Linux Security
    Linux Security
    Linux Security

    On Net Neutrality

    Date 08 Apr 2010
    Category Government
    Posted By Anthony Pell
    On Tuesday in Washington, DC, the U.S. Court of Appeals for the District of Columbia ruled that the FCC lacks authority to require broadband providers to give equal treatment to all Internet traffic flowing over their networks.
    This begs two questions. First, if not the FCC, then who has that authority? The second, bigger question is what does this do for the issue of Net Neutrality in the United States?

    The decision was a victory for cable provider Comcast who has been accused of traffic shaping on its network. Comcast argues, perhaps correctly, that since they built the network and since they manage the network, they are in the right when it comes to what traffic can and cannot cross their network.

    On the other side are users and companies, like Google, that feel that the pipes, regardless of who owns them, should be open and available to whomever wants to use them.

    And therein is the rub. Third party providers of services such as VoIP have long complained that Comcast has been throttling their packets, resulting in a lower quality of service, while Comcast gave a higher QoS its own packets. This is all well and good if you are trying to keep a competing product out (or so the mantra of capitalism would go) but it causes issues when you are communicating between systems, or, as Google has argued in the past, when the route from Point A to Point E goes across the network of Point C.

    The link for this article located at Linux Journal is no longer available.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.