Home / Blogs

Treating Different Types of Communications Differently

David Isenberg

A friend who read my Creating Sustainable Network Neutrality paper wrote to say, "Help me understand what is so bad about treating different types of communications differently."

That's a really good question! My answer:

1. If you want to offer vertically integrated services on special purpose networks, such as video entertainment or pager service or telephony, I do not have a problem with that, provided you don't use your market power to impede Internet applications that offer competing services. (In fact, many of these are extremely useful; consider for example the Cisco technician who deals with router outages, you don't want to depend on the Internet to reach her, because the Internet service at her location is by definition on the blink, but instead you'd better use a non-Internet-dependent pager or cell phone.)

2. On the Internet, you don't need to treat different types of communications differently. In every case, simply adding more capacity is more cost effective and more reliable in getting the packets where they need to go than treating different types of communications differently. This is a conclusive finding dating back to Andrew Odlyzko's work at Bell Labs in the early 1990s. So if carriers want to treat different types of Internet traffic differently, they must be doing it for other than operational reasons — e.g., because discriminating different kinds of traffic is more consistent with their business model.

3. On the Internet, treating different types of communications differently is anti-innovative. One of the strengths of the Internet is its stupidity, that is, its ability to carry all kinds of traffic without "asking permission" for special kinds of carrier services. So we have this great Internet thingy that you and I can use for our own private application, where we can be as inventive as we want without having to pay for some special service, without waiting for clueless execs to approve anything, without having to fit our new service into some pre-existing category, etc.

4. On the Internet, if you treat different types of communications differently, it is a slippery slope. Once the machinery for treating different types of communications differently is in place, the people in charge of that machinery might want to give their financial partners an advantage. Or they might want to give ideologies they like an advantage, and suppress the ones they think are dangerous.

There's more, but I think these are the high-order bits.

By David Isenberg, Principal Prosultant(sm), isen.com, LLC. More blog posts from David Isenberg can also be read here.

Related topics: Access Providers, Broadband, Net Neutrality, Networks, Telecom


Don't miss a thing – get the Weekly Wrap delivered to your inbox.


To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Dig Deeper


Sponsored by Verisign

IP Addressing

Sponsored by Avenue4 LLC

DNS Security

Sponsored by Afilias

Mobile Internet

Sponsored by Afilias Mobile & Web Services

Promoted Posts

Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s. more»

Industry Updates – Sponsored Posts

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

2016 U.S. Election: An Internet Forecast

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Mobile Web Intelligence Report: Bots and Crawlers May Represent up to 50% of Web Traffic

Data Volumes and Network Stress to Be Top IoT Concerns

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Dyn Evolves Internet Performance Space with Launch of Internet Intelligence

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Verisign iDefense 2015 Cyber-Threats and Trends

3 Questions to Ask Your DNS Host About DDoS

Afilias Partners With Internet Society to Sponsor Deploy360 ION Conference Series Through 2016

Neustar to Build Multiple Tbps DDoS Mitigation Platform

Nominum Announces Future Ready DNS

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Tips to Address New FFIEC DDoS Requirements

Is Your Organization Prepared for a Cyberattack?

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks