Feeds

FCC censures Comcast for doing its job

Hangs the monkey

Combat fraud and increase customer satisfaction

The resurrection of Neutrality

The ruling is borne out of political pressure from a campaign funded by George Soros' Free Press, amongst others who cried foul at the actions of the US' biggest cable operator.

Last autumn, Comcast found itself in an invidious position, one very few Reg readers would want to be in. Due to a bug in the cable modem protocol (DOCSIS), Comcast found that heavy BitTorrent users were crippling its network. BitTorrent doesn't respect the "honor box" of the internet, and it's not alone in not doing so. But the cable operator realised that BitTorrent users were all requesting bandwidth allocation on a per-packet basis at the same time. Because with the version of DOCSIS deployed by Comcast, all applications use the same slot for requesting bandwidth, and because BitTorrent requests bandwidth so aggressively (hundreds of times in a minute, compared to a few times an hour for an email application), the P2P app was effectively starving other applications of oxygen.

(DSL modems don't have this particular technical gotcha - and next-generation cable modems based on DOCSIS 3.0 work around it.)

So, for the most aggressive P2P users Comcast resorted to a crude workaround - but one much less crude than banning BitTorrent, or making downloads slower. At times of peak load, Comcast looked for BitTorrent seeders and threw away a few upload requests, for short periods of a few seconds. This let other network applications breath again, and BitTorrent performance increased overall.

But campaigners, despairing of seeing their hobby horse die (Neutrality activism had peaked in 2006 with the tabling of two bills in Congress), saw their chance.

Ignoring the fact that the P2P experience for humans at the end of the pipe (remember them?) was enhanced by the action, campaigners argued that Comcast was "busting" Torrents. It made for great headlines. Comcast's clunky technical fix was matched by even clunkier PR, with the cable company's flaks foolishly denying the network was engaged in traffic management. Given half a clue, Comcast last year should have argued that it's traffic management that "saves the internet" from collapsing in a heap. But Comcast has underestimated the ideological determination of its opponents, and campaigners' success in turning metaphors into engineering practices. Once unleashed, the mob began to imagine neutrality violations everywhere.

Comcast has since renounced the practice and engaged in an effort to create a better P2P experience for the future. It debunked the "busting" arguments in this FCC filing (pdf).

The landmark decision draws together two strands of policy - one old and specific to the US, and one new and widespread.

I've noted before how American politics are largely fought through symbolic gestures. Think of the bitter fights over the wording on the US currency, or inscriptions on public statues. The Neutrality campaign was similarly engaged in a symbolic battle.

But the other aspect is more disturbing. Britain's equivalent of the FCC, Ofcom, prides itself on what it calls "evidence-based policy making". It may not always succeed, but it's a tradition based on empiricism. With "Net Neutrality", what we're seeing is the opposite, where the direction is set on a hunch or intuition, or the angst of a mob, and the facts cherry-picked to support the conclusion. The definition of harm and "busting" are great illustrations. Call it "policy-based evidence-making", if you like.

The ruling is expected shortly. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.