decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
There is no such thing as "Net Neutrality"... | 273 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
There is no such thing as "Net Neutrality"...
Authored by: Chromatix on Sunday, June 17 2012 @ 08:18 PM EDT
Most "network neutrality" laws and policies I'm aware of allow:

1) Prioritising specific types of traffic to improve service. For example, small packets are usually interactive traffic which benefits from low latency. This basically encompasses the entire field of QoS, including AQM and FQ disciplines.

2) Prioritising traffic to or from specific sites, in accordance with policies published or even marketed to customers. In some cases, ISPs may even allow customers to customise this aspect of their service.

3) Throttling heavy users during periods of high traffic demand, so that lighter users still get good service. This could be implemented as a coarser- scale version of the QoS mentioned in point 1.

4) Outright blocking traffic deemed to be harmful, such as flood attacks or worm spreading vectors. (This does not include BitTorrent.)

5) Outright blocking traffic to specific sites as part of a specific service to customers, such as parental control.

All of the above are reasonable traffic management practices. It is not reasonable to enforce a "pure dumb pipe" requirement on all ISPs, even if some of them are happy to provide that type of service.

What is generally not allowed is to block or throttle specific types of traffic that are not inherently harmful, and which customers have not specifically agreed to. This also disallows the spoofing of TCP RST packets to forcibly close BitTorrent connections, which Comcast used to do.

Incidentally, the problem with Comcast was with the method of obtaining upload bandwidth on the shared cable. The cable equipment permitted a combination of several heavy uploaders to accidentally monopolise the upload bandwidth, drowning out lighter users who only needed the uplink for ACK packets and requests. The correct solution in such a case is to patch the equipment so that it always leaves some room for light users (see point 3 above) - and I would hope that such a solution was even cheaper than installing DPI boxes.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )