Internet protocols. Firstly, the improved understanding of the stakeholders’ incentives helps protocol developers to avoid design decisions leading to non-deployment and take strategic actions to facilitate the deployment. Secondly, deploying stakeholders can make more informed deployment decisions, if they understand, whether the other involved stakeholders are interested in doing their part. Organizations belonging to the mentioned target groups participate in the IETF standardization, and therefore, researchers and engineers in the IETF could be the first potential users of the feasibility analysis framework. Some of the working groups in the IETF have already been studying the use cases and deployment considerations of certain protocols, but the framework provides a more holistic and systematic baseline for such studies. In the best case, the framework could construct guidelines for the deployment considerations that could become a similar, mandatory part of an RFC as the security considerations are.

Even though the feasibility analysis framework has been targeted for people with technical background, the full understanding of the framework and related analysis tools may require some experience on economics, and Internet market dynamics, or support from people familiar with these topics. Typically, a more elaborate analysis can be conducted, if the developer of the analyzed protocol joins the feasibility study with the support of people with business-oriented background. Research projects should encourage this collaboration by avoiding separation of technical development and socio-economic research. However, sometimes the collaboration may be challenging due to the different and potentially

Page 87: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

64

conflicting terminology and concepts. Therefore, the techno-economic feasibility studies of protocols also require people with multi-disciplinary expertise to fill the gap between engineers and business managers.

6.1.3 Factors affecting the feasibility of Internet protocols

The case studies of MPTCP, HIP and CoAP represent the most direct contribution to improve the feasibility of Internet protocols. All of these protocols were still under development during the case studies were made, thus maximizing their potential for improving the feasibility of studied protocols. Moreover, the case studies were conducted in close collaboration with the protocol developers that contributed to the studies either as authors (MPTCP, HIP) or interviewees (HIP, CoAP). Therefore, the results were immediately available to the protocol developers. For example, the results of HIP study led to a library implementation (Gu, 2012) and were also included in the updated version of the protocol specification (Moskowitz & Komu, 2014).

The case studies of MPTCP and HIP identify several factors affecting the feasibility of the studied protocols. Both studies highlight the market demand as the most important factor, because without demand the perceived benefits remain low. Similarly, they observe the general reluctance of OS vendors to include new Internet protocols into their operating systems due to the costs to implement and maintain the code and provide support to end users. The other factors hampering the feasibility include the bootstrapping problem where the benefits exceed the costs for early adopters, the presence of strong incumbent substitutes in the market, and the middleboxes blocking the traffic of new protocols. Since all of these factors have been reported in earlier studies in the context of other protocols, or innovations in general, this dissertation contributes by confirming their existence and explaining thoroughly their details and relative importance in the studied cases. However, the dissertation identifies also new factors that have not been discussed widely in the existing literature. The following paragraphs discuss their potential wider meaning to protocol development.

The underlying assumption of this dissertation, shared by the IETF community in general, is that the protocols standardized in the IETF are developed to solve actual real-life problems of companies and consumers. In this case, deployment is the measure for success (Thaler & Aboba, 2008). However, the protocol developers may also have other motives, such as to research an interesting, theoretical problem or write academic theses. Then also the metrics for success are different, such as the number of published research papers. For example, HIP would be perceived more successful if

Page 88: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

65

considered from research perspective. Consequently, the developers and investors spending money and effort on protocol development should consider carefully how to handle the potentially misaligned interests of research-driven academic institutions and profit-driven companies, both participating in protocol development.

Earlier studies on protocol adoption have identified the importance of value network issues during the deployment and adoption of a protocol. The results of case studies propose that they are important already during the protocol development. The too narrow stakeholder composition in HIP development lacking the OS vendors suggests that a failure to involve all the relevant stakeholders already during the protocol development may hamper the success chances of a protocol. Because the research orientation of HIP development was found to be one reason for non-deployment, an interesting topic for future research would be to study how the stakeholder composition during the protocol development (i.e., research-driven vs. business-driven development) affects the success rate of protocols.

Transparency of network and transport layer protocols to the applications is an important factor in the protocol design affecting their feasibility towards the application developers that could build their applications on top of them. On the one hand, the transparency is desirable as it allows application developers ignore the lower-layer protocols, thus enabling interoperability with legacy applications without modifications. On the other hand, the transparency may not always be a virtue as demonstrated by the HIP case, because applications often want to influence, control or at least be aware of their traffic due to their better knowledge over transport and application state, and user requirements. Therefore, the developers of lower layer protocols should consider avoiding full transparency and specify optional APIs providing better control to applications.

The trade-off between the generality and deployability of protocols in relation to the protocol stack layering is an important topic that relates to the optimal implementation location of Internet protocols from the perspective of successful deployment. The case studies confirm the well-known deployment challenges of network and transport layer protocols intended to be included in the networking stacks of operating systems. However, the logical architectural placement of a protocol in the networking stack and its software realization within an operating system is a topic that to our knowledge has not been widely discussed before. The HIP implementations show that with the present microkernel OSes, the protocols that conceptually belong to the network layer, may not require kernel modifications, but could be implemented in the userspace or as application-layer middleware. Especially the application-layer middleware

Page 89: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

66

approach, successfully followed by, e.g., TLS, seems like a valid compromise between the generality and deployability as it can provide functionalities to applications as a service, but is easier to deploy than changes to the OS kernels, while also giving better control to applications. Despite the fact that the implementation in the kernel would be desirable eventually due to, e.g., performance issues, implementing the protocol first closer to applications would enable easier experimentation for the potential adopters and thus help in demonstrating the feasibility of the protocol.

The technology acceptance studies (e.g., Davis, 1989) conducted in the context of consumer product adoption acknowledge the determining role of the potential adopters’ subjective perception of the product’s characteristics for the success of the product. Contrary to this, the earlier protocol adoption studies (e.g., Joseph et al., 2007; Jin et al., 2008) studying the utility of the protocols have taken a more objective view based on the rational decision-making typically assumed by economists. The findings concerning the negative impact of misconceptions on HIP adoption challenge this perspective and propose that also protocol developers should consider more carefully, how the relevant stakeholders perceive their protocols. Also the misconceptions among protocol developers seem to hamper protocol deployment. The HIP case confirms the finding of Rogers (2003) that the pro-innovation bias among enthusiastic developers often leads to a misconception that an innovation should be applied ubiquitously. Quite to the contrary, this dissertation suggests that it is beneficial to focus on the problems and use cases with highest demand and net benefit, still keeping in mind the extensibility of the protocol that would allow ‘‘wild success’’ beyond the original scope and scale (Thaler & Aboba, 2008). To put this in the terms of algorithm designers, depth-first may be more favorable than breadth-first.

In addition to identifying the factors affecting the feasibility of Internet protocols, and leading to deployment challenges, the dissertation contributes also by suggesting a wide range of potential solutions to these challenges. The feasibility analysis framework divides the solutions to five categories based on their impact point. Firstly, a fundamental problem in the protocol design may require changes to the protocol design. For example, the developers of HIP implemented an extension to solve the identified NAT traversal problem. Secondly, scoping the protocol to the most promising use cases also improves its deployment chances. This solution was applied in the case study that identified CoAP being most feasible from the cost perspective in the application scenarios where the smart objects either are large in volume, are deployed in the field, communicate frequently over connections charged based on the transferred

Page 90: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

67

data volume, or are sleeping between the communication sessions. Thirdly, changing the technical architecture can improve the feasibility by eliminating problematic deployment actions, as exemplified by the suggested implementation of MPTCP and HIP directly in applications or middleware instead of operating system implementations. Fourthly, the misalignment of costs and benefits among stakeholders can be solved by changing the value network through the introduction of value transfers and incentive mechanisms, or reallocating roles among stakeholders. The “both ends in one hand” strategy suggested for MPTCP, and implemented by Apple in its iOS 7 operating system and Siri service (Bonaventure, 2003), is an example of value network change that decreases the expensive coordination costs through the reduction in the number of involved stakeholders. Finally, the feasibility can also be improved by affecting the deployment environment through actions like lobbying or creation of alliances supporting the protocol.

The choice of the solution depends on the deployment challenge, the maturity of the protocol and the power of the protocol advocates to impact the aforementioned matters. Table 12 summarizes the solution categories by introducing the challenges they tackle and providing examples of the solutions.

Table 12. Solutions to the typical deployment challenges of Internet protocols.

Solution Examples: from deployment challenges to solutions

Change protocol design

Middlebox traversal problem Lack of backwards-compatibility Transparency to applications

Develop middlebox traversal extension Introduce protocol converters Develop APIs

Change use case

Initial use case infeasible Too many use cases

Select more promising use case Narrow the scope of the protocol

Change technical architecture

OS vendors do not implement Slow diffusion to end users Performance bottleneck

Implement protocol in apps/middleware Implement functionality in a proxy Move from centralized to distributed architecture

Change value network

Misaligned costs and benefits Stakeholder refuses to deploy Coordination too expensive

Introduce value transfers & incentive mechanisms Reallocate the roles among stakeholders Reduce number of actors (both ends in one hand)

Affect deployment environment

Benefits not observable Misconceptions about protocol Legislation hinders deployment

Implement protocol in an open source OS Bust the myths through education and marketing Lobby the decision-makers to change laws

6.2 Limitations

This dissertation has some limitations that need to be taken into account when interpreting the obtained results. Firstly, the results are based on a limited number of protocol case studies. Moreover, the deployment of each protocol has its own context consisting of issues such as the deployment environment, stakeholder constellation and deployment time. Consequently, the results concerning the factors affecting the deployment of case protocols should be generalized with caution. The developed

Page 91: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

68

methods for analyzing the deployment and feasibility of Internet protocols – including the interview study approach, TCO model, feasibility analysis framework, and measurement framework – can be more easily generalized outside of their original scope. The methods are generic enough to be used for analyzing at least the proprietary protocols in addition to the standardized ones, and potentially also other networked innovations, such as mobile services.

Secondly, the context specificity of Internet protocols, combined with the immaturity of analyzed protocol cases, limited the availability of data and increased their uncertainty. In order to overcome the uncertainty, the qualitative findings were confirmed from multiple sources and sensitivity analysis was conducted for quantitative results. Due to the heavy usage of expert interviews in the case studies, a large share of the results is based on the limited knowledge and subjective opinions of interviewed experts as interpreted by the interviewer. Moreover, the interviewees were largely technical experts involved in protocol development. Consequently, the results are potentially biased towards technical issues.

Thirdly, the efficiency of the developed feasibility analysis framework, and feasibility analysis in general, has not been proved mathematically due to the limited number of analyzed protocol cases for which the outcome has not been broken yet. Moreover, the heterogeneity of the protocol cases makes it difficult to isolate the impact of the framework from the impact of other differences between protocols. However, by introducing a systematic way to conduct techno-economic analysis concerning Internet protocols, the framework is actually the first step towards this direction, because statistical analysis requires that a uniform process has been followed for a sufficiently high number of protocols.

Fourthly, one could argue that many of the deployment challenges could be identified without the suggested framework by using the public and tacit knowledge of typical deployment problems. This may be possible for the seasoned protocol developers familiar both with the technology and the rules of business, but the framework gives an opportunity also for the less experienced developers to inspect the feasibility of their solutions. Therefore, an initial validation of the framework was conducted by university students who applied it to seven different protocols. Examples of these studies include a master’s thesis (Tabakov, 2014) and a conference paper (Ilaghi et al., 2014) that analyze the feasibility of web real time communications (WebRTC) and CoAP, respectively. The received feedback was positive and led to the refinement of the framework. Additionally, the increasing interests towards techno-economic analysis in the European Commission research projects supports the notion of its potential.

Page 92: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

69

Finally, the feasibility analysis cannot necessarily predict the outcome of the protocol deployment. The results are always context-specific, thus requiring repeated analysis when the context changes. Some companies may also act irrationally and continue advancing the protocol in order to sell more products and show their technical capabilities, although demand for the protocol would be low. In addition, some of the deployment challenges may become visible only when the deployment occurs, and sometimes the availability of technologies just creates demand, which is hard to understand beforehand. Consider, for example, the famous quote of Thomas J. Watson, the chairman of IBM, in 1943: “I think there is a world market demand for maybe five computers”. Therefore, this dissertation, including the analysis methods developed in it, does not intend to predict the fate of protocols, but rather improve their techno-economic feasibility.

6.3 Future research

The Internet technology and transition (ITAT) workshop organized by the Internet Architecture Board (IAB) in December 2013 is one example of the increased interest in the Internet standardization community towards open discussion of techno-economic issues affecting deployment and feasibility of Internet protocols (Lear, 2014). Public techno-economic analyses could complement the confidential analyses conducted internally by the actors participating in protocol development. The public analyses, potentially utilizing the methods suggested by this dissertation, could provide a wider and more objective perspective and enable open discussion of economic incentives instead of hiding that discussion behind the technical argumentation. This, for one, could make the protocol development more effective by improving the success rate of new Internet protocols and allocating the R&D resources more efficiently to the protocols with the highest demand and potential.

The research of this dissertation could be continued to multiple directions. The measurement framework provides a plethora of opportunities for analyzing the dynamics of protocol deployment. The application of the framework could be extended to cover additional data sources, protocols, and markets. For example, network traffic measurements could provide data on usage levels for a larger number of protocols and enable the usage analysis to include the frequency and volume of use. Studying a case where also post- and update installation models were relevant would allow comparing the deployment levels and gaps of different deployment models, thus shedding light on the optimal deployment strategies. The comparison of different geographic or device

Page 93: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Discussion

70

markets could help to explain the role of deployment environment on protocol deployment. Finally, the measurements could be combined with surveys to explain the observed patterns.

The feasibility analysis framework could be further improved by validating it with additional case studies and by adding new analysis tools. The method development should move from qualitative methods towards more quantitative ones. Since the benefits are in general more difficult to analyze, methods for translating the benefits from technical units (e.g., bandwidth, latency, jitter) into economic measures (e.g., time, money, satisfaction) are required. Moreover, the credibility of techno-economic feasibility analysis could be improved by demonstrating its usefulness by either surveying the appliers of the feasibility analysis methods, evaluating the accuracy of the findings made on the case protocols when the outcome of their deployment has unveiled or comparing the success of the protocols for which the feasibility analysis has and has not been conducted.

Also the conducted case studies on protocol feasibility could be extended. The qualitative analyses of HIP and MPTCP could be continued with quantitative cost-benefit analyses, whereas the cost estimates of CoAP study, which rely heavily on the expert judgment, could be complemented with market data. The CoAP study could also be extended to other substitutes than HTTP and include other factors than costs, including the expected benefits, roadblocks, and organizational policies. Additionally, the case studies could evolve from single-protocol perspective towards multi-protocol analyses that take better the dependencies between different protocols into account.

Finally, the techno-economic analysis could be extended outside the scope of this dissertation to analyze how the protocol development and standardization processes at the IETF affect the success of Internet protocols. For example, comparing the market-based approach of the IETF to the committee-based approach of the 3GPP by using parameters such as the quantity, quality and success of the protocols could provide strategies for improving the effectiveness of protocol development. The analysis of the different stakeholders’ activity in the development of different protocols could reveal whether the success of protocols depends on the stakeholder composition or the origin of the idea. In the best case, the analysis of the standardization process could complement the protocol-centric feasibility analyses suggested in this dissertation by improving the effectiveness of protocol development through the better allocation of R&D resources.

Page 94: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

71

Appendix 1: Interview questions of the HIP study

1 Background information 1.1 What is your level of business understanding in the field of networking

technology on scale 1-5 (low-high)? 1.2 What is your level of IETF expertise on scale 1-5 (low-high)? 1.3 What is your level of HIP expertise on scale 1-5 (low-high)? 1.4 What is your attitude towards HIP on scale 1-5 (oppose-support)? 1.5 What is your employer’s attitude towards HIP on scale 1-5 (oppose-

support)? 2 Reasons why HIP has not been widely deployed yet Demand

2.1 How would you define HIP? 2.2 Where is HIP needed? What is HIP developed for?

Technical design / protocol characteristics

2.3 Does HIP’s technical design have some weaknesses concerning deployment?

2.4 Is HIP on the right layer? How does the layer choice affect deployment? Substitute technologies

2.5 Does HIP have some relative disadvantage compared to substitute technologies?

Stakeholders’ incentives

2.6 How do you see HIP’s value for the different stakeholders? What incentives or disincentives do they have to deploy HIP? • OS and end-user device vendors (e.g., Microsoft, Apple) • ISPs and mobile network operators (e.g., Verizon, Vodafone) • Network equipment providers (e.g., Cisco, Ericsson) • Mobility/VPN solution vendors (e.g., Check Point, Sybase) • Server-side: Application service providers (e.g., Google, Facebook) • Client-side: Consumers and companies (e.g., Boeing) • Other stakeholders

Page 95: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Appendix 1: Interview questions of the HIP study

72

Protocol development process 2.7 Do you see any reasons for non-deployment related to the protocol

development, i.e., standardization and reference implementations? 2.8 Do you see any personal frictions or company policies causing non-

deployment? 2.9 Has HIP been introduced timely? Was HIP too late or too early?

Prioritizing identified reasons

2.10 What is the most important reason that HIP has not been deployed yet? 2.11 Evaluate the importance of suggested reasons for non-deployment on scale

1-5 (“not important at all” – “very important”, “I don’t know” also possible) 1) There is no real demand for HIP. 2) HIP is missing a killer application. 3) HIP is on the wrong layer of the protocol stack. 4) HIP is a too big change, whereupon people favor point solutions that

solve a single problem. 5) ISPs (or other stakeholders) do not like encrypted traffic. 6) Managing identities is too problematic. 7) Lack of stable mainstream implementation discourages adoption. 8) Experimental track status of HIP RFCs discourages adoption. 9) Chicken-egg problem (i.e., no one adopts HIP because early adopters

do not gain immediate benefit) 10) Substitute technologies are favored. 11) HIP is too late. 12) Decision-makers are not aware of HIP or they have misinformation. 13) Company policies or personal frictions in the IETF hinder deployment 14) Real-world deployability not taken into account from the first day on

due to research-mindedness.

Other questions 2.12 What should happen or change so that HIP would get deployed?

3 Benefits and possible use cases

3.1 Rank the listed technical features of HIP based on demand for them. [ ] Mobility [ ] Multihoming [ ] Easier network renumbering [ ] Improved security [ ] Simultaneous NAT-traversal for all applications [ ] Easing IPv6 deployment by interoperating IPv4 and IPv6

3.2 Is HIP a good solution for implementing the features or would you prefer some other technology? Why?

3.3 What do you think of the following suggested use cases? Are they interesting and feasible? What kind of opportunities and problems do you see? Has HIP potential in these use cases?

Page 96: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Appendix 1: Interview questions of the HIP study

73

3.3.1 Use case 1: HIP as a multihoming solution for WiFi and cellular Modern cellular handhelds (mobile phones, tablets) support both WiFi and cellular connectivity. When you switch from WiFi to cellular or vice versa, e.g. streams of video and sound will break. HIP can be used to solve this problem. 3.3.2 Use case 2: Creating security context for sensors (HIP-DEX for core) COnstrained RESTful Environments working group in the IETF is considering applying a light-weight version of HIP as part of their security solution for sensor networking. Sensor environment requires efficient use of memory and computing, which should make HIP interesting option compared to alternative solutions. 3.3.3 Use case 3: “Automatic corporate VPN” Tofino security product uses HIP to set up layer-two VPN connectivity between two or more remote networks. The product is effectively a physical Ethernet adapter plugged in between the computer and the Ethernet jack. The device captures ARP requests and creates VPN tunnels dynamically to remote networks when the local computer tries to connect to a machine located in a remote network. The process is transparent to the user. Also the typical corporate VPN case can be discussed. 3.3.4 Use case 4: “Home-VPN” aka “Back to my Mac” Back to my MAC allows a MAC user to connect to his remote desktop machine remotely. The service supports file sharing and sharing of the screen. Similarly to HIP, the service is based on IPSec and supports changing IP addresses. HIP could be used to build such as service in a non-proprietary and cross-platform way. 3.3.5 Use case 5: “HIP as TLS substitute” With the help of HIP-specific APIs, HIP can be used to offer security similar to TLS (or dTLS).

4 Feedback

4.1 What do you think about the interview? 4.2 Who should be interviewed?

Page 97: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

Appendix 1: Interview questions of the HIP study

74

Page 98: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

75

References

Achilladetis, B. et al. (1969). Project Sappho: A study of success and failure in innovation. Report, Science policy research unit, University of Sussex.

Adams, R., Bessant, J., & Phelps, R. (2006). Innovation management measurement: A review. International Journal of Management Reviews, 8(1), 21–47.

Adcon (2013). A755 V2 addSDI GPRS, Product specification. Available at: http://www.adcon.at/index.php?option=com_docman&task=doc_download&gid=104&Itemid=239.

Adomavicius, G., Bockstedt, J. C., Gupta, A., & Kauffman, R. J. (2007). Technology roles and paths of influence in an ecosystem model of technology evolution. Information Technology and Management, 8(2), 185–202.

Akhshabi, S., & Dovrolis, C. (2011). The evolution of layered protocol stacks leads to an hourglass-shaped architecture. In Proceedings of the ACM SIGCOMM 2011 Conference (pp. 206–217), August 15–19, Toronto, Canada.

Alvestrand, H. (2004). The role of the standards process in shaping the Internet. Proceedings of the IEEE, 92(9), 1371–1374.

Anderson, P., & Tushman, M. L. (1990). Technological discontinuities and dominant designs: A cyclical model of technological change. Administrative Science Quarterly, 35(4), 604–633.

Armstrong, M. (2006). Competition in two-sided markets. The RAND Journal of Economics, 37(3), 668–691.

Arrow, K. (1962). The economic implications of learning by doing. The Review of Economic Studies, 29(3), 155–173.

Arthur, W. (1989). Competing technologies, increasing returns, and lock-in by historical events. The Economic Journal, 9(394), 116–131.

Page 99: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

76

Bakos, Y., & Brynjolfsson, E. (1999). Bundling information goods: Pricing, profits, and efficiency. Management Science, 45(12), 1613–1630.

Bass, F. M. (1969). A new product growth model for consumer durables. Management Science, 15(5), 215–227.

Barre, S., Paasch, C., & Bonaventure, O. (2011). Multipath TCP: From theory to practice. In Proceedings of the 10th International IFIP TC 6 Networking Conference, May 9–13, Valencia, Spain.

Besen, S.M., & Farrell, J. (1994). Choosing how to compete: Strategies and tactics in standardization. The Journal of Economic Perspectives, 8(2), 117–131.

Boardman, A. E., Greenberg, D. H., Vining, A. R., & Weimer, D. L. (2006). Cost-benefit analysis: concepts and practice, 3rd ed. Upper Saddle River, NJ, USA: Prentice Hall.

Boehm, B. W. (1981). Software engineering economics. Upper Saddle River, NJ, USA: Prentice Hall.

Boehm, B., Abts, C., & Chulani, S. (2000). Software development cost estimation approaches — A survey. Annals of Software Engineering, 10(1-4), 177–205.

Bohlin, E., & Lindmark, S. (2003). Incentives to invest in next generation networks. In Proceedings of the 14th European Regional ITS Conference, August 23–24, Helsinki, Finland.

Bonaventure, O. (2013). Apple seems to also believe in Multipath TCP. [Blog post]. September 18, 2013. Available at: http://perso.uclouvain.be/olivier.bonaventure/blog/html/2013/09/18/mptcp.html.

Bond, E. U., & Houston, M. B. (2003). Barriers to matching new technologies and market opportunities in established firms. Journal of Product Innovation Management, 20(2), 120–135.

Bormann, C., Castellani, A. P., & Shelby, Z. (2012). CoAP: An application protocol for billions of tiny Internet nodes. IEEE Internet Computing, 16(2), 62–67.

Bottermann, M. (2009). IPv6 deployment survey 2009. Available at: http://ripe59.ripe.net/presentations/botterman-v6-survey.pdf.

