Home / Blogs

Vint Cerf Speaking Out on Internet Neutrality

Don't miss a thing – sign up for CircleID Weekly Wrap newsletter delivered to your inbox once a week.

In a U.S. congress hearing held yesterday November 9th, significant focus was projected on "network neutrality" and a new telecommunications bill affecting the Internet. "This bill could fundamentally alter the fabulously successful end-to-end Internet," says Alan Davidson in the post on Google blog.

Vint Cerf was not able to testify because of the Presidential Medal of Freedom award ceremony at the White House, but submitted the following letter to the hearing:

Dear Chairman Barton and Ranking Member Dingell,

I appreciate the inquiries by your staff about my availability to appear before the Committee and to share Google's views about draft telecommunications legislation and the issues related to "network neutrality." These are matters of great importance to the Internet and Google welcomes the Committee's hard work and attention. The hearing unfortunately conflicts with another obligation, and I am sorry I will not be able to attend. (Along with my colleague Robert Kahn, I am honored to be receiving the Presidential Medal of Freedom on Wednesday at the White House for our work in creating the Internet protocol TCP/IP.)

Despite my inability to participate in the planned hearing in person, I hope that you will accept some brief observations about this legislation.

The remarkable social impact and economic success of the Internet is in many ways directly attributable to the architectural characteristics that were part of its design. The Internet was designed with no gatekeepers over new content or services. The Internet is based on a layered, end-to-end model that allows people at each level of the network to innovate free of any central control. By placing intelligence at the edges rather than control in the middle of the network, the Internet has created a platform for innovation. This has led to an explosion of offerings – from VOIP to 802.11x wi-fi to blogging – that might never have evolved had central control of the network been required by design.

My fear is that, as written, this bill would do great damage to the Internet as we know it. Enshrining a rule that broadly permits network operators to discriminate in favor of certain kinds of services and to potentially interfere with others would place broadband operators in control of online activity. Allowing broadband providers to segment their IP offerings and reserve huge amounts of bandwidth for their own services will not give consumers the broadband Internet our country and economy need. Many people will have little or no choice among broadband operators for the foreseeable future, implying that such operators will have the power to exercise a great deal of control over any applications placed on the network.

As we move to a broadband environment and eliminate century-old non-discrimination requirements, a lightweight but enforceable neutrality rule is needed to ensure that the Internet continues to thrive. Telephone companies cannot tell consumers who they can call; network operators should not dictate what people can do online.

I am confident that we can build a broadband system that allows users to decide what websites they want to see and what applications they want to use – and that also guarantees high quality service and network security. That network model has and can continue to provide economic benefits to innovators and consumers — and to the broadband operators who will reap the rewards for providing access to such a valued network.

We appreciate the efforts in your current draft to create at least a starting point for net neutrality principles. Google looks forward to working with you and your staff to draft a bill that will maintain the revolutionary potential of the broadband Internet.

Thank you for your attention and for your efforts on these important issues.

Sincerely,

Vinton Cerf
Chief Internet Evangelist
Google Inc.

By CircleID Reporter

Related topics: Access Providers, Broadband, Net Neutrality, Security, Telecom, VoIP, Wireless

 
   

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Sponsored Topics

Promoted Posts

Now Is the Time for .eco

.eco launches globally at 16:00 UTC on April 25, 2017, when domains will be available on a first-come, first-serve basis. .eco is for businesses, non-profits and people committed to positive change for the planet. See list of registrars offering .eco more»

Boston Ivy Gets Competitive With Its TLDs, Offers Registrars New Wholesale Pricing

With a mission to make its top-level domains available to the broadest market possible, Boston Ivy has permanently reduced its registration, renewal and transfer prices for .Broker, .Forex, .Markets and .Trading. more»

Industry Updates – Sponsored Posts

Leading Internet Associations Strengthen Cooperation

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

2016 U.S. Election: An Internet Forecast

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail Raises $12M for Its Email Authentication Service

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

i2Coalition to Host First Ever Smarter Internet Forum

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities