docs/diploma

diff thesis/tex/2-MarketAnalysis.tex @ 126:27ddf2506157

outsourced floats; minor stuff
author meillo@marmaro.de
date Tue, 09 Dec 2008 16:04:02 +0100
parents f2046b9c5382
children a83a29e10b10
line diff
     1.1 --- a/thesis/tex/2-MarketAnalysis.tex	Sun Dec 07 17:29:29 2008 +0100
     1.2 +++ b/thesis/tex/2-MarketAnalysis.tex	Tue Dec 09 16:04:02 2008 +0100
     1.3 @@ -32,47 +32,13 @@
     1.4  
     1.5  
     1.6  
     1.7 -%\begin{figure}
     1.8 -%	\begin{center}
     1.9 -%\begin{verbatim}
    1.10 -% ---------------------------------------------------
    1.11 -%             |                  |                  |
    1.12 -% messages    |  email           | voicemail        |
    1.13 -% asynchron   |  SMS             | video messages   |
    1.14 -%             |                  |                  |
    1.15 -% ---------------------------------------------------
    1.16 -%             |                  |                  |
    1.17 -% dialog      |  IM              | VoIP             |
    1.18 -% synchron    |  chat            | video conference |
    1.19 -%             |                  |                  |
    1.20 -% ---------------------------------------------------
    1.21 -%             |                  |                  |
    1.22 -%             | written          | recorded         |
    1.23 -%             |                  |                  |
    1.24 -%\end{verbatim}
    1.25 -%	\end{center}
    1.26 -%	\caption{Classification of electronic communication}
    1.27 -%	\label{fig:comm-classification}
    1.28 -%\end{figure}
    1.29 -
    1.30 -
    1.31  \input{kvmacros}
    1.32  \kvunitlength=3cm
    1.33  \kvnoindex
    1.34  
    1.35 -\begin{figure}
    1.36 +\begin{figure} %fixme: table or figure?
    1.37  	\begin{center}
    1.38 -\karnaughmap{2}{}{
    1.39 -  {\parbox{\kvunitlength}{asynchronous\\(messages)}}
    1.40 -  {written}
    1.41 -  {\parbox{\kvunitlength}{synchronous\\(dialog)}}
    1.42 -  {recorded}
    1.43 -}{
    1.44 -	{\parbox{0.8\kvunitlength}{email\\\NAME{SMS}}}
    1.45 -	{\parbox{0.8\kvunitlength}{voice mail\\video messages}}
    1.46 -	{\parbox{0.8\kvunitlength}{\NAME{IM}\\chat}}
    1.47 -	{\parbox{0.8\kvunitlength}{VoIP\\video conferencing}}
    1.48 -}{}
    1.49 +		\input{input/comm-classification.tex}
    1.50  	\end{center}
    1.51  	\caption{Classification of electronic communication}
    1.52  	\label{fig:comm-classification}
    1.53 @@ -90,26 +56,7 @@
    1.54  
    1.55  \begin{figure}
    1.56  	\begin{center}
    1.57 -		\begin{verbatim}
    1.58 -|            |             |          |    *******  |          |
    1.59 -|            |             |          |*#**       **|  telefax |
    1.60 -|            |             |      ***** email       ***#**     |
    1.61 -|            |             |    **    |             |     *****|
    1.62 -|            |             |*#**      |             |          |
    1.63 -|            |           *** IM       |             |          |
    1.64 -|            |         **  |          |             |          |
    1.65 -|            |      *#*    |          |             |          |
    1.66 -|            |    ** VoIP  |          |             |          |
    1.67 -|            |  **         |          |             |          |
    1.68 -|        voice *           |          |             |          |
    1.69 -| video  mail**            |          |             |          |
    1.70 -| mess.   #**|             |          |             |          |
    1.71 -|    #****   |             |          |             |          |
    1.72 -|****        |             |          |             |          |
    1.73 -----------------------------------------------------------------
    1.74 -|            |             |          |             |          |
    1.75 -| introduct. | growth      | mature   | saturation  | decline  |
    1.76 -		\end{verbatim}
    1.77 +		\input{input/comm-lifecycle.tex}
    1.78  	\end{center}
    1.79  	\caption{Life cycle of electronic communication technologies}
    1.80  	\label{fig:comm-lifecycle}
    1.81 @@ -183,6 +130,11 @@
    1.82  
    1.83  The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it.
    1.84  
    1.85 +\begin{quote}
    1.86 +Since receivers pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, or until people can no longer use email.
