Feeds

Lessig leads Net Neut charge in Stanford inquisition

Tripping the light Comcastic

Gartner critical capabilities for enterprise endpoint backup

Left Coast Comcast Hearing "The most outrageous thing about this whole story," Larry Lessig told FCC boss Kevin Martin, "is that we can't get the facts straight."

And we agree with him.

When the US Federal Communications Commission parachuted into Silicon Valley last week, pulling together another public hearing on the network management practices of American ISPs, Lessig was on the guest list, and as you might expect, he came down hard on Comcast, the big-name cable provider that's made a habit of throttling BitTorrent and other peer-to-peer traffic. The Free Culture-loving Stanford law professor is on the board at Free Press, one of the organizations that petitioned the FCC to investigate Comcast's behavior.

In a prepared speech, Lessig urged the commission to lay down hard and fast net neutrality rules, arguing this is the only way to ensure that Americans - including consumers, developers, and investors - know what they're getting from the country's ISPs.

"We are here facing these problems because of a failure in FCC policy," he said. "The FCC has failed to make it absolutely clear that the network owners that are building the internet need to build it neutrally. It is this failure of clear policy that makes us wonder why exactly Comcast is doing what its doing at the network level."

This sort of talk was well received by the liberal-minded crowd that turned up at the hearing - held on Stanford's campus - but the Comcast controversy goes well beyond the usual debate over net neutrality. The truth is that we still don't know what Comcast is doing at the network level - as Lessig later pointed out when questioned by Kevin Martin.

"The least we should be able to do is have an agency of the United States government get the truth about what's actually happening here," Lessig told Martin. "The most important thing you can do - right away - is address the question of 'What happened?'"

Or rather, What's happening? Though Comcast has said it will stop throttling traffic by the end of the year, that's still a ways away.

Delay tactics

As Martin told the Stanford hearing, Comcast continues to say that it's merely delaying traffic - not blocking it. The company said it was delaying when the FCC held its first network management hearing in late February. And it said so again with a March 28 letter to Martin and his fellow commissioners.

But tests have shown that Comcast is preventing users from "seeding" peer-to-peer uploads. In certain cases, when one machine downloads a file and attempts to upload that file to another machine, Comcast uses a forged "reset flag" to breaks this peer-to-peer connection.

"It's very clear that this is blocking," said Jon Peha, the associate director of the Center for Wireless and Broadband Networking and a professor in the department of electrical and computer engineering at Carnegie Mellon University. "When you delay something, it does eventually happen. If you intervene in some way that the thing never happens unless someone takes another step, that is not delaying.

"If you block my phone call and I get a busy signal, I have to dial again if I want to make the call later. That's not delaying. That's blocking. And that's what's happening here, when they're sending tcp reset packets. They are terminating the call. They end it. Unless you call again, it won't happen."

Boost IT visibility and business value

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.