Exploring the Adoption of New Network Technologies & Architectures Roch Guérin Dept. Elec. & Sys. Eng University of Pennsylvania FIND Meeting, April 7,

Slides:



Advertisements
Similar presentations
What Is Perfect Competition? Perfect competition is an industry in which Many firms sell identical products to many buyers. There are no restrictions.
Advertisements

On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar University of Pennsylvania & Andrew Odlyzko, Zhi-Li Zhang University of.
End of the Internet Predicted! Torrent at 11. The Oracle Bones of IPv4 Some personal divination by Geoff Huston APNIC.
Policy and Regulatory Challenges – Technology Providers View February 14 Challenges for Successful Implementation of ICT Projects Challenges for Successful.
3rd Module: Information Systems Strategy and Planning:
Employing Agent-based Models to study Interdomain Network Formation, Dynamics & Economics Aemen Lodhi (Georgia Tech) 1 Workshop on Internet Topology &
Game Theory and Computer Networks: a useful combination? Christos Samaras, COMNET Group, DUTH.
1 Product Innovation and Marketing Strategy l Adoption of innovations: l Demand Side Perspectives l Strategic or Firm Side Perspectives l Product Lifecycle.
The transition challenge for hydrogen vehicles; analysis of adoption dynamics Jeroen Struben*) MIT Sloan School of Management April *) Many thanks.
School of something FACULTY OF OTHER School of Geography FACULTY OF ENVIRONMENT Extending spatial interaction models with agents for understanding relationships.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 Welcome to EC 209: Managerial Economics- Group A By: Dr. Jacqueline Khorassani Week Ten.
Basic Oligopoly Models
Oligopoly The challenge of analyzing interdependent strategic decisions.
Planning under Uncertainty
Gabriel Tsang Supervisor: Jian Yang.  Initial Problem  Related Work  Approach  Outcome  Conclusion  Future Work 2.
CHAPTER 9 Basic Oligopoly Models Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
© 2007 by Prentice Hall1-1 Chapter 1 Meeting Present and Emerging Strategic Human Resource Challenges.
Geoff Huston Chief Scientist, Asia Pacific Network Information Centre IPv6 Workshop European Digital Agenda Assembly June 2011.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Incomplete Contracts Renegotiation, Communications and Theory December 10, 2007.
-1- Entrance of Cable TV Service Provider into Broadband Internet Service Market : Service Bundling and Role of Access Charge By Jae-Hyeon Ahn, Jungsuk.
Presented By: Lindsey Moore John Limberg Matt Martinez Joseph Morgan.
Thesis Proposal On Economic Viability and Choices of Networked Systems & Architectures Soumya Sen 31st March 2010, Thesis Proposal.
Chapter 5: Demand and Supply
Bottom-Up Coordination in the El Farol Game: an agent-based model Shu-Heng Chen, Umberto Gostoli.
Learning dynamics,genetic algorithms,and corporate takeovers Thomas H. Noe,Lynn Pi.
Models of Influence in Online Social Networks
Network Competition IS250 Spring 2010
Soumya Sen, K. Yamauchi, Roch Guerin and Kartik Hosanagar ESE, Wharton University of Pennsylvania 11.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
A Framework for Distributed Model Predictive Control
On the Adoption Paths and Competition of Network Applications Soumya Sen ESE, UPenn March 4, 2009.
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
EC941 - Game Theory Prof. Francesco Squintani Lecture 5 1.
8 Identifying Market Segments and Targets
What is a Process? A logically related set of tasks performed to achieve a defined business outcome. A structured, measured set of activities designed.
Chapter 4 MODELING AND ANALYSIS. Model component Data component provides input data User interface displays solution It is the model component of a DSS.
1 Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Lecture #11 Stability of switched system: Arbitrary switching João P. Hespanha University of California at Santa Barbara Hybrid Control and Switched Systems.
Chapter 24: Network Issues1 Network Issues. Chapter 24: Network Issues2 Introduction Some products are popular with individual consumers precisely because.
Developing Competitive Advantage and Strategic Focus
On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar (University of Pennsylvania) Andrew Odlyzko, Zhi-Li Zhang (University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Soumya Sen Dept. of Electrical & Systems Engineering University of Pennsylvania Joint Work with: R.
The Internet is out of Breath or Is It? Roch Guerin University of Pennsylvania IWQoS’09 – Charleston, S.C., July 14, 2009.
Modeling the Economics of Network Technology Adoption & Infrastructure Deployment Soumya Sen 24 th September, Princeton University.
Implementing Enterprise Architectures If We Build It, Will They Come? Mark L. Hess Weston Technology Management Group
Part III: Strategy in Action
Perfect Competition CHAPTER 11. What Is Perfect Competition? Perfect competition is an industry in which  Many firms sell identical products to many.
New York Computer Science & Economics Day, Nov 9, Dynamics of Network Technology Competition The Role of Gateways Soumya Sen Dept. Elec. & Sys.
An extension to Salop’s model Focused on variety differentiation: consumers differ on the most preferred variety Expands it to include quality differentiation:
Soumya Sen Dept. of Electrical & Systems Engineering University of Pennsylvania Joint Work with: R.
4 C H A P T E R © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in.
Hotelling Competition on Quality in the Health Care Market Marcello Montefiori.
Pricing of Competing Products BI Solutions December
Quick summary One-dimensional vertical (quality) differentiation model is extended to two dimensions Use to analyze product and price competition Two.
Journal of Economic Behavior and Organization Presented by: Kuan Chen.
Misconception: Price is the same thing as cost. What is a pricing strategy?
Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Misconception: Price is the same thing as cost. What is a pricing strategy?
DADSS Multiattribute Utility Theory. Administrative Details Homework Assignment 6 is due Monday. (slightly shorter) Homework Assignment 7 posted tonight.
03/31/2010 v.20 DRAFT – DO NOT CITE OR QUOTE For NPC Study Discussion Only 1 Summary of Demand Perspective Hard Truths provided evaluation of baseline.
12 PERFECT COMPETITION. © 2012 Pearson Education.
1 st December’09, ReArch, CoNEXT1 Shared Versus Separate Networks The Impact of Reprovisioning Soumya Sen (ESE) Roch Guerin (ESE) Kartik Hosanagar (Wharton)
Q 2.1 Nash Equilibrium Ben
Soumya Sen Dept. of Electrical & Systems Engineering
End of the Internet Predicted!
Presentation transcript:

Exploring the Adoption of New Network Technologies & Architectures Roch Guérin Dept. Elec. & Sys. Eng University of Pennsylvania FIND Meeting, April 7, 2009, Arlington, VA

Acknowledgments This is joint work with – Youngmi Jin and Soumya Sen (Penn, ESE) – Kartik Hosanagar (Penn, Wharton) – Zhi-Li Zhang (U. Minn) and in collaboration with – Andrew Odlyzko (U. Minn) 2FIND Meeting – April 2009

Outline Why this work? – Problem formulation and motivations Model scope and characteristics A very brief glance at the solution The insight and surprises – Key findings and representative examples Conclusion and extensions – What next? 3FIND Meeting – April 2009

Background and Motivations Deploying new (network) technologies (and architectures) is rife with uncertainty and challenges – Presence of an often formidable incumbent (e.g., today’s Internet) – Dependencies on what others do (externalities) – Migration and upgrade issues (infrastructure wide) Can we develop models that provide insight into – When, why, and how new network technologies succeed? – What parameters affect the outcome, and how do they interact? Intrinsic technology quality, price, individual user decisions, etc. – To what extent do gateways/converters between old an new network technologies influence deployment dynamics and eventual equilibria? P.S.: The models have applicability beyond communication networks 4FIND Meeting – April 2009

Problem Formulation Two competing and incompatible network technologies – Incumbent (tech. 1) offers a (network) service with “quality” ( q 1 ) at a (recurring) price ( p 1 ) Incumbent’s market penetration at time t 0 ( 0<x 1 (t 0 )  1 ) – Entrant (tech. 2) deploys new (network) service of higher “quality” ( q 2 >q 1 ) at price ( p 2 ) No initial market penetration ( x 2 (t 0 ) =0 ) Interoperability through gateways/converters – Each network can develop gateways/converters to allow its users to communicate with users of the other network A network/technology-level rather than user-level choice, e.g., NAT46 + NAT64 – Gateways/converters characteristics/performance Duplex vs. simplex (independent in each direction or coupled) Asymmetric vs. symmetric (performance/functionality wise) Constrained vs. unconstrained (performance/functionality wise) Users adoption decisions – They choose one technology or none ( 0  x 1 +x 2  1 ) – Users are heterogeneous and have a personal technology valuation preference  Individual  ‘s are unknown, but their distribution is known – Users are rational and choose the technology that gives them the highest positive utility 5FIND Meeting – April 2009

Utility Function General expression – Technology 1: U 1 ( ,x 1,x 2 ) =  q 1 +(x 1 +α 1 β x 2 ) – p 1 – Technology 2: U 2 ( ,x 1,x 2 ) =  q 2 +(βx 2 +α 2 x 1 ) – p 2 A closer look at the parameters – The higher the price ( p i ), the lower the utility – Utility grows linearly with number of adopters – Metcalfe’s law Externality benefits of tech. 1 normalized to 1 Externality benefits of tech. 2 scaled by β (possibly different from tech. 1) Gateways/converters for either technology, possibly with different performance/functionality ( α i, 0  α i  1 ) – Utility also depends on “intrinsic” technology quality ( q i ) Tech. 2 better than tech. 1 ( q 2 >q 1 ) but no constraint on magnitude, i.e., stronger or weaker than externalities (can have q 2 >q 1  0 ) – Sensitivity (  ) to technology quality 6FIND Meeting – April 2009

Anchoring the Model 1.IPv4  IPv6 – Duplex, asymmetric, constrained gateways 2.Low def. video conf.  High def. video conf. – Simplex, asymmetric, unconstrained converters 7FIND Meeting – April 2009

IPv4 (Tech. 1)  IPv6 (Tech. 2) IPv4: U 1 ( ,x 1,x 2 ) =  q 1 +(x 1 +α 1 β x 2 ) – p 1 IPv6: U 2 ( ,x 1,x 2 ) =  q 2 +(βx 2 +α 2 x 1 ) – p 2 Setting – We are (eventually) running out of IPv4 addresses Providers will need to start assigning IPv6 only addresses to new subscribers (p IPv4 =p 1 >p 2 =p IPv6 ) – IPv4 and IPv6 similar as “technologies” ( q 1  q 2 and  =1 ) Mandatory IPv6 IPv4 gateways for transition to happen – Most content is not yet available on IPv6 Little in way of incentives for content providers to do it – Duplex, asymmetric, constrained converters Users technology choice – Function of price and accessible content 8FIND Meeting – April 2009

Low-def. video  High-def. video Low-def: U 1 ( ,x 1,x 2 ) =  q 1 +(x 1 +α 1 β x 2 ) – p 1 High-def: U 2 ( ,x 1,x 2 ) =  q 2 +(βx 2 +α 2 x 1 ) – p 2 Setting – Two video-conf service offerings: Low-def & High-def Low-def has lower price ( p 1 <p 2 ), but lower quality (q 1 <q 2 ) – Video as an asymmetric technology Encoding is hard, decoding is easy – Low-def subscribers could display high-def signals but not generate them Externality benefits of High-def are higher than those of Low-def (  >1 ) Converters characteristics – High/Low-def user can decode Low/High-def video signal – Simplex, asymmetric, unconstrained Users technology choice – Best price/quality offering – Low-def has lower price but can enjoy High-def quality (if others use it…) 9FIND Meeting – April 2009

Technology Adoption Model Assume a given level of technology penetration x(t)= ( x 1 (t),x 2 (t) ) at time t – This translates into an hypothetical number of users, H i ( x(t) ), for whom it is rational to adopt technology i at time t (users can change their mind) – At equilibrium, penetration levels satisfy H i (x*) = x i *, i  {1,2} – For a given x(t), expressions for H i ( x(t) ) can be explicitly determined from the users’ utility function and decision variables From hypothetical to actual decisions: Adoption dynamics – Not all users learn about the current penetration levels at the same time (information diffuses) – Not all users react instantly to information about new penetration levels (rate of adoption in target population) – Modeling approach: A diffusion process with constant rate γ< 1 10FIND Meeting – April 2009

Solving the Model It’s messy because there are different regions that exhibit different behaviors, and adoption trajectories can cross region boundaries But it is solvable and we can compute/characterize – All combinations of possible stable (and unstable) equilibria – Expressions for adoption trajectories in each region General expression is of the form where 1 and 2 can be positive, negative, or even complex Trajectories can be stitched as they cross region boundaries 11FIND Meeting – April 2009

Key Findings – (1) 1.The system can have at most two stable equilibria – Could have had up to three, i.e., Tech. 1 wins, Tech. 2 wins, Tech. 1 and Tech. 2 co-exist 2.In the presence of gateways it is possible for the system not to have any stable equilibria, and exhibit cyclical adoption trajectories – This only happens when α 1 β>1, i.e., Tech. 2 has higher externality benefits and Tech. 1 users can tap into those through gateways/converters, e.g., the video-conf example – This cannot happen in the absence of gateways, i.e., when gateways are absent, technology adoption always converges 12FIND Meeting – April 2009

A “Typical” Outcome 13 Technology 1 penetration stable unstable Technology 2 penetration FIND Meeting – April 2009

Key Findings – (1) 1.The system can have at most two stable equilibria – Could have had up to three, i.e., Tech. 1 wins, Tech. 2 wins, Tech. 1 and Tech. 2 co-exist 2.In the presence of gateways it is possible for the system not to have any stable equilibria, and exhibit cyclical adoption trajectories – This only happens when α 1 β>1, i.e., Tech. 2 has higher externality benefits and Tech. 1 users can tap into those through gateways/converters, e.g., the video-conf example – This cannot happen without gateways, i.e., in the absence of gateways, technology adoption always converges 14FIND Meeting – April 2009

From Stable to Unstable (Asymmetric Gateways) As the efficiency of Tech. 1 gateway increases, system goes from dominance of Tech. 2 to a system with no stable state – No stable equilibrium for  1 =1 and  2 =0 15FIND Meeting – April 2009

From Stable to Unstable to Stable (Symmetric Gateways) No gateways: Tech. 2 captures full market Low efficiency gateways: No stable outcome Medium efficiency gateways: Neither tech. makes much inroad High efficiency gateways: Tech. 1 dominates at close to full market penetration 16FIND Meeting – April 2009

Key Findings – (2) 3.Gateways can help a technology emerge from oblivion and nearly eliminate its competitor 4.Better gateways by either technology or both can hurt overall market penetration – This requires α 1 β>1, for Tech. 1, and α 1 β<1 for Tech. 2 5.Tech. 1 can hurt its own and the overall market penetration by introducing or improving its gateways, but Tech. 2 can never hurt its own market penetration through better gateways 17FIND Meeting – April 2009

From Oblivion to Dominance (With Intermediate Instabilities) Without gateways, Tech. 2 wipes out Tech. 1 With close to perfect gateways, Tech. 1 nearly wipes out Tech. 2 Intermediate scenarios can again give rise to permanent market instabilities 18FIND Meeting – April 2009

Key Findings – (2) 3.Gateways can help a technology emerge from oblivion and nearly eliminate its competitor 4.Better gateways by either technology or both can hurt overall market penetration – This requires α 1 β>1, for Tech. 1, but α 1 β<1 for Tech. 2 5.Tech. 1 can hurt its own and the overall market penetration by introducing or improving its gateways, but Tech. 2 can never hurt its own market penetration through better gateways 19FIND Meeting – April 2009

Hurting Overall Market (Symmetric Gateways) Better gateways take Tech. 2 From 100% market penetration To an unstable market To a combined market penetration with Tech. 1 below 20%! 20FIND Meeting – April 2009

Hurting Overall Market (Asymmetric Gateways – Tech. 1) In the absence of gateways, Tech. 2 takes over the entire market Tech. 1 introduces gateways of increasing efficiency – Tech. 1 reemerges, but ultimately reduces overall market penetration 21FIND Meeting – April 2009

Hurting Overall Market (Asymmetric Gateways – Tech. 2) Tech. 2 fails to gain market share without gateways Tech. 2 introduces gateways of increasing efficiency – Tech. 2 gains market share, but at the cost of a lower overall market penetration 22FIND Meeting – April 2009

Key Findings – (2) 3.Gateways can help a technology emerge from oblivion and nearly eliminate its competitor 4.Better gateways by either technology or both can hurt overall market penetration – This requires α 1 β>1, for the Tech. 1, but α 1 β<1 for Tech. 2 5.Tech. 1 can hurt its own (and the overall) market penetration by introducing or improving its gateways, but Tech. 2 can never hurt its own market penetration through better gateways 23FIND Meeting – April 2009

Hurting Tech. 1 (and the Overall Market) 24FIND Meeting – April 2009

Summary 25FIND Meeting – April 2009 Gateways can be useful – Facilitate technology coexistence and ease adoption of new technologies – Allow improved overall market penetration But they can be harmful too (though mostly in highly asymmetric scenarios – α 1 β>1 ) – Hurt an individual technology (Tech. 1 only) – Lower overall market penetration (both technologies) – Introduce instabilities (only with large externalities imbalance and unconstrained gateways) The “good news” though is that harmful effects are largely absent in the context of most “standard” network technologies, e.g., the IPv4-IPv6 transition scenario Natural extensions to the investigation – Time-varying parameters (price and quality) – Strategic policies (dynamic pricing) – Incorporate switching costs (likely to require non-trivial model changes) – Sensitivity to choice of utility function (initial numerical results reveal relative robustness)

SUPPLEMENTAL MATERIAL 26FIND Meeting – April 2009

A Closer Look at a “Limit Cycle” 27FIND Meeting – April 2009

IPv4 Slightly “Better” than IPv6 28 IPv6 penetration IPv4 penetration Perfect gatewaysNo gateways IPv6 always wins In the absence of gateways, IPv6 never takes off unless IPv4 initial penetration is very low… After introducing “perfect” gateways ( α=100%), IPv6 eventually takes over, irrespective of IPv4 initial penetration – There is a “threshold” value (80%) for gateway efficiency below which this does not happen! IPv4 wins IPv6 wins FIND Meeting – April 2009

IPv6 Slightly “Better” than IPv4 29 IPv4 penetration IPv6 penetration Perfect gatewaysNo gateways IPv6 always wins Pretty much the same story In the absence of gateways, IPv6 never takes off unless IPv4 initial penetration is very low… After introducing “perfect” gateways ( α=100%), IPv6 eventually takes over, irrespective of IPv4 initial penetration – There is a “threshold” value (70%) for gateway efficiency below which this does not happen! IPv6 wins IPv4 wins FIND Meeting – April 2009