Net Neutrality

Net Neutrality / Most Viewed

Regulating and Not Regulating the Internet

There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more

Why the Blackout Never Happened: Internet Governance Lessons From Poland’s Energy Sector

Poland thwarted a large-scale cyberattack on its energy grid without disruption, offering a rare case study in critical infrastructure resilience, decentralised energy governance, and the balancing act between openness and digital security. more

Why a Net Neutrality Law is Not Enough

Once we decide that Network Neutrality is a good thing to (re)enshrine in law, then we need to ask how to do that effectively. One way would be to pass a law saying, "Thou shalt not discriminate." That's the current approach. But network operators will say that they must manage their network, and if, in the course of network management, they were to disadvantage some source, destination, application, service or content, they might be accused of violating the law. So any Network Neutrality law must have a Network Management Exception... more

Where Is Net Neutrality When We Need It?

Just in the last two weeks, two stories in the United States hit the press that highlight behavior from ISPs that would have likely have violated the Net Neutrality rules that were killed by Ajit Pai's FCC. The big ISPs have been surprisingly quiet and have not loudly violated those rules, even though they are no longer in effect. The industry speculation is that the big ISPs are treading lightly because they don't want to trigger a regulatory overreaction should there be a change of party in the administration or Congress. more

WCIT Denouement

It is midnight in Dubai and I am listening to the final readings of the International Telecommunication Regulations (ITR). This instrument is the final output of two weeks of negotiations at the World Conference on International Telecommunication (WCIT), a gathering of the world's nations to update the the ITRs. The Chair goes through the document article by article, section by section, and with each passing "thank you", this Conference draws to a close. Many in the room are elated. more

P2P: Boon, Boondoggle, or Bandwidth Hog? (The Dark Side)

Yesterday's post explained how peer-to-peer (P2P) applications use the processing power, bandwidth, and storage capacity of participants in a service rather than centralized resources. This makes such applications generally less subject to catastrophic failure, much less subject to running out of resources (since each new user brings new capacity as well as new demand), and much cheaper FOR THE PROVIDER of the application in terms of hardware and bandwidth required. It's the FOR THE PROVIDER part that's the rub. Let's consider the case of BBC's iPlayer service... more

FCC: We Will Regulate Broadband

Since the dust has settled from a stinging defeat in federal court, the FCC has decided to move on its own to settle the broadband regulation dispute. With a 3-2 vote the commission issued a Notice of Inquiry that would set the stage for more regulatory authority of broadband. It seems ironic that the motivating factor was the court case brought by Comcast in Federal District Court to immobilize the FCC's efforts to sanction the service provider from throttling Bit Torrent, file sharing customers. more

Beyond Net Neutrality: A Manifesto for Internet Freedom

The Internet's existence within the regulatory system has been a disastrous failure. Network Neutrality is fine as far as it goes. The problem is that it leaves the current abysmal system in place. On my Economics and Architecture of IP Networks Mail list, Erik Cecil has been deconstructing the regulatory system. Bottom line -- the most significant thing that can be done for the citizens of the internet in the US would be for the FCC to declare the internet protocol to be telecommunications and no longer exempt from regulation. more

Return of Net Neutrality: Discussion of European Net Neutrality Proposal Relevant for U.S. Broadband Market

There is an interesting recent discussion in Europe about net neutrality that has relevance to the U.S. broadband market. The European Commission that oversees telecom and broadband has started taking comments on a proposal to force content generators like Netflix to pay fees to ISPs for using the Internet. I've seen this same idea circulating here from time to time, and in fact, this was one of the issues that convinced the FCC first to implement net neutrality. more

Berkman Broadband Study: Mixing Passion and Scholarship

Last week, comments were filed with the FCC in response to the Berkman study of international broadband comparisons... Many of the comments were not supportive of the Harvard Berkman study. In an earlier blog posting, we had observed that there appeared to be statistical problems in the Berkman study that would not hold up to peer review. Our comments may have understated the extent of the problems. more

From “Network Neutrality” to “Sender Pays”, the Principles Remain Much the Same

The entire set of issues of network neutrality, interconnection and settlements, termination monopolies, cost allocation and infrastructure investment economics is back with us again. This time it's not under the banner of "Network Neutrality" but under a more directly confronting title of "Sender Pays." The principle is much the same: network providers want to charge both their customers and the content providers to carry content to users. more

Netflix Has Buyer’s Remorse Over Its Paid Peering Deal With Comcast

Soon after capitulating to Comcast's surcharge demand for improved treatment of its traffic, Netflix got better downstream delivery speeds. Apparently Comcast did not have to undertake a major bandwidth expansion program. Much to the immediate relief of Netflix, Comcast merely needed to allocate more ports for Netflix traffic. So with a reallocation of available bandwidth, Comcast solved Netflix's quality of service dilemma apparently without degrading service to anyone else, upstream or downstream. more

First Square Mile is not the Last or First Mile: Discovery not Just Choices!

The term "last mile" highlights the fact that we are the consumers at the end of a broadband "pipe". Saying "first mile" is a little better but the Internet is not a pipe to or from somewhere else. It's about what we can do locally and then what we can do when we interconnect with other neighborhoods. It's better to describe our neighborhood as the first square mile. Telecom is about selling us services; the Internet is about what we can do ourselves locally and then interconnecting with others everywhere. In writing the First Square Mile - Our Neighborhood essay which I just posted I came to better understand the fundamental difference between the world of telecom which is about giving you choices and the Internet which provides opportunity to discover what we can't anticipate... more

Why Regulate Cable Internet Access

The cable guys have their way of saying it: "What do you want to do, nationalize our businesses?" Another way of seeing this issue is: We have a very few very large providers of highspeed internet access in U.S. They have sufficient market power to decide how and when to prioritize internet communications. And all of these providers are competing with the internet in some way -- they are all (or are becoming) old media and old telecom companies that want to maintain control over their distribution channels. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more