Feeds

AT&T rigs net neutrality study

All hail the tiered internet

High performance access to file storage

A new study from the Rensselaer Polytechnic Institute and the University of Nevada Reno says that net neutrality is a bad idea. Of course, that's what you'd expect it to say. It was paid for by AT&T.

For years, AT&T has called for a "tiered Internet," which would abandon net neutrality in favor of a system where high-bandwidth sites like YouTube are forced to pay higher fees to ISPs like, well, AT&T. Now, the telecoms giant has commissioned a study that supports its own argument. Conducted by researchers at AT&T Labs as well as Rensselaer and Nevada Reno, the study claims that an internet where all traffic is treated equally would require much more capacity than a tiered infrastructure.

"We wanted to take one piece of the overall debate and approach it quantitatively,” said principal investigator Shivkumar Kalyanaraman, professor of electrical, computer, and systems engineering at Rensselaer. "The study makes it clear that there are substantial additional costs for the extra capacity required to operate networks in which all traffic is treated alike."

Using computer models, the study compares today's internet with a two-tiered setup that gives special treatment to high-bandwidth applications like video games and voice over IP (VoIP). According to the models, a net-neutral approach requires between 60 and 100 per cent more capacity to maintain the same level of performance.

Last December, to gain FCC approval for its merger with BellSouth, AT&T agreed to maintain “a neutral network and neutral routing in its wire-line broadband Internet access service" for at least two years. But the company continues to battle the introduction of net neutrality laws in Congress.

FCC chairman Kevin Martin has said he wants to ensure that consumers have access to all Internet content, but he isn't opposed to some sort of tiered model. "It's crucial to ensure that people are able to recoup some of the cost of their investments," he said last month, appearing via satellite at the annual NXTcomm conference in Chicago. “[Providers] should have the flexibility to offer various tiers of service."

This might involve ISPs charging consumers higher fees for faster service or specialized content. Everyone would still have access to all content - but they'd have to pay extra for it.®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.