💾 Archived View for spam.works › mirrors › textfiles › internet › varian2.txt captured on 2023-06-16 at 18:52:38.

View Raw

More Information

-=-=-=-=-=-=-



                                                         Preliminary Draft

                     Pricing  the  Internet


                                       by


                  Jeffrey  K.  MacKie-Mason

                             Hal  R.  Varian
                         University of Michigan


                                 April 1993
                    Current version: June 14, 1993


Abstract. This is a preliminary version of a paper prepared
for  the  conference  ``Public  Access  to  the  Internet,''  JFK
School  of  Government,  May  26--27  ,  1993.   We  describe
some of the technology and costs relevant to pricing access to
the Internet and suggest a possible smart-market mechanism
for pricing traffic on the Internet.
Keywords.  Networks, Internet, NREN.
Address.  Hal R. Varian, Jeffrey K. MacKie-Mason, Depart-
ment of Economics, University of Michigan, Ann Arbor, MI
48109-1220. E-mail: jmm@umich.edu, halv@umich.edu.

                             Pricing the Internet

                         Jeffrey K. MacKie-Mason
                                 Hal R. Varian

On  December  23,  1992  the  National  Science  Foundation

announced  that  it  will  cease  funding  the  ANS  T3  Internet

backbone in the near future. This is a major step in the tran-

sition from a government-funded to a commercial Internet.

This movement has been welcomed by private providers of

telecommunication  services  and  businesses  seeking  access

to the Internet.

     We think that it is safe to say that no one is quite sure

about how this privatization effort will work.  In particular,

it is far from clear how access to the privatized Internet will

be priced. Currently, the several Internet backbone networks

are public goods with exclusion: usage is essentially free to

all authorized users. Most users are connected to a backbone

through a ``pipe'' for which a fixed access fee is charged,

but the user's organization nearly always covers the access

fee as overhead without any direct charge to the user.1   In

any case, none of the backbones charge for actual usage in

the sense of the volume of data transmitted.

     In this paper we describe some of the technological, cost,

and  economic  issues  related  to  pricing  the  Internet.   We

strongly suspect that efficiency will require usage pricing for
_________________________________________

       We wish to thank Guy Almes,  Eric Aupperle,  Paul Green,  Mark
Knopper,  Ken Latta,  Dave McQueeny,  Jeff Ogden,  Chris Parkin,  Scott
Shenker and Paul Southworth for helpful discussions, advice and data.

  1  Most users of the NSFNET backbone do not pay a pipeline fee to ANS,
the service provider, but instead pay for a connection to their ``regional'' or
mid-level network, which then is granted a connection to the NSFNET.



                                       1

backbone services.  In order to do this, it will be necessary

to  develop  new  standards  for  TCP/IP  packets  in  order  to

facilitate  accounting  and  priority-based  routing.   We  offer

a proposal as to how access might be priced using a smart

market.



1.  Internet Technology and Costs


The Internet is a network of networks. In this paper we focus

on network backbones,  although most of our pricing ideas

apply  equally  well  to  mid-level  and  local  area  networks.

There  are  essentially  three  competing  backbones  for  the

Internet:   ANSnet,  PSInet  and  Alternet.   ANS  is  a  non-

profit  that  was  formed  in  1990  to  manage  the  publicly-

funded NSFNET for research and educational users. ANSnet

now  provides  the  virtual  backbone  service  for  NSFNET,

as well as backbone service for commercial users (through

its  subsidiary,  ANS  CO+RE,  Inc.).   PSInet  and  Alternet

are independent commercial providers of backbone Internet

services to both commercial and non-commercial users.

     The  Internet  is  defined  as  those  connected  networks

that  use  connectionless  packet-switching  communications

technology  based  on  the  TCP/IP  protocols.   Even  though

much of the traffic moves across lines leased from telephone

common carriers, the technology is quite different from the

switched  circuits  used  for  voice  telephony.   A  telephone

user dials a number and various switches then open a line

between the caller and the called number. This circuit stays

open  and  no  other  caller  can  share  the  line  until  the  call

is terminated.  A connectionless packet-switching network,

by contrast, uses statistical multiplexing to maximize use of


                                       2

the communications lines.2   Each circuit is simultaneously

shared by numerous users, and no single open connection is

maintained for a particular communications session:  some

of the data may go by one route while the rest may take a

different route. Because of the technology differences pricing

models appropriate for voice telephony will be inappropriate

for data networks.

     Packet-switching technology has two major components:

packetization  and  dynamic  routing.  A  data  stream  from  a

computer is broken up into small chunks called ``packets.''

The  IP  (Internet  protocol)  specifies  how  to  break  up  a

datastream into packets and reassemble it, and also provides

the  necessary  information  for  various  computers  on  the

Internet (the routers) to move the packet to the next link on

the way to its final destination.

     Packetization  allows  for  the  efficient  use  of  expensive

communications lines. Consider a typical interactive terminal

session to a remote computer.  Most of the time the user is

thinking. The network is needed only after a key is struck or

when a reply is returned. Holding an open connection would

waste most of the capacity of the network link. Instead, the

computer  waits  until  after  a  key  is  struck,  at  which  point

it puts the keystroke information in a packet which is sent

across the network.  The rest of the time the network links

are free to be used for transporting packets from other users.

     With dynamic routing a packet's path across the network

is  determined  anew  for  each  packet  transmitted.   Because

multiple paths exist between most pairs of network nodes,
_________________________________________
  2  ``Connection-oriented'' packet-switching networks also exist:  X.25
and Frame Relay are examples of such.



                                       3

it is quite possible that different packets will take different

paths through the network.3

     The postal service is a good metaphor for the technology

of  the  Internet  (Krol  (1992),  pp.  20--23).   A  sender  puts

a message into an envelope (packet),  and that envelope is

routed through a series of postal stations, each determining

where to send the envelope on its next hop.  No dedicated

pipeline is opened end-to-end, and thus there is no guarantee

that envelopes will arrive in the sequence they were sent, or

follow exactly the same route to get there.

     So that packets can be identified and reassembled in the

correct order, TCP packets consist of a header followed by

data.  The header contains the source and destination ports,

the sequence number of the packet, an acknowledgment flag,

and so on.  The header comprises 20 (or more) bytes of the

packet.

     Once  a  packet  is  built  TCP  sends  it  to  a  router,  a

computer that is in charge of sending packets on to their next

destination.  At this point IP tacks on another header (20 or

more bytes) containing source and destination addresses and

other information needed for routing the packet. The router

then calculates the best next link for the packet to traverse

towards  its  destination,  and  sends  it  on.    The  best  link

may change minute-by-minute, as the network configuration

changes.4  Routes can be recalculated immediately from the
_________________________________________
  3  Dynamic routing contributes to the efficient use of the communications
lines, because routing can be adjusted to balance load across the network.
The other main justification for dynamic routing is network reliability, since
it gives each packet alternative routes to their destination should some links
fail.  This was especially important to the military, which funded most of
the early TCP/IP research to improve the ARPANET.

  4  Routing is based on a dynamic knowledge of which links are up and



                                       4

routing table if a route fails. The routing table in a switch is

updated approximately continuously.

     The data in a packet may be 1500 bytes or so. However,

recently the average packet on NSFNET carries about 200

bytes of data (packet size has been steadily increasing).  On

top of these 200 bytes the TCP/IP headers add about 40; thus

about  17%  of  the  traffic  carried  on  the  Internet  is  simply

header information.

     Over the past 5 years, the speed of the NSFNET backbone

has grown from 56 Kbps to 45 Mbps (``T-3'' service).5 These

lines can move data at a speed of 1,400 pages of text per

second; a 20-volume encyclopedia can be sent across the net

in half a minute. Many of the regional networks still provide

T1 (1.5Mbps) service, but these too, are being upgraded.

     The  transmission  speed  of  the  Internet  is  remarkably

high.  We recently tested the transmission delay at various

times of day and night for sending a packet to Norway. Each

packet traversed 16 links, and thus the IP header had to be

read and modified 16 times, and 16 different routers had to

calculate  the  best  next  link  for  the  transmission.   Despite

the  many  hops  and  substantial  packetization  and  routing

overhead, the longest delay on one representative weekday

was only 0.333 seconds (at 1:10 PM); the shortest delay was

0.174 seconds (at 5:13 PM).

_________________________________________
a static ``cost'' assigned to each link.  Currently routing does not take
congestion into account. Routes can change when hosts are added or deleted
from the network (including failures), which happens often with about 1
million hosts and over 11,000 subnetworks.

  5  In fact, although the communications lines can transport 45 Mbps, the
current network routers can support only 22.5 Mbps service.  ``Kbps'' is
thousand (kilo) bits per second; ``Mbps'' is million (mega) bits per second.



                                       5

Current Backbone Network Costs


The postal service is a good metaphor for packet-switching

technology,  but  a  bad  metaphor  for  the  cost  structure  of

Internet services. Most of the costs of providing the Internet

are  more-or-less  independent  of  the  level  of  usage  of  the

network; i.e., most of the costs are fixed costs. If the network

is  not  saturated  the  incremental  cost  of  sending  additional

packets is essentially zero.

     The NSF currently spends about $11.5 million per year

to operate the NSFNET and provides $7 million per year of

grants to help operate the regional networks.6  There is also

an NSF grant program to help colleges and universities to

connect to the NSFNET. Using the conservative estimate of

1  million  hosts  and  10  million  users,  this  implies  that  the

NSF subsidy of the Internet is less than $20 per year per host,

and less than $2 per year per user.

     Total salaries and wages for NSFNET have increased by

a little more than one-half (about 68% nominal) over 1988-

-1991, during a time when the number of packets delivered

has increased 128 times.7  It is hard to calculate total costs

because  of  large  in-kind  contributions  by  IBM  and  MCI

during the initial years of the NSFNET project, but it appears

that  total  costs  for  the  128-fold  increase  in  packets  have

increased by a factor of about 3.2.

     Two  components  dominate  the  costs  of  providing  a

backbone network: communications lines and routers. Lease
_________________________________________
  6  The regional network providers generally set their charges to recover
the remainder of their costs, but there is also some subsidization from state
governments at the regional level.

  7  Since  packet  size  has  been  slowly  increasing,  the  amount  of  data
transported has increased even more.



                                       6

payments for lines and routers accounted for nearly 80% of


the 1992 NSFNET costs.  The only other significant cost is


for the Network Operations Center (NOC), which accounts


for roughly 7% of total cost.8   In our discussion we focus


only on the costs of lines and routers.
     We have estimated costs for the network backbone as of


1992--93.9  A T-3 (45 Mbps) trunk line running 300 miles


between two metropolitan central stations can be leased for


about  $32,000  per  month.   The  cost  to  purchase  a  router


capable of managing a T-3 line is approximately $100,000.


Assuming another $100,000 for service and operation costs,


and 50-month amortization at a nominal 10% rate yields a


rental cost of about $4900 per month for the router.

_________________________________________
  8  A NOC monitors traffic flow at all nodes in the network and trou-
bleshoots problems.
  9  We estimated costs for the network backbone only, defined to be links
between common carrier Points of Presence (POPs) and the routers that
manage those links.  We did not estimate the costs for the feeder lines to
the mid-level or regional networks where the data packets usually enter and
leave the backbone, nor for the terminal costs of setting up the packets or
tearing them apart at the destination.


                                       7

 Table 1.

 Communications and Router Costs

_(Nominal_$_per_million_bits)1_________________________________________________*
 *_______

__Year________Communications_____________Routers______Design_Throughput________*
 *_______

  1960                         1.00                           2.4 kbps

  1962                                     10.00

  1963                         0.42                          40.8 kbps

  1964                         0.34                          50.0 kbps

  1967                         0.33                          50.0 kbps

  1970                                     0.168

  1971                                     0.102

  1974                         0.11        0.026             56.0 kbps

__1992____________________0.00094_______0.00007_______________45_mbps__________*
 *_______


Notes: 1. Costs are based on sending one million bits of data approximately
1200 miles on a path that traverses five routers.
Sources:  1960--74 from Roberts (1974).  1992 calculated by the authors
using data provided by Merit Network, Inc.


     The costs of both communications and switching have

been dropping rapidly for over three decades. In the 1960s,

digital  computer  switching  was  more  expensive  (on  a  per

packet  basis)  than  communications  (Roberts  (1974)),  but

switching has become substantially cheaper since then.  We

have estimated the 1992 costs for transporting 1 million bits

of data through the NSFNET backbone and compare these

to estimates for earlier years in Table 1.  As can be seen, in

1992 the line cost is about eight times as large as the cost of

routers.

     The topology of the NSFNET backbone directly reflects

the cost structure: lots of cheap routers are used to manage

a limited number of expensive lines. We illustrate a portion

of the network in Figure 1.  Each of the numbered squares

is an RS6000 router; the numbers listed beside a router are


                                       8

links to regional networks. Notice that in general any packet

coming on to the backbone has to move through two separate

routers at the entry and exit node.  For example, a message

we  send  from  the  University  of  Michigan  to  a  scientist  at

Bell Laboratories will traverse link 131 to Cleveland, where

it passes through two routers (41 and 40). The packet goes to

New York, where it again moves through two routers (32 and

33) before leaving the backbone on link 137 to the JVNCnet

regional  network  that  Bell  Labs  is  attached  to.   Two  T-3

communications links are navigated using four routers.



   /afs/umich.edu/user/h/a/halv/Shared/Figures/NetFrag.eps


Figure 1. Network Topology Fragment

Technological and Cost Trends


The decline in both communications link and switching costs

has been exponential at about 30% per year (see the semi-log


                                       9

plot in Figure 2). But more interesting than the rapid decline

in costs is the change from expensive routers to expensive

transmission links. Indeed, it was the crossover around 1970

(Figure 2) that created a role for packet-switching networks.

When  lines  were  cheap  relative  to  switches  it  made  sense

to  have  many  lines  feed  into  relatively  few  switches,  and

to open an end-to-end circuit for each connection.  In that

way, each connection wastes transmission capacity (lines are

held open whether data is flowing or not) but economizes on

switching (one set-up per connection).



 /afs/umich.edu/user/h/a/halv/Shared/Figures/CommCost.eps

Figure  2.   Trends  in  costs  for  communications  links  and

routers.
     When switches became cheaper than lines the network is

more efficient if data streams are broken into small packets

and sent out piecemeal, allowing the packets of many users

to share a single line. Each packet must be examined at each

switch along the way to determine its type and destination,

but this uses the relatively cheap switch capacity.  The gain


                                       10

is that when one source is quiet, packets from other sources

use the same (relatively expensive) lines.

     Although the same reversal in switch and line costs oc-

curred for voice networks, circuit-switching is still the norm

for voice. Voice is not well-suited for packetization because

of variation in delivery delays, packet loss, and packet or-

dering.10   Voice customers will not tolerate these delays in

transmission (although some packetized voice applications

are beginning to emerge as transmission speed and reliability

increases, see (Anonymous (1986)) ).11



2.  Congestion problems


Another  aspect  of  cost  of  the  Internet  is  congestion  cost.

Although congestion costs are not paid for by the providers

of  network  services,  they  are  paid  for  by  the  users  of  the

service.   Time  spent  by  users  waiting  for  a  file  transfer

is  a  social  cost,  and  should  be  recognized  as  such  in  any

economic accounting.

     The  Internet  experienced  severe  congestion  problems

in  1987.    Even  now  congestion  problems  are  relatively

common in parts of the Internet (although not currently on

the T-3 backbone). According to Kahin (1992): ``However,

problems  arise  when  prolonged  or  simultaneous  high-end
_________________________________________
 10  Our tests found packet delays ranging between 156 msec and 425 msec
on a trans-Atlantic route (N=2487 traces, standard deviation = 24.6 msec).
Delays were far more variable to a Nova Scotia site: the standard deviation
was 340.5 msec when the mean delay was only 226.2 msec (N=2467); the
maximum delay was 4878 msec.

 11  The reversal in link and switch costs has had a profound effect on voice
networks. Indeed, Peter Huber has argued that this reversal made inevitable
the breakup of ATT (Huber (1987)). He describes the transformation of the
network from one with long lines all going into a few central offices into
a web of many switches with short lines interconnecting them so that each
call could follow the best path to its destination.



                                       11

uses start degrading service for thousands of ordinary users.

In  fact,  the  growth  of  high-end  use  strains  the  inherent

adaptability of the network as a common channel.''  (page

11.)   It  is  apparent  that  contemplated  uses,  such  as  real-

time video and audio transmission, would lead to substantial

increases in the demand for bandwidth and that congestion

problems  will  only  get  worse  in  the  future  unless  there  is

substantial increase in bandwidth:

          If  a  single  remote  visualization  process  were
     to  produce  100  Mbps  bursts,  it  would  take  only  a
     handful  of  users  on  the  national  network  to  gener-
     ate  over  1Gbps  load.   As  the  remote  visualization
     services move from three dimensions to [animation]
     the  single-user  bursts  will  increase  to  several  hun-
     dred  Mbps  : : :Only  for  periods  of  tens  of  minutes
     to several hours over a 24-hour period are the high-
     end requirements seen on the network.  With these
     applications, however, network load can jump from
     average to peak instantaneously.'' Smarr and Catlett
     (1992), page 167.


There are cases where this has happened. For example dur-

ing  the  weeks  of  November  9  and  16,  1992,  some  packet

audio/visual broadcasts caused severe delay problems, espe-

cially at heavily-used gateways to the NSFNET backbone,

and in several mid-level networks.

     To investigate the nature of congestion on the Internet

we timed the delay in delivering packets to seven different

sites  around  the  world.    We  ran  our  test  hourly  for  37

days  during  February  and  March,  1993.   Deliveries  can

be delayed for a number of reasons other than congestion-

induced  bottlenecks.   For  example,  if  a  router  fails  then

packets  must  be  resent  by  a  different  route.   However,  in

a  multiply-connected  network,  the  speed  of  rerouting  and


                                       12

  delivery of failed packets measures one aspect of congestion,

  or the scarcity of the network's delivery bandwidth.

       Our results are summarized in Figure 3 and Figure 4; we

  present the results only from four of the 24 hourly probes.

  Figure 3 shows the average and maximum delivery delays by

  time of day.  Average delays are not always proportional to

  distance: the delay from Michigan to New York University

  was  generally  longer  than  to  Berkeley,  and  delays  from

  Michigan to Nova Scotia, Canada, were often longer than to

  Oslo, Norway.



/afs/umich.edu/user/h/a/halv/Shared/Figures/DelayAvgMax.eps


  Figure 3.  Maximum and Average Transmission Delays on

  the Internet
                                         13

/afs/umich.edu/user/h/a/halv/Shared/Figures/DelayStdDev.eps


 Figure 4. Variability in Internet Transmission Delays


      There  is  substantial  variability  in  Internet  delays.   For

 example, the maximum and average delays in Figure 3 are

 quite different by time of day.  There appears to be a large

 4PM peak problem on the east coast for packets to New York

 and Nova Scotia, but much less for ATT Bell Labs (in New

 Jersey).12  The time-of-day variation is also evident in Figure

 5, borrowed from Claffy, Polyzos, and Braun (1992).13

      Figure 4 shows the standard deviation of delays by time

 of  day  for  each  destination.    The  delays  to  Canada  are

 extraordinarily variable, yet the delays to Oslo have no more

 variability  than  does  transmission  to  New  Jersey  (ATT).
 _________________________________________
  12  The high maximum delay for the University of Washington at 4PM is
 correct, but appears to be aberrant. The maximum delay was 627 msec; the
 next two highest delays (in a sample of over 2400) were about 250 msecs
 each.  After dropping this extreme outlier, the University of Washington
 looks just like UC Berkeley.

  13  Note that the Claffy et al. data were for the old, congested T-1 network.
 We reproduce their figure to illustrate the time-of-day variation in usage;
 the actual levels of link utilization are generally much lower in the current
 T-3 backbone. Braun and Claffy (1993) show time-of-day variations in T-3
 traffic between the US and three other countries in their Figure 5.



                                        14



 /afs/umich.edu/user/h/a/halv/Shared/Figures/UsageTOD.eps
Figure 5.  Utilization of Most Heavily Used Link in Each

Fifteen Minute Interval (Claffy et al. (1992))


Variability in delay fluctuates widely across times of day, as

we would expect in a system with bursty traffic, but follows

no obvious pattern.

     According  to  Kleinrock  (1992),  ``One  of  the  least  un-

derstood aspects of today's networking technology is that of

network  control,  which  entails  congestion  control,  routing

control, and bandwidth access and allocation.''  We expect

that if access to Internet bandwidth continues to be provided

at  a  zero  cost  there  will  inevitably  be  congestion.   Essen-

tially,  this  is  the  classic  problem  of  the  commons:  unless

the congestion externality is priced, there will inevitably be

inefficient use of the common resource. As long as users face

a zero price for access, they will continue to ``overgraze.''

Hence, it makes sense to consider how networks such as the

Internet should be priced.

     There is a large literature on network congestion control;


                                       15

see Gerla and Kleinrock (1988) for an overview.  However,

there is very little work in using pricing for congestion con-

trol. Cocchi, Estrin, Shenker, and Zhang (1992) and Shenker

(1993) make the important point that if different applications

use different types of network services (responsiveness, re-

liability, throughput, etc.), then it will be necessary to have

some  sort  of  pricing  to  sort  out  users'  demands  for  these

characteristics. These papers lay out the problem in general

and describe how it might be solved.

     Faulhaber (1992) has considered some of the economic

issues related to pricing access to the Internet.  He suggests

that  ``transactions  among  institutions  are  most  efficiently

based on capacity per unit time. We would expect the ANS

to  charge  mid-level  networks  or  institutions  a  monthly  or

annual  fee  that  varied  with  the  size  of  the  electronic  pipe

provided  to  them.   If  the  cost  of  providing  the  pipe  to  an

institution were higher than to a mid-level network : : :the

fee would be higher.''

     Faulhaber's suggestion makes sense for a dedicated line--

-e.g., a line connecting an institution to the Internet backbone.

But  we  don't  think  that  it  is  necessarily  appropriate  for

charging for backbone traffic itself.  The reason is that the

bandwidth on the backbone is inherently a shared resource-

--many packets ``compete'' for the same bandwidth.  There

is an overall constraint on capacity, but there are is no such

thing as individual capacity level on the backbone.14
_________________________________________
 14  Although  it  may  be  true  that  an  institution's  use  of  the  backbo*
 *ne
bandwidth is more-or-less proportional to the bandwidth of its connection
to the backbone.   That is,  the size of an institution's dedicated line to
the backbone may be a good signal of its intended usage of the common
backbone.



                                       16

     Although  we  agree  that  it  is  appropriate  to  charge  a

flat  fee  for  connection  to  the  network,  we  also  think  that

it  is  important  to  charge  on  a  per  packet  basis,  at  least

when the network is congested.  After all,  during times of

congestion the scarce resource is bandwidth for additional

packets.15   The problem with this proposal is the overhead,

or, in economics terms, the transactions cost. If one literally

charged for each individual packet,  it would be extremely

costly  to  maintain  adequate  records.   However,  given  the

astronomical units involved there should be no difficulty in

basing  charges  on  a  statistical  sample  of  the  packets  sent.

Furthermore, accounting can be done in parallel to routing

using much less expensive computers.

     Conversely  when  the  network  is  not  congested  there

is  very  small  marginal  cost  of  sending  additional  packets

through  the  routers.   It  would  therefore  be  appropriate  to

charge users a very small price for packets when the system

is not congested.

     There  has  been  substantial  recent  work  on  designing

mechanisms for usage accounting on the Internet.  The In-

ternet  Accounting  Working  Group  has  published  a  draft

architecture for Internet usage reporting (Internet Account-

ing: Usage Reporting Architecture, July 9, 1992 draft). ANS

has  developed  a  usage  sampling  and  reporting  system  it

calls  COMBits.   COMBits  was  developed  to  address  the

need  to  allocate  costs  between  government-sponsored  re-

search and educational use, and commercial usage, which is
_________________________________________
 15  As we have already pointed out the major bottleneck in backbone
capacity is not the bandwidth of the medium itself, but the switch technology.
We use the term bandwidth to refer to the overall capacity of the network.



                                       17

rapidly growing. COMBits collects an aggregate measure of

packets and bytes usage,  using a statistical sampling tech-

nique.16  However, COMBits only collects data down to the

network-to-network level of source and destination.  Thus,

the resulting data can only be used to charge at the level of the

subnetwork;  the local network administrator is responsible

for splitting up the bill (Ruth and Mills (1992)).17

     Braun and Claffy (1993) describe current traffic patterns

of  the  Internet  by  type  of  application  and  by  international

data flows, and discuss some of the accounting issues that

need to be solved.



Existing support for prioritizing packets


IP  packets  contain  fields  known  Precedence  and  Type  of

Service (TOS). Currently, most commercial routers do not

use  these  fields.18   However,  it  is  widely  anticipated  that

this must change due to increased congestion on the Internet:

``An obvious application would be to allow router and host

configuration to limit traffic entering the internet to be above

some specific precedence. Such a mechanism could be used

to reduce traffic on an internet as often as needed under crisis

conditions'' (Cerf (1993)).

     The  current  interpretations  of  these  fields  described  in

Postel (1981) will probably be changed to the more flexible
_________________________________________
 16  See K. Claffy and Polyzos (1993) for a detailed study of sampling
techniques for measuring network usage.

 17  COMBits has been plagued by problems and resistance and currently
is used by almost none of the mid-level networks.

 18  In 1986 the NSFNET experienced severe congestion and the there was
some experimentation with routing based on the IP precedence field and
the type of application. When the NSFNET was upgraded to T1 capacity,
priority queuing was abandoned for end-user traffic.



                                       18

form  described  in  Almquist  (1992).    Almquist  discusses

only the TOS fields,  and proposes that the user be able to

request that the network should minimize delay, maximize

throughput, maximize reliability, or minimize monetary cost

when delivering the packet. Prototype algorithms to provide

such service are described in Prue and Postel (1988). In this

proposed protocol a router looks up the destination address

and  examines  the  possible  routes.   Each  route  has  a  TOS

number.  If the TOS number of the route matches the TOS

number of the datagram, then that route is chosen. Note that

the TOS numbers must match;  inequality relationships are

not allowed.

     To an economist's eye,  this specification seems some-

what  inflexible.   In  particular,  the  TOS  value  ``minimize

monetary cost'' seems somewhat strange. Of course senders

would want to minimize monetary cost for a given quality

of service:  minimizing monetary cost is an objective, not a

constraint. Also, the fact that TOS numbers do not allow for

inequality relations is strange. Normally, one would think of

specifying the amount that one would be willing to pay for

delivery, with the implicit assumption that any less expensive

service (other things being equal) would be better.

     As Almquist (1992) explains, ``There was considerable

debate over what exactly this value [minimize monetary cost]

should mean.'' However, he goes on to say:

          ``It seems likely that in the future users may need
     some  mechanism  to  express  the  maximum  amount
     they  are  willing  to  pay  to  have  a  packet  delivered.
     However, an IP option would be a more appropriate
     mechanism,  since  there  are  precedents  for  having
     IP  options  that  all  routers  are  required  to  honor,
     and  an  IP  option  could  include  parameters  such  as


                                       19

     the  maximum  amount  the  user  was  willing  to  pay.
     Thus,  the  TOS  value  defined  in  this  memo  merely
     requests that the network ``minimize monetary cost.''
     Almquist (1992)


     Currently there is much discussion in the network com-

munity about what forms of pricing should become part of

the Internet protocol. As Estrin (1989) puts it: ``The Internet

community developed its original protocol suite with only

minimal provision for resource control : : :This time it would

be inexcusable to ignore resource control requirements and

not to pay careful attention to their specification.''



3.  General observations on pricing


The  Internet  uses  scarce  resources.   Telecommunications

lines,  computer  equipment,  and  labor  are  not  free;  if  not

employed by the Internet, they could be put to productive use

in other activities. Bandwidth is also scarce: when the back-

bone is congested, one user's packet crowds out another's,

resulting in dropped or delayed transmissions.  Economics

is concerned with ways to allocate scarce resources among

competing uses, and it is our belief that economics will be

useful in allocating Internet resources as well.

     We are not concerned with pricing the Internet to generate

profits from selling backbone services.  Indeed,  a network

need not be private to be priced; governments are perfectly

capable  of  charging  prices.19    Rather,  our  goal  is  to  find

pricing  mechanisms  that  lead  to  the  most  efficient  use  of

existing resources, and that guide investment decisions in an

appropriate manner.
_________________________________________
 19  In  fact,  many  of  the  mid-level  regional  networks  are  government
agencies, and they charge prices to connect organizations to their networks.



                                       20

     One common resource allocation mechanism is random-

ization: each packet has an equal chance of getting through

(or being dropped). Another allocation scheme is first-come,

first-served: all packets are queued as they arrive and if the

network  is  congested,  every  packet  suffers  a  delay  based

on its arrival time in the queue.  It is easy to see why these

schemes are not good ways to achieve efficiency.20  However

one measures the social value of expeditious delivery for a

packet,  it  will  surely  be  true  that  some  packets  are  worth

more than others.  For example, a real-time video transmis-

sion  of  a  heart  operation  to  a  remote  expert  may  be  more

valuable than a file transfer of a recreational game or picture.

Economic efficiency will be enhanced if the mechanism al-

locating scarce bandwidth gives higher priority to uses that

are more socially valuable.

     We  do  not  want  the  service  provider---government  or

otherwise---to decide which packets are more socially valu-

able and allocate scarce bandwidth accordingly.  We know

from the Soviet experience that allowing bureaucrats to de-

cide whether work shoes or designer jeans are more valuable

is a deeply flawed mechanism.  A price mechanism works

quite differently. The provider knows the costs of providing

services  and  can  announce  these  to  the  users;  users  then

can decide for themselves whether their packets are more or

less valuable than the cost of providing the packet transport

service. When the backbone is congested the cost of service

will be high due to the the cost of crowding out or delaying

the packets of other users; if prices reflect costs only those
_________________________________________
 20  Current backbones use a mix of queuing and random dropping as their
mechanisms for allocating congested capacity.



                                       21

packets with high value will be sent until congestion dimin-

ishes. The users themselves decide how valuable each packet

is, and sort out for themselves which packets are serviced (or

in a multiple service quality network, receive which quality

of service; see Shenker (1993)).

     Furthermore,  if  network  congestion  is  properly  priced,

the revenues collected from the congestion surcharges can

be used to fund further capacity expansion.  Under certain

conditions,  the  fees  collected  from  the  congestion  charges

turn out to be just the ``right'' amount to spend on expanding

capacity. We return to this point below.

     One commonly expressed concern about pricing the In-

ternet is that ``poor'' users will be deprived of access.  This

is not a problem with pricing,  but with the distribution of

wealth.   A  pricing  mechanism  determines  how  the  scarce

bandwidth  will  be  allocated  given  the  preferences  and  re-

sources of the users.  If we wish to ensure that certain users

have sufficient resources to purchase a base level of services

then we can redistribute initial resources, say by providing

vouchers or lump sum grants.21

     Universal access and a base endowment of usage for all

citizens---if desired---can be provided through vouchers or

other  redistribution  schemes.   But  for  a  given  distribution

of  resources,  how  should  backbone  services  be  allocated?

They are currently allocated (among paid-up subscribers) on
_________________________________________
 21  Food stamps are an example of such a scheme. The federal government
more or less ensures that everyone has sufficient resources to purchase a
certain amount of food. But food is priced, so that given one's wealth plus
food stamps, the consumer still must decide how to allocate scarce resources
relative to the costliness of providing those resources. The government does
not guarantee unlimited access to foodstuffs, nor to all varieties of caloric
substances (alcoholic beverages are not eligible).



                                       22

the basis of randomization and first-come,  first-served.  In

other words, users are already paying the costs of congestion

through delays and lost packets.  A pricing mechanism will

convert delay and queuing costs into dollar costs.  If prices

are designed to reflect the costs of providing the services,

they will force the user to compare the value of her packets

to the costs she is imposing on the system.  Allocation will

then be on the basis of the value of the packets, and the total

value of service provided by the backbones will be greater

than under a non-price allocation scheme.

     In  the  rest  of  the  paper  we  discuss  how  one  might

implement pricing that reflects the cost (including congestion

costs)  of  providing  backbone  services.   We  begin  with  a

review of some current pricing schemes and their relationship

to costs.



4.  Current Pricing Mechanisms


NSFNET,  the  primary  backbone  network  of  the  Internet,

has been paid for by the NSF, IBM, MCI and the State of

Michigan until the present.22  However, most organizations

do not connect directly to the NSFNET. A typical university

will  connect  to  its  regional  mid-level  network;  the  mid-

level maintains a connection to the NSFNET. The mid-level

networks (and a few alternative backbone networks) charge

their customers for access.

     There  are  dozens  of  companies  that  offer  connections

to the Internet.  Most large organizations obtain direct con-

nections,  which  use  a  leased  line  that  permits  unlimited
_________________________________________
 22  NSF restricts the use of the backbone to traffic with a research or
educational purpose, as defined in the Acceptable Use Policies.



                                       23

usage subject to the bandwidth of the line. Some customers


purchase ``dial-up'' service which provides an intermittent


connection, usually at much lower speeds.  We will discuss


only direct connections below.

     Table 3 summarizes the prices offered to large universi-


ties by ten of the major providers for T-1 access (1.5 mbps).23


There are three major components: an annual access fee, an


initial connection fee and in some cases a separate charge


for the customer premises equipment (a router to serve as


a  gateway  between  the  customer  network  and  the  Internet


provider's network).24  The current annualized total cost per


T-1 connection is about $30--35,000.


_________________________________________
 23  The  fees  for  some  providers  are  dramatically  lower  due  to  public
subsidies.

 24  Customers will generally also have to pay a monthly ``local loop''
charge to a telephone company for the line between the customer's site and
the Internet provider's ``point of presence'' (POP), but this charge depends
on mileage and will generally be set by the telephone company, not the
Internet provider.



                                       24




     All of the providers use the same type of pricing: annual

fee  for  unlimited  access,  based  on  the  bandwidth  of  the

connection.   This  is  the  type  of  pricing  recommended  by

Faulhaber (1992).  However, these pricing schemes provide

no incentives to flatten peak demands, nor any mechanism for

allocating network bandwidth during periods of congestion.

It  would  be  relatively  simple  for  a  provider  to  monitor  a

customer's usage and bill by the packet or byte. Monitoring

requires only that the outgoing packets be counted at a single

point: the customer's gateway router.

     However,  pricing  by  the  packet  would  not  necessarily

increase the efficiency of network service provision, because

the  marginal  cost  of  a  packet  is  nearly  zero.  As  we  have

shown, the important scarce resource is bandwidth, and thus


                                       25

efficient prices need to reflect the current state of the network.

Neither a flat price per packet nor even time-of-day prices

would come very close to efficient pricing.
5.  Matching prices to costs



In general we want the prices that users face to reflect the

resource  costs  that  they  generate  so  that  they  can  make

intelligent decisions about resource utilization. In the case of

the Internet, there are several costs that might be considered:



  o  The fixed costs of providing the network infrastruc-

     ture.  As we have seen this is basically the rent for the

     line, the cost of the routers, and the salary for the support

     staff.


  o  The  incremental  costs  of  sending  extra  packets.   If

     the network is not congested, this is essentially zero.


  o  The social costs of delaying other users' packets when

     the network is congested. This is not directly a resource

     cost, but should certainly be considered part of the social

     cost of a packet.


  o  The cost of expanding capacity of the network. This

     will normally consist of adding new routers, new lines,

     and new staff.


     We  first  consider  how  ideal  prices  would  incorporate

this cost information, then consider how market-based prices

might work.
                                       26

The incremental costs of sending extra packets.


The price of sending a packet in a non-congested network

should be close to zero; any higher price is socially inefficient

since  it  does  not  reflect  the  true  incremental  costs.    If

the  incremental  cost  is  high  enough  to  justify  the  cost  of

monitoring and billing, it should be charged as a per-packet

cost.25
The social costs of delaying other users' packets when the

network is congested.


The  price  for  sending  a  packet  when  the  network  is  in  a

congested state should be positive:  if my packet precludes

(or delays) another user's packet, then I should face the cost

that I impose on the other user. If my packet is more valuable

than hers, then it should be sent; if hers is more valuable than

mine, then hers should be sent.

     We  can  depict  the  logic  of  this  argument  graphically

using demand and supply curves.  Suppose the packet price

were very high;  then only a few users would want to send

packets.  As the packet price decreases,  more users would

be willing to send more packets. We depict this relationship

between price and the demand for network access in Figure

6. If the network capacity is some fixed amount K, then the

optimal price for access is where the demand curve crosses

the capacity supply. If demand is small relative to capacity,

the efficient price is zero---all users are admitted. If demand

_________________________________________
 25  Note  that  much  of  the  necessary  monitoring  and  billing  cost  may
already be incurred to implement our other pricing proposals.
                                       27



   /afs/umich.edu/user/h/a/halv/Shared/Figures/Demand.eps



Figure 6.  Demand for network access with fixed capacity.

When demand is low, the packet price is low. When demand

is high, the packet price is high.


is high, users that are willing to pay more than the price of

admission to the network are admitted; the others are not.

     This analysis applies for the extreme case where there is

a fixed capacity.  If increase in use by some agents imposes

delay on other agents, but not outright exclusion, the analysis

is slightly different.  Suppose that we know the amount of

delay as a function of number of packets, and that we have

some idea of the costs imposed on users by a given amount of

delay. Then we can calculate a relationship between number

of packets sent and delay costs. The relevant magnitude for

determining the optimal number of users is the marginal cost

of delay, as depicted in Figure 7.

     The efficient price is where the marginal willingness to

pay for an additional packet just covers the marginal increase

in delay costs generated by that packet.  If a potential user

faces this price he will be able to compare his own benefit

from sending a packet to the marginal delay costs that this

imposes on other users.



                                       28



/afs/umich.edu/user/h/a/halv/Shared/Figures/DemandSupply.eps



  Figure 7.  Demand for network access with a marginal cost

  of delay. When demand is low, the packet price is low. When

  demand is high, and congestion is high, the packet price is

  high.


  The cost of expanding capacity of the network.


  If the network usage never reaches capacity, even at a zero

  price of packets, then clearly there is no need for expanding

  capacity. It is only appropriate to expand capacity when the

  network is sometimes congested.  Consider first the model

  with fixed capacity. If the packet prices are set correctly, we

  have seen that they measure the marginal value of the last

  admitted packet.  If the cost of expanding capacity enough

  to accommodate one more packet is less than the marginal

  value of that packet, then it makes economic sense to expand

  capacity.   If  this  condition  is  not  satisfied,  then  capacity

  expansion is not economically worthwhile.


       Hence the optimal congestion prices play a two roles---

  they serve to efficiently ration access to the network in times

  of congestion and they send the correct signals with respect

  to capacity expansion.  In this framework, all the revenues


                                         29

generated by congestion prices should be plowed back into

capacity expansion.

     Note  that  only  the  users  who  want  to  use  the  network

when  it  is  at  capacity  pay  for  capacity  expansion.   Users

who  are  willing  to  wait  until  after  the  demand  peak  do

not pay anything towards expanding network capacity.  We

think that this point is important from a political perspective.