    1.87 +\url{http://www.dwheeler.com/guarded-email/guarded-email.html}
    1.88 +\end{quote}
    1.89 +
    1.90  Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and and stresses mail servers a lot.
    1.91  
    1.92  The use of various hardware to access mail is another opportunity of the market. The software and infrastructure needed to transfer mail within this network might be a weakness of the email system. %fixme: think about that
    1.93 @@ -196,23 +148,7 @@
    1.94  
    1.95  \begin{figure}
    1.96  	\begin{center}
    1.97 -		\begin{verbatim}
    1.98 - ---------------------------------------------------
    1.99 -             |                  |                  |
   1.100 - strength    | standard         |                  |
   1.101 - of email    | modular,extensible|                  |
   1.102 -             |                  |                  |
   1.103 - ---------------------------------------------------
   1.104 -             | big data transfer|                  |
   1.105 - weaknesses  | too big for phone|                  |
   1.106 - of email    |                  | spam             |
   1.107 -             |                  |                  |
   1.108 - ---------------------------------------------------
   1.109 -             |                  |                  |
   1.110 -             | opportunities of | threats of       |
   1.111 -             | market           | market           |
   1.112 -             |                  |                  |
   1.113 -		\end{verbatim}
   1.114 +		\input{input/email-swot.tex}
   1.115  	\end{center}
   1.116  	\caption{\NAME{SWOT} analysis for email}
   1.117  	\label{fig:email-swot}
   1.118 @@ -253,7 +189,8 @@
   1.119  %FIXME: add reference to push email
   1.120  
   1.121  
   1.122 -\subsubsection*{Internet Mail 2000}
   1.123 +\subsubsection*{New email protocols}
   1.124 +
   1.125  Another concept to redesign the electronic mail system, but this time focused on mail transfer is named ``Internet Mail 2000''. It was proposed by Daniel J.\ Bernstein, the creator of \name{qmail}. Similar approaches were independently introduced by others too.
   1.126  
   1.127  As main change it makes the sender have the responsibility of mail storage; only a notification about a mail message gets send to the receiver, who can fetch the message then from the sender's server. This is in contrast to the \NAME{SMTP} mail architecture, where mail and the responsibility for it is transferred from the sender to the receiver.
   1.128 @@ -262,6 +199,9 @@
   1.129  %FIXME: add references for IM2000
   1.130  
   1.131  
   1.132 +%add ``guarded email'' by dwheeler
   1.133 +
   1.134 +%maybe add a third one
   1.135  
   1.136  
   1.137  
   1.138 @@ -276,6 +216,7 @@
   1.139  
   1.140  
   1.141  \section{What will be important}
   1.142 +\label{sec:what-will-be-important}
   1.143  Now that it is explained why email will survive (in some changed but related form), it is time to think about the properties required for \mta{}s in the next years. Because as the fields and kinds of usage change, the requirement change too.
   1.144  
   1.145  Provider independence through running an own mail server at home asks for easy configuration of the \MTA. Providers have specialists to configure the systems, but ordinary people do not. Solutions are either having some home service system for computer configuration established with specialists coming to ones home to set up the systems; like it is already common for problems with the power and water supply systems. Or configuration needs to be easy and fool-prove, to be done by the owner himself. The latter solution depends on standardized parts that fit together seamlessly. The technology must not be a problem itself. Only settings custom to the users environment should be left open for him to set. This of course needs to be doable using a simple configuration interface like a web interface. Non-technical educated users should be able to configure the system.