Feeds

Everyone's a winner in the Comcast - BitTorrent detente

Everyone except the Neutralists?

Secure remote control for conventional and virtual desktops

Policy created in election years tends to be infused with hyper-polarization, so to the extent that Comcast and BitTorrent can make the FCC calm down and let business take its course, consumers will be the winners. For the moment, BitTorrent also has a leg up on its litigious competitor in peer-to-peer TV, Vuze. But these two rivals may reach parity if the latter decides to focus on its core business, rather than than lawsuits that enable Vuze to profit from the use of other people's software to distribute other people's content over (still) other people's bandwidth.

A smarter network beats the dumber network

Another winner in the new Comcast order is tradition.

Since the days of three-digit RFCs, it's been standard practice for network operators to correct the TCP protocol's mistaken notion that fairness consists of the right to consume bandwidth in proportion to ones appetite by applying fair queuing at the entry to the first hop. One of the first to write about this was John Nagle, father of "Nagle's Algorithm", and the key internet RFCs 896 and 970.

Writing on Slashdot, Nagle said recently:

The way [congestion control] was supposed to work is that TCP needs to be well-behaved because it is to the advantage of the endpoint to be well-behaved. What makes this work is enforcement of fair queuing at the first router entering the network. Fair queuing balances load by IP address, not TCP connection, and 'weighted fair queueing [sic]' allows quality of service controls to be imposed at the entry router. "

The losers are those who still think, against all the evidence, that the Internet is a "stupid network".

New equipment permits Comcast to enforce fair queuing at the first router inside their network, and a better understanding of tradition motivates BitTorrent to curb its appetite. In the future, this equipment and its complements will permit users to apply their own preferences to the various streams they generate at the same time, so they won't even have to worry about the effect that one member of their family's uploads have on others' web browsing and VoIP sessions.

Comcast isn't there yet, but the replacement of application-centric network infrastructure with traffic-sensitive equipment is a strong step in the right direction, and all of us who buy network services from the cable company should be happy about it.®

Internet Security Threat Report 2014

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.