The largest constituency of the Internet apparently is e-mail

users.26  A proposal to charge high prices for e-mail is likely

to  be  politically  infeasible.   However,  e-mail  can  usually

tolerate moderate delays.  Under congestion pricing of the

sort we are describing, e-mail users could put a low or zero

bid price on their traffic, and would continue to face a very

low cost.

     The situation is only slightly different in the case of delay

costs.  Here the price measures the marginal benefit of an

additional  packet  (which  is  equal  to  the  marginal  cost  of

delay); if additional investment can reduce the marginal cost

of  delay  by  more  than  the  willingness-to-pay  for  reduced

delay then it should be undertaken, otherwise it should not.

We examine the analytics of pricing a congested network in

the Appendix 1.  It turns out that essentially the same result

holds: if the packet price is chosen to be optimal with respect

to delay and congestion costs it will be the appropriate price

to use for determining whether capacity should be expanded.

_________________________________________
 26  More traffic is generated by file transfers, but this reflects fewer users
sending bigger data streams (files vs. e-mail messages).
                                       30

The fixed costs of providing the network infrastructure.


Think  of  the  initial  investment  in  network  infrastructure

as  a  discrete  decision:   if  you  pay  a  certain  amount  of

money  you  can  create  a  usable  network  of  minimal  size.

Further expansion can be guided by the congestion prices,

as indicated above. But what criterion can be used to decide

whether the initial investment is warranted?

     The  simple  answer  is  that  the  investment  should  be

undertaken  if  total  benefits  exceed  costs.   But  since  the

existence  of  the  network  is  a  public  good  that  provides

benefits for all users, we have to add up all potential users'

willingnesses-to-pay for the network infrastructure, and see

if this total willingness-to-pay exceeds the cost of provision.

     In the case of a computer network like the Internet, it is

natural to think of paying for the network infrastructure via

a flat access fee.  Each party who connects to the network

pays a flat price for network access distinct from the usage

based fee described earlier.  In general,  these connect fees

will be different for different people, since different people

and institutions will value connection to the net differently.

Note that in general efficiency will require some sort of price

discrimination in connect fees;  but it will also require that

users pay the same prices for congestion fees.


     In  summary:  there  are  four  types  of  costs  associated

with providing a broad-based computer network: 1) the fixed

costs of providing initial infrastructure; 2) the marginal costs

of sending packets when the network is not congested;  3)

the congestion costs of sending packets when the network is

congested; 4) the costs of expanding capacity.  An efficient

pricing mechanism will have a structure that is parallel to


                                       31

this cost structure: 1) a fixed connection charge that differs

from  institution  to  institution;  2)  a  packet  charge  close  to

zero when the network is not congested; 3) a positive packet

charge when the network is congested; 4) the packet charge

revenues  can  then  be  used  to  guide  capacity  expansion

decisions.



6.  Implementing prices


We  have  argued  that  prices  should  reflect  costs.   But  we

have not yet considered how these efficient prices should be

implemented. We turn now to that task.

     The connect charges are the easiest to deal with,  since

that is very much like the current methods of charging for

provision. Each customer pays a flat fee for connection; often

this fee will depend on the characteristics of the customer

(educational, commercial) and on the size of the bandwidth of

the connection. Presumably the bandwidth of the connection

purchased by a user is correlated to some degree with the

user's willingness to pay, so this should serve as a reasonable

characteristic upon which to base connect charges.27

     A zero cost of packet charges when the network is not

congested is not hard to arrange either---that's what we have

now.  The novel part of the pricing mechanism we propose

is  the  per  packet  congestion  charge.   We  have  discussed

how one might implement such a fee in MacKie-Mason and

Varian  (1993).   We  briefly  review  that  proposal  here.   In

Appendix 2 we describe some of the details that would be

necessary to implement a smart market.
_________________________________________
 27  We intend to investigate how a profit-maximizing or welfare-maximizing
provider of network access might price discriminate in connect fees in future
work.



                                       32

     If congestion has a regular pattern with respect to time of

day, or day of week, then prices could vary in a predictable

way over time. However, this is a relatively inflexible form

for pricing. We think that it would be better to use a ``smart

market'':  a  price  for  packet  access  to  the  net  that  varies

minute-by-minute to reflect the current state of the network

congestion.

     This  would  not  be  terribly  difficult  to  implement,  at

least in a minimal form.  Each packet would have a ``bid''

field in the header that would indicate the willingness-to-pay

for that packet.  Users would typically set default bids for

various applications, then override these defaults in special

circumstances.  For example, a user might assign a low bid

to e-mail packets, for which immediate access to the net is

usually not required. Real-time audio or visual data might be

assigned a high bid price. The network would then admit all

packets whose bid exceeded some cutoff amount. The cutoff

amount  is  determined  by  the  condition  that  the  marginal

willingness-to-pay for an additional packet has to equal the

marginal congestion costs imposed by that packet.

     A  novel  feature  of  this  kind  of  smart  market  is  that

users do not pay the price that they actually bid; rather they

pay  for  their  packets  at  the  market-clearing  price,  which

by construction will be lower than the bids of all admitted

packets.   Note  how  this  is  different  from  priority-pricing

by  say,  the  post  office.  In  the  post-office  model  you  pay

for first-class mail even if there is enough excess capacity

that  second-class  mail  could  move  at  the  same  speed.   In

the smart market described here,  a user pays at most their

willingness-to-pay for an additional packet.


                                       33

     The smart market has many desirable features.  By con-

struction  the  outcome  is  the  classic  supply-equals-demand

level  of  service  of  which  economists  are  so  fond.28    The

equilibrium  price,  at  any  point  in  time,  is  the  bid  of  the

marginal user. Each infra-marginal user is charged this price,

so each infra-marginal user gets positive consumer surplus

from his or her purchase.

     The  major  differences  from  the  textbook  demand  and

supply  story  is  that  no  iteration  is  needed  to  determine

the  market-clearing  price---the  market  is  cleared  as  soon

as  the  users  have  submitted  their  bids  for  access.29    This

mechanism can be viewed as a Vickrey auction where the n

highest bidders gain access at the n + 1st highest price bid.30
     We  have  assumed  that  the  bid-price  set  by  the  users

accurately  reflects  the  true  willingness-to-pay.  One  might

well ask whether users have the correct incentives to reveal

this value: is there anything to be gained by trying to ``fool''

the smart market?  It turns out that the answer is ``no.''  It

can be shown that it is a dominant strategy in the Vickrey

auction to bid your true value, so users have no incentive to

misprepresent their bids for network access. By the nature of
_________________________________________
 28  For good reason, we might add.


 29  Of course,  in real time operation,  one would presumably cumulate
demand over some time interval.   It is an interesting research issue to
consider how often the market price should be adjusted. The bursty nature
of Internet activity suggests a fairly short time interval. However, if users
were charged for the congestion cost of their usage, it is possible that the
bursts would be dampened.

 30  Waldspurger,  Hogg,  Huberman,  Kephart,  and Stornetta (1992) de-
scribes some (generally positive) experiences in using this kind of ``second-
bid'' auction to allocate network resources. However, they do not examine
network access itself, as we are proposing here.



                                       34

the auction, you are assured that you will never be charged

more  than  this  amount  and  normally  you  will  be  charged

much less.



7.  Remarks about the smart market solution
Who sets the bids?


We expect that choice of bids would be done by three parties:

the local administrator who controls access to the net,  the

user  of  the  computer,  and  the  computer  software  itself.

An organization with limited resources, for example, might

choose  low  bid  prices  for  all  sorts  of  access.  This  would

mean that they may not have access during peak times, but

still would have access during off-peak periods.31

     Within  any  limits  imposed  by  institution  policies,  the

users  could  then  set  priority  values  for  their  own  usage.

Normally,  users would set default values in their software

for  different  services.   For  example,  file  transfers  might

have lower priority than e-mail, e-mail would be lower than

telnet (terminal sessions), telnet would be lower than audio,

and so on.  The user could override these default values to

express his own preferences---if he was willing to pay for

the increased congestion during peak periods.

     Note that this access control mechanism only guarantees

relative  priority,  not  absolute  priority.   A  packet  with  a
_________________________________________
 31  With bursty traffic, low-priority packets at ``peak time'' might experi-
ence only moderate delays before getting through. This is likely to be quite
different from the telephone analogue of making customers wait until after
10PM to obtain low-priority, low-rate service. The average length of delays
for low-priority traffic will depend on the average level of excess capacity
in the system. One advantage of our scheme is that it correctly signals the
efficient level of capacity to maintain.



                                       35

high bid is guaranteed access sooner than a low bid, but no

absolute guarantees of delivery time can be made.32  Rejected

packets could be bounced back to the users, or be routed to

a slower network, possibly after being stored for a period in

a buffer in case the permitted priority level falls sufficiently

a short time later.



Offline accounting


If the smart market system is used with the sampling system

suggested  earlier  the  accounting  overhead  doesn't  have  to

slow things down much since it can be done in parallel. All

the router has to do is to compare the bid of a packet with the

current value of the cutoff.  The accounting information on

every 1000th  packet, say, is sent to a dedicated accounting

machine  that  determines  the  equilibrium  access  price  and

records  the  usage  for  later  billing.33   However,  such  sam-

pling  would  require  changes  in  current  router  technology.

Such accounting may well prove expensive.  NSFNET has

modified routers to collect sampled usage data; they found

that the cost of the monitoring system is significant.



Network stability


Adding  bidding  for  priority  to  the  routing  system  should

help  maintain  network  stability,  since  the  highest  priority

packets  should  presumably  be  the  packets  sent  between
_________________________________________
 32  It is hard to see how absolute guarantees can be made on a connec-
tionless network.  However, there have been proposals to provide hybrid
networks, with some connection-oriented services in parallel to the connec-
tionless services. Connection-oriented services are well-suited for delivery
guarantees.

 33  We don't discuss the mechanics of the billing system here. Obviously,
there is a need for COD, third-party pricing, and other similar services.



                                       36

routers that indicate the state of the network. These network

``traffic cops'' could displace ordinary packets so as to get

information through the system as quickly as possible.

