Feeds

FCC censures Comcast for doing its job

Hangs the monkey

Top three mobile application threats

The resurrection of Neutrality

The ruling is borne out of political pressure from a campaign funded by George Soros' Free Press, amongst others who cried foul at the actions of the US' biggest cable operator.

Last autumn, Comcast found itself in an invidious position, one very few Reg readers would want to be in. Due to a bug in the cable modem protocol (DOCSIS), Comcast found that heavy BitTorrent users were crippling its network. BitTorrent doesn't respect the "honor box" of the internet, and it's not alone in not doing so. But the cable operator realised that BitTorrent users were all requesting bandwidth allocation on a per-packet basis at the same time. Because with the version of DOCSIS deployed by Comcast, all applications use the same slot for requesting bandwidth, and because BitTorrent requests bandwidth so aggressively (hundreds of times in a minute, compared to a few times an hour for an email application), the P2P app was effectively starving other applications of oxygen.

(DSL modems don't have this particular technical gotcha - and next-generation cable modems based on DOCSIS 3.0 work around it.)

So, for the most aggressive P2P users Comcast resorted to a crude workaround - but one much less crude than banning BitTorrent, or making downloads slower. At times of peak load, Comcast looked for BitTorrent seeders and threw away a few upload requests, for short periods of a few seconds. This let other network applications breath again, and BitTorrent performance increased overall.

But campaigners, despairing of seeing their hobby horse die (Neutrality activism had peaked in 2006 with the tabling of two bills in Congress), saw their chance.

Ignoring the fact that the P2P experience for humans at the end of the pipe (remember them?) was enhanced by the action, campaigners argued that Comcast was "busting" Torrents. It made for great headlines. Comcast's clunky technical fix was matched by even clunkier PR, with the cable company's flaks foolishly denying the network was engaged in traffic management. Given half a clue, Comcast last year should have argued that it's traffic management that "saves the internet" from collapsing in a heap. But Comcast has underestimated the ideological determination of its opponents, and campaigners' success in turning metaphors into engineering practices. Once unleashed, the mob began to imagine neutrality violations everywhere.

Comcast has since renounced the practice and engaged in an effort to create a better P2P experience for the future. It debunked the "busting" arguments in this FCC filing (pdf).

The landmark decision draws together two strands of policy - one old and specific to the US, and one new and widespread.

I've noted before how American politics are largely fought through symbolic gestures. Think of the bitter fights over the wording on the US currency, or inscriptions on public statues. The Neutrality campaign was similarly engaged in a symbolic battle.

But the other aspect is more disturbing. Britain's equivalent of the FCC, Ofcom, prides itself on what it calls "evidence-based policy making". It may not always succeed, but it's a tradition based on empiricism. With "Net Neutrality", what we're seeing is the opposite, where the direction is set on a hunch or intuition, or the angst of a mob, and the facts cherry-picked to support the conclusion. The definition of harm and "busting" are great illustrations. Call it "policy-based evidence-making", if you like.

The ruling is expected shortly. ®

Top three mobile application threats

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.