Bottermann, M. (2010). IPv6 deployment survey 2010. Available at: http://www.nro.net/wp-content/uploads/2010/11/GlobalIPv6SurveySummaryv2.pdf.

Page 100: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

77

Bottermann, M. (2011). IPv6 deployment survey 2011. Available at: http://www.nro.net/wp-content/uploads/ipv6_deployment_survey.pdf.

Briscoe, B., Odlyzko, A., & Tilly, B. (2006). Metcalfe’s law is wrong – Communications networks increase in value as they add members but by how much? IEEE Spectrum, 43(7), 34–39.

Bush, R., & Meyer, D. (2002). Some Internet architectural guidelines and philosophy, RFC 3439 (Informational).

Campbell, A. T., Gomez, J., Kim, S., Wan, C.-Y. (2002). Comparison of IP micromobility protocols. IEEE Wireless Communications, 9(1), 72–82.

Carpenter, B. (1996). Architectural principles of the Internet, RFC 1958 (Informational).

Carter, F. J., Jambulingam, T., Gupta, V. K., & Melone, N. (2001). Technological innovations: A framework for communicating diffusion effects. Information & Management, 38(5), 277–287.

Chesbrough, H. W., & Teece, D. J. (1996). Organizing for innovation: When is virtual virtuous? Harvard Business Review, 74(1), 65–74.

Chitika (2013). UPDATE: iOS 7 on 52% of iOS devices one week after public release. [Blog post]. September 19, 2013. Available at: http://www.chitika.com/insights/2013/ios-7-adoption.

Clark, D., Wroclawski, J., Sollins, K. R., & Braden, R. (2005). Tussle in cyberspace: Defining tomorrow’s Internet. IEEE/ACM Transactions on Networking, 13(3), 462–475.

Colitti, L., Gunderson, S. H., Kline, E., & Refice, T. (2010). Evaluating IPv6 adoption in the Internet. In Proceedings of the 11th International Conference on Passive and Active Measurement (PAM) (pp. 141–150), April 7–9, Zürich, Switzerland.

Colitti, W., Steenhaut, K., De Caro, N., Buta, B., & Dobrota, V. (2011). Evaluation of constrained application protocol for wireless sensor networks. In Proceedings of the 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN), October 13–14, Chapel Hill, NC, USA.

Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: A technological diffusion approach. Management Science, 36(2), 123–139.

Page 101: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

78

Cusumano, M. A., Mylonadis, Y., & Rosenbloom, R. S. (1992). Strategic maneuvering and mass-market dynamics: The triumph of VHS over Beta. Business history review, 66(1), 51–94.

David, J. S., Schuff, D., & St Louis, R. (2002). Managing your total IT cost of ownership. Communications of the ACM, 45(1), 101–106.

David, P. A. (1985). Clio and the Economics of QWERTY. The American economic review, 75(2), 332–337.

Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, 13(3), 319–340.

Degraeve, Z., & Roodhooft, F. (1999). Improving the efficiency of the purchasing process using total cost of ownership information: The case of heating electrodes at Cockerill Sambre SA. European Journal of Operational Research, 112(1), 42–53.

Eardley, P., Kanakakis, M., Kostopoulos, A., Levä, T., Richardson, K., & Warma, H. (2011). Deployment and adoption of future Internet protocols. In The Future Internet – Future Internet Assembly 2011: Achievements and Technological Promises (pp. 133–144). Berlin Heidelberg: Springer.

Eggert, L. (2014). Deployment trends of IPv6, SIP, XMPP, DNSSEC, DKIM, and SPF. Available at: http://eggert.org/.

Eisenmann, T., Parker, G., Van Alstyne, M.W. (2006). Strategies for two-sided markets. Harvard business review, 84(10), 92–101.

Ellram, L. M. (1993). A framework for total cost of ownership. The International Journal of Logistics Management, 4(2), 49–60.

Ellram, L. M. (1995). Total cost of ownership: an analysis approach for purchasing. International Journal of Physical Distribution & Logistics Management, 25(8), 4–23.

Ende, J., & Dolfsma, W. (2005). Technology-push, demand-pull and the shaping of technological paradigms – Patterns in the development of computing technology. Journal of Evolutionary Economics, 15(1), 83–99.

Farrell, J., & Saloner, G. (1985). Standardization, compatibility, and innovation. The RAND Journal of Economics, 16(1), 70–83.

Ferrin, B. G., & Plank, R. E. (2002). Total cost of ownership models: an exploratory study. Journal of Supply chain management, 38(3), 18–29.

Page 102: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

79

Fichman, R. G., & Kemerer, C. F. (1999). The illusory diffusion of innovation: An examination of assimilation gaps. Information Systems Research, 10(3), 255–275.

Ficora (2012). Consumer survey on communications services. Available at: https://www.viestintavirasto.fi/en/aboutthesector/studiesandsurveys/viestintapalvelujenkuluttajatutkimus.html.

Ford, A., Eardley, P., & van Schewick, B. (2009). New design principles for the Internet. In Proceedings of the International Workshop on the Network of the Future, June 14-18, Dresden, Germany.

Ford, A., Raiciu, C., Handley, M., Barre, S., & Iyengar, J. (2011). Architectural guidelines for multipath TCP development, RFC 6182 (Informational).

Ford, A., Raiciu, C., Handley, M., & Bonaventure, O. (2013). TCP extensions for multipath operation with multiple addresses, RFC 6824 (Experimental).

Fomin, V. V, Su, J., & Gao, P. (2011). Indigenous standard development in the presence of dominant international standards: The case of the AVS standard in China. Technology Analysis & Strategic Management, 23(7), 745–758.

Freeman, R. (1984). Strategic management: A stakeholder approach. Boston, USA: Pitman.

Globe, S. et al. (1973). The interactions of science and technology in the innovative process: some case studies. Report to the national science foundation, Battelle-Columbus Laboratories, Columbus, Ohio.

Gu, X. (2012). Host Identity Protocol Version 2.5. Master’s thesis, Aalto University, School of Science.

Handley, M. (2006). Why the Internet only just works. BT Technology Journal, 24(3), 119–129.

Hanseth, O., & Lyytinen, K. (2010). Information infrastructures: The case of building Internet. Journal of Information Technology, 25(1), 1–19.

Heikkinen, M. V. J., & Hämmäinen, H. (2008). Scenario planning of mobile peer-to-peer service usage. In Proceedings of the 7th International Conference on Mobile Business (pp. 145–152), July 7–8, Barcelona, Spain.

Page 103: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

80

Henderson, T., Nikander, P., & Komu, M. (2008). Using the host identity protocol with legacy applications, RFC 5338 (Experimental).

Hettick, L. (2001). Protocol wars threaten VoIP future. Business Communications Review, September 2001, 64–67.

Honda, M., Nishida, Y., Raiciu, C., Greenhalgh, A., Handley, M., & Tokuda, H. (2011). Is it still possible to extend TCP? In Proceedings of the 2011 ACM SIGCOMM Internet measurement conference (IMC ’11) (pp. 181–194), November 2–4, Berlin, Germany.

Hovav, A., Patnayakuni, R., & Schuff, D. (2004). A model of Internet standards adoption: The case of IPv6. Information Systems Journal, 14(3), 265–294.

Hurkens, K., Valk, W., & Wynstra, F. (2006). Total cost of ownership in the services sector: A case study. Journal of Supply Chain Management, 42(1), 27–37.

Huston, G. (2014). IPv6 reports. Available at: http://bgp.potaroo.net/index-v6.html.

Iannone, L., & Levä, T. (2010). Modeling the economics of Loc/ID split for the future Internet. In G. Tselentis et al. (Eds.), Towards the Future Internet (pp. 11–20). Amsterdam: IOS Press.

IETF (2014). IETF Successes and Failures. Available at: http:// trac.tools.ietf.org/misc/outcomes.

Ilaghi, M., Levä, T., & Komu, M. (2014). Techno-economic feasibility analysis of constrained application protocol. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), March 6–8, Seoul, Korea.

Ims, L. A., Olsen, B. T., Myhre, D., Lahteenoja, M., Mononen, J., Ferrero, U., & Zaganlaris, A. (1996). Multiservice access network upgrading in Europe: A techno-economic analysis. IEEE Communications Magazine, 34(12), 124–134.

Isenson, R. (1969). Project Hindsight: An empirical study of the sources of ideas utilized in operational weapon system. In Gruber, W., & Marquis, D. (eds.), Factors in the transfer of technology. Cambridge, Massachusetts: MIT Press.

Jin, Y., Sen, S., Guérin, R., Hosanagar, K., & Zhang, Z.-L. (2008). Dynamics of competition between incumbent and emerging network technologies. In Proceedings of the 3rd international workshop on economics of networked systems (pp. 49–54), Seattle, WA, USA.

Page 104: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

81

Jorgensen, M., & Shepperd, M. (2007). A systematic review of software development cost estimation studies. IEEE Transactions on Software Engineering, 33(1), 33–53.

Jorstad, I., Dustdar, S., & Do, T. (2005). An analysis of current mobile services and enabling technologies. International Journal of Ad Hoc and Ubiquitous Computing, 1(1), 92–102.

Joseph, D., Shetty, N., Chuang, J., & Stoica, I. (2007). Modeling the adoption of new network architectures. In Proceedings of the 2007 ACM CoNEXT conference, December 10–13, New York, NY, USA.

Järvinen, P. (2004). On research methods. Tampere, Finland: Opinpajan kirja.

Kalogiros, C., Courcoubetis, C., Stamoulis, G. D., Boniface, M., Meyer, E., Waldburger, M., … Stiller, B. (2011). An approach to investigating socio-economic tussles arising from building the future Internet. In The Future Internet – Future Internet Assembly 2011: Achievements and Technological Promises (pp. 145–159). Berlin Heidelberg: Springer.

Karjaluoto, H., Karvonen, J., Kesti, M., Koivumäki, T., Manninen, M., Pakola, J., & Salo, J. (2005). Factors affecting consumer choice of mobile phones: Two studies from Finland. Journal of Euromarketing, 14(3), 59–82.

Katsianis, D., Welling, I., Yionen, M., Varoutas, D., Sphicopoulos, T., Elnegaard, N. K., ... & Budry, L. (2001). The financial perspective of the mobile networks in Europe. IEEE Personal Communications, 8(6), 58–64.

Katz, M. L., & Shapiro, C. (1985). Network externalities, competition, and compatibility. The American Economic Review, 75(3), 424–440.

Katz, M. L., & Shapiro, C. (1986). Technology adoption in the presence of network externalities. Journal of Political Economics, 94(4), 822–841.

Kivi, A. (2011). Diffusion of mobile Internet services. PhD dissertation, Aalto University, School of Electrical Engineering.

Kivi, A., Smura, T., & Töyli, J. (2012). Technology product evolution and the diffusion of new product features. Technological Forecasting and Social Change, 79(1), 107–126.

Komu, M., Varjonen, S., Gurtov, A., & Tarkoma, S. (2012). Sockets and beyond: Assessing the source code of network applications. In

Page 105: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

82

Proceedings of Linux Symposium (pp. 7–24), July 11–13, Ottawa, Canada.

Kostopoulos, A., Papafili, I., Kalogiros, C., Levä, T., Zhang, N., & Trossen, D (2012). A tussle analysis for information-centric networking architectures. In The Future Internet – Future Internet Assembly 2012: From Promises to Reality (pp. 6–17), Berlin Heidelberg: Springer.

Lear, E. (Ed.) (2014). Report from the IAB workshop on Internet technology adoption and transition (ITAT), RFC 7305 (Informational).

Lehmann, S., & Buxmann, P. (2009). Pricing strategies of software vendors. Business & Information Systems Engineering, 1(6), 452–462.

Levä, T., Warma, H., Ford, A., Kostopoulos, A., Heinrich, B., Widera, R., & Eardley, P. (2010). Business aspects of multipath TCP adoption. In G. Tselentis et al. (Eds.), Towards the Future Internet (pp. 21–30). Amsterdam: IOS Press.

Liker, J. K., Fleischer, M., & Arnsdorf, D. (1992). Fulfilling the promises of CAD. Sloan Management Review, 33(3), 74–86.

Liu, C.-M. (2002). The effects of promotional activities on brand decision in the cellular telephone industry. Journal of Product & Brand Management, 11(1), 42–51.

Luehrman, T. (1997). Using APV (adjusted present value): A better tool for valuing operations, Harvard Business Review, 75(3), 145–154.

Lyytinen, K., & Damsgaard, J. (2001). What’s wrong with the diffusion of innovation theory? The case of a complex and networked technology. In Proceedings of the IFIP TC8 WG8.6 Fourth Working Conference on Diffusing Software Products and Process Innovations (pp. 173–190), April 7–10, Banff, Canada.

Maier, G., Feldmann, A., Paxson, V., & Allman, M. (2009). On dominant characteristics of residential broadband Internet traffic. In Proceedings of the 9th ACM SIGCOMM Internet measurement conference (IMC '09) (pp. 90–10). New York, NY, USA.

March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems, 15(4), 251–266.

Marcus, J. (2004). Evolving core capabilities of the Internet. Journal on Telecommunications and High Technology Law, 3(1), 121–161.

Page 106: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

83

Morse, J. M. (2010). Procedures and practice of mixed method design: Maintaining control, rigor and complexity. In A. Tashakkori, & C. Teddlie (Eds.), Sage handbook of mixed methods in social and behavioral research (pp. 339–352). Thousand Oaks, CA, USA: Sage publications.

Moskowitz, R., & Komu, M. (2014). Host identity protocol architecture, draft-ietf-hip-rfc4423-bis-08. Internet-draft, Work in progress. Available at: http://tools.ietf.org/html/draft-ietf-hip-rfc4423-bis-08.

Moskowitz, R., Nikander, P., & Jokela, P., & Henderson, T. (2008). Host identity protocol, RFC 5201 (Experimental).

Nair, H., Chintagunta, P., & Dubé, J. (2004). Empirical analysis of indirect network effects in the market for personal digital assistants. Quantitative Marketing and Economics, 2(1), 23–58.

Nikander, P. Gurtov, A., Henderson, T. (2010). Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. IEEE Communications Surveys and Tutorials, 12(2), 186–204.

Ozment, A., & Schechter, S.E. (2006). Bootstrapping the adoption of Internet security protocols. In Proceedings of the Fifth Workshop on the Economics of Information Security, June 26–28, Cambridge, UK.

Parker, G. G., & Van Alstyne, M. W. (2005). Two-sided network effects: A theory of information product design. Management Science, 51(10), 1494–1504.

Pickton, D. W., & Wright, S. (1998). What's SWOT in strategic analysis? Strategic Change, 7(2), 101–109.

Prescott, M. M., & Van Slyke, C. (1997). Understanding the Internet as an innovation. Industrial Management & Data Systems, 97(3), 119–124.

Raiciu, C., Paasch, C., Barre, S., Ford, A., Honda, M., Duchene, F., … Handley, M. (2012). How hard can it be? Designing and implementing a deployable multipath TCP. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12), April 25–27, San Jose, CA, USA.

Riikonen, A., & Smura, T. (2013). Mobile Handset Population in Finland 2005–2012. Technical report, April 11, 2013, Aalto University, Department of Communications and Networking. Available at:

Page 107: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

84

http://momie.comnet.aalto.fi/wp-uploads/Mobile_Handset_Population_2005-2012.pdf.

Riikonen, A., Smura, T., Kivi, A., & Töyli, J. (2013). Diffusion of mobile handset features: Analysis of turning points and stages. Telecommunications Policy, 37(6–7), 563–572.

Riquelme, H. (2001). Do consumers know what they want? Journal of Consumer Marketing, 18(5), 437–448.

Robson, C. (2002). Real world research: A resource for social scientists and practitioner-researchers (2nd ed.). Malden: Blackwell Publishing.

Rochet, J., & Tirole, J. (2006). Two-sided markets: A progress report. The RAND Journal of Economics, 37(3), 645–667.

Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York, NY, USA: Free Press.

Rosenberg, N. (1982). Inside the black box: Technology and economics. Cambridge University Press.

Saltzer, J. H., Reed, D. P., & Clark, D. D. (1984). End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS), 2(4), 277–288.

Sandvig, C. (2006). Shaping infrastructure and innovation on the Internet: The end-to-end network that isn't. In D. Guston, & D. Sarewitz (Eds.), Shaping science and technology policy: The next generation of research (pp. 234–255). Madison: University of Wisconsin Press.

ScientiaMobile (2012). WURFL repository v. 2.3.4, 8 Nov 2012. Available at: http://wurfl.sourceforge.net/.

Sen, S., Jin, Y., Guérin, R., & Hosanagar, K. (2010). Modeling the dynamics of network technology adoption and the role of converters. IEEE/ACM Transactions on Networking (TON), 18(6), 1793–1805.

Shapiro, C., & Varian, H.R. (1998). Versioning: The smart way to sell information. Harvard Business Review, 76(6), 106–114.

Shapiro, C., & Varian, H. R. (1999). The art of standards wars. California Management Review, 41(2), 10–32.

Shelby, Z. (2010). Embedded web services. IEEE Wireless Communications, 17(6), 52–57.

Shelby, Z., Hartke, K., Bormann, C., & Frank, B. (2014). Constrained application protocol (CoAP), RFC 7252 (Standards Track).

Page 108: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

85

Shepard, D. S., & Thompson, M. S. (1979). First principles of cost-effectiveness analysis in health. Public health reports, 94(6), 535–543.

Shih, C., & Venkatesh, A. (2004). Beyond adoption: Development and application of a use-diffusion model. Journal of Marketing, 68(1), 59–72.

Simon, H. A. (1996). The sciences of the artificial (3rd ed.). MIT press.

Smura, T. (2012). Techno-economic modeling of wireless network and industry architectures. PhD dissertation, Aalto University, School of Electrical Engineering.

Smura, T., Kivi, A., & Töyli, J. (2009). A framework for analysing the usage of mobile services. INFO – The journal of policy, regulation and strategy for telecommunications, information and media, 11(4), 53–67.

Sonntag, S., & Suomi, H. (2013). Economic feasibility of multipath protocols in mobile Internet of things applications. Concurrency and Computation: Practice and Experience. Advance online publication. Available online on 18 September 2013, DOI: 10.1002/cpe.3127.

Sprint (2013). M2M pricing, Available at: http://m2m.sprint.com/engage-with-us/m2m-pricing.

Sterman, J. (2000). Business dynamics: Systems thinking and modeling for a complex world. New York, NY: McGraw-Hill.

Suomi, H. (2014). Techno-economic feasibility analysis of multipath protocols in the Internet. PhD dissertation, Aalto University, School of Electrical Engineering.

Suomi, H., Basaure, A., and Hämmäinen, H. (2013). Effects of capacity sharing on mobile access competition. In Proceedings of the 21st International IEEE Conference on Network Protocols (ICNP 2013), October 7–10, Göttingen, Germany.

Suomi, H., Kilkki, K., & Hämmäinen, H. (2012). Modeling the value of end-to-end multipath protocols. Journal of Universal Computer Science, 18(14), 2071–2092.

Tabakov, B. (2014). Techno-economic feasibility of web real-time communications. Master’s thesis, Aalto University, School of Electrical Engineering.

Page 109: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

86

Tang, L., Chen, Q., Zhang, B., Li, Y., & Zheng, X. (2008). Load balancing model based on Stackelberg game for multi-homing in heterogeneous radio access networks. In Proceedings of the 2008 International Conference on Advanced Infocomm Technology (ICAIT '08), July 28–31, Da Meisha, Shenzhen, China.

Thaler, D., & Aboba, B. (2008). What makes for a successful protocol? RFC 5218 (Informational).

Thompson, K., Miller, G. J., & Wilder, R. (1997). Wide-area Internet traffic patterns and characteristics. IEEE Network, 11(6), 10–23.

Tornatzky, L. G., Fleischer, M., & Chakrabarti, A. K. (1990). The processes of technological innovation. Lexington, MA: Lexington Books.

Varoutas, D., Katsianis, D., Sphicopoulos, T., Stordahl, K., & Welling, I. (2006). On the economics of 3g mobile virtual network operators (MVNOs). Wireless Personal Communications, 36(2), 129–142.

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.

Verbrugge, S., Casier, K., Van Ooteghem, J., & Lannoo, B. (2009). Practical steps in techno-economic evaluation of network deployment planning. White paper, November 25. Available at: http://www.ibcn.intec.ugent.be/content/techno-economics/Whitepaper_November_2009.

Verhoef, C. (2005). Quantifying the value of IT-investments. Science of Computer Programming, 56(3), 315–342.

Verkasalo, H. (2008). Dynamics of mobile service adoption. International Journal of E-Business Research, 4(3), 40–63.

Vishwanath, A., & Chen, H. (2006). Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters. Journal of the American Society for Information Science and Technology, 57(11), 1451–1460.

Von Hippel, E. (1986). Lead users: a source of novel product concepts. Management science, 32(7), 791–805.

Von Neumann, J., & Morgenstern, O. (1944). Theory of games and economic behavior. Princeton, NJ, USA: Princeton University Press.

Walker, E. (2009). The real cost of a CPU hour. Computer, 42(4), 35–41.

Walker, E., Brisken, W., & Romney, J. (2010). To lease or not to lease from storage clouds. Computer, 43(4), 44–50.

Page 110: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

References

87

Warma, H., Levä, T., Eggert, L., Hämmäinen, H., & Manner, J. (2010). Mobile Internet in stereo: An end-to-end scenario. In Proceedings of the 3rd Workshop on Economic Traffic Management (ETM 2010), September 6, Amsterdam, the Netherlands.

Weitzel, T., Beimborn, D., & Konig, W. (2006). A unified economic model of standard diffusion: The impact of standardization cost, network effects, and network topology. Management Information Systems Quarterly, 30(1), 489–514.

Wu, I. W., Chen, W. S., Liao, H. E., & Young, F. F. (2002). A seamless handoff approach of mobile IP protocol for mobile wireless data networks. IEEE Transactions on Consumer Electronics, 48(2), 335–344.

Yin, R. K. (2009). Case study research: Design and methods (4th ed.). Sage Publications.

Yoo, Y., Lyytinen, K., & Yang, H. (2005). The role of standards in innovation and diffusion of broadband mobile services: The case of South Korea. The Journal of Strategic Information Systems, 14(3), 323–353.

Young, W. (2013). The History of Winsock. Available at: http://tangentsoft.net/wskfaq/articles/history.html.

Zhang, N., Levä, T., & Hämmäinen, H. (2014). Value networks and two-sided markets of Internet content delivery. Telecommunications Policy, 38(5-6), 460–472.

Zmud, R. (1984). An examination of push-pull theory applied to process innovation in knowledge work. Management Science, 30(6), 727–738.

Page 111: Aalto- Feasibility analysis of new DD Internet protocols9HSTFMG*afhjch+ ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto

9HSTFMG*afhjch+

ISBN 978-952-60-5792-7 ISBN 978-952-60-5793-4 (pdf) ISSN-L 1799-4934 ISSN 1799-4934 ISSN 1799-4942 (pdf) Aalto University School of Electrical Engineering Department of Communications and Networking www.aalto.fi

BUSINESS + ECONOMY ART + DESIGN + ARCHITECTURE SCIENCE + TECHNOLOGY CROSSOVER DOCTORAL DISSERTATIONS

Aalto-D

D 113

/2014

The Internet standardization community actively develops new Internet protocols as a response to the challenges with the existing protocols and the requirements of emerging application areas. However, many of these protocols fail to get deployed, because the stakeholders' incentives and the dynamics of protocol deployment are not sufficiently understood and taken into account during the protocol development. This dissertation aims for improving the success rate of new Internet protocols by increasing the understanding of the dynamics of protocol deployment and the techno-economic factors affecting the feasibility of Internet protocols. Additionally, the dissertation develops methods for analyzing the deployment and feasibility of Internet protocols.

Tapio L

evä F

easibility analysis of new Internet protocols

Aalto

Unive

rsity

Department of Communications and Networking

Feasibility analysis of new Internet protocols Methods and case studies

Tapio Levä

DOCTORAL DISSERTATIONS