     In fact, administrative information currently moves though

the  network  at  a  higher  priority  than  regular  traffic.   This

allows the administrators to update routing tables, etc.  in a

more timely manner. The fact that such prioritized routing is

already in place, albeit in a limited form, indicates that it is

at least feasible to consider extending the prioritization to a

broader set of users.


Fluctuations in the spot market price


Many readers have been unhappy with the idea that the price

of bandwidth would fluctuate in the smart market system. It

is felt by some that having predictable prices and budgets is

important to users. We have several responses to this set of

issues. First, everything depends on how much expenditures

fluctuate.   If  prices  and  uses  of  the  network  turn  out  to

be relatively predictable, expenditures would fluctuate very

little.   Enterprises  have  little  difficulty  now  dealing  with

fluctuations in postage, electricity, and telephone bills from

month to month, and there is no reason to expect that network

usage would be different.

     Second,  it  is  important  to  remember  that  in  the  smart

market, prices only fluctuation down. The user (or the user's

application) sets the maximum he or she is willing to pay for

network access; the actual price paid will almost always be

less than this.  Furthermore,  the user should have virtually

instantaneous feedback about the current state of his or her

expenditures, so there should be little difficulty in budgetary

control.


                                       37

     Finally, the most important point that we need to make

is that the price set by the smart market is a ``wholesale''

price,  not necessarily a ``retail'' price.  If a particular user

doesn't want to bear the risk of price fluctuations, he or she

can always contract with another party who is willing to bear

that  risk.   This  party  may  be  the  supplier  of  the  network

service, or it may be a third party.

     For example, consider an extreme case where the network

price  has  significant  fluctuations:  the  price  for  an  hour  of

teleconferencing at a particular time of day could be $200

or could be $50. A third party could offer to sell bandwidth

to anyone demanding it at, say, $100 an hour.  If the price

turned out to be $50, the bandwidth reseller would make a

profit;  if  it  turned  out  to  be  $200,  the  bandwidth  reseller

would make a loss. But the purchaser would pay a flat $100

no matter what.

     If the price fluctuations are large, it may well happen that

most retail customers buy bandwidth on a contract basis at a

fixed price.  But the fact that the spot market is available is

very important since it allows ``wholesale'' customers to buy

bandwidth on an ``as available'' basis, thereby encouraging

efficient use of bandwidth.


Short term price fluctuations


Another problem arises at the other end of the time scale. It is

widely observed that packet transfers are ``bursty.'' Traffic

on  the  network  fluctuations  quite  significantly  over  short

time periods.  Can a market price keep up with this kind of

fluctuation?

     We have two answers to this question.  First, it is very

easy  to  buffer  packets  for  short  time  intervals.   When  a


                                       38

high-priority/high-bid burst comes along, packets with low

priority  and  low  bid,  are  buffered.  After  the  high-priority

packets are admitted, the low-priority packets move onto the

network.  In network engineering this is known as priority-

based routing, and is a reasonably well-understood policy.

     The second answer is a bit deeper. We conjecture that if

usage were priced in the way we advocate, network traffic

would  be  a  lot  less  bursty.   Said  another  way:  bursts  in

network traffic are there now because there is no charge for

bursts. If bursts were costly to the user there would be fewer

of them.

     Of course, this is not only because the user would change

behavior---the  bursts  are  at  a  much  higher  frequency  than

the users control. Rather, the users would have an incentive

to use applications that smoothed the network traffic flow.

In countries where electricity is priced by time of day, water

heaters are smart enough to heat water in the middle of the

night when rates are low. If a refrigerator can be that smart,

think  what  a  workstation  could  do---if  it  know  the  right

prices.



Routing


As we have mentioned several times, the Internet is a connec-

tionless network. Each router knows the final destination of a

packet, and determines, from its routing tables, what the best

way is to get from the current location to the next location.

These routing tables are updated continuously to indicate the

current state of the network. Routing tables change to reflect

failed links and new nodes, but they do not change to reflect

congestion  on  various  links  of  the  network.  Indeed,  there


                                       39

is no standard measurement for congestion available on the

current NSFNET T-3 network.

     Currently, there is no prioritization of packets: all packets

follow the same route at a given time. However, if each packet

carried a bid price, as we have suggested, this information

could be used to facilitate routing through the Internet.  For

example, packets with higher bids could take faster routes,

while packets with lower bids could be routed through slower

links.

     The  routers  could  assign  access  prices  to  each  link  in

the net, so that only packets that were ``willing to pay'' for

access to that link would be given access.  Obviously this

description is very incomplete, but it seems likely that having

packets bid for access will help to distribute packets through

the network in a more efficient way.


Distributional aspects


As we mentioned earlier, the issue of pricing the Internet is

highly politicized. One nice feature of smart market pricing is

that low-priority access to the Internet (such as e-mail) would

continue  to  have  a  very  low  cost.   Indeed,  with  relatively

minor public subsidies to cover the marginal resource costs,

it would be possible to have efficient pricing with a price of

close to zero most of the time, since the network is usually

not congested.

     If there are several competing carriers, the usual logic of

competitive bidding suggests that the price for low-priority

packets should approach marginal cost---which, as we have

argued, is essentially zero. In the plan that we have outlined

the high priority users would end up paying most of the costs

of the Internet.


                                       40

Price uncertainty


Several readers have objected to the use of the smart market

since it adds an element of price uncertainty: the user won't

necessarily know the price for access to the network unless

he inquires beforehand.  We don't think that this would be

a big problem for several reasons.  First,  it is important to

remember  that  the  user  (or  the  application)  has  complete

control  over  the  maximum  price  that  he  or  she  is  willing

to pay.  Second, we imagine that there would be reasonably

predictable  patterns  in  usage  so  that  users  would  have  a

good  idea  when  congestion  is  likely  to  occur.   Third,  if

there is some uncertainty about the current price,  the user

could simply query the router.  Finally, we think that if the

congestion  prices  are  used  to  guide  investment  decisions,

the demand of the users and the supply of network capacity

should  be  closely  enough  matched  so  that  the  congestion

prices would normally be rather small.

     It is also worthwhile to note that the fluctuations in price

represent a real resource cost---congestion costs. If the user

doesn't bear that cost, then someone else will have to:  the

other users who find their packets delayed or dropped.  Of

course, there is no reason why the risk of price fluctuations

couldn't  be  borne  by  third-parties.   One  could  imagine  a

futures market for bandwidth in which third-parties offer to

absorb the risk of price fluctuations for a fee.



Interruptible service


Implementing the smart market mechanism for pricing con-

gestion on the Internet would involve adding new information

to the TCP/IP headers. It will take a considerable amount of


                                       41

discussion and debate to accomplish this. However, there is

a partial way to handle congestion pricing that requires very

little change in existing protocols.

     Suppose  that  providers  of  Internet  services  had  two

classes  of  service:   full  service  and  interruptible  service.

Users would pay a flat fee based on the size of their pipeline

for the type of service they preferred and full service would

cost more than interruptible service.

     When the load on the routers used by the Internet provider

reached a certain level, the users who had purchased inter-

ruptible service would be denied access until the congestion

subsided.   All  that  is  needed  to  implement  this  rationing

mechanism is a simple change to the routing algorithms.

     The  defect  of  interruptible  service  is  that  it  is  rather

inflexible compared to the smart market solution: it applies

to all participants in a single administrative billing unit and

cannot be overridden by individual users. On the other hand

it  is  very  simple  to  implement.   See  Wilson  (1989)  for  a

detailed study of the analytics of interruptible service.



8.  Role of public and private sector


As  we  have  seen,  current  private  providers  of  access  to

the  Internet  generally  charge  for  the  ``size  of  the  pipe''

connecting users to the net.  This sort of pricing is probably

not too bad from an efficiency point of view since the ``size

of  the  pipe''  is  more-or-less  proportional  to  contemplated

peak usage.

     The  problem  is  that  there  is  no  pricing  for  access  to

the common backbone.  In December of 1992, the NSF an-

nounced that it would stop providing direct operation funding


                                       42

for the ANS T-3 Internet backbone. It is not yet clear when

this  will  actually  happen,  although  the  cooperative  agree-

ment  between  NSF  and  Merit  has  been  extended  through

April 1994. According to the solicitation for new proposals,

the NSF intends to create a new very high speed network

to  connect  the  supercomputer  centers  which  would  not  be

used for general purpose traffic. In addition, the NSF would

provide funding to regional networks that they could use to

pay for access to backbone networks like ANSnet,  PSInet

and Alternet.

     The  NSF  plan  is  moving  the  Internet  away  from  the

``Interstate''  model,  and  towards  the  ``turnpike''  model.

The ``Interstate'' approach is for the government to develop

the ``electronic superhighways of the future'' as part of an

investment in infrastructure. The ``turnpike'' approach is that

the private sector should develop the network infrastructure

for Internet-like operations, with the government providing

subsidies to offset the cost of access to the private networks.

     Both funding models have their advantages and disad-

vantages.   But  we  think  that  an  intermediate  solution  is

necessary.  The private sector is probably more flexible and

responsive  than  a  government  bureaucracy.  However,  the

danger is that competing network standards would lead to an

electronic Tower of Babel. It is important to remember that

turnpikes have the same traffic regulations as the Interstates:

there  is  likely  a  role  for  the  government  in  coordinating

standards setting for network traffic. In particular, we think

that  it  makes  sense  for  the  government,  or  some  industry

consortium, to develop a coherent plan for pricing Internet

traffic at a packet level.34
_________________________________________
 34  One of the recent bills submitted by Representative Boucher to begin



                                       43

     It is worth remarking on the history of standards for voice

networks. U.S. voice communications are now provided by

a mesh of overlapping and connected networks operated by

multiple, competing providers (ATT, MCI and Sprint being

the largest). This is quite a bit like the situation we expect to

emerge for data networks. However, over the decades when

switching  and  billing  standards  were  being  designed  and

refined, the only significant provider was ATT, so it could

impose  a  single,  coordinated  standard  that  later  providers

accepted.   International  voice  networks,  by  contrast,  have

always required interconnection and traffic handoff between

various (mostly national) providers. Standards were designed

and imposed by a public body, the CCITT.

     A pricing standard has to be carefully designed to contain

enough  information  to  encourage  efficient  use  of  network

bandwidth,  as  well  as  containing  the  necessary  hooks  for

accounting and rebilling information.  A privatized network

is simply not viable without such standards, and work should

start immediately on developing them.


_________________________________________
implementing the NREN requires uniform protocols for interconnection
between providers. It is not clear whether the bill will also mandate uniform
standards for providing management information like accounting data.



                                       44

Appendix  1:   Some  analytics  of  pricing  a  congestible

resource


     The  classic  ``problem  of  the  commons''  describes  a

situation where property that is held in common will tend

to be overexploited.  Each user is aware of his private costs

incurred by accessing the common property but neglects the

costs he imposes on others. In the context of the Internet we

have seen that the scarce resource is the switching capacity

of  the  routers.  When  the  network  is  highly  congested,  an

additional  user  imposes  costs  on  other  users  to  the  extent

that his use of switching capacity prevents, or at least slows

down, the use of the same capacity by other users.

     Efficient use of the switch capacity requires that users

that are willing to pay more for access should be admitted

before  users  with  lower  willingness-to-pay.  The  price  for

admission to the switches should be that price that reflects

the social cost of an additional packet.

     Here  we  briefly  examine  some  of  the  analytics  of  a

standard  (static)  congestion  model.35    Arnott,  de  Palma,

and  Lindsey  (1990)  have  argued  strongly  that  congestion

models should examine dynamic microbehavior in a more

detailed  way  than  the  standard  model  does.  Although  we

agree  with  this  point,  and  think  that  modeling  congestion

behavior for computer networks is a promising avenue for

future research, we here consider only the simplest textbook

case of congestion.

     We suppose that a representative user has a utility func-

tion u(xi)-D, where xi is the number of packets sent by user
_________________________________________
 35  The treatment is intended for economists; it is probably too terse for
non-economists.



                                       45

i and D is the total delay experienced by the user. The delay

depends on the total utilization of the network, Y  = X=K
             P  n
where  X  =     i=1  xi  is  the  total  usage  and  K  is  network

capacity.36    This  specification  implies  that  if  usage  X  is

doubled and capacity K is doubled, then network utilization

Y  = X=K and delay D(Y ) remain the same.

     If there is no congestion-based pricing, user i will choose

xi to satisfy the first-order condition37


                                 u0(xi) = 0:


The efficient utilization of the network maximizes the sum
                         P   n
of all users' utilities,     i=1  u(xi) - nD(X=K).  This yields

the n first-order conditions


                         u0(xi) - _n__KD0(Y ) = 0:


One way to achieve this efficient outcome is to set a conges-

tion price per packet of


                               p =  n___KD0(Y );                            (1)


so that user i faces the maximization problem


                      maxx   u(xi) - D(Y )) - pxi:
                          i

The first-order condition to this problem is


                         u0(xi) = p =  n___KD0(Y )                          (2)


which is easily seen to lead to the optimal choice of xi. The

price has been chosen to measure the congestion costs that

i's packets impose on the other users.
_________________________________________
 36  We could also make the utility of packets depend on the delay by writing
utility as u(xi; D). We choose the additively separable specification only
for simplicity.

 37  We assume that the user ignores the fact that his own packets impose
delay on his own packets; we can think of this effect as being built into the
utility function already.  There is no problem in relaxing this assumption;
the calculations just become messier.



                                       46

Optimal capacity expansion


Suppose now that it costs c(K) for capacity K  and that we

currently have some historically given capacity. Should the

capacity be expanded? The welfare problem is

                          X n
            W (K) = maxK        u(xi) - nD(Y ) - c(K):
                           i=1


Since xi is already chosen so as to maximize this expression,

the envelope theorem implies that



                   W 0(K) = nD0(Y ) X____K2- c0(K):



Substituting from equation (1)



                        W 0(K) = p X___K- c0(K):                            (3)



Suppose  that  the  marginal  cost  of  capacity  expansion  is

a  constant,  cK    =  c0(K).    Then  we  see  that  W 0(K)  is

positive if and only if pX - cK  K  > 0.  That is, capacity

should expanded when the revenues from congestion fees

exceed the cost of providing the capacity.



A competitive market for network services


Suppose  that  there  are  several  competing  firms  providing

network  access.   A  typical  producer  has  a  network  with

capacity  K  and  carries  X  packets,  each  of  which  pays  a

packet  charge  of  p.   The  producer's  operating  profits  are

pX - c(K).

     Let p(D) be the price charged by a provider that offers

delay D. In general, if the delay on one network is different

than  on  another  the  price  will  have  to  reflect  this  quality


                                       47

difference. The utility maximization problem for consumer i

is to choose which network to use and how much to use it:


                       maxx   u(xi) - D - p(D)xi
                           i;D

which has first-order conditions

                            u0(xi) - p(D)       = 0


                            -1 - p0(D)xi        = 0:

The first equation says that each user will send packets until

the value of an additional packet equals its price. The second

equation  says  that  the  user  will  choose  a  network  with  a

level of delay that such that the marginal value to the user of

additional delay equals the marginal cost of paying for the

delay (by switching suppliers). Adding up this last first-order

condition over the consumers yields


                              n = -p0(D)X:                                  (4)


     A  competitive  producer  offering  delay  D(Y )  wants  to

choose capacity and price so as to maximize profits, recog-

nizing that if it changes its delay the price that it can charge

for access will change. The profit maximization problem is


                        maxX;K p(D(Y ))X - c(K);


which gives us first-order conditions

                         p0(D)D0(Y )Y  + p(D)          = 0
                                                                            (5)
                    -p0(D)D0(Y )Y 2 - c0(K)            = 0:

Combining these two conditions and using equation (4) gives

us two useful expressions for p(D):


                            p(D)    =  n___KD0(Y )
                                                    :
                                    = c0(K) K___X


                                       48

Comparing the first equation to (2) we see that the compet-

itive  price  will  result  in  the  optimal  degree  of  congestion.

Comparing the second equation to equation (3) we see that

competitive behavior will also result in optimal capacity.



Adding capacity


Suppose  now  that  a  competitive  firm  is  trying  to  decide

whether  to  add  additional  capacity  K.   We  consider  two

scenarios. In the first scenario, the firm contemplates keeping

X fixed and simply charging more for the reduction in delay.

The amount extra it can charge for each packet is


                    _dp__ K = -p0(D)D0(Y ) X____K:
                    dK                     K2


Using equation (5) this becomes


                                     _p__K:
                                     K


Since the firm can charge this amount for each packet sent,

the total additional revenue from this capacity expansion is



                                    p X___KK:



This revenue will cover the costs of expansion if

                               ~               ~

           p X___KK - c0(K)K =   p X___K- c0(K)     K   0;



which is precisely the condition for social optimality as given

in equation (3).

     Consider  now  the  second  scenario.   The  firm  expands

its  capacity  and  keeps  its  price  fixed.   In  a  competitive

market it will attract new customers due to the reduction in

delay.  In  equilibrium  this  firm  must  have  the  same  delay


                                       49

as other firms charging the same price.  Suppose that in the

initial equilibrium X=K  = Y .  Then the additional number

of  packets  sent  must  satisfy  X  =  Y K:  It  follows  that  the

increase in in profit for this firm is given by

                               ~               ~

               pY K - c0(K)K =   p X___K- c0(K)     K:



Again we see that capacity expansion is optimal if and only

if it increases profits.

     The relationship between capacity expansion and conges-

tion pricing was first recognized by Mohring and Hartwize

(1962) and Strotz (1978). Some recent general results can be

found in Arnott and Kraus (1992b, 1992a).

                                       50

Appendix  2:  An  hypothetical  one-node  backbone  with

smart market


     Implementing any pricing scheme for backbone services

will  require  changes  to  user  applications,  host  operating

systems,  and router algorithms.  Very little work has been

done  on  the  software  and  protocol  changes  necessary  to

support efficient pricing.38  To illustrate the types of changes

that  will  be  necessary,  we  shall  briefly  describe  how  our

smart market might be implemented in a very simple case.

     Consider a simple network fragment: two host machines,

each with multiple users, each connected to a separate local

area network.  The two LANs are connected by a backbone

with a single switch (which admittedly doesn't have much

work to do!).  Users have applications that send packets to

each other.  How would the smart market work if users are

sending each other a steady flow of packets that is sufficient

to cause congestion at the switch if all packets were admitted?



User application


Suppose user 1 on machine 1 (u11 ) is sending e-mail to user

1 on machine 2 (u12 ).  u11  needs to be able to set her bid

(maximum willingness to pay) for the packets that make up

her e-mail message. However, she prefers not to think about

a bid for every message since she usually puts the same, very

low priority price on e-mail. Thus, the e-mail software needs

to provide hooks for a user to set a default bid price, and to

override the default when desired.
_________________________________________
 38  A draft technical report has proposed some semantics and a conceptual
model for network usage accounting, but this has not become a standard,
nor does it deal with billing or cost allocation; see C. Mills (1991).  See
Braun and Claffy (1993) for a detailed discussion of some of the problems
facing usage accounting.



                                       51

User system


The  host  machine  must  handle  some  new  tasks  through

systems software. First, the e-mail is packetized with one new

piece of information loaded into the header: the bid price.39

Also,  since  this  is  a  multiuser  machine  and  the  network

only recognizes machine (IP) addresses, not user names, the

host machine must create a record in an accounting database

that records the user name, number of packets sent, and the

packet identification number. It is not possible to record the

price for the packets yet because of the design of the smart

market: the user specifies her maximum willingness to pay,

but the actual price for each packet may (and typically will)

be lower.  However, since the TCP protocol offers positive

acknowledgement of each packet, the acknowledging packets

that are returned can contain the actual price charged so that

the host database can record user-specific charges.



Local area network


It may be desirable to implement some hooks in the local

organization  network,  before  the  packet  reaches  the  back-

bone.40    For  example,  organization  policy  may  want  to

impose a ceiling on bids to restrict the maximum price that

users  volunteer  to  pay.   Also,  billing  from  the  backbone

provider may be only to the organization level since the IP

address  of  host  machines  identifies  only  a  station,  not  the
_________________________________________
 39  It would be natural to use the priority field to contain the bid price.


 40  In  practice  there  may  be  several  levels  of  interconnected  network
between the user and the backbone: departmental, organization, regional,
national. What we say here about a single local network should generally
apply at each such level.



                                       52

responsible  users.  It  may  be  that  backbone  providers  will

provide bills that itemize by host IP address; the organization

may want to record packets sent by each host, as well as the

price extracted from the acknowledgement return.

     In this example we assume that the local network is not

imposing its own charges on top of the backbone charges. If

local pricing is desired to allocate locally congested resources

(as we suspect if often will be for large organizations), the

tasks identified below for the backbone must also be carried

out by the LAN.
Backbone


As  a  packet  reaches  the  backbone  router,  its  bid  price  is

compared to the current smart market price for admission. If

the bid is too low, a message (presumably implemented in

the ICMP protocol) is returned to the user with the packet

number, user's bid and the current price.  If the bid exceeds

the admission price, then the packet is admitted and routed.

     Every  packet  is  checked  for  its  bid,  but  to  control  the

transactions  costs  of  pricing,  accounting,  and  billing  we

assume that only 1 of every N packets is sampled for further

processing.  A  copy  of  the  header  of  the  sampled  packets

is diverted to a separate CPU, where it is used for several

functions.

     One task is to update the state of demand on the backbone.

Packets with bids come in over time; it will be necessary to

aggregate packets over some window (the width of which

could be time- or event-driven) to construct the ``current''

state of demand.  When a newly sampled packet arrives, it


                                       53

is  added  to  the  history  window  of  bids,  and  a  stale  bid  is

removed.41

     The sampled packet is logged to the accounting database:

the  current  price  times  N  (since  the  packet  represents  on

average  1=N th  of  those  sent  by  a  particular  user)  and  the

billing identification information. Periodically the backbone

provider will prepare and deliver bills.

     Periodically the smart market price would be recalculated

to  reflect  changes  in  the  state  of  demand.   A  new  price

might be event-driven (e.g., recalculated every time a new

N th packet arrives, or less frequently) or time-driven (e.g.,

recalculated  every  T  msecs).   The  new  price  would  then

be sent to the gatekeeper subsystem on the router, and in a

network with multiple nodes possibly broadcast to the other

nodes.42



``Collect calls'': Pricing proxy server packets


We  have  assumed  so  far  that  the  originator  of  a  packet  is

the party to be billed.  Many of the most important Internet

services  involve  packets  that  are  sent  by  one  host  at  the

request  of  a  user  on  another  host.   For  example,  ftp  file

transfers  and  gopher  information  services  take  this  form;

these are currently the first and seventh largest sources of

bytes transferred on the NSFnet backbone (Braun and Claffy

(1993)).   Clearly  most  services  will  not  offer  to  pay  the

network charges for any and all user requests for data.  We
_________________________________________
 41  The market algorithm would account for the fact that each packet was
a representative for N other packets assumed to have the same bid.

 42  We comment below on some of the issues for implementing a smart
market in a multiple node environment.



                                       54

need something like collect calls, COD, or bill-to-recipient's-

account, or all of the above.

     There are at least two straightforward methods to charge

the  costs  back  to  the  responsible  party.   A  traditional  ap-

proach would have users obtain accounts and authorization

codes that permit the proxy server to use an external billing

system for charges incurred by user requests; this is the way

that  many  current  commercial  information  services  (e.g.,

Compuserve) are billed.

     However, the growth of the Internet has been fueled by

the vast proliferation of information services. It is implausible

to think that a user would be willing to obtain separate charge

accounts with every service; it would also be inefficient to

have the necessary credit and risk management duplicated by

every proxy server provider. A more advanced method that

fits in well with the scheme we have described is to allow for

billing directly back to the user's backbone usage account.

     To implement a system of bill-to-sender would require

some further work, however.  The user's application (client

software) would presumably have to allow the user to specify

a maximum price for an entire transaction which could be

included  in  the  request  for  service,  since  it  will  often  be

impossible to anticipate the number of packets that are being

requested.   The  server  could  then  send  the  packets  with

a  flag  set  in  the  packet  header  that  indicates  the  charges

are to be levied against the destination IP address,  not the

source.    However,  to  make  such  a  system  feasible  will

require authentication and authorization services. Otherwise,

unscrupulous  uses  could  send  out  packets  that  were  not

requested by the recipients but charge them to the destination


                                       55

address;  likewise  malicious  pranksters  could  modify  their

system software to generate forged requests for data that is

unwanted by but charged to another user.43


_________________________________________
 43  There may also be a way to steal network services by having them
billed to another user, but we haven't figured out how to do that yet.



                                       56

                                 References


Almquist, P. (1992). Type of service in the internet protocol
         suite. Tech. rep. RFC 1349, Network Working Group.

Anonymous (1986).  Stratacom, inc. introduces `packetized
         voice system'. Communications Week, 2.

Arnott, R., de Palma, A., and Lindsey, R. (1990). Economics
         of a bottleneck. Journal of Urban Economics, 27, 111-
         -130.

Arnott,  R.,  and  Kraus,  M.  (1992a).    Financing  capacity
         on the bottleneck model.  Tech. rep.,  Department of
         Economics, Boston College.

Arnott,  R.,  and  Kraus,  M.  (1992b).     Self-financing  of
         congestible facilities in a dynamic environment. Tech.
         rep., Economics Department, Boston College.

Braun, H.-W., and Claffy, K. (1993).   Network analysis in
         support  of  internet  policy  requirements.   Tech.  rep.,
         San Diego Supercomputer Center.

C.  Mills,  D.  Hirsh,  G.  R.  (1991).     Internet  accounting:
         Background. Tech. rep. RFC 1272, Network Working
         Group.

Cerf,  V.  G.  (1993).    Core  protocols.   In  Internet  System
         Handbook. Addison Wesley, Reading, MA.

Claffy,  K.  C.,  Polyzos,  G.  C.,  and  Braun,  H.-W.  (1992).
         Traffic characteristics of the t1 nsfnet backbone. Tech.
         rep. CS92-252, UCSD.  Available via Merit gopher in
         Introducing the Internet directory.

Cocchi,  R.,  Estrin,  D.,  Shenker,  S.,  and Zhang,  L. (1992).
         Pricing in computer networks:  Motivation,  formula-
         tion, and example.  Tech. rep., University of Southern
         California.

Estrin,  D.  (1989).   Policy  requirements  for  inter  adminis-
         trative  domain  routing.   Tech.  rep.  RFC1125,  USC
         Computer Science Department.

Faulhaber,  G.  R.  (1992).    Pricing  Internet:  The  efficient
         subsidy.   In  Kahin,  B.  (Ed.),  Building  Information
         Infrastructure. McGraw-Hill Primis.

Gerla, M., and Kleinrock, L. (1988).  Congestion control in
         interconnected lans. IEEE Network, 2(1), 72--76.


                                       57

Huber, P. W. (1987).  The Geodesic Network: 1987 Report
         on Competition in the Telephone Industry. U.S. Gov't
         Printing Office, Washington, DC.

K. Claffy, H.-W. B., and Polyzos, G. (1993). Application of
         sampling methodologies to wide-area network traffic
         characterization.  Tech. rep. Technical Report CS93-
         275, UCSD.

Kahin, B. (1992).  Overview: Understanding the NREN.  In
         Kahin, B. (Ed.), Building Information Infrastructure.
         McGraw-Hill Primis, NY.

Kleinrock,  L.  (1992).     Technology  issues  in  the  design
         of NREN.  In Kahin,  B. (Ed.),  Building Information
         Infrastructure. McGraw-Hill Primis.

Krol, E. (1992). The Whole Internet. O'Reilly & Associates,
         Inc., Sebastopol, CA.

MacKie-Mason, J., and Varian, H. (1993). Some economics
         of the internet. Tech. rep., University of Michigan.

Mohring, H., and Hartwize, M. (1962).  Highway Benefits:
         An  Analytical  Approach.    Northwestern  University
         Press, Evanston.

Postel,  J.  (1981).   Darpa  internet  program  protocol  speci-
         fication.  Tech.  rep.  RFC  791,  Information  Sciences
         Institute, University of Southern California.

Prue,  W.,  and  Postel,  J.  (1988).   A  queuing  algorithm  to
         provide type-of-service for ip links.  Tech. rep. RFC
         1046, USC Information Sciences Institute.

Roberts, L. G. (1974).  Data by the packet.  IEEE Spectrum,
         XX, 46--51.

Ruth, G., and Mills, C. (1992).  Usage-based cost recovery
         in internetworks.  Business Communications Review,
         xx, 38--42.

Shenker, S. (1993).  Service models and pricing policies for
         an integrated services internet.  Tech. rep., Palo Alto
         Research Center, Xerox Corporation.

Smarr, L. L., and Catlett, C. E. (1992).  Life after Internet:
         Making room for new applications. In Kahin, B. (Ed.),
         Building  Information  Infrastructure.    McGraw-Hill
         Primis.



                                       58

Strotz, R. (1978). Urban transportation parables. In Margolis,
         J. (Ed.), The Public Economy of Urban Communities.
         Resources for the Future, Washington, D.C.

Waldspurger, C. A., Hogg, T., Huberman, B. A., Kephart,
         J.  O.,  and  Stornetta,  W.  S.  (1992).   Spawn:  A  dis-
         tributed computational economy.  IEEE Transactions
         on Software Engineering, 18(2), 103--117.

Wilson,  R.  (1989).    Efficient  and  competitive  rationing.
         Econometrica, 57(1), 1--40.



                                       59

 




-----------------------------------------------------------------------

     This file passed through SEA OF NOISE, +1 203 886 1441...

                          SHARE & ENJOY!

-----------------------------------------------------